The new supercomputers break limits.
“In a groundbreaking development poised to redefine the landscape of computational technology, China's unveiling of the Zuchongzhi 3.0 quantum processor, reportedly 1 quadrillion times faster than existing supercomputers, marks a significant leap forward in the quest for quantum supremacy.” (RudeBaguette/U.S. Intelligence on Red Alert After “Quantum Sparks Rip Through Limits” as China’s Processor Hits 1 Quadrillion and Threatens Google’s Willow Domination)
The Chinese new supercomputer causes discussions about the safety of its algorithms. The problem with things like RSA encryption is that they are made for binary computers. And the speed of those computers limits the effectiveness of that encryption. The problem is that the more powerful computer can break the encryption by using slower computers. The new high-power computers and computer groups are urgent tools for physics. And especially for protein research. But the same computers can also break codes. This makes those systems very dangerous in the wrong hands.
Supercomputers in data centers can operate as a group. The RSA encryption is based on a very long binary number that the system generates using the Riemann conjecture. Or the so-called Zeta function. The system creates a so-called quantum prime number. That involves thousands, or even millions of decimals. The problem is that those numbers are in linear mode. The system can cut the number line at certain points. The system can share those parts, or sequences, with the computer group.
We can think that there are supercomputers standing in line, and then the system shares the bite of the number line to each of them. When computers decode things like DNA molecules, they use this method. The linear information fits computers better than things like a chess game. In chess, the computer must run algorithms back and forth. This makes the chess game harder for computers than DNA decoding. The problem with the most advanced computers is that.
They might have enough power to crack even the nuclear launch codes. The data center is also a tool that can operate as a powerful spy satellite. Remote-controlled supercomputers can make hacker operations over the net. Those systems can also make DOS attacks by pinging certain IP addresses and denying the system's operations. The AI-based hacking tools are powerful tools in the hands of intelligence. The operator can simply give an order to break into a certain system and then go to take coffee.
The system generates the needed algorithm. And then it gives access to the targeted system. These kinds of systems can be better than regular hacking. If we think this. From the point of view of the Chinese and North Korean governments. Because it can deny the human operator access to all information outside targeted systems. The hackers are key operators in Chinese and North Korean intelligence. Those people are also good subjects for counter-propaganda or psychological operations.
The ability to deny other than necessary information denies them access to “harmful information”. The hackers must have access to Western homepages so that they can get the information. That their government requires. That means they can get influence from Western culture. The idea of the North Korean and Chinese censorship is simple. If people don’t know about freedoms and other things that belong to the Western way of thinking, those people don’t miss those things.
https://www.rudebaguette.com/en/2025/08/u-s-intelligence-on-red-alert-after-quantum-sparks-rip-through-limits-as-chinas-processor-hits-1-quadrillion-and-threatens-googles-willow-domination/
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.