Yes, the key is that you have to know the public and private keys. I'm guessing you hacked into the remote server to recover Paypal's key? Or do you have some exploit for the SSL protocol that nobody knows about? Because, if so, you should be watching your back. You never know who might try to kill you (TLAs come to mind). It's also funny how you transition from reversing with private keys to supporting strong ciphers in one sentence -- that seems to suggest that those are somehow related? The cipher used is barely related to the private key, and I'm pretty sure that you can't recover the private key, even if the cipher is very weak.
And yes, RC4 has been provably broken. I seem to recall that distributed.net recovered an RC4 key from an encrypted sentence in under 24 hours. So it's not just unverified accounts.
Or were you using an ARP or DNS poisoner? Because that's the type of program that I mentioned earlier, where you can proxy connections and decrypt/re-encrypt the data. This is well known and can't really be prevented. I also don't see how getting Firefox can prevent your unknown mystery exploit program.
It should also be noted that encryption is different from obfuscation. I won't go into details, but the words aren't interchangeable. Neither are encryption and encoding. If you're going to argue about encryption, it's necessary to understand the distinction between those three words.
In any case, you are correct that, given an infinite amount of time or processing power, any encryption algorithm can be broken. However, SSL is the Internet standard, and, as I said earlier, if you can break it, I have some people here who are very interested in keeping you quiet.