His point, which seems pedantic, but isn’t, is to illustrate the specific attack vector.
Breaking encryption would mean that the cryptographic process is something that an attacker can directly exploit. This is as close to impossible as it gets in that line of work.
While you can compromise the effectiveness of encryption by subverting it using other attack vectors like man in the middle or phishing or the good old fashioned physical device access, these don’t break the algorithm used in a way that it makes it vulnerable to decrypting other data.
None of those mean an algorithm used like say the ole Two fish encryption is “broken”.
Blowfish
Triple DES
Twofish
RC4
Etc. All are fine and not currently broken. All however cannot protect your data if some other attack vector companies you or your site’s security.
That’s what the headline implies. Encryption is useless if a third party can decrypt it.
His point, which seems pedantic, but isn’t, is to illustrate the specific attack vector.
Breaking encryption would mean that the cryptographic process is something that an attacker can directly exploit. This is as close to impossible as it gets in that line of work.
While you can compromise the effectiveness of encryption by subverting it using other attack vectors like man in the middle or phishing or the good old fashioned physical device access, these don’t break the algorithm used in a way that it makes it vulnerable to decrypting other data.
None of those mean an algorithm used like say the ole Two fish encryption is “broken”.
Blowfish Triple DES Twofish RC4 Etc. All are fine and not currently broken. All however cannot protect your data if some other attack vector companies you or your site’s security.