[tor-dev] The consequences of key compromise (or the reasons for changing)
Marsh Ray
marsh at extendedsubset.com
Fri Nov 4 15:46:00 UTC 2011
On 11/04/2011 01:39 AM, Jon Callas wrote:
>
> It's certainly laudable to worry about TLAs with ASICs. They probably
> can't break 80-bit crypto yet, but that's why you need to get off of
> it now.
>
> On the other hand, no TLA worth their salt is buying ASICs to crack
> crypto. They are buying zero-day kernel 'sploits. That's how the
> Germans are beating Skype. Keep that in perspective. The half life of
> an ASIC is 18 months. Zero-days are much more effective and much
> cheaper.
I think this does not follow. Just because they are buying 0-days
doesn't mean that they are not also buying ASICs (or at least FPGAs). My
guess is that there are some adversaries with more money for
cybershenanigans than they know what to do with right now.
- Marsh
More information about the tor-dev
mailing list