Did I mention the 448-Bit blowfish encryption? From the Mozy blog....
<snip>
"We’re a little unique here in that we give our users the option to provide their own private key (a passphrase, a picture, a music file – whatever) which is hashed to generate a 448-bit key for encryption. This key is stored on their PC, and we don’t have access to it – it’s stored on the PC and is never transferred to our servers – which means that we can confidently protect data from both kid sisters and government agencies.
To help explain how strong the encryption is, let’s consider if you were to brute force an attack on the data encrypted on the Mozy servers. You’d have to consider 2^448 different keys, which is a lot of keys (the numbers of atoms in the universe is estimated to be somewhere around 2^77 or so.)
But let’s say the DOE Lawrence Livermore National Laboratory let you borrow BlueGene/L, which is the most powerful computer in the world (as of this writing) and let’s assume that the Linpack Rmax Gflops metric is a proxy for key generation – where a key can be generated and tested in about the same amount of time it takes to perform 1,000 floating point operations. So that’s 280,600,000,000 keys per second.
This means that it would take BlueGene/L about 30 years to guarantee that it would crack the encryption that Mozy utilizes. Now, this doesn’t mean that Mozy is all that when it comes to encryption – it’s not like we invented this algorithm – we just selected it based on its strength and speed.
So that’s BlueGene/L – but if you used your own PC, then it’d take closer to 3,026,328,640 years or so. Or if you got a bunch of people to cluster your computers together – say 10,000 of your closest friends, it’d still take about three hundred thousand years."
<snip>