GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Embed Notice

HTML Code

Corresponding Notice

  1. Embed this notice
    🌱@ambiguous_yelp:ahimsa.chat (ambiguous_yelp@social.coop)'s status on Tuesday, 14-Jan-2025 17:11:48 JST🌱@ambiguous_yelp:ahimsa.chat🌱@ambiguous_yelp:ahimsa.chat
    in reply to
    • Rich Felker
    • sammi
    • Joe Lanman

    @dalias @sammi @joelanman no true scotsman fallacy. no true security researcher believes in quantum breaking classical encryption, if you havent seen the veritasium video on Harvest Now Decrypt Later you can also read the wikipedia page https://en.wikipedia.org/wiki/Harvest_now%2C_decrypt_later, at the very least it seems powerful orgs are taking the threat srsly, harvesting encrypted data for decryption and transitioning to PQ as defense https://cloud.google.com/blog/products/identity-security/why-google-now-uses-post-quantum-cryptography-for-internal-comms

    In conversationabout 5 months ago from social.cooppermalink

    Attachments

    1. No result found on File_thumbnail lookup.
      Harvest now, decrypt later
      Harvest now, decrypt later, also known as store now, decrypt later, steal now decrypt later or retrospective decryption, is a surveillance strategy that relies on the acquisition and long-term storage of currently unreadable encrypted data awaiting possible breakthroughs in decryption technology that would render it readable in the future - a hypothetical date referred to as Y2Q (a reference to Y2K) or Q-Day. The most common concern is the prospect of developments in quantum computing which would allow current strong encryption algorithms to be broken at some time in the future, making it possible to decrypt any stored material that had been encrypted using those algorithms. However, the improvement in decryption technology need not be due to a quantum-cryptographic advance; any other form of attack capable of enabling decryption would be sufficient. The existence of this strategy has led to concerns about the need to urgently deploy post-quantum cryptography, even though no practical quantum attacks yet exist, as some data stored now may still remain sensitive even decades into the future. As of 2022, the U.S. federal government has proposed...
    2. Domain not in remote thumbnail source whitelist: storage.googleapis.com
      Why Google now uses post-quantum cryptography for internal comms | Google Cloud Blog
      Google has enabled post-quantum cryptography for its internal communication protocol. Here’s why.
  • Help
  • About
  • FAQ
  • TOS
  • Privacy
  • Source
  • Version
  • Contact

GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.