How do key matrices work? | Dark Hacker News