However we already knew for a while that the active attacks are being done:
http://www.theguardian.com/technology/2014/dec/07/north-kore...
The active attack can of course obtain enough information to decrypt the traffic automatically afterwards or even record it unencrypted. It appears that's the context of the SSH decryption in the documents.
So, all your sessions are hosed at some point in time. Either now or in the future.
And yes, sensationalize is sometimes necessary to get more folks onboard to work with the documents.
Yes, for now OTR and PGP is fine. There must be a big speculation on future breakthroughs regarding breaking crypto - otherwise they wouldn't build Bluffdale.
Edit: Instead of downvoting, how about taking position?
The present is problematic enough, we don't even need to hypothesize on the future breakages.
1) http://en.wikipedia.org/wiki/Forward_secrecy
"As of December 2014, 20.0% of TLS-enabled websites are configured to use cipher suites that provide forward secrecy to web browsers."
IPSEC is also often configured with the disabled PFS, even if the RFC is from 1998 ( http://tools.ietf.org/html/rfc2412 )
https://www.imperialviolet.org/2013/06/27/botchingpfs.html
"I'm not aware of any open source servers that support anything like that."
The article is from June 2013, has anything changed since?
The latter half of AGL's post is about systems security, not (really) the cryptographic security of TLS. It's about things you can do that would make NSA owning up your servers a greater or lesser threat to previously encrypted TLS sessions.