Meaningful attempts to produce practical solutions for the problem of an increasingly hostile environment are emerging in evolutionary computation. The problems cryptography faces are in the number and variety of ways it can be broken. One response is to build stronger defenses against increasingly powerful attacks. But what if the most powerful attacks came from the authorities who created the defense mechanisms you thought were protecting you? Powerful cryptanalysis tools and deceptive practices by authorities requires re-imagining the threat landscape. Existing solutions to this problem focus on collaboration between researchers and builders to ensure the implementation details of existing security protocols are effectively applied. Other courses of action suggest a better engagement with both software review and the creation of standards. There is no drawback to these solutions and they would complement a parallel effort to increase the diversity of encryption algorithms. Ensuring better reliability in these new algorithms means taking a look at the reliability of the building blocks of complex systems and protocols. New algorithms inspired by evolutionary computation that contribute to these building blocks is an approach that holds promise to this new threat.