Exclusive: The NSA Is Archiving All Encrypted Emails and Transactions, Knowing They Will Be Able to Decrypt Most Digital Files in About 3 Years, Thanks to Quantum Computing

megaphone-2

Advisory: Be careful of what you read on social media. The algorithms used by these platforms have no regard for Biblical truth. They target your emotions to keep you engaged on their site so their advertisers can drop more ads. These platforms exist to enrich their stockholders. Consider God’s promise to Believers in James 1:5, “If any of you lacks wisdom, you should ask God, who gives generously to all without finding fault, and it will be given to you.”

Featured Story

The detailed prophecies contained in God’s Word are part of what makes the Bible unique among religious texts. Our God can “make known the end from the beginning, from ancient times, what is still to come” (Isaiah 46:10), and He has revealed significant events in the future, counting out the very days of those periods of time.

EXCLUSIVE ANALYSIS – All encrypted emails, files and hard drives that currently rely on 256-bit encryption (such as AES or RSA) may be retroactively broken by the NSA in the next three years, thanks to rapid advances in quantum computing recently announced by Google scientists.

The NSA is currently archiving all encrypted communications and storing the digital files on offline storage servers in its “Bumblehive” domestic spying facility in Utah. Currently these digital files cannot be broken because classical computing presents a strongly asymmetrical complexity problem that makes breaking encrypted files prohibitively time consuming and expensive. Files encrypted with 2^n bits currently present computational complexity that requires 2^n computer power to break. In other words, encrypting files is easy (linear), but breaking encryption is incredibly difficult (logarithmic).

But rapid advances in quantum computing transform the breaking of encryption from a logarithmic mathematical problem to a linear problem, collapsing the complexity to 2 * n instead of 2 ^ n. The enormity of this difference can only be appreciated when you do the math. Calculate 2 ^ 512, versus 2 * 512 and compare the answers. Quantum computing effectively transforms certain logarithmic computations into linear computations, and its best application is breaking encryption. (Quantum computing isn’t really “computing” at all, by the way. For a more detailed mathematical explanation of the hyper-dimensional, hyper-computational capabilities of quantum phenomena, read this explanation at Natural News.)

The NSA will likely be able to break all 256-bit encryption within about three years, according to admissions from Google scientists

What all this means is that within the next three years, according to a recently released paper published by Google scientists — who appear to be conducting research on a D-Wave quantum computing framework — quantum computers will exceed 256 qubits, allowing them to almost effortlessly crack all 256-bit encryption (but not all at once, they still have to pick and choose which files to crack). Roughly each year beyond that, the capabilities of these quantum computers will reportedly double, meaning that cracking 512-bit, 1024-bit or even 2048-bit encryption is just a few years away. This obviously has huge implications for military communications and global geopolitics.

This means the NSA will be able to retroactively break all the encrypted emails, files and other digital communications that it has surreptitiously hoovered up and stored on its servers.

Importantly, whatever information you’ve sent via encrypted email services may be retroactively broken by the NSA, transforming your encrypted emails and files into plain text files. This is true across all the encrypted emails and files you’ve sent over the last decade or more.

None of this means encrypted email services have done anything wrong. Encrypted email providers like ProtonMail and HushMail have done an excellent job of providing secure communications for individuals and businesses. But the emergence of quantum computing sooner or later renders classical encryption obsolete. This also means, by the way, that the NSA will be able to spoof or break all cryptocurrency transactions within just a few years. In fact, your entire crypto wallet could be drained by the NSA in mere seconds, almost effortlessly, if they choose to target you with such an action. (The “crypto” in cryptocurrency means cryptography. Without cryptography, there is no cryptocurrency. And Google — which is little more than a tech front for the NSA — will soon render classical cryptography obsolete.)

The weaponization of quantum computing against human freedom

The high economic cost of quantum computing systems means the NSA will likely direct this digital weapon at targets with the highest payoff — such as the digital communications of members of Congress or U.S. Supreme Court justices who can be pressured into supporting abortion, gun control and the expansion of government tyranny.

The only thing protecting your past encrypted communications, at that point, will be the NSA’s relative lack of interest in your emails since they probably have bigger targets to attack first. Fortunately for us all, quantum computers cost millions of dollars (at the moment, at least). So there is, at some level, an economic barrier to the NSA buying and deploying entire server farms of these systems. This means their capacity to break encrypted files is strictly limited, at least until quantum computers become several orders of magnitude more affordable.

