At 01:56 PM 6/20/2015, you wrote:
On 20 June 2015 at 11:58, Ted Roche <[email protected]> wrote:
> They're synchronized, easily to regularly update, and encrypted on my
> local machine store as well as "in the cloud" so the exploit is going
> to steal a fully-encrypted blob that will take them several decades to
> decrypt. I'm not worried.

Did you audit the encryption method they use and can you be 100% confident
it will take several decades to decrypt?  Would you bet your bank balance?

If I was in your shoes I would change my passwords.  Seriously.

Every few years we are told we need to have stronger encryption because the previous level of encryption, which we were told would "never be broken", was broken.

Computers get faster all the time, and the people stealing this stuff are no longer script kiddies. They are organized, wealthy criminals, with programmers in their employ as good as any that work anywhere. They have massive botnets at their disposal, which they can use as distributed resources all working on a common problem, just like SETI uses to analyze its radiotelescope data.

If there is profit in it, the criminals will attempt it. It is inevitable that eventually, enough processing power will be brought to bear on a brute force effort to crack this stuff to succeed within a reasonable amount of time. There is no such thing as uncrackable computer security.

Ken Dibble
www.stic-cil.org

_______________________________________________
Post Messages to: [email protected]
Subscription Maintenance: http://mail.leafe.com/mailman/listinfo/profox
OT-free version of this list: http://mail.leafe.com/mailman/listinfo/profoxtech
Searchable Archive: http://leafe.com/archives/search/profox
This message: 
http://leafe.com/archives/byMID/profox/BC.40.14612.7BBA5855@cdptpa-oedge01
** All postings, unless explicitly stated otherwise, are the opinions of the 
author, and do not constitute legal or medical advice. This statement is added 
to the messages for those lawyers who are too stupid to see the obvious.

Reply via email to