Address to the author of this article. I'm too lazy to read it. Load the page of this article, locate the section "Comments and Discussions" at the end and use "Add a Comment or Question" to ask your question.
However, if instead you need to understand how
not to defeat the purpose of asymmetric encryption, read the article where this not-so-trivial logic is explained really
correctly:
http://en.wikipedia.org/wiki/Public-key_cryptography[
^].
This is just a matter of one-in-a-lifetime enlightenment.
—SA