Decrypt the payload content in the command line
Use the matched-data-cli
tool to decrypt a payload in the command line.
-
Download the
matched-data-cli
tool for your platform from the Releases page on GitHub, under Assets. -
Extract the content of the downloaded
.tar.gz
file to a local folder. -
Open a command line window and change to the local folder containing the
matched-data-cli
binary.~ $ cd matched-data-cli
-
Create two files: one with your private key and another one with the encrypted payload:
~/matched-data-cli $ printf "<PRIVATE_KEY>" > private_key.txt && chmod 400 private_key.txt ~/matched-data-cli $ printf "<ENCRYPTED_PAYLOAD>" > encrypted_payload.txt
Replace
<PRIVATE_KEY>
with your private key and<ENCRYPTED_PAYLOAD>
with the encrypted payload.Note: The first
printf
command will make your private key visible in your command history. -
Run the following command to decrypt the payload:
~/matched-data-cli $ ./matched-data-cli decrypt -k private_key.txt encrypted_payload.txt
Example
The following example creates two files — one with the private key and another one with the encrypted payload — and runs the matched-data-cli
tool to decrypt the payload in the encrypted_payload.txt
file:
~ $ cd matched-data-cli
~/matched-data-cli $ printf "uBS5eBttHrqkdY41kbZPdvYnNz8Vj0TvKIUpjB1y/GA=" > private_key.txt && chmod 400 private_key.txt
~/matched-data-cli $ printf "AzTY6FHajXYXuDMUte82wrd+1n5CEHPoydYiyd3FMg5IEQAAAAAAAAA0lOhGXBclw8pWU5jbbYuepSIJN5JohTtZekLliJBlVWk=" > encrypted_payload.txt
~/matched-data-cli $ ./matched-data-cli decrypt -k private_key.txt encrypted_payload.txt
test matched data