Occupy The Web, a cybersecurity expert and author known for his insights into Linux, hacking, and encryption, joins the discussion. He warns that quantum computing could break current encryption methods like RSA within three years. The conversation covers the urgent need for post-quantum cryptography, the risks associated with client-side scanning, and nation-states' strategies to exploit vulnerabilities. They also touch on ethical dilemmas concerning AI on personal devices and privacy, making this a crucial listen for anyone concerned about data security.
38:17
forum Ask episode
web_stories AI Snips
view_agenda Chapters
menu_book Books
auto_awesome Transcript
info_circle Episode notes
insights INSIGHT
Asymmetric Crypto Is The Weak Link
Quantum computers will break asymmetric cryptography like RSA and ECC, threatening the key-exchange foundations of TLS and VPNs.
OTW predicts a nation-state hybrid quantum system could arrive within about three years and expose vast amounts of encrypted data.
insights INSIGHT
Key Exchange Exposure Equals Data Exposure
Asymmetric cryptography is primarily used to exchange symmetric keys, so breaking it exposes session keys and content.
Quantum machines run Shor's algorithm which can rapidly solve those asymmetric problems and reveal exchanged keys.
insights INSIGHT
States Harvest Encrypted Data For Later Decryption
Nation-states already collect encrypted traffic now for 'store now, decrypt later' when quantum capability arrives.
That harvesting makes both past and future privacy at risk once decryption becomes feasible.
Get the Snipd Podcast app to discover more snips from this episode
Big thanks to Brilliant for sponsoring this video. To try everything Brilliant has to offer for free for a full 30 days, visit https://brilliant.org/davidbombal or scan the QR code onscreen – You’ll also get 20% off an annual premium subscription.
Quantum computing isn’t a far-off sci-fi threat. In a hybrid model (CPU + GPU + quantum), it could land within ~3 years—and that’s enough to break today’s
asymmetric cryptography (RSA/ECC/PKI) used for TLS/HTTPS and VPN key exchange via Shor’s algorithm. Result? Session keys exposed, mass decryption possible, and a risky “post-quantum gap” before new hardware/software are widely deployed.
In this frank discussion, OTW joins David Bombal to explain:
• Why asymmetric key exchange is the weak link for TLS/VPNs
• How hybrid quantum + CUDA-Q accelerates timelines
• Nation-states’ “collect now, decrypt later” strategy
• The painful window before post-quantum cryptography (PQC) rolls out
• Risks of client-side scanning and on-device AI
• NSA backdoors, PGP/Phil Zimmermann, and the San Bernardino iPhone case
// Occupy The Web SOCIAL //
X: / three_cube
Website: https://hackers-arise.net/
// Occupy The Web Books //
Linux Basics for Hackers 2nd Ed
US: https://amzn.to/3TscpxY
UK: https://amzn.to/45XaF7j
Linux Basics for Hackers:
US: https://amzn.to/3wqukgC
UK: https://amzn.to/43PHFev
Getting Started Becoming a Master Hacker
US: https://amzn.to/4bmGqX2
UK: https://amzn.to/43JG2iA
Network Basics for hackers:
US: https://amzn.to/3yeYVyb
UK: https://amzn.to/4aInbGK
// OTW Discount //
Use the code BOMBAL to get a 20% discount off anything from OTW's website: https://hackers-arise.net/
// Playlists REFERENCE //
Linux Basics for Hackers: • Linux for Hackers Tutorial (And Free Courses)
Mr Robot: • Hack like Mr Robot // WiFi, Bluetooth and ...
Hackers Arise / Occupy the Web Hacks: • Hacking Tools (with demos) that you need t...
// YouTube video REFERENCE //
• USA stops UK creating Apple backdoor. Why ...
• Will this Tiny Chip Change EVERYTHING in Q...
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: www.twitter.com/davidbombal
Instagram: www.instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: www.facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
YouTube: / @davidbombal
Spotify: open.spotify.com/show/3f6k6gE...
SoundCloud: / davidbombal
Apple Podcast: podcasts.apple.com/us/podcast...
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// MENU //
0:00 - Coming Up
01:00 - Intro
01:49 - OTW's Books
02:46 - Brilliant Advert
04:01 - Encryption and Apple Backdoors
05:12 - Nation-states Racing for Quantum Computing
08:35 - Jensen Huang's Hybrid Quantum Computer
10:57 - The Threat of National Agencies
12:10 - China Collecting Encrypted Data
13:56 - Post-Quantum Cryptography
17:58 - The NSA Collecting Data
19:21 - The NSA and Encryption
24:40 - Concerns Against Cryptography
28:09 - Client-Side Scanning
30:46 - Should you Run AI on your Devices?
34:56 - NVIDIA's Role on Cryptography
37:37 - Conclusion
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.