Ok. So I recently signed up for Crashplan which uses 448-bit Blowfish to encrypt the data you send them, and the more I do research on Blowfish the more it sounds like the 64-bit block size is totally insufficient for the size of the volumes they will be backing up.
I've read that especially in certain modes (like CTR) it is totally insufficient for large streams of data, and can be distinguished from random data after only gigabytes? However, other stuff I've read seems to indicate this isn't an issue if properly implemented.
Would such an attack not apply to Crashplan's implementation?
Also, assuming the implementation is as perfect as it gets, is it even mildly "Post Quantum" secure?
The Founder of the company that owns Crashplan responded to a similar question here: https://superuser.com/questions/587661/crashplan-truecrypt-overkill
However, I really would like a better response from him regarding their implementation and why I should trust it for the large amount of data I'm sending to Crashplan if Blowfish's own creator says he is amazed anyone still uses it and says you should definitely use Twofish instead.
Anyone else is welcome to chime in too. I want as much info on this as possible. I'm already concerned enough that I might discontinue using Crashplan entirely.