Compromised Keys Exploit Without Limits