News Feed
  • DrugHub has agreed to fully refund all users who lost money in the SuperMarket exit scam.  
  • Retro Market has gone offline. Circumstances of the closure unknown.  
  • SuperMarket has closed following an exit scam by one of the admins.  
  • The admin of Incognito Market, Pharoah, has been arrested by the FBI several months after exit scamming.  
  • Silk RoadTorhoo mini logo
  • darknet markets list
  • Popular P2P exchange LocalMonero has announced it is closing.  

Is quantum computing going to fuck us? : CafeDread | Torhoo darknet markets

Considering the accelerated pace at which technologies like AI and quantum computing are being developed, it's likely that in the near future, governments and big corporations will have the capability to decrypt communications and content that is currently considered highly private. Although new post-quantum cryptography algorithms are being created to protect information, it's possible that many organizations are collecting and storing large amounts of data with the goal of decrypting them in the future.

Based on this premise, is it reasonable to assume that we'll all eventually be fucked?
/u/A1purequality P
5 points
3 months ago
where there are smart cops ,
there are even smarter criminals

Amen
/u/null 📢
1 points
3 months ago
The issue is not about the availability of tools to defend oneself, but about the impossibility of protecting information stored in the past.
/u/footsteps 🌈 Nazi 🌈
1 points
3 months ago
How do you know it's impossible? Maybe the problem has more dimensions than you can see, with more potential solutions in those dimensions. What is "information"? What is "the past"? To beat "quantum", you probably have to "think quantum"-ly about reality.
/u/footsteps 🌈 Nazi 🌈
2 points
3 months ago

Quantum Key Distribution (QKD) Explained
QKD is still an effective option for secure communication in the quantum computer era because it has no equivalent security characteristics that are based on quantum mechanical properties.

BB84 and E91 Protocols: How They Work?
BB84 Protocol
The BB84 protocol, developed by Charles Bennett and Gilles Brassard in 1984, is the first and most widely used quantum key distribution (QKD) method. It uses photon polarization to encode binary information, ensuring secure communication. Alice (the sender of a message or quantum information) transmits photons in four possible states, while Bob (the receiver of the message) measures them using random bases. After transmission, they compare bases and retain matching bits to form a shared key. Due to the no-cloning theorem, any eavesdropping introduces detectable errors. BB84 is widely used in finance, defense, and healthcare to protect sensitive data against quantum computing threats.

E91 Protocol
The E91 protocol, proposed by Artur Ekert in 1991, relies on quantum entanglement for secure key distribution. Entangled photon pairs are generated and shared between Alice and Bob, with their measurements showing strong correlations. These correlations enable them to establish a shared key while detecting any eavesdropping attempts, as interference disrupts entanglement. E91 enhances security in quantum communications.

Security Features and Eavesdropping Detection
Quantum cryptography accomplishes safe communication through the use of the principles of superposition, entanglement, and the no-cloning theorem to enable the detection of eavesdropping and quantum computing-resistant encryption.

Tamper Detection: Quantum Key Distribution (QKD) is based on principles of superposition and entanglement to facilitate the detection of eavesdropping. While an eavesdropper measures quantum states, it alters them, causing errors that are visible to Alice and Bob.

No-Cloning Theorem: This principle prevents quantum states from being copied without detection, which prevents attackers from making copies of encrypted data and enabling secure key exchange.

Error Thresholds: During key verification, if the error rate exceeds a certain limit, it signals possible eavesdropping. In such cases, communication is immediately stopped to maintain security.


Quantum Secure Direct Communication (QSDC)
QSDC provides secure transmission of secret messages without shared keys. In contrast to QKD with key exchange, QSDC securely transmits actual messages in quantum state form. Quantum mechanical laws, such as the no-cloning theorem, detect eavesdropping for QSDC. Laboratory experiments using free-space and satellite QSDC verify its functionality for long-distance communication. Limitations such as noise, loss of photons, and scalability reduce the speed, and thus it is not popularly used.

Quantum Random Number Generation (QRNG)
QRNG applies quantum mechanics to produce genuine random numbers for cryptographic purposes. Unlike classical pseudo-random generators, QRNG produces non-deterministic outputs based on phenomena of quantum mechanics, i.e., photon measurement and vacuum fluctuations. Non-determinism offers cryptographically secure keys that are not susceptible to attack. QRNG is already deployed in commercial hardware to a large degree, adding more security to secure communication and cryptography systems and thereby becoming a leading-edge technology for future-proof encryption.

