After seeing the video of veritasium on these topics, I wondered how standard notes was prepared for these innovations. - how is store now, decrypt later hindered (if that’s possible) - is the current encryption algorithm resilient against quantum computing etc.
Does somebody have some expertise on this? It would also be great of standard notes themself put a blog post or video out on that topic.
Security depends upon who the threat agent is that you are trying to protect against. A common person, an experienced expert/criminal hacker or a nation/state. Given that in theory any nation/state has “potentially unlimited” resources, to the point of there being at least one known case of a cyberattack on an air-gap computer, I would say all bets are off if you are doing something shady enough to attract the attention of the government of a powerful nation such as the USA or UK and be viewed as a potential threat to national security. Beyond that, I’d say within reason most encryption accomplishes its job by at the very least slowing the person down big time and requiring more resources to extract the data than the data is worth.