This reminds of the carnard that crypto weakness is in the implementation or user ineptness not the algorithm, the math nor the cryptographers. Probably old stuff to the sharp tacks here, a 2007 paper describes how to retrieve keys from volatile memory not via brute force cracking or key logger or back doors or rubber hole or stupidly vain cryptographers. PGP Disk and TrueCrypto are used as examples of how to do it. http://cryptome.org/0003/RAMisKey.pdf This might suggest explain why those associated long-associated with PGP have moved on to less risky endeavors and why TrueCrypt is so beloved by snoops. The paper was written by a student which again demonstrates that those with less of a stake in the most trustworthy security are seldom the most trustworthy and must be protected by secrecy. Now, for dead-broke deep thinking futurists: Which is the world's greatest spying machine, the Internet or cellphones or the two combined? What is the crucial aspect of each system which renders it susceptible to covert compromise? Which is most promoted as a way to assure freedom from compromise? Name the most prominent promoters for each. Name the most unknown skeptic for each. Name three shame-faced apologists who admit they had not examined the consequences of what they once believed with certainty. Winners will receive a huge amount of untaxable cash amply hoarded offshore by Robert Hettinga, secured by powerful financial crypto.