Once again with feeling.......
This may have been mentioned before....but it bears repeating:
1. Private ciphers are widely regarded as "weak". But it still takes time to break them. So users of private ciphers have a TIME ADVANTAGE over potential snoopers...an advantage which puts the snooper on the back foot from the get go.
2. So...we get (or already have!) backdoors in some "remote computing service" or another. So what? Using the backdoor will simply reveal something enciphered in some unknown way.
3. And thanks to El Reg, readers can experience a sample right here!
*
007Q12l20P2Y08Ie0IPj08vh0zix1GLu0Tib1731
0SUX0W8Q1h$h1iud0K7M0WtU1Kgt0QYo1aKO1D8x
1WjJ1DAA1Q3G1gAs0EW11IPj0PGl1Wly1D8Q0zXQ
0YMq1DzV1TJI0Lrj1HzR0M=t05eF0TZw0lQf0jef
1GpB0O0X0Jgr0Ccn07JA0FWC1ayI1A=C1S561ML3
0Fif0z9815W103UJ1Frw17=u13Jl14jd0X520ec1
0tJl0BVk0V5M1DuE05qa162t1Hso0A5n1Qhb1Kxj
0X7Q0FfU1dCX1JFF0FXh0oSZ03vU0tjC0Ud51Yhx
0T2y1a2e0CMs0gz60zSJ12Xn1iJr0w1s0FlJ0=b4
1eo50b8q1Plo07Qz1iQV0CWj0Q9s1bQT1VHB079Z
0jjh1Cmz0$Bn0CW90dWW0kCA1jl00naW1MhT0pmh
0grC1LlM1JCf0fIS1Og41GIB1aOU0VVr1c1e1EYB
1H7v1Zk10rAz0slX0IA51l=P1hX$1Jsp0CK10Iav
1P5j0GZm10lO0ihH0LoB0rgq0DBQ0CtT1YtE1TSd
1WQR0=K10nrc1aAg0P8M1bms0woi0VXQ1KYO1WqO
17zX024O1ABn0GN01FOW1dGA1ZG515xW0Hqi0TcJ
1Ujs0tU60Mcz17KQ1gVL17qY1F0b049P1bQo0OXo
0Yjq1Hd41dHv1Lhp171F0CW81G7k0MV91fli0$3E
1JXU026b0Zq906pt1iN$0kFu0O9F1Ujh077U1LDi
16XL0xut08it0VPG0rRU1Jmx10Oy0VQh1CEm0AC9
0KG21mAG0tyu1NxL18ZV15IG03u00=f31A8T1J2c
1MgT1R7O19r91HjJ1La409h31C2Q0k2y0XsD0wU1
0z7r0y4w0fZe0prH0hZD1lD90vE80OaO1HLl0kxk
1BcH0wTa19$t00rA0gdj0iTy1jul0ROs16pd0y0S
0lDx1eZo0vjR1EiS0=6y1iYN1I6t10oj0yJb1DvM
068F1M9T1YUL0hUJ1BLP1TGZ135t0A0L0E=B0Y37
1R=U0oo80K8R0mbW0IoE0l6=1dGB0$DL13rL0uTJ
0zs90bXS0rwM1Z3b1S4x06hh1dC50Nav0EQA0ySQ
00fx
*