On 08/14/2013 07:36 AM, Kent Borg wrote:
On 08/14/2013 06:34 AM, Jerry Feldman wrote:
Agreed. But, breaking the session key only works for a single message
or a single session. If they want to target a specific individual,
breaking the RSA/DSA keys will give them access to all encrypted
messages. (within the context is that a sent message is encrypted by
the recipient's public key),
Yes, breaking the RSA/DSA key will let them read files or e-mails
(effectively a file) encrypted with that public key. But I think that
if you are doing SSL with that public key, the key exchange cannot be
understood by a passive observer, so passively recording the packets
will not let someone later decrypt the exchange.
Basically, there are 3 groups of those who want to hack encryption
1. Governments - they have resources and if they want to get your
information they have tools to do it.
2. criminals who want your information. Unless you are very wealthy,
there is very small chance they will try to break your encryption.
Simple cost benefit.
3. random hackers. There are people out there with skills and some
resources. It is hard to protect against these people because of their
skills. While they don't have acres of supercomputers they have the
skills to build or use low cost clusters.
So, I'm not really worried. If the NSA or FBI wanted to get my
information and read my emails they can do it, and there is very little
that I can do other than remain under the radar.
--
Jerry Feldman <[email protected]>
Boston Linux and Unix
PGP key id:3BC1EB90
PGP Key fingerprint: 49E2 C52A FC5A A31F 8D66 C0AF 7CEA 30FC 3BC1 EB90
_______________________________________________
Discuss mailing list
[email protected]
http://lists.blu.org/mailman/listinfo/discuss