The Threat That Makes Encryption Useless
Sources:
1:27 https://www.theregister.com/2024/03/13/quantum_openai_hire/
1:30 https://www.wired.com/story/q-day-apocalypse-quantum-computers-encryption/
3:00 https://en.wikipedia.org/wiki/Shor's_algorithm#/media/File:Shor's_algorithm.svg
3:14 https://en.wikipedia.org/wiki/List_of_quantum_processors
4:11 https://www.youtube.com/watch?v=vWJS62eIVxI
4:24 https://csrc.nist.gov/pubs/ir/8105/final
4:41 https://www.nist.gov/news-events/news/2024/08/nist-releases-first-3-finalized-post-quantum-encryption-standards
4:53 https://en.wikipedia.org/wiki/Post-quantum_cryptography
5:17 https://www.redhat.com/en/blog/post-quantum-cryptography-introduction
5:27 https://en.wikipedia.org/wiki/Shor's_algorithm#/media/File:Shor's_algorithm.svg
5:49 https://en.wikipedia.org/wiki/Grover's_algorithm
6:13 https://mullvad.net/en/blog/post-quantum-safe-vpn-tunnels-available-on-all-wireguard-servers
6:15 https://security.apple.com/blog/imessage-pq3/
6:52 https://radar.cloudflare.com/adoption-and-usage#post-quantum-encryption-adoption
7:02 https://blog.cloudflare.com/pq-2024/
7:11 https://signal.org/blog/pqxdh/
7:15 https://tuta.com/blog/post-quantum-cryptography
7:20 https://www.youtube.com/watch?v=W7ppd_RY-UE
7:30 https://www.privacyguides.org/en/encryption/
Subscriber Discussion