That’s incorrect, there are algorithms that can be used on classical computers that are impervious to quantum computer decryption. One-time pad cipher is an obvious example. Unless you know the pad there is insufficient information to retrieve the encoded message. Some other algorithms are discussed here https://en.wikipedia.org/wiki/Post-quantum_cryptography
I was unaware of these systems, yet there remains a greater vulnerability to quantum computer attacks until the user don’t has it’s own.
Even today with traditional techniques it is increasingly difficult to protect yourself, since only Google introduces every little new dirty tricks on the network to facilitate user tracking, such as FloC (although with this it has hit the teeth in a singing, being rejected en masse by the main manufacturers), Idle detection, dozens of header and fingerprint sniffing systems, CSS exfil, CDN tracking, redirects, etc…
This with Quantum technology can only get worse.
Although strong encryption techniques can be applied, it will make things more difficult for the user as it is now to protect themselves.
The technological difference is abysmal between a normal PC and a Quantum computer with currently 60 Qbits and who knows, how much in the near future.
Bad for a free internet, it only leaves descentralized networks
As I said earlier, the reality of the situation is that it’s pretty much impossible to guarantee any kind of security against a determined attacker today. What quantum computing brings is the ability to guarantee secure communications which is practically impossible to do with traditional computers, and eventually this tech will get small and cheap enough to be accessible to individuals.
Ultimately, quantum computing is happening whether we like it or not. So, lamenting it seems kind of pointless to be honest. The cat is out of the bag, and there is a lot incentive to develop this technology.
That’s incorrect, there are algorithms that can be used on classical computers that are impervious to quantum computer decryption. One-time pad cipher is an obvious example. Unless you know the pad there is insufficient information to retrieve the encoded message. Some other algorithms are discussed here https://en.wikipedia.org/wiki/Post-quantum_cryptography
I was unaware of these systems, yet there remains a greater vulnerability to quantum computer attacks until the user don’t has it’s own. Even today with traditional techniques it is increasingly difficult to protect yourself, since only Google introduces every little new dirty tricks on the network to facilitate user tracking, such as FloC (although with this it has hit the teeth in a singing, being rejected en masse by the main manufacturers), Idle detection, dozens of header and fingerprint sniffing systems, CSS exfil, CDN tracking, redirects, etc…
This with Quantum technology can only get worse. Although strong encryption techniques can be applied, it will make things more difficult for the user as it is now to protect themselves. The technological difference is abysmal between a normal PC and a Quantum computer with currently 60 Qbits and who knows, how much in the near future. Bad for a free internet, it only leaves descentralized networks
As I said earlier, the reality of the situation is that it’s pretty much impossible to guarantee any kind of security against a determined attacker today. What quantum computing brings is the ability to guarantee secure communications which is practically impossible to do with traditional computers, and eventually this tech will get small and cheap enough to be accessible to individuals.
Ultimately, quantum computing is happening whether we like it or not. So, lamenting it seems kind of pointless to be honest. The cat is out of the bag, and there is a lot incentive to develop this technology.