Discussion about this post

User's avatar
diogenez's avatar

It doesn't take much to imagine how this metadata could be used to pursue whistle blowers.

Expand full comment
Mahousu's avatar

Uh, this is basically completely inaccurate. Yes, essentially all older ciphers and ciphers with keys of, say, 64 bits or shorter should be regarded as badly broken. But properly implemented ciphers in current use with keys of 128 bits or longer are still for the most part secure, even in cases like RC4 which have been partially broken. Problems arise mostly from weaknesses in cryptosystem design, as in, e.g., 128-bit WEP, which can be trivially broken in less than a minute, even though it is effectively using a 104-bit key. But, as we increasingly move to 256-bit keys, and the flaws in existing designs are addressed, "breaking" ciphers in the traditional sense becomes less and less an issue.

Which is why places like NSA increasingly are not going that route. After all, what is the point in trying to break an SSL connection to a Gmail server, when I can just go to Google and tap into the contents after they've been transmitted?

Expand full comment
5 more comments...

No posts

Ready for more?