
#512: All Encryption Hacked in 3 Years?
David Bombal
00:00
The Looming Quantum Threat to Encryption
This chapter explores the impact of quantum computing on encryption, focusing on its ability to undermine current asymmetric encryption methods. Experts warn that nation-state actors could exploit these vulnerabilities within a matter of years, emphasizing the urgent need to reevaluate data security practices.
Transcript
Play full episode
Transcript
Episode notes
Big thanks to Brilliant for sponsoring this video. To try everything Brilliant has to offer for free for a full 30 days, visit https://brilliant.org/davidbombal or scan the QR code onscreen – You’ll also get 20% off an annual premium subscription.
Quantum computing isn’t a far-off sci-fi threat. In a hybrid model (CPU + GPU + quantum), it could land within ~3 years—and that’s enough to break today’s
asymmetric cryptography (RSA/ECC/PKI) used for TLS/HTTPS and VPN key exchange via Shor’s algorithm. Result? Session keys exposed, mass decryption possible, and a risky “post-quantum gap” before new hardware/software are widely deployed.
In this frank discussion, OTW joins David Bombal to explain:
• Why asymmetric key exchange is the weak link for TLS/VPNs
• How hybrid quantum + CUDA-Q accelerates timelines
• Nation-states’ “collect now, decrypt later” strategy
• The painful window before post-quantum cryptography (PQC) rolls out
• Risks of client-side scanning and on-device AI
• NSA backdoors, PGP/Phil Zimmermann, and the San Bernardino iPhone case
// Occupy The Web SOCIAL //
X: / three_cube
Website: https://hackers-arise.net/
// Occupy The Web Books //
Linux Basics for Hackers 2nd Ed
US: https://amzn.to/3TscpxY
UK: https://amzn.to/45XaF7j
Linux Basics for Hackers:
US: https://amzn.to/3wqukgC
UK: https://amzn.to/43PHFev
Getting Started Becoming a Master Hacker
US: https://amzn.to/4bmGqX2
UK: https://amzn.to/43JG2iA
Network Basics for hackers:
US: https://amzn.to/3yeYVyb
UK: https://amzn.to/4aInbGK
// OTW Discount //
Use the code BOMBAL to get a 20% discount off anything from OTW's website: https://hackers-arise.net/
// Playlists REFERENCE //
Linux Basics for Hackers: • Linux for Hackers Tutorial (And Free Courses)
Mr Robot: • Hack like Mr Robot // WiFi, Bluetooth and ...
Hackers Arise / Occupy the Web Hacks: • Hacking Tools (with demos) that you need t...
// YouTube video REFERENCE //
• USA stops UK creating Apple backdoor. Why ...
• Will this Tiny Chip Change EVERYTHING in Q...
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: www.twitter.com/davidbombal
Instagram: www.instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: www.facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
YouTube: / @davidbombal
Spotify: open.spotify.com/show/3f6k6gE...
SoundCloud: / davidbombal
Apple Podcast: podcasts.apple.com/us/podcast...
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// MENU //
0:00 - Coming Up
01:00 - Intro
01:49 - OTW's Books
02:46 - Brilliant Advert
04:01 - Encryption and Apple Backdoors
05:12 - Nation-states Racing for Quantum Computing
08:35 - Jensen Huang's Hybrid Quantum Computer
10:57 - The Threat of National Agencies
12:10 - China Collecting Encrypted Data
13:56 - Post-Quantum Cryptography
17:58 - The NSA Collecting Data
19:21 - The NSA and Encryption
24:40 - Concerns Against Cryptography
28:09 - Client-Side Scanning
30:46 - Should you Run AI on your Devices?
34:56 - NVIDIA's Role on Cryptography
37:37 - Conclusion
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
The AI-powered Podcast Player
Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!