Comment by dh2022
relevant to this discussion is an essay from James Mickens : https://www.usenix.org/system/files/1401_08-12_mickens.pdf
This essay is relevant to this situation because the threat model in James’ essay is almost the same way this cipher was decrypted.