Decrypt the payload content
Use the matched-data-cli
tool to decrypt a payload in the command line.
-
Download ↗ the
matched-data-cli
tool for your platform from the Releases page on GitHub, under Assets. -
Extract the content of the downloaded
.tar.gz
file to a local folder. -
Open a command line window and change to the local folder containing the
matched-data-cli
binary. -
Create two files: one with your private key and another one with the encrypted payload:
Replace
<PRIVATE_KEY>
with your private key and<ENCRYPTED_PAYLOAD>
with the encrypted payload.Note: The first
printf
command will make your private key visible in your command history. -
Run the following command to decrypt the payload:
The following example creates two files — one with the private key and another one with the encrypted payload — and runs the matched-data-cli
tool to decrypt the payload in the encrypted_payload.txt
file: