Owning the System, Cryptography and Data Capture
Owning the EM spectrum
Crypto AG https://www.bbc.com/news/world-europe-51487856
https://www.ntia.gov/book-page/regulating-use-spectrum
https://science.nasa.gov/mission/hubble/science/science-behind-the-discoveries/wavelengths/
Intelligence Operation
All communication equipment, encrypted or otherwise, is listened in on and recorded
Data overflow: keywords and phrases are searched out by AI Agents
The nature of modern communication equipment means that all data is captured and decrypted with our keys
"There is nothing wrong with your television set. Do not attempt to adjust the picture. We are controlling transmission. If we wish to make it louder, we will bring up the volume. If we wish to make it softer, we will tune it to a whisper. We will control the horizontal. We will control the vertical. We can roll the image, make it flutter.[3] We can change the focus to a soft blur, or sharpen it to crystal clarity. For the next hour, sit quietly and we will control all that you see and hear. We repeat: There is nothing wrong with your television set. You are about to participate in a great adventure. You are about to experience the awe and mystery which reaches from the inner mind to... The Outer Limits."
Worldwide data capture hubs and Quantum communication utilized
-data teleportation, instant information capture, optical photonic
-hub nodes at 1 mm^3 (invisible within polymer during manufacturing for future iterations)
-airdrop drone delivery and installation
Entanglement utilized for long distance communication -note: manifold fabric
......
Cracking Quantum Blockchain: link x https://barleysarthistory.blogspot.com/2025/07/owning-system-cryptography-and-data.html
https://barleysarthistory.blogspot.com/2024/08/block-chain-technology-government.html
https://barleysarthistory.blogspot.com/2024/08/blog-post_78.html
...
"These are the six primary areas of quantum-safe cryptography:
Lattice-based cryptography
Multivariate cryptography
Hash-based cryptography
Code-based cryptography
Isogeny-based cryptography
Symmetric key quantum resistance" -IBM
https://www.ibm.com/think/topics/quantum-cryptography
https://www.nist.gov/cybersecurity/what-quantum-cryptography
https://csrc.nist.gov/projects/post-quantum-cryptography
https://www.nist.gov/blogs/taking-measure/post-quantum-cryptography-qa-nists-matt-scholl
No comments:
Post a Comment