01/17/2023 / By Ethan Huff
In the very near future, according to Chinese researchers, advancements in quantum computing could lead to a “Quantum Apocalypse” that breaks everything from online banking to “secure” government platforms filled with state secrets.
An academic paper on the subject warns that the current encryption keeping all of our data “safe” will quickly become vulnerable, and possibly collapse entirely, as a result of quantum computing becoming too “smart” for the current iteration of the internet.
Researchers from The University of Chicago say they are working on an un-hackable quantum internet for the future – a Web 3.0, as many are calling it – but will it work?
Computers today use a system called public key encryption to protect information. Text messages, for instance, are transferred on phones containing two keys: one that is public, and the other that is private.
The device making contact uses a public key to encrypt the message, while the recipient’s private key opens it up. This ensures that nobody else outside the two devices can intercept and unencrypt the message.
According to Tim Callan, a chief experience officer at the cybersecurity company Sectigo, quantum computers currently in development could one day “make the encryption we use today no longer fit for purpose.”
(Related: Remember when loony leftists slammed the Nature journal for publishing a study about the “supremacy” of quantum computing, arguing that the word supremacy conjures up racist imagery?)
With today’s computers, this is not an issue. It would take about 300 trillion years to crack the key codes aforementioned. But with quantum computer soon making its debut, existing encryption technologies could soon become obsolete.
Perhaps you are familiar with the current binary of zeros and ones that make up electronic and optical pulses. This is how data is created, saved, and transferred on existing computers. Quantum computing, on the other hand, uses photons, or light particles, which can be set to zero, one, or both one and zero.
This added flexibility of including both a zero and a one in the same photon could allow quantum computers to rapidly code and crack all possible solutions to an encryption, eliminating computer and online security as we have long known it.
“The evolution of quantum computers creates a significant threat to data security,” Callan warns. “Their immense processing power is capable of breaking encryption at great speed, leaving important data vulnerable, everything from bank account details to medical records to state secrets.”
“This scenario is so alarming that specialists refer to it as the ‘Quantum Apocalypse.'”
Callan would go on in a statement to explain that quantum computing will also be millions of times faster than “classical computers” thanks to the use of ones, zeros, or both ones and zeros at the same time – a technology known as “qubits.”
Once this happens, it will be Q-Day – a wordplay on D-Day – allowing all of the world’s secrets to become vulnerable. This is especially concerning to governments, which are hiding all sorts of things that they do not want the general public to know.
The Biden regime is one such government that is concerned about quantum computing, having been hacked last year with a quantum attack. Corporations like IBM and Google are working feverishly to release more advanced quantum computers, though their widespread release is still a few years off – perhaps 8-20 years from now, according to Chinese experts.
“The recent claim that researchers have broken encryption invites us to wonder if the quantum apocalypse is already here,” Callan says. “However, at present this ‘breakthrough’ remains theoretical.”
More stories like this one can be found at Collapse.news.
Sources for this article include:
Tagged Under:
big government, Collapse, computing, cybersecurity, cyberwar, Dangerous, data breech, data security, encryption, future science, future tech, Glitch, Google, IBM, information technology, national security, privacy watch, Quantum Apocalypse, quantum computing
This article may contain statements that reflect the opinion of the author
COPYRIGHT © 2017 COMPUTING NEWS