His point, which seems pedantic, but isn’t, is to illustrate the specific attack vector.
Breaking encryption would mean that the cryptographic process is something that an attacker can directly exploit. This is as close to impossible as it gets in that line of work.
While you can compromise the effectiveness of encryption by subserving it using other attack vectors like man in the middle or phishing or the good old fashioned physical device access.
None of those mean an algorithm used like say the ole Two fish encryption is “broken”.
Blowfish
Triple DES
Twofish
RC4
Etc. All are fine and not currently being broken. All however cannot protect your data if some other attack vector companies you or your site’s security.
That’s what the headline implies. Encryption is useless if a third party can decrypt it.
His point, which seems pedantic, but isn’t, is to illustrate the specific attack vector.
Breaking encryption would mean that the cryptographic process is something that an attacker can directly exploit. This is as close to impossible as it gets in that line of work.
While you can compromise the effectiveness of encryption by subserving it using other attack vectors like man in the middle or phishing or the good old fashioned physical device access.
None of those mean an algorithm used like say the ole Two fish encryption is “broken”.
Blowfish Triple DES Twofish RC4 Etc. All are fine and not currently being broken. All however cannot protect your data if some other attack vector companies you or your site’s security.