
And I maintain: as long as he stays in the embassy, I don't see how he's anyone's problem but Ecuador's. So why piss off the international community just to make him our problem again?
And the "computer taking years to break modern encryption" thing is based on the fact that modern cryptographic algorithms have been very thoroughly studied, by many academics and hackers and security professionals and so on and so on, and we can base time estimates off the most efficient cracking algorithm all these experts have found in all their years of study.
Sure, as far as I know, it's effectively impossible to prove that more efficient cracking algorithms don't exist, but the odds of someone having found one (that no-one else has found and published), and successfully kept it a secret, are vanishingly small.
If someone wanted to encrypt something in a way that was unbreakable in this universe, I assure you that it is possible.
[edit] I almost forgot: One-time pads are completely unbreakable, even if you had infinite computing power -- there is inherently no possibility of a cracking algorithm. You just need a key of high-quality entropy, with as many bits as the data you want to encrypt. I'm sure WikiLeaks could manage that.
( , Thu 16 Aug 2012, 12:15, Reply)

Until someone found out a number in the process that was supposed to be random churned out "4" every time.
Ok, the wikileaks "insurance file" containing all the uncensored documents including names of informants in hostile countries was sent all around the internet a few years ago.
Have a look it'll be on the torrents. there's now thousands of copies.
It's encrypted with a 256bit AES key.
That's a string of 256 characters and strong encryption indeed.
Now, this one file holds the mother of all intelligence gathering.
A nation that can access this will be very happy indeed.
You can guarantee everyone's working on accessing it.
Problem is human error can defeat the strongest encryption.
The key he distributed to key followers will be written down, talked about, saved on a computer in a folder marked "super secret passwords" whatever.
Assange bet the life of a lot of people on that simple bit of encryption.
You can talk about one time pads but he didn't use them he used a very public way to insure he's not bumped off. In fact I can well imagine many foreign powers happily killing him so his followers release the code.
( , Thu 16 Aug 2012, 12:52, Reply)

As you say, that's strong encryption indeed, modulo non-technical weaknesses such as human error. We can but wait and see whether WikiLeaks screwed up in such a way.
And we can but wait and see whether they were bluffing about the contents. If not, then, as you say, they have indeed "bet the life of a lot of people" on it, and letting the key get out (deliberately or though error) would be pretty damn irresponsible however you slice it.
( , Thu 16 Aug 2012, 13:06, Reply)