Re: Self-serving loss of perspective
@milton
1. The "nearer Yes" answers may be correct for published crypto (PGP and so on). But what about the possibility that someone is using a private cipher BEFORE the text enters some public system or another? A book cipher comes to mind (see https://en.wikipedia.org/wiki/Beale_ciphers for an example....it gives you an idea about what's going on, even if the Beale papers are a hoax).
2. Even if GCHQ is actually listening to real time conversations (whether point-to-point or group), what if the conversations are conducted using pre-agreed code words? A recent NFL program showed quarterbacks instructing the team with actor's names -- Halle Berry was one of the calls!
*
So...here's a real book cipher example....readers feel free to publish the plain text.
*
630A92D4421135721B7F4360C322EF2690D16A92
6DB9E013793D05E0650E746412C8393E561032A9
3541103386229D309E2F73C4E5A8383EB9F41960
3B6B610FEA724FE5C98D3110E02C066BDCB50875
52BB42F527380975B473146F60959449B4C72648
451EB425136643B519436A88D1B5B517D820BC5F
57EEB7489154F4C2668934F842163B3DE2F4ECFF
0F977308A16A6156AE70035263D187465D5248C0
011F3417C52BA3A67C10663AC0428304C0E3DE13
117701A23041BB51EF510D59143BE1194964D9DE
0DCAC4359865BC9661486579E568465641F49615
148F633852109410F97A23B760B25F62CC6520E8
346C047EA13C90502E27678FA745FD07FB6490BD
0FE9B135B41CB2C21E303FA060CA1E58CD036FEB