On Sat, May 9, 2020 at 1:05 PM Kevin Chadwick <m8il1i...@gmail.com> wrote: > Careful of what sources you trust! If a processor was storing the keys used, > non > volatile then people would have found out. Software encryption wouldn't save > you > either. If there is a back door it won't have anything to do with AES-NI that > can be analysed so easily.
Indeed -- human based key compromise issues severely outweigh the risk of direct attacks on a tcp session with encrypted content. That said, the risk with encrypted material here is not attacks on individual sessions but opportunistic attacks on large bodies of sample material (with, of course, human assist which will often have economic basis and vectors). (That said, I would also keep in mind also that supposedly the computer industry has hit a performance wall because of Moore's Law issues. But, assuming that there's a thread of truth in the marketing, we also have reason to believe that 5G switches at speeds an order of magnitude faster than anything we see on computer busses. So it's not just about the size of the transistors. And, sure, there's real issues there, but I think we have to assume that some of what we're hearing about computational abilities and limits isn't completely factual.) Thanks, -- Raul