The user needs to know the decryption key required to unravel the messages.
The malware author is the only party that knows the needed private decryption key.
Reading the contents of the packet requires a decryption key.
Her real name was considered important as the possibility exists that it may be the decryption key for the code.
The password is then used to derive a decryption key.
Some countries require decryption keys to be recoverable in case of a police investigation.
And that allows it to determine the decryption key for the title.
The alternative is to actually use the information in the fingerprint as the decryption key.
There is no central device that maintains the decryption keys or the library of content.
It additionally tries to protect a secret decryption key from the users of the system.