Send CathInfo's owner Matthew a gift from his Amazon wish list:
https://www.amazon.com/hz/wishlist/ls/25M2B8RERL1UO

Author Topic: Denninger on Google's “Quantum Supremacy”  (Read 381 times)

0 Members and 1 Guest are viewing this topic.

Offline Bonaventure

  • Full Member
  • ***
  • Posts: 1238
  • Reputation: +789/-272
  • Gender: Male
Denninger on Google's “Quantum Supremacy”
« on: September 24, 2019, 02:39:27 PM »
  • Thanks!0
  • No Thanks!0
  • Karl Denninger weighs in on the latest claims from Joogle regarding their computing abilities.  Speaking with a friend of mine who is an IT systems security tech, if the claims are true, it "has the capacity to revolutionize data."

    https://market-ticker.org/akcs-www?post=236927




    Online Mark 79

    • Supporter
    • *****
    • Posts: 9543
    • Reputation: +6256/-940
    • Gender: Male
    Re: Denninger on Google's “Quantum Supremacy”
    « Reply #1 on: September 27, 2019, 10:20:43 PM »
  • Thanks!0
  • No Thanks!0
  • This is one reason why we are advised to use non-NIST (read, "non-government") encryption, avoiding reliance upon RSA and AES encryption. Instead, use quantum-computing-resistant encryption (not the same as quantum-computing-proof), such as ECC (Elliptical Curve Cryptography), Serpent, Twofish, et al.

    It is already trivial to break RSA. It is possible to break ECC, but you need to have made yourself sufficiently a threat that someone with  a lot of free super-computer time or a quantum computer would dedicate the qubit time to deal with you.

    As for cryptocurrency, one must realize that Bitcoin, Ethereum, and their derivatives are not anonymous, but pseudonymous, hence easily tracked unless one makes great "meatspace" and cyberspace effort to anonymize the cryptocurrency (e.g., anonymous cash purchase of the crypto, use a mixing service, break transactions into randomized transaction amounts and timestamps to resist metadata tracking, use distributed internet such as I2P for transactions). Better still, do that and use cryptocurrencies that were designed for anonymity (e.g., ZEC, DASH, XMR, et al.) and do not use online "services" to purchase or transact with those cryptocurrencies.

    And, as you have said before, never say anything through the internet (or within "earshot" of internet-connected devices) that you do not want made public.