I find it very funny that computer security is based on a principle of randomly generated secret.
Anyone could *potentially* generate the exact same secret when trying to brute force a system
It's unlikely in practice, but it's theoretically possible to brute force a system in one try
I have no guarantee that today, someone won't be generating an SSH key identical to mine