On Sat, May 9, 2020 at 1:05 PM Kevin Chadwick <m8il1i...@gmail.com> wrote:
> Careful of what sources you trust! If a processor was storing the keys used, 
> non
> volatile then people would have found out. Software encryption wouldn't save 
> you
> either. If there is a back door it won't have anything to do with AES-NI that
> can be analysed so easily.

Indeed -- human based key compromise issues severely outweigh the risk
of direct attacks on a tcp session with encrypted content.

That said, the risk with encrypted material here is not attacks on
individual sessions but opportunistic attacks on large bodies of
sample material (with, of course, human assist which will often have
economic basis and vectors).

(That said, I would also keep in mind also that supposedly the
computer industry has hit a performance wall because of Moore's Law
issues. But, assuming that there's a thread of truth in the marketing,
we also have reason to believe that 5G switches at speeds an order of
magnitude faster than anything we see on computer busses. So it's not
just about the size of the transistors. And, sure, there's real issues
there, but I think we have to assume that some of what we're hearing
about computational abilities and limits isn't completely factual.)

Thanks,

-- 
Raul

Reply via email to