Also, the standard for cryptographic security tends to be "better than brute force". 65 minutes to extract a key is orders of magnitude better.
That's why certain agencies prioritizing collection over real-time cracking. Collect first, worry about the content later. An adversary just need 65 minutes of footage taken at some point - and we live in an age where there are plenty of devices that can passively capture w/ their cameras.
65 minutes is pretty bad. That's several orders of magnitude less than it takes to crack password hashes.
there's a massive difference between giving away your keys and being compromised without your knowledge.
not to mention that are ways to secure data in a way that different keys yield different valid results with plausible deniability.
> The video must be captured for 65 minutes, during which the reader must constantly perform the operation.
So not only must you be using a compromised brand of smart card (which number in the low single digits), you have to use a cheap Chinese reader and the camera must be focused on card activity for 65 minutes (which would never happen). You have to compromise the camera first.
It would be more effective to use what I term the "Walter Sobchak method" which is during that 65 minute window you "grab the smart card and beat the PIN out of him".