> From: Nick Arnett <[EMAIL PROTECTED]>

> > -----Original Message-----
> > From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On
> > Behalf Of The Fool

> And we didn't even touch on one of the most common reasons for data
loss at
> home -- children.  I have stories.

Cats.
 
> ...
> 
> > > Now, having said all that, I'll add that if you're the NSA, you can
> > probably
> > > crack anything...
> >
> > Nope.  ROTFLMAOALALALALALAL.
> >
> > http://stats.distributed.net/rc5-64/
> 
> There's no need to be pedantic.  I'm quite sure that neither of us
really
> knows what capabilities are available at Ft. Meade... although I
suspect I
> know rather more than you do.  More to the point, the NSA is very
likely to
> be able to crack the passwords in Kevin's machine.  Even more to the
point,
> what seems unbreakable today often isn't tomorrow.

Lets put it another way.  distributed.net has > 30000 active
participants.  Each participant can be anything from a 486 to an entire
business's computer network to a beowulf cluster.  This virtual
supercomputer undoubtedly has more processing power than than the fastest
super computer (ASCI Purple
http://www.theregister.co.uk/content/53/23905.html), and is still
probably bigger than any NSA black-budget super-computer.  It has taken
this virtual super-computer ~4.5 years to exaust 70% of the keyspace on
_1_ 64-bit encrypted message.  The standard for Internet explorer is
128-bit.  The standard for pgp is several kilo-bit.

It will be some time before quantum computing will be powerful enough to
crack public-key encryption.
 
> And the following bears repeating:  The Windows registry is an
abomination.

As compared to the linux method?  Or the AS/400 method?  AS/400's are an
abomination.

Reply via email to