At 01:56 PM 6/20/2015, you wrote:
On 20 June 2015 at 11:58, Ted Roche <[email protected]> wrote:
> They're synchronized, easily to regularly update, and encrypted on my
> local machine store as well as "in the cloud" so the exploit is going
> to steal a fully-encrypted blob that will take them several decades to
> decrypt. I'm not worried.
Did you audit the encryption method they use and can you be 100% confident
it will take several decades to decrypt? Would you bet your bank balance?
If I was in your shoes I would change my passwords. Seriously.
Every few years we are told we need to have stronger encryption
because the previous level of encryption, which we were told would
"never be broken", was broken.
Computers get faster all the time, and the people stealing this stuff
are no longer script kiddies. They are organized, wealthy criminals,
with programmers in their employ as good as any that work anywhere.
They have massive botnets at their disposal, which they can use as
distributed resources all working on a common problem, just like SETI
uses to analyze its radiotelescope data.
If there is profit in it, the criminals will attempt it. It is
inevitable that eventually, enough processing power will be brought
to bear on a brute force effort to crack this stuff to succeed within
a reasonable amount of time. There is no such thing as uncrackable
computer security.
Ken Dibble
www.stic-cil.org
_______________________________________________
Post Messages to: [email protected]
Subscription Maintenance: http://mail.leafe.com/mailman/listinfo/profox
OT-free version of this list: http://mail.leafe.com/mailman/listinfo/profoxtech
Searchable Archive: http://leafe.com/archives/search/profox
This message:
http://leafe.com/archives/byMID/profox/BC.40.14612.7BBA5855@cdptpa-oedge01
** All postings, unless explicitly stated otherwise, are the opinions of the
author, and do not constitute legal or medical advice. This statement is added
to the messages for those lawyers who are too stupid to see the obvious.