thats advantageous in the context of key spraying attacks, aiming to get as many possible keys blacklisted as forgeries, leading to large scale key losses.
you dont have to know any keys just the structure of a valid key, then make things up according to spec