This is one reason why we are advised to use non-NIST (read, "non-government") encryption, avoiding reliance upon RSA and AES encryption. Instead, use quantum-computing-resistant encryption (not the same as quantum-computing-proof), such as ECC (Elliptical Curve Cryptography), Serpent, Twofish, et al.
It is already trivial to break RSA. It is possible to break ECC, but you need to have made yourself sufficiently a threat that someone with a lot of free super-computer time or a quantum computer would dedicate the qubit time to deal with you.
As for cryptocurrency, one must realize that Bitcoin, Ethereum, and their derivatives are not anonymous, but pseudonymous, hence easily tracked unless one makes great "meatspace" and cyberspace effort to anonymize the cryptocurrency (e.g., anonymous cash purchase of the crypto, use a mixing service, break transactions into randomized transaction amounts and timestamps to resist metadata tracking, use distributed internet such as I2P for transactions). Better still, do that and use cryptocurrencies that were designed for anonymity (e.g., ZEC, DASH, XMR, et al.) and do not use online "services" to purchase or transact with those cryptocurrencies.
And, as you have said before, never say anything through the internet (or within "earshot" of internet-connected devices) that you do not want made public.