I wouldn't believe everything the NSA or other government agencies say.
Dig through the various NSA leaks/exposed documents, read the interviews of top position employees that quit over frustration, etc... The NSA is very capable. What they can't decrypt now they simply archive until they can.
< 128 bit SSL is very likely to be "live" decryptable. 128 bit according to some sources is likely to be being decrypted by them as well (thoguh perhaps not live).
Then, worse, you have to consider that the NSA does have the private key's to various (most major?) Certificate Authority (CA)'s that your encryption chain trusts. This again, comes from leaks, interviews, and by putting the pieces together.
Telnet traffic is very likely archived at the least. If you become "interesting" then it will be looked at closer. All easily accessible traffic is certainly run though various systems for flagging / profiling content.
I'm hoping more boards (and software) make it easiler to support proper SSH connections with large key sizes. ...of course then you still have the very likey (almost certainly for some cipher suites) issue of the NSA having planted moles in some of the major encryption authorities to get some "backdoor" implementations in place. I put "backdoor" in quotes as it's not that there are actually simple backdoors in most of this stuff... it's that the algorithms themselves are comprimised.
And with that said, FUCK YOU NSA, I KNOW YOU'RE READING! :)
---
þ Synchronet þ thePharcyde_
telnet://bbs.pharcyde.org (Wisconsin)