I've seen this a lot lately, and it's getting really annoying. It's the idea that intelligence agencies like the NSA have some form of "magical" capability to instantly crack every encryption scheme known to man because 'you don't know what they're capable of' Yes I do. I know quite well what they're capable of, and what they're capable of is nowhere near what you claim, simply because of how cryptography and computers work. Let's look at the cryptography side of things. Any textbook on information security will tell you that secrecy in the true nature of cryptographic algorithms doesn't work. However, wikipedia explains that the history of this goes farther back than one would think. In short, hiding any sort of meta-information about cryptography would be foolish. Cryptography is the ultimate open source, because it requires and benefits from the eyes of everyone. it also says with regards to modern computer encryption algorithms In short, no they didn't find some super secret special way to instabreak AES, SHA-512, RSA, or ECC. If you truly believe they did, show some damn evidence.
On the computer side, I think people overestimate the how powerful computers are in terms of password and general cryptography breaking, and even more so how powerful the NSA's computers are. Below is a link to an earlier version of the Kaspersky password checker that estimates how long it would take for different types of computers to crack a password, everything from a ZX Spectrum to the TOP500 supercomputer Tianhe-2. Obviously don't type in your real password, but play around with this. You'll find that if your password is even remotely competent and in keeping with industry best practices (20+ characters, atleast 1 lower, upper, number, special char), it would take good ole Tianhe way longer than the average human lifespan to crack it. web.archive.org/web/20170824104237/https://password.kaspersky.com/ To believe that the NSA can get it done as fast as you claim, you would have to believe that they have computers that would be TOP500-tier. I seriously doubt that.
The NSA hires a lot of crypto researchers, and they do not publish holes and attacks which reduce the search space for crypto algorithms. At the same time, the NSA doesn't want sensitive US communications to be easily intercepted by adversaries, so their work on improving encryption schemes (they were involved in helping tweak RSA) are not likely nefarious. As for "magic", it's more along the lines of interdicting shipments of computers to certain individuals, and botnetting their hardware.
Austin Roberts
You seriously doubt that a secretive agency with a bottomless wallet doesn't have access to the most powerful hardware on earth? You either glow or you are incredibly naive.
Not only will they have hardware which surpasses those computers, they'll have custom designed hardware to perform various specific tasks magnitudes of times faster than supercomputers.
Lucas Martin
The problem is not even cryptography. The problem is exploits and hardware backdoors. Best encryption algorithm isn't doing shit for you if the software encrypting has an unknown bug that can be exploited or if the hardware simply keylogs you entering the password or gives DMA access to the memory containing the unencrypted data. That is the big problem. There's ample evidence that three letter agencies influence the hardware industry big time. Look into Snowden and hardware backdoors in Cisco hardware for example.
They also probably have a lot of people figuring out exploits they don't publish and don't get found quickly because software has become so incredibly complex. Every critical new exploit in widely used software you hear of, you have to assume agencies like the NSA have known for months, if not for years. If they don't planted it there themselves by hired programmers working on opensource projects, that is. How safe or unsafe cryptography is does not even matter.
Bentley Ross
...
Logan Johnson
I'm surprised this answer took four replies to appear. Encryption is not the weak point of almost any system. Take the enigma code as an example: So then how did they break it? Don't attack the strong point. Attack things like: for example. Yes, NSA capabilities aren't infinite. However they are an advanced global persistent threat with unknown capability and (if Snowden and others are to be believed) known to have massive capabilities.
Noah Torres
There is an intelligence agency with dozens of billions of dollars to hire the most talented engineers in the world and fund projects with goals beyond the what most people can even imagine some guy on a Taiwanese basket weaving forum who knows how to install Gentoo.
There is clearly an enormous capability difference. I'd actually be surprised if they couldn't get into my system whenever they wanted to.
Daniel Murphy
Government agencies are highly capable but (mostly) low motivated. That doesn't mean they are magic though. If you are airgapped, they aren't getting in without visiting your house. If you are using simple obscure software (incl. firmware) and they have no physical access, they aren't getting in unless they focus on you and spend time finding a vuln and crafting an exploit. I would be surprised if they had a prepared exploit for Haiku. Who has time for that? If they need to get in one of those devices (eg. you are a legitimate powerful risk to them) they can with proper planning, effort and paperwork. Just don't be worth that effort and they aren't getting in.
Jordan Murphy
SUPER ADVANCED (((AI))) GOY (((NEURAL NETWORKS!))) not just auto generated if else statements