Hacker News new | past | comments | ask | show | jobs | submit login

> Anything sent with Signal needs to be treated as published with an unknown delay.

Oddly they have thought of that already, to the point all encryption systems in use in the gov are thought of in these terms.

All that matters are the different assumed times to publication (weeks to years), and then treating the strength of measures involved differently based on what is reasonable for the given use.

If you absolutely need something to never be published then encryption isn't the solution, and nor are computers generally.






It's the entire mandate of the NSA's Utah Data Center. Archive all the world's encrypted data until such a time as it can be decrypted when either the algorithms have been cracked or machines are powerful enough to brute-force.

https://en.wikipedia.org/wiki/Utah_Data_Center


More like until they'll get the keys

Or maybe they found a way to outsource brute forcing the keys.

128 bits will never be bruteforced. There's nothing to outsource. The only actual risk is that the encryption algorithm is cracked.

> 128 bits will never be bruteforced

Famous last words


Concur. This is part of why Suite A ciphers (algorithms) exist, and the second component includes robust key management practices are so important (this includes hardening of devices to prevent leakage of signals that could compromise those keys or the cryptographic processes themselves).

https://en.wikipedia.org/wiki/NSA_Suite_A_Cryptography




Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: