Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Nah, not on the public, peer-reviewed algorithms. Any breaks are likely to be with implementation details of the program.

Truecrypt et al are open source, and are considered pretty good if set up by someone who knows what they're doing.

There is of course the possibility that The Man puts considerable effort into finding and/or encouraging subtle holes in common encryption products; even if so, though, they would sit on that asset and only use it when seriously important. Ie, military/national security level use, not cops. When you spend millions developing a tiny, secret advantage you do not fritter it away so PC Plod and Sgt Sad Sack can power trip on getting into some pleb's porn folder, after which the hole used is discovered and patched the next day.

update: oh he was downvoted? That's harsh, it's not like there hasn't been any precedent for such things. Search for Crypto AG. And encryption systems as used by programs like Skype are absolutely not to be trusted; you can assume they are backdoored wide enough to drive 10 unmarked white vans and a black helicopter through.



The 5 year sentence in the article is for failure to reveal keys in cases concerning national security, ie terrorism.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: