Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: rarestia
You assertion may be true if you're talking standard commercially available hardware used on most supercomputer systems.

But the NSA has supposed worked with IBM on special dedicated computer hardware designed specifically for breaking encryption, which means custom made hardware including the processing chips. If that's the case, the NSA is many steps ahead of everyone else in breaking encryption, since by using dedicated hardware the time needed to break the encryption is vastly shorter.

13 posted on 09/08/2013 7:23:51 AM PDT by RayChuang88 (FairTax: America's economic cure)
[ Post Reply | Private Reply | To 11 | View Replies ]


To: RayChuang88

I hedge everything I say with the phrase “properly-implemented.” That means no root CAs with 10+ year expiry, no intermediate CAs with greater than 2 year expiry, no encryption hashes under 1024-bit, symmetric key generation, 45 day password change requirements with >12-character, symalphanumeric (symbols, letters, and numbers) with no repeatability, mandatory two-factor authentication (what I have and what I know), and no local key generation (all keys generated on a non-Internet-connected machine).

I’m not saying that they can’t crack it all, ever, but the amount of effort required to read my personal documents, emails, browser history, and secure transactional databases is such that they will need a really good lead to think I’m even remotely worth the effort.

Essentially, I’m hedging against someone planting incriminating data on any of my devices in the event someone or entity wants to take me down. I’m prepared to die with my complex passwords.


19 posted on 09/08/2013 7:51:22 AM PDT by rarestia (It's time to water the Tree of Liberty.)
[ Post Reply | Private Reply | To 13 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson