Properly implemented strong crypto systems are one of the few things that you can rely on, he said, though cautioning that the N.S.A. often bypasses the encryption altogether by targeting the computers at one end or the other and grabbing text before it is encrypted or after it is decrypted.”
The usual method used is either to steal the encryption passphrase, or use a passphrase-guessing program. These programs are quite useful if you know a lot about the target.
Not just that, they've also apparently come up with a mechanism for storing encryption keys for commercial encryption technologies, found a way to break SSL and hack into VPNs. This will cause every country in the world to create new encryption technologies -- unbelievably broad leak.
This is why passwords should not be words but instead ramdom characters, # and if you know how to make special ascii characters even better.
This is a key part of this document, Null. I know we had our discussions earlier, but having just read this article, I believe this is game, set, match for anyone trying to secure their privacy online.
Short of going completely "dark," folks, you cannot conduct any private business electronically anymore.
It's over. Pack it up and hit the trail.