Welcome to DU!
The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards.
Join the community:
Create a free account
Support DU (and get rid of ads!):
Become a Star Member
Latest Breaking News
Editorials & Other Articles
General Discussion
The DU Lounge
All Forums
Issue Forums
Culture Forums
Alliance Forums
Region Forums
Support Forums
Help & Search
General Discussion
In reply to the discussion: A thread for apologies from those who said I was nuts about the NSA [View all]AtheistCrusader
(33,982 posts)16. All of that s true, but also look at the customized ASIC chips available for bitcoin mining.
Now imagine you had a black budget in the billions to make your own for whatever purpose you wanted, with no accountability, in secret.
Whatever we've been told about the number of computational operations, and the duration to complete it, to brute force certain levels of encryption... is wrong.
If they don't have a private pair key themselves, if they don't know a vulnerability in the random salt generation table, if they don't have a window into an unencrypted link in the transmission path, if they don't have a way to scrape a key from the initial key pair handshake.. why THEN they just brute force it. And I doubt it takes them long to accomplish.
That's my bet anyway.
Edit history
Please sign in to view edit histories.
Recommendations
0 members have recommended this reply (displayed in chronological order):
109 replies
= new reply since forum marked as read
Highlight:
NoneDon't highlight anything
5 newestHighlight 5 most recent replies
RecommendedHighlight replies with 5 or more recommendations
A thread for apologies from those who said I was nuts about the NSA [View all]
hootinholler
Sep 2013
OP
All of that s true, but also look at the customized ASIC chips available for bitcoin mining.
AtheistCrusader
Sep 2013
#16
The way you id a partisan loon is as follows: when they wage a war on math
ConservativeDemocrat
Sep 2013
#42
When I was a young pup working at my first real job in the late 60's and early 70's
LiberalArkie
Sep 2013
#14
Good and bad - the NSA harrassed Martin Hellman, but he became friends with Bobby Inman
bananas
Sep 2013
#36
I think you're mixing up hardware based encryption with open source software.
PrestonLocke
Sep 2013
#62
Always remember if it can be encrpted, then the encryption can be decrypted. It is all a game,
Thinkingabout
Sep 2013
#54
can you work faster than high powered computer, why yes, the smart ones at NSA, etc
Thinkingabout
Sep 2013
#68
There is only so much electricity and computing power available, right now.
PrestonLocke
Sep 2013
#69
If the encryption is from their files it will probably be broken in short time, remember they
Thinkingabout
Sep 2013
#88
Uhhh...we are talking about encryption so assume the brute force attack is on that subject.
Gravitycollapse
Sep 2013
#92
Brute force was before the computers, like brute force required to build the pyrmaids so there is a
Thinkingabout
Sep 2013
#96
Okay, so your statements lead me to believe you do not understand a brute force attack.
Gravitycollapse
Sep 2013
#98
If they had a file in which they already know what the file contains and it is encrpyted then the
Thinkingabout
Sep 2013
#99
How would they have the encryption key for files they did not themselves generate?
Gravitycollapse
Sep 2013
#100
They would probably get it by spying and stealing information, that works pretty well.
Thinkingabout
Sep 2013
#101
If the keys are encrypted themselves then that becomes a useless endeavor.
Gravitycollapse
Sep 2013
#103
If a middle level grunt has something an unethical billionaire wants, it will be sold,
GoneFishin
Sep 2013
#57