2xAES256 doesn't equal AES512. Look up meet-in-the-middle attacks.
If you depend on a single algorithm (e.g., AES) instead of a chain of independent (in several senses) algorithms (eg AES followed by a few other contenders) you are a pathetic optimist.
Computation is free. (Meh, batteries)
Because Snowden.
As if you didn't know. Gilmore.
Other links are weaker: key distribution, your children, your OS, videobugs. But really, depending on one approved algorithm? And hbleed? And gotoFucked?
TCMay may forgive your souls. Unlikely though, he is a harsh master.
I'll see your DNS worm and raise you a BGP attack. Or maybe ve sent de death packet und you gives us der Taivan.
Please tell me you didn't just build the latest version of your civilization on a prototype.