So we can basically state that many encryptions on which almost anyone relies are flawed (Ive had some discussion about using this word but I think it fits the definition, if its not point to point secure its flawed)
I disagree with a few things here.
The government hasn't broken anything; they cracked RSA but that's about it. And it took them a very long time to boot. Saying all encryption is flawed is not true. Simply because many encryption methods are public knowledge and very unguarded when it comes to the /src/. Also, it's important to note that many standards are not public knowledge or FOS.
That does not inherently mean they are flawed or back-doored just because the author never showed the code. PGP/GnuPG, DES, most key encryption means are still safe and secure. It would take quantum computers to crack these keys. Things like OTR (Pidgin Off The Record messaging encryption) are still very much safe.
Your best bet in fact, in breaking most key algorithms, is to intercept keys in transit from person to keyserver. Even then technically they are not broken, you just got lucky and found the secret keys. And those are by the way, usually password encrypted themselves. This adds an additional layer of encryption. GnuPG is an excellent example of secure communication that will not likely be broken until quantum computing. DES is very strong as well, and AES (a non-key encryption) is still not taken lightly.
Saying all encryption is broken because NSA cracked RSA or ToR (no discussion needed or wanted here) is not very informed.