Nevertheless, if you’ve previously sent encrypted emails or files, there’s nothing you can do to go back and erase those emails or files, since they’ve already been copied by the NSA into a massive (and highly illegal) database, thanks to laws passed after the staged 9/11 attacks that were engineered to launch a massive expansion of the surveillance state.

Everything you’ve sent over the internet in encrypted form — including details of your purchases from encryption-protected websites and https / SSL communications — will be an open book to the NSA in just a few years. Over time, quantum computers will become less expensive, meaning the NSA will, over time, be able to retroactively break an increasingly large number of encrypted files. The only safe assumption here is to assume that ALL encrypted files possessed by the NSA will eventually be broken, very likely within the next decade if not sooner.

The NSA will, of course, weaponize this technology and use it to destroy its political opponents while rapidly expanding its own power and reach. Quantum computing will be used not to set humanity free but to enslave humanity to centralized, digitized authoritarian rule. The laws of physics, in other words, will be turned against humanity to create a hyper-dangerous, authoritarian techno-fascist regime that rules the world.

Denial is not a working strategy

In covering quantum computing, we’ve noticed a strong pattern of denial across independent media, which seems to dislike the idea that cryptocurrency, as currently structured, will likely be made horrifyingly vulnerable in just a few years by these advances in quantum computing. Many promoters of Bitcoin, in particular, have long operated in the dream world of self-delusion rather than reality, telling themselves that Bitcoin would rise to $1 million and take over global banking, for example. In truth, Bitcoin is absurdly slow to clear transactions, and the very concept of blockchain is in some ways self-defeating since widespread use would make the sheer size of the blockchain ledger itself far larger than the storage capabilities of mobile devices. The more people use Bitcoin, the bigger the blockchain becomes in terms of sheer storage and computational requirements to update stored wallets.

That doesn’t mean the cryptocurrency is a bad thing, of course. Any technology that achieves decentralization and challenges the pure evil of central banks is a good technology for humanity. Regardless of Bitcoin’s true origins — which remain shrouded in secrecy and myth — the underlying technology core of Bitcoin, as currently structured, looks like it’s about to be rendered potentially obsolete (unless radical changes are made, see below). The fact that China is also working feverishly on quantum computing means that U.S. interests cannot abandon the project, or they risk being beaten in the “quantum supremacy” game by a powerful geopolitical enemy.

Once quantum computing is achieved at the 256-bit level, the technology will quickly be stolen, copied or sold to other nations, and the deployment of 256-qubit systems will become widespread within a few years. It won’t be long before encryption breaking becomes ubiquitous, and all the old secrets protected by 256-bit encryption will be exposed to the surveillance state.

How Bitcoin and other cryptos might survive the emergence of quantum computing

If Bitcoin (or any cryptocurrency) hopes to survive, it must develop a new encryption method that does much more than merely adding bits to the encryption keys. Shifting to 512-bit encryption is only a delaying tactic since a 512-qubit quantum system won’t be far behind the achievement of 256-qubit computing.

Fortunately, the people behind Bitcoin and other cryptos are truly some of the smartest people in the world, and they may yet develop new cryptography solutions that can out-pace quantum computing in ways we can’t currently imagine. The incorporation of personal biometrics into encryption algorithms might be one solution. So-called “quantum encryption” is another possibility, but the widespread deployment of that technology would require new hardware on all computing platforms (you have to read the spin states of atomic elements), making this solution less than feasible, given current technology.

My guess is that the very smartest encryption people involved in the crypto world are already well aware of the risk that quantum computing poses to the crypto backbone, and they are already exploring possible solutions. So I don’t think quantum computing automatically spells the end of cryptocurrency; I think it will force crypto to re-engineer itself in radical ways. Yes, there is a very real risk that some cryptocurrencies might not adapt quickly enough and could become obsolete, but the smartest cryptos will likely find a way to adapt and overcome. (Never underestimate the intelligence of the people who built Zcash, as a general rule.)

