Comments are closed in I27 Part Two, so I figured I'd start a thread here. I've updated part of the text in I27P2 in an attempt to clarify exactly what the heck they were trying to use CB to do to crack the encryption on the file. People who actually understand encryption found the old description confusing. Hopefully this one is a bit clearer.
In technical writing parlance, this is what is known as "iterative documentation" :-)