1 TB USB sticiks...

On 30-Jan-23 2:48 am, Don Y wrote:
On 1/28/2023 4:58 PM, Sylvia Else wrote:
Since my data is encrypted before it\'s sent, good luck to Amazon
reading it.

Never underestimate the power of US decryption facilities.

It would take a breakthrough in number theory related to factorisation
for RSA to be broken. There is no reason to think that the US has
achieved that.

Or, for <someone> to install a keylogger on your computer and
wait until you access the data -- cheerfully capturing your
300 character passphrase in the process.

If they can do that, they can probably access the files directly,
without bothering with my backups. In addition, there\'s much more
interesting stuff at stake that the source code various programs I\'ve
written, letters of complaint to the government, etc. My internet
banking password, for one.

Sylvia.
 
On 29-Jan-23 7:01 pm, Jan Panteltje wrote:
On 28-Jan-23 10:55 pm, Jan Panteltje wrote:
On a sunny day (Sat, 28 Jan 2023 19:04:56 +1100) it happened Sylvia Else
sylvia@email.invalid> wrote in <k3k398F2pd4U1@mid.individual.net>:

On 28-Jan-23 5:39 pm, Jan Panteltje wrote:

Never underestimate the power of US decryption facilities.

It would take a breakthrough in number theory related to factorisation
for RSA to be broken. There is no reason to think that the US has
achieved that.

There is a lot to do about quantum computers, I know they have some.
No idea if it can break RSA in a flash,

There is an quantum computer algorithm (Shore\'s algorithm) for
addressing the factorisation problem, and it\'s supposedly been
demonstrated on a few very small numbers, but quantum computers have
nowhere near advanced far enough to make them able to tackle realistic
RSA keys, and it\'s not just a question of having enough money to build a
big quantum computer.

There are alternative encryption schemes not vulnerable to Shore\'s
algorithm, but that\'s a problem for the future

Sylvia.
 
On 1/29/2023 2:53 PM, Sylvia Else wrote:
On 30-Jan-23 2:48 am, Don Y wrote:
On 1/28/2023 4:58 PM, Sylvia Else wrote:
Since my data is encrypted before it\'s sent, good luck to Amazon reading it.

Never underestimate the power of US decryption facilities.

It would take a breakthrough in number theory related to factorisation for
RSA to be broken. There is no reason to think that the US has achieved that.

Or, for <someone> to install a keylogger on your computer and
wait until you access the data -- cheerfully capturing your
300 character passphrase in the process.

If they can do that, they can probably access the files directly, without
bothering with my backups. In addition, there\'s much more interesting stuff at
stake that the source code various programs I\'ve written, letters of complaint
to the government, etc. My internet banking password, for one.

They don\'t *know* what to go looking for -- so, go looking for everything they
can access.

Compromise AWS\'s security and everything there is exposed.
Do you think they will decide that *your* files are not
significant (\"Who are you?\").

Chances are, human eyes won\'t examine them as there would be
far too much to parse (you being one of N clients). So,
<something> will decide what is worth pursuing and what isn\'t.

[data files with no giveaway \"hints\" as to content would likely
be not worth the effort. But, most file have internal hints
as to their form and likely content. Else file(1) wouldn\'t
work...]
 

Welcome to EDABoard.com

Sponsor

Back
Top