У нас вы можете посмотреть бесплатно Quantum Computing Will Break Encryption или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
Quantum computing won’t “challenge” encryption — it will break it. The data being encrypted today may already be harvested, stored, and waiting to be decrypted when the technology catches up. For years, intelligence agencies and advanced threat actors have been collecting encrypted traffic they can’t yet read. Not because they failed — but because they’re patient. This strategy is known as Harvest Now, Decrypt Later. In this video, I break down what most discussions about quantum security miss: the real danger isn’t the future arrival of quantum computers — it’s the encrypted data being collected right now that may still be valuable years or decades from today. We cover: • How modern encryption (RSA, ECC) actually works — and why it breaks under quantum computing • Shor’s Algorithm and why quantum changes the rules of cryptography • What “Harvest Now, Decrypt Later” means in real-world attacks • Which types of data remain valuable long after they’re stolen • Why post-quantum algorithms alone are not enough • What crypto-agility really means at an architectural level • Why waiting for a “quantum deadline” is already too late This isn’t fear-mongering. It’s a timing problem. History shows that cryptographic transitions take years, not months — from SHA-1 deprecation to TLS migrations to IPv6 adoption. The gap between having a solution and deploying it at scale is where real risk lives. If your organization handles long-lived data — intellectual property, healthcare records, government information, biometrics, financial systems, or cryptographic keys — quantum computing turns encryption into a time-delayed vulnerability. The question isn’t whether encryption fails. It’s whether your systems are crypto-agile enough to survive when it does. 📌 Resources linked below include: • NIST post-quantum cryptography standards • Guidance on crypto-agility and migration strategies • Real-world examples of long-term data exposure If this video changed how you think about encryption, consider subscribing for more deep-dive cybersecurity analysis. Comment below if you’d like a technical breakdown of post-quantum algorithms or a follow-up on how crypto-agility can be implemented in real environments. Chapters 00:00 "Encryption Has an Expiration Date" 05:15 "Quantum Computing as a Cloud Service" 07:13 "Data Value and Long-Term Risk" 12:38 "Preparing for Post-Quantum Cybersecurity" 15:45 "Prepare for Post-Quantum Security" 16:45 Stay Paranoid, Prepared, Secure 🔗 Join the Cybersecurity Community ▶️ YouTube - / @yanivhoffman 💼 LinkedIn - / yanivhoffman ✈️ Telegram - https://t.me/+oQxfGqavlg41ZjNh 𝕏 X (Twitter) - / hoffmanyaniv 🔗 Join the Cybersecurity Community