A few weeks ago, our podcast turned 200! In this case, we are talking about episodes, not years. We (that is, Tim Peacock and myself) definitely feel like we have to say something humorous, pithy…
@darkuncle for the very least, the articles that I've seen have multiple red flags:
* "Military grade encryption": not a term cryptographers use, ever.
* Breaking both RSA and AES: no known plausible mechanism to break both with the same approach
* Details withheld due to sensitivity: there are zero knowledge proofs (well sorta, slight abuse of terminology here) you could give (for both AES and RSA) that would show that you have this capability. For example, sign something with the RSA2048 challenge number, or reveal the AES key of a plaintext/ciphertext pair that is generated by a trusted non colluding third party. You wouldn't reveal anything about your methods, but you would show that you have the capability.
Extraordinary claims require extraordinary evidence. And I haven't even been able to access the paper so far, so I do not see the extraordinary evidence.