Personally, I hope crypto survives, and I hope we will still find ourselves living in a world where citizens can have secrets that can’t be read by government regimes. Because the alternative to that — a world where governments can break all encryption — is a very dangerous, dark, evil world in which no human can truly be free. Sadly, quantum computing research is marching us in precisely that direction, and there has never been a game-changing technology that wasn’t eventually used to murder, brainwash or enslave humanity. Source

Watch more videos on quantum computing, cryptocurrency, and liberty at Brighteon.com, the free speech alternative to YouTube.FacebookTwittergoogle_plusShare

True Tyranny Always Begins with the Censoring of Free Speech

As U.S. Founding Father Benjamin Franklin said, “Man will ultimately be governed by God or by tyrants.” When a culture abuses its democratic power, the result is chaos and ruin. Either a democracy, guided by self-control and morality, keeps itself in check, or it crashes. When the crash happens, control falls to a non-democratic system, either willingly or by force. Cultures that drift from Christianity tend to drift from “true” democracy into other, democracy-flavored political schemes and, eventually, into subjection to tyranny…

In this very important story over at Activist Post titled “YouTube Just Purged 17,000 Channels For Hate Speech, Some Broke NO RULES AT ALL“, Steve Quayle left an absolutely crucial note while linking to the story: “You are watching the assassination of free speech in America in real-time!

Many are puzzled by a known fact that 3% of the American population (homosexuals) control the narrative, the question has to be asked, why? here’s the answer- most so-called Christians today, just happen to be Christians in name only, they’re okay with God’s infallible word being rewritten ( Queer bible and Hillsong Churches) to suit their ungodly lifestyles. Christians in name only are common within liberal faith and political circles. Sometimes, they may attempt to justify their liberal make-believe god through loose paraphrases of the Bible and leaps of logic (e.g., going from the Christian communities described in Acts to a call for a welfare state). They may at other times abandon any pretense that the Bible has anything to do with their views and identify as “Christian” solely for advancement in their liberal Churches and political circles or for identification with the Culture War. They also often attempt to turn Christianity into a purely or predominantly secular political movement, emphasizing social justice and other notions that are completely unmoored from Bible-based Christianity. StevieRay Hansen

StevieRay Hansen
Editor, HNewsWire.com

Let Me Make This Abundantly Clear. (I Am Apolitical) While I Have a General Distaste for Politicians No Matter the Party They Belong To, I Am Unashamedly Politically a Bible Believing Conservative Christian. I Have a Severe Distrust of Government. I Believe It Is the Most Inefficient and Ineffective Way to Accomplish Most Things. While I Strongly Disagree with Liberals/Progressives and Conservative on Most Political Issues, and While I Believe Liberals/Progressives and Most Politicians Are Terribly Misguided and Naive About What Big Government Will Eventually Result In, I Strive to Not Question Their Motives. at the Same Time, While I Find Myself in Agreement with Conservative Politicians on Some Issues, I Do Not Believe Electing Republicans Is the Answer to Everything. for Me, Very Sadly, the Main Difference Between Republicans and Democrats Is How Quickly They Want to Drive the Car Towards the Cliff. Simply Put, I Do Not Believe the Government Is the Solution for Everything. I Do Not Place Any Faith, Trust, or Hope in Any Politicians to Fix What Is Wrong with the World. “Come Lord Jesus!” (Revelation 22:20)

Our government has been overthrown. As evidenced by Trump’s capitulation on the border, his recent servitude to the GMO industry and his acquiescence to the warmongers, our President has been compromised. Our liberties are being eliminated one by one. Gun confiscation is next. The Constitution is gasping its last breaths. Our borders are destroyed and our culture has been turned upside down by every perversion known to man.

Education is useless without the bible (Daniel Webster)

Usually, the Lord doth no great thing for or against his people, without giving warning of it before it comes.

John Wesley who said that what we tolerate in our generation, will be embraced by the next. Wesley is 100% correct! We are living in sick times.

Evil Exists So Spiritual Warfare Becomes Necessary!

  1. Corinthians 4:8-11 New King James Version (NKJV)
  2. We are hard-pressed on every side, yet not crushed; we are perplexed, but not in despair; 9. persecuted, but not forsaken; struck down, but not destroyed— 10. always carrying about in the body the dying of the Lord Jesus, that the life of Jesus also may be manifested in our body. 11. For we who live are always delivered to death for Jesus’ sake, that the life of Jesus also may be manifested in our mortal flesh.

Satan has power over (LGBTQE-TRANS PEOPLE). The “sons of disobedience” referred to in Ephesians 2:2 are those who have not trusted Christ as Lord and Savior (cf. Acts 26:18; 2 Corinthians 4:4; Revelation 13:12). The demons are also under the rule of Satan (Matthew 12:24), and one of his titles is “prince of demons” (Matthew 9:34). Satan has a kingdom (Matthew 12:26) and a throne (Revelation 2:13). Satan is called a prince because he is a ruler and possesses the power to manifest evil in the world through influencing people and commanding demons.

