462
submitted 9 months ago by boem@lemmy.world to c/technology@lemmy.world
you are viewing a single comment's thread
view the rest of the comments
[-] echodot@feddit.uk 9 points 9 months ago* (last edited 9 months ago)

Jokes on them now they have to pay my electricity bill

They have already developed quantum proof encryption algorithms, something something latent spaces something something. Anyway, as long as the website has been updated to use the new algorithms you'll be okay. You may just have to change your password one time in case it was compromised under the old encryption scheme.

[-] Chobbes@lemmy.world 1 points 9 months ago

Post quantum cryptography is under development and is slowly being introduced in order to evaluate it / prevent store-and-decrypt-later attacks... But this is generally in more niche applications. SSH recently adopted post-quantum cryptography for key exchange, but it uses a hybrid approach with traditional cryptography in case the post-quantum stuff proves to be not as strong as we think... Signal is experimenting with post-quantum stuff as well. As far as I know, though, post-quantum cryptograhy hasn't seen wide deployment, and I don't think any of it is used with HTTPS yet (certainly not commonly, anyway). Depending on what you care about this could be a problem. If you just care that nobody else can authenticate as you, then yeah, once everything is moved over to post-quantum stuff you can just change all your passwords and hopefully you'll be good... If you care that the data is private then this is a big problem, and in theory somebody could scrape all of the messages you've sent and the contents of everything that you've done on the web (probably government agencies and not normal people, but maybe this information later gets leaked to the public too). This could also be a problem for authentication, for instance if you've ever logged into your bank account you've probably seen your routing numbers which somebody could take and use to transfer money, in theory.

It's also worth noting that, as far as I know, we don't actually know for certain that the post-quantum cryptography we've developed is secure. I think all we know is that it isn't vulnerable to Shor's algorithm, but there could be other exploits we don't know about. This is of course also true for all of the cryptography we use today too. We don't actually know how hard factoring into prime numbers is, for instance, but these algorithms have been in use for a long time and have been under a lot of scrutiny so we have more confidence in them.

this post was submitted on 04 Dec 2023
462 points (97.7% liked)

Technology

58150 readers
4244 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS