The fact that the factorization of RSA-768 has been completed doesn’t mean that the RSA keys are useless; it means that, if we decide to protect our data with RSA-768, it would take an attacker about the same time to illicitly access this data – or even less, with the appropriate supercomputation infrastructure. Therefore, if we want to properly protect sensitive data, it would be advisable to use longer encryption keys. In a similar way, the authors of the article say that factorizing an RSA-1024 is about one thousand times harder than RSA-768, but surely the factorization of these RSA-1024 keys will be completed if the same effort is made than for breaking RSA-768. Therefore, if we want to protect relevant data with RSA, we’d better start thinking about using RSA-2048 keys, although, as we have stated before, it will come the time when these keys will be compromised too. It’s just a matter of time, and also a matter of knowing whether the encrypted data is worth all the effort.