Thursday, March 5, 2026

Are you ready for quantum apocalypse?



Every single encryption made by traditional binary computers is vulnerable to quantum computers. There are service providers who promise end-to-end encryption. That should resist quantum computer-based attacks.  But are those encryption systems really tested against quantum computer-based attacks? It is always possible to create systems that use extremely complex math for encryption. But things like artificial intelligence can read words.  

Straight from the image that the camera transmits from a keyboard. If those keyboards are visible to some hacked cameras. The AI follows. On. How a person moves fingers on the keyboard. And reads words from those films. This means that if we are not prepared for AI. That is dangerous.  Second, that things like a note. Is visible. It is enough for AI that it can read words written to it. 

The attacking system would, anyway, be quantum computer-morphing neural network-based systems. The quantum computer will generate binary numbers for the morphing neural network. 

Which makes. Attacks against systems that use traditional Riemann conjecture-based encryption algorithms. Still yet. A quantum computer cannot. Run things like AI-based software. The complicated software. It runs. On a group of traditional binary computer networks. Which we call a morphing neural network. In that system, the group of computers runs the programs and makes those attacks simultaneously. The system changes the attacking computer. 

All the time. Which. Makes it hard to deny the IP address of the attacking system. The system can share binary numbers between those computers. And that makes this kind of system dangerous. The morphing neural network can run data like a single computer. Or. It can share different missions to separate computers, which means the morphing neural network can operate. With multiple problems. At the same time. The problem with traditional encryption collapse is that. It can endanger things. Like crypto- and digicurrencies security.  

This means that. Somebody. Could create fake crypto- and digital currencies. Digital currency means a national currency that is shared in digital form. If digital form currency can be faked, that can cause the collapse of the economy. The encryption is also required in computer operating systems and program updates. If somebody can slip malicious software. In the computer update flow, this can cause very big problems. The fake update. It can make it possible to switch off computers. And that can have a destructive effect. In cybersecurity. 

Cyber is the new dimension in intelligence and military operations. Things like malware, computer viruses, and spyware are tools that can endanger many things.  In an assassination. Of the Iranian leader Khamenei, the key role was in the traffic surveillance cameras. Those cameras offered real-time information about Khamenei and his security council’s movements. This means that even innocent-looking systems. Like. Surveillance cameras in the next building can open a window for hackers and other attackers. The AI can sort very large data masses. 

And it can find things. Like reflections from glasses. There is a computer screen visible. The system. It can render the image so clear that the passwords are visible. The AI agents can search things like passwords on cellphone screens. They can recognize. If somebody visits. On homepages. That requires strong identification. The AI can see when a person fills the passphrase box. And then it can give access to the system. The AI is the next-generation threat. Maybe the hackers already have AI assistants. That can detect things like logging in to the protected homepages. The system can see things like passwords from the computer screen. Or they can watch. The way a person moves their hands on keyboards. 


https://www.fairedih.fi/en/2025/10/30/the-encryption-endgame-why-the-world-faces-a-quantum-reckoning/#:~:text=When%20quantum%20computers%20break%20current%20encryption%20%E2%80%94%20and,become%20obsolete.%20This%20threat%20has%20already%20spurred%20action.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.

Are you ready for quantum apocalypse?

Every single encryption made by traditional binary computers is vulnerable to quantum computers. There are service providers who promise end...