TS//RELIDO/UNCLASSIFIED MIX

20250729

Owning the System, Cryptography and Data Capture

The Outer Limits Intro dr. k | modtitan


Owning the System, Cryptography and Data Capture


Owning the EM spectrum

Crypto AG https://www.bbc.com/news/world-europe-51487856

https://www.washingtonpost.com/graphics/2020/world/national-security/cia-crypto-encryption-machines-espionage/

https://www.ntia.gov/book-page/regulating-use-spectrum

https://science.nasa.gov/mission/hubble/science/science-behind-the-discoveries/wavelengths/


Intelligence Operation

All communication equipment, encrypted or otherwise, is listened in on and recorded

Data overflow: keywords and phrases are searched out by AI Agents

The nature of modern communication equipment means that all data is captured and decrypted with our keys

"There is nothing wrong with your television set. Do not attempt to adjust the picture. We are controlling transmission. If we wish to make it louder, we will bring up the volume. If we wish to make it softer, we will tune it to a whisper. We will control the horizontal. We will control the vertical. We can roll the image, make it flutter.[3] We can change the focus to a soft blur, or sharpen it to crystal clarity. For the next hour, sit quietly and we will control all that you see and hear. We repeat: There is nothing wrong with your television set. You are about to participate in a great adventure. You are about to experience the awe and mystery which reaches from the inner mind to... The Outer Limits."


Worldwide data capture hubs and Quantum communication utilized

-data teleportation, instant information capture, optical photonic

-hub nodes at 1 mm^3 (invisible within polymer during manufacturing for future iterations)

    -airdrop drone delivery and installation


Entanglement utilized for long distance communication -note: manifold fabric

......

Cracking Quantum Blockchain: link x https://barleysarthistory.blogspot.com/2025/07/owning-system-cryptography-and-data.html

https://barleysarthistory.blogspot.com/2024/08/block-chain-technology-government.html

https://barleysarthistory.blogspot.com/2024/08/blog-post_78.html

...

"These are the six primary areas of quantum-safe cryptography:

Lattice-based cryptography

Multivariate cryptography

Hash-based cryptography

Code-based cryptography

Isogeny-based cryptography

Symmetric key quantum resistance" -IBM

https://www.ibm.com/think/topics/quantum-cryptography

https://www.nist.gov/cybersecurity/what-quantum-cryptography

https://csrc.nist.gov/projects/post-quantum-cryptography

https://www.nist.gov/blogs/taking-measure/post-quantum-cryptography-qa-nists-matt-scholl

https://www.dwavequantum.com/blockchain/

No comments:

Post a Comment