Posted by Saint_Cuthbert in OpSec (edited by a moderator )

Quantum computers are based on the phenomena of quantum mechanics, as opposed to familiar classical computers based on transistors which encode data into binary digits (bits). In traditional computing, this process always leads to one of two possible states (0 or 1). [1] However, quantum computation relies on qubits that can express many different states simultaneously ("superpositions"), meaning that when/if this technology is fully developed, it will be capable of solving some types of mathematical problems virtually instantaneously. [2] [3]

Assembling a quantum computer is now an engineering problem rather than one impeded by laws of physics -- a theoretically imperfect machine can still yield useful results. Military and government agencies have invested heavily in this area because of the implications for today's widely used public-key cryptography. [4] Ciphertext that is invulnerable to classical computing will be shredded into ribbons by a large-scale quantum computer. Similarly, all Tor traffic will be vulnerable until quantum-resistant cryptography is implemented.

The Snowden documents reveal that all encrypted data traversing the internet is intercepted and stored indefinitely for cryptanalysis should there be a scientific breakthrough. A global arms race has ensued between the United States, EU, Russia, China, Israel and other global powers due to the immense geo-political, economic, intelligence and military advantages this technology would confer.

The academic and corporate consensus is that a large quantum computer will be built in around 10-15 years. It is safe to assume that well-funded intelligence communities are capable of greatly reducing this development period.

As of July 2020, the second round of NIST PQ cipher standardization has concluded. The 26 candidates are grouped into finalist and alternate groups which will be reviewed for another 12-18 months. NIST plans to release the initial standard for quantum-resistant cryptography in 2022. The finalist group has better performance, but less security confidence while alternate candidates have a stronger security rationale, but lack performance for all use cases. Only one cipher of each design type will be standardized, for example one lattice based asymmetric crypto and one lattice based signature scheme will be selected out of the group. A fourth round looking at alternates for standardization is planned.


Source: www.kicksecure.com/wiki/PQCrypto

3

Comments

You must log in or register to comment.

NotQball wrote (edited by a moderator )

One of these days, maybe you can post a tutorial for i2p with KickSecure. For some reason that OS did not agree with me and commited suicide.

There is a EEE standard, NIST standard and I speculate there is a DIN (German) standard for this situation. For a while there was even a YubiKey for that but it disapear from the market. I was stupid enough to have a known acolite order it for me and arrived backdoored and damaged. Quantum computers have been around since at least late 1980's and were called TriState. Some people were recruiting at that time to work in that field.

The TriState computers were used extensively by US spies but once the Soviets fell the rusky started to sell the location data (unique electromagnetic signature) and the need for Tor ensued. The last failed attempt to use TriState for spies was the Turkey coup against Erdogan. That is how Turkey knew the "exact" location of the participants and most likely the names (Gyudem or something was the leader).

Currently a lot of US government employees and contractors use a Quantum boot. USB key that allows a regular computer to be booted externally from a TriState computer. You do NOT want to use that crap from your home... It is open season after from China-man, Ruskies etc. I do know of some sorry ass cases of people who make environment assessments or pollution assessments that MADE THAT BIG MISTAKE.

If you have that KickSecure tutorial for I2P that does NOT endanger your activities please post it.

1

Saint_Cuthbert OP wrote (edited by a moderator )

Nope. It didn't just disagree with you. I can recommend Heads OS, an alternative to Tails. I haven't attempted to put I2P on it, but it's thought to be a pretty good OS otherwise.

What is your opinion on the reliability of hard drive encryption?

Are you referring to the place that sells computers (TriState)?

I've been wondering how one would fix hardware back doors, or if that's even a possibility. I'm not sure what resources our favored big brother has, but I don't have any doubts about what he would do if he could.

1

NotQball wrote (edited by a moderator )

Hard Drive Hardware encryption along with BTRFS is the best mitigation I have against Quantum and Supercomputer attacks. I used to get them monthly but now it is a rare occurrence.

I did know a Arch person that swear by their BIOS (solders and modifies boards). I was so impressed by his demonstration at his layer (full of equipment) that I almost plunged a small fortunes into buying a laptop from him. The problem was that when his machine was tested in guerrilla environments (direct trunk connection) it did not perform much better than mine.

I don't know who sold Quantum-Tristate computers. Some crap had to do with IBM but they like to take credit for a lot of things (Oppenheimer was a manager not the developer of A-bomb kind of crap). If you search Tristate it comes out as a battery company that probably has little to do with computers. Tristate comes from 3 states as a 0-1-unknown.

1

NotQball wrote

If you are by your computer when you are attacked by a Quantum with Supercomputer attack:

  1. Your machine will go in a short Reboot but will recover where you left off.
  2. Your SSD/Hard-Disk will go nuts because THEY are uploading.

What THEY are trying to do is break your encryption by looking for KNOWN files that were encrypted with that key. Take action and don't delay.

I usually wipe the disks and change all the keys. Consider encrypting a KNOWN file like an OS download with a different encryption. I usually store this type of crap on a different disk.

1

Saint_Cuthbert OP wrote (edited by a moderator )

I've heard of people busting out their soldering irons to protect against backdoors. There are places I have heard of to purchase computer hardware with monero, but my better instincts tell me that it could just a honeypot to appeal to privacy-conscious individuals.

I also gave your issues with kicksecure and I2P a little more thought. I believe that kicksecure's ports are configured differently than other OSs; that might be your problem.

1

Saint_Cuthbert OP wrote

I'm curious if you've ever experienced your computer heating up or electrically shocking you when looking up politically incorrect subjects. I've asked all my tinfoil hat friends, and they're puzzled about it. It only happens when I'm on a 5-eyes/9-eyes/14-eyes network. Otherwise it's fine. And it only happens when I'm reading about those subjects for an extended period of time.

1

NotQball wrote

I did experience massive computer use in some attacks. I use very good equipment. The fans are running wild but the equipment does not overheat. No Apple incendiary devices here!

1

Saint_Cuthbert OP wrote

I've heard from some people that folks can be targeted by their device remotely...I'll try to remember where I heard that. Devices can listen in on people, unless the microphone is off and the camera is covered with tape. Librum computers have those features. I think that they have anti-evil maid features as well.

1

NotQball wrote (edited by a moderator )

The worst situation I've heard of was people converting Google equipment from paying customers at location. All the cell phones were hacked, mic and camera turned on. There were calls with various ring tones to calibrate the mics.

This was not the first Dog and Pony show for these people and they competed with Google insults read by Orca for a few hours until Google caught on.

I only clash with Google rarely due to misunderstandings and I do not considered them evil, Just Slight Negative.

1

Saint_Cuthbert OP wrote

Google isn't evil at all, except for the fact that they target you with advertisements, collect data in shady ways, and violate privacy by every means conceivable, lol. And I'm sure that there isn't anything worse than that that they do without burying it under the legalese in their terms or service and privacy policy.

1