My understanding of it was that "They" had gotten backdoors into paid for encryption tech, ie. closed source. That sort of thing shouldn't be able to happen with open source software, as there are too many people that do understand it watching it...
That's certainly some of it, we know they did that with Microsoft and Oracle. But with the ones that didn't play game, they just used espionage to steel the keys.
The big takeaway should simply be: They haven't broken the theory or practical nature of encryption. Instead they've gone for the weakest link which are the humans and processes of the companies that provide encryption.
The NSA and GCHQ have kinda done this:
But encryption actually does work, providing you aren't using one of the compromised providers (a closed device is most likely compromised, but you can still encrypt your communications with OpenVPN, and your files with Truecrypt).
That's certainly some of it, we know they did that with Microsoft and Oracle. But with the ones that didn't play game, they just used espionage to steel the keys.
The big takeaway should simply be: They haven't broken the theory or practical nature of encryption. Instead they've gone for the weakest link which are the humans and processes of the companies that provide encryption.
The NSA and GCHQ have kinda done this:
But encryption actually does work, providing you aren't using one of the compromised providers (a closed device is most likely compromised, but you can still encrypt your communications with OpenVPN, and your files with Truecrypt).