Skip to main content

Are bitcoins safe from attackers who use quantum computers?

The fact is this. There is quite a small number of quantum computers in the world. They are easy to control. And there is no free access to those computers. If the quantum computer is in some cave there is the possibility to double-check the code that s driven by using quantum computers. But if some intelligence service uses that quantum computer. There is the possibility. That it will use as a tool for network attacks. 

Trusted organizations are controlling those systems. And that means the internet is safe from private attackers who use quantum computers. But the problem is that some governments might have a will to attack other states' facilities by using quantum computers. 

Nobody protects people against governmental actors. If the hackers are operating under governmental protection. There is no way to get them to the court. 

The NSA is not the only network intelligence organization in the world. Chinese and Russians are also interesting in quantum computers. And those governments have their way to make hackers cooperate with their military and intelligence organizations. If some hacker would not cooperate those governments will make some trouble to that person who dares to deny their offer. 

In the worst cases, some family members will get in trouble. If the hacker says "no". And the offer goes like this. If the hacker will cooperate with authorities, some of that person's family members would not get a new workplace in carbon mining. 

And one area where quantum computers are the ultimate tools is cryptology. Quantum computers can use to break protective algorithms. The thing is that the benefits and power of quantum computers are well-known. That makes them very financed and very wanted tools.

As I wrote earlier, there are not many quantum computers in the world yet. But the situation can change quite soon. The R&D work around quantum computers continues. And the advantages in that area are impressive. The quantum computers would turn more common all the time. 

And sooner or later also medium and small-size companies can buy those systems. So in those companies may work people with some gang-contacts. And they can offer access to their systems for private hackers.

The biggest threat from the non-governmental sector is that some hackers will get access to quantum computers. And they can use the quantum systems for carking tools. When those quantum systems turn more common, there is the possibility that this kind of quantum system would get into the wrong hands. 


https://physicsworld.com/a/bitcoin-encryption-is-safe-from-quantum-computers-for-now/


https://thoughtsaboutsuperpositions.blogspot.com/

Comments

Popular posts from this blog

Schrödinger's cat: and the limits of that idea.

"In quantum mechanics, Schrödinger's cat is a thought experiment concerning quantum superposition". (Wikipedia, Schrödinger's cat). But the same thing can use as model for many other thought experiments.  Sooner or later, or at least in the ultimate end of the universe, the Schrödinger's cat will turn into wave movement. The information that this cat involved exists but the cat does not exist in its material form. The information doesn't ever vanish. It just turns its shape.  We are all trapped in the universe and time. The universe is the space that is entirety to us. There are no confirmed other universities. But the multiverse is a logical continuum for the expanding galactic megastructures.  The problem with natural things is this. They are black and white. They exist or do not exist. Could there be something, that exists and not exists at the same time?  Scrödinger's cat is thinking experiment about case their cat is not dead or not alive. But in this...

The string theory offers a new way to calculate Pi.

"Scientists discovered a new series for pi through string theory research, echoing a 15th-century formula by Madhava. By combining Euler-Beta Functions and Feynman Diagrams, they modeled particle interactions efficiently. Credit: SciTechDaily.com" (ScitechDaily, String Theory Unravels New Pi Formula: A Quantum Leap in Mathematics) People normally think that. The pi is the ratio of the circumference circle's circumference to the circle's diameter. The Pi is a mathematical constant 3.14159..., the endless decimal number. The Pi is interesting because developers can use that decimal number to make the encryption algorithms stronger.  The idea is that the encryptions program hides the message's original ASCII numbers by multiplicating those numbers with some decimal number. Or the system can add some numbers to those ASCII numbers.  "Aninda Sinha (left) and Arnab Saha (right). Credit: Manu Y" (ScitechDaily, String Theory Unravels New Pi Formula: A Quantum Le...

There are always more than three actors in the real world.

"An international research team is advancing precision timekeeping by developing a nuclear clock using thorium isotopes and innovative laser methods, potentially transforming our understanding of physical constants and dark matter. (Artist’s concept.) Credit: SciTechDaily.com" (ScitechDaily, Unveiling the Thorium Nuclear Clock and Its Time-Twisting Secrets) From Three-body problem... There are no pure three-body systems in nature. There are always more than three components in the system. For making real three-body systems we must separate those three bodies from the environment. Otherwise, there are stable effects. But nobody can predict some effects like distant supernova explosions or sun eruptions.  And one of those things that affect all bodies is time. When radioactive materials decay. That affects the stability and symmetry of the object.  Energy levels affect the existence of things like neutrons. The thorium atom clocks are next-generation tools for time measurement....