Quintius Walker, Grey Hat Developer, Cybersecurity Consultant
14 June 2024
Absolutely everything on this blog pertaining to the term “hacking” is meant for training and educational purposes only. WE DO NOT ENGAGE IN NOR PROMOTE ANY ILLEGAL HACKING ACTIVITY!
This post will be a break away from the norm in the sense that it isn’t the usual display and dialog of some module in some course that we’re currently grinding in. However, it’s reflective of a state of mind in one single point in time. And as it’s often the case, waxing poetically is how it is being manifested here today.
I recently had the fortune of sitting down for a quick chat with a very supportive and dynamic duo from Palo Alto who brought my attention to giving some thought towards resiliency in a quantum computer hacking future. Given the quantum realm is something that one of my mentors smashes about, this idea wasn’t new to me.
Although, I do realize that this may be something you’ve yet to consider yourself. Thus, I’ll hence wax poetically then I’ll point you in a direction to research more about it….and also point you to a source that’ll give you some guidance on what you can proactively do about it.
How’s that sound? Cool.
A Quantum Computer Hacking Future
Quantum computing,
could render obsolete
R-S-A,
and any old encryption
that we’ve used along the way.
They can pawn and flip the data,
Just like we tip the waiter,
No need to pay upfront
they Harvest Now
Decrypt it Later.
Y’all thought Pete,
was truly out his mind
but when he spoke this,
I seen that he
was way before his time
could we’d be hopeless….
If quantum broke
encryption as we know it,
I feel if we was faced
with opposition
we would blow it.
In this Nation,
with so much
placed on “Likes”
and competition,
no wonder why we’re drifting
like we’re stuck inside suspension.
We pride in our position,
relying on our contention,
and drowning out the choir
while our adversaries are listening.
They lay the bait
then wait
to exfiltrate
our information,
If NIST can get us out
this state
then why is they
still waiting?
NS Memorandum 10,
“ah, here we go again”,
This war is fought
through hacking
they can’t win this with no pen.
Well, I guess that all depends….
if Quantum breaks the Cipher,
Cybersecurity’s trite
but that’s the price I trade my life fa’.
Solutions of tomorrow
are they already dead?
From entropy
to latency
disorder’s in your head.
Quantum Wave information,
the ashes and the gasses,
paper turns to fire,
turns to smoke
for all the masses.
When it turns into survival,
security is vital,
no order nor correction
if our energies are idle.
Controlling operations,
the goal is to achieve,
We flex and roll
with Sec Controls
and all it’s prop-er-ties.
Like Trust,
the things
you can’t control
will get you trolled,
influence your operations
so reliably you scroll.
We have
no more motivation,
we’re lacking observation,
and can’t decide
what’s new or changed
collectively we’re wasting.
A structured,
adaptable approach
for situations,
to combat all this latency
and entropy we’re facing.
Visibility,
Induction…
Inquest and Interactions,
the Narrative’s dividing
our Intentions like it’s fractions.
Interventions
cannot help us
if our Contexts have no force,
Resources won’t mean nothing
when our choices
have no voice.
But it’s all about Intent,
before then during
and after….
React,
Resolve,
We hack
and that’s
the only fact that matters.
In a quantum…
computer hacking future!
And that’s it. If you’ve made it to the end, as always, you’re awesome. If you vibed with this and know someone else who would or you’d like to stay in the loop to get more posts like these, by all means Subscribe and Share.
To make it make sense, like I said, I have some sources for you.
- First, read about the Quantum Computing Threat directly from the Palo Alto docs. (kind of geeky)
- Then, here’s one from their blog on how they’re helping customers in they’re Quantum Secure journey.
- And last but not least, as I said I would, here’s a Jewel that can help you be proactive about security in a Quantum Hacking Future.
Hack On, Ladz & Gentz!