> From: Nick Arnett <[EMAIL PROTECTED]> > > -----Original Message----- > > From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On > > Behalf Of The Fool
> And we didn't even touch on one of the most common reasons for data loss at > home -- children. I have stories. Cats. > ... > > > > Now, having said all that, I'll add that if you're the NSA, you can > > probably > > > crack anything... > > > > Nope. ROTFLMAOALALALALALAL. > > > > http://stats.distributed.net/rc5-64/ > > There's no need to be pedantic. I'm quite sure that neither of us really > knows what capabilities are available at Ft. Meade... although I suspect I > know rather more than you do. More to the point, the NSA is very likely to > be able to crack the passwords in Kevin's machine. Even more to the point, > what seems unbreakable today often isn't tomorrow. Lets put it another way. distributed.net has > 30000 active participants. Each participant can be anything from a 486 to an entire business's computer network to a beowulf cluster. This virtual supercomputer undoubtedly has more processing power than than the fastest super computer (ASCI Purple http://www.theregister.co.uk/content/53/23905.html), and is still probably bigger than any NSA black-budget super-computer. It has taken this virtual super-computer ~4.5 years to exaust 70% of the keyspace on _1_ 64-bit encrypted message. The standard for Internet explorer is 128-bit. The standard for pgp is several kilo-bit. It will be some time before quantum computing will be powerful enough to crack public-key encryption. > And the following bears repeating: The Windows registry is an abomination. As compared to the linux method? Or the AS/400 method? AS/400's are an abomination.
