← Back to context

Comment by ljlolel

8 months ago

Easy. The “deleted” even overwritten data can leave ghosts even multiple layers deep (think of a clay tablet or painting with multiple inscriptions)

Encryption for 30 years ago? Trivially breakable with quantum

Shor's algorithm is primarily relevant to asymmetric cryptography, and disk encryption is pretty much universally symmetric. Quantum computers do nothing to break modern disk encryption.

> Encryption for 30 years ago? Trivially breakable with quantum

I wouldn't be so sure - quantum computers aren't nearly as effective for symmetric algorithms as they are for pre-quantum asymmetric algorithms.

  • I would go as far as saying anyone who mentions quantum computers breaking block encryption doesn’t know what they’re talking about.

  • Regardless of the parent's statement, just normal compute in 30 years, plus general vulnerabilities and weaknesses discovered, will ensure that anything encrypted today is easily readable in the future.

    I can't think of anything from 30 years ago that isn't just a joke today. The same will likely be true by 2050, quantum computing or not. I wonder how many people realise this?

    Even if one disagrees with my certainty, I think people should still plan for the concept that there's a strong probability it will be so. Encryption is really not about preventing data exposure, but about delaying it.

    Any other view regarding encryption means disappointment.

    • > I can't think of anything from 30 years ago that isn't just a joke today.

      AES is only 3 years shy of 30.

      If you used MD5 as a keystream generator I believe that would still be secure and that's 33 years old.

      3DES is still pretty secure, isn't it? That's 44 years old.

      As for today's data, there's always risk into the future but we've gotten better as making secure algorithms over time and avoiding quantum attacks seems to mostly be a matter of doubling key length. I'd worry more about plain old leaks.

      3 replies →

    • >normal compute

      You are underestimating the exponential possibilities of keys.

      >plus general vulnerabilities and weaknesses discovered, will ensure that anything encrypted today is easily readable in the future.

      You can't just assume that there is always going to be new vulnerabilities that cause it to be broken. It ignores that people have improved at designing secure cryptography over time.

      1 reply →

    • > I can't think of anything from 30 years ago that isn't just a joke today

      The gold standard 30 years ago was PGP. RSA 1024 or 2048 for key exchange. IDEA symmetric cipher.

      This combination is, as far as I am aware, still practically cryptographically secure. Though maybe not in another 10 or 20 years. (RSA 1024 is not that far from brute forcing with classical machines.)

      1 reply →

Not this tripe again.

The reality is, as soon as humanity figures out how to distinguish between two values (magnetic flux, voltage, pits/lands, etc) we use it to store more data, or move it faster.

The end.

Don't forget that flash drives are not accessed linearly. Your data might look linear to you, but without that sector addressing table, you're looking at noise.

On top of that static wear leveling can move all your data around when your disk is idle, and TRIM will effectively zero your unused areas when you are not looking.

So, it's a very different landscape.

Has this been proven for flash storage? Once a flash charge is depleted its gone forever, its not like magnetic storage of old.