My experience is that state actors won't even try to decrypt your communications. That's old school - and a horribly inefficient use of resources. They'll come after you with a keylogger or manufactured legal nightmares or torture - to either or both sides of the communication; depending on the perceived value of your secret.
It all comes down to 4 fundamental questions:
It all comes down to 4 fundamental questions:
- What is the value of your secret to you
- What resources do you have available to protect it
- What is the perceived value of your secret to your adversary
- What resources do they have available to divulge it