Post-Quantum Cryptography (PQC) and Hybrid Models
PQC relies on quantum-resistant primitives based on hard computational problems such as lattice-based cryptography. Standardization processes, such as NIST's choice of CRYSTALS-KYBER, are defining worldwide quantum-safe cryptography. Hybrid models integrate PQC with quantum communications protocols, such as QSDC, and offer computational and information-theoretic security. PQC integration into quantum networks offers organizations greater security against both classical and quantum attacks, paving the way for secure cryptographic infrastructures.

https://www.analyticsinsight.net/white-papers/quantum-cryptography-a-new-era-of-encryption
/u/Helpful-I-Hope
2 points
3 months ago
Those are great technologies! However, it's useful to know that encryption that is secure against quantum attacks does NOT require quantum computing to implement! There are already many quantum-safe encryption systems, like Crystals-Kyber, as one popular cipher, among others. These run just fine on normal computer hardware, though they require a little more processing power than most encryption systems that came before.
/u/Paris A
2 points
3 months ago
It's already planned to move to post quantum cryptography on arti when the time is needed. We are not near the quantum requirements at this moment, so don't worry. Information is valuable but time can make it worth less.

Protections are there and being built. The future still has privacy. As long as you fight for it that is.
/u/el_feo_404
1 points
3 months ago
"Information is valuable but time can make it worth less."
Exactly.... Especially since most crimes have status of limitations except murder if i remember correctly.
/u/guest2096
1 points
3 months ago
Someone will probably find a way to start up a new version of TOR with new encryption methods and some other version of pgp keys and all that shit, since if the feds use all that high-level AI, someone will find a way to use it against the feds. everything levels out I guess
/u/null 📢
2 points
3 months ago
Sure, but the problem is that everything stored before post-quantum cryptography will be decryptable. PGP messages, communications, browsing packets, everything.
/u/footsteps 🌈 Nazi 🌈
1 points
3 months ago
One mitigation is to flood spaces with noise-as-fake-data to make it harder to discern what data is true and what is not. It's conceptually equivalent to painting a green field with shades of red if you only have red clothes instead of green camouflage.
/u/Octopus Sea 🕷 Spider
1 points
3 months ago
it's possible that many organizations are collecting and storing

Possible? lol everything is scraped. it's 100% no doubt about it.
/u/Helpful-I-Hope
1 points
3 months ago
Yeah, literally one of the most central parts of NSA's mandate, and of course many other nations' agencies, as well. They didn't build that gigantic storage datacenter in Utah for nothing...
anyone seriously study quantum physics and cryptography here?

i here IBM is the boss and qiskit is THE shit
/u/whitelightwhiteheat
1 points
3 months ago
It's safe to assume that PGp will be cracked within a decade or so, and that all scraped data will be readable by LE
/u/HorkyPorky
1 points
3 months ago
Part of this question is whether governments actually care enough about what goes on here to utilize quantum computing, which I suspect will remain extremely expensive for quite a long time.
/u/BigDaddy2K
1 points
3 months ago
With time it will be here the impact well that is up for question and the circumstance in the world.
Does it come in a dirty blond version?
/u/BlackNoir
1 points
3 months ago
The field is still young prolly in 10 years maybe it would gangbang our encryption but we will pull through.
/u/isopropanol
1 points
3 months ago
Safest bet to stop using tech unless you really need it. Stop carrying around a phone, you don't need one nearly as much as you think
All of their power vanishes if you stop using their stuff
/u/T0ren0
1 points
2 months ago
good point
/u/tripmaster77
0 points
3 months ago
This is something that has been on my mind as well I'm not too familiar with how it all works but I've seen post where they have beaten pgp and a few other types of encryption pretty fast and that they are working on cracking bitcoin to able to protect it from quantum computing it's definitely going to change things forsure.
/u/Helpful-I-Hope
1 points
3 months ago
They have absolutely NOT beaten OpenPGP encryption. Quantum Computers that can run Shor's Algorithm and other encryption-cracking methods are still a long ways off.
/u/tripmaster77
2 points
3 months ago
My bad I just looked it up yeah I was wrong that makes me happy tho I'm glad that they can't