HNewsWire- “All political language is designed to make lies sound truthful and murder respectable.” Just look at some of our modern-day examples: torture is “enhanced interrogation techniques”; murder is “collateral damage”; the aggression initiation of war is a “pre-emptive strike”; the theft of taxpayers’ money is a “bailout”, and the theft of depositors’ money in a bank is a “haircut” or “bail-in”.In a blatant example of Newspeak, the New World Order controllers (through the psychiatric DSM V) have tried to rename pedophiles as “minor-attracted persons” and redefine pedophilia as “sexual orientation”. This makes no sense since sexual orientation has to do with gender, not age, with whether you are attracted to males or females, not how old they are. There are even organizations (like B4UAct.org) which are claiming that pedophiles are being unfairly stigmatized for their feelings!

If homosexuality has been posed as healthy, good and normal, in the face of overwhelming evidence to the contrary, so can pedophilia. Pro-pedophilic articles are making their way into academia.

The Cult of LGBTQE-E for EVIL and is often a cover for child-molesting perverts

Tagged Under: abuse, children’s health, gender-confused, gender issues, gender madness, the left cult, LGBTQE, un-godly Mob, Lunacy, mutilation, transgender, Child molesting perverts LGBTQE- E For Evil, drag queens, perverts

Unfortunately, not all alternative sources are reliable, even some Major Christian (and I use Christian loosely) news sources have been corrupted. They will NOT tell the truth. They just parrot the deceptive narratives perpetrated by those who currently control our government and media. Even those who are honestly trying to present the truth can miss it sometimes. There is so much deception out there. In these last days, you must be wise as serpents and gentle as lambs. It is no time to sleep or slumber. Diligence and vigilance are required. It is critical that you think for yourself and not be a Lemming.

HNewsWire Logo Bottom Menu

Tagged Under: computingemailsencryptionGoogleinformation technologyNSAPGPprivacyquantum computingsecretssurveillance

Loading

watchman-on-wall

Tagged In

Newsletter

Must Read

Long-Journey-Home-1
One-Thing
Mark-Cahill-Ministries-1
One-Blinding-Vision

Other Sources

USSANews

Latest News

Watchman Warning: Daily Devotional, Denying God’s Truth When Claiming to Be a Christian Can Be a Deadly Mistake

By StevieRay Hansen | June 13, 2024

Denying God’s Truth When Claiming to Be a Christian Can Be a Deadly Mistake, Making One Hellbound, S. Michael Houdmann and GotQuestions.blog Proud of It,…

Loading

Read More

Watchman: How Satan Soldiers at Google And Wikipedia Brainwash You. They Are Evil Incarnate!

By StevieRay Hansen | June 12, 2024

Internet giants cover-up for Big Pharma, suppress alternative medicine and bury inconvenient facts…   According to research done by We Are Social, the average internet user spends over…

Loading

Read More

VIDEO: Mainstream Media Conspiring With Google to Rig All Search Results and Silence Dissenting Views… Google Becomes “Fake Search”

By StevieRay Hansen | June 12, 2024

What does Google have in common with traditionally [liberal news networks like MSNBC](http://www.msnbc.news/), ABC and CNN? On the surface, nothing much at all – the…

Loading

Read More

Watchman: Google Poses a Serious Threat to Our Democracy–Google Is Either Evil and the Most Incompetent Search Engine on the Planet, or It Is Intentional

By StevieRay Hansen | June 12, 2024

HNewsWire: What High-Tech Do-Gooders Have Ignored There Are No Laws or Rules in the World They Have Created, Artificial Intelligence Will Eventually Eat Their Own,…

Loading

Read More

LOOSED BY LOVE OR BOUND BY UNFORGIVENESS, WHICH DO YOU PREFER FOR ETERNITY?

By Edward O'Hara | June 12, 2024

Edward O’Hara In Mat.18 Jesus says “Verily I say unto you, Whatsoever ye shall bind on earth shall be bound in heaven: and whatsoever ye shall…

Loading

Read More
Focused-Protection-1
Place Your Ad Here

We make every effort to acknowledge sources used in our news articles. In a few cases, the sources were lost due to a technological glitch. If you believe we have not given sufficient credit for your source material, please contact us, and we will be more than happy to link to your article.

StevieRay Hansen

In his riveting memoir, "A Long Journey Home", StevieRay Hansen will lead you through his incredible journey from homeless kid to multimillionaire oilman willing to give a helping hand to other throwaway kids. Available on Amazon.

Leave a Comment





This site uses Akismet to reduce spam. Learn how your comment data is processed.