Abstract

Since 1959, with the creation of the microchip, and 1983 with the development of the internet, or what they called, the interwebs, our societies have quickly expanded into competitive, technological ones. With upcoming companies such as Microsoft and IBM, at the time, the personal computer and advanced microprocessors came into developing fruition.

Though as technology improves and personal begins to really mean personal, security became a major aspect for software and hardware companies. The average user would take these technologies for granted, considered miracles of the late 20th century, but as these concerns grew, the enthusiast and consumer awareness approach developed. By informing people of current technological states, its beauties, and its flaws, greatly enhances audience knowledge and incites critical thinking on technological relationships.

As the paper enforces, the basic 64bit encryption rate (The code of binary that camouflages your personal information through the internet) has its flaws, just like any program or code, though it uses third party programs and supplementary software to improve its security and efficiency). Even so, with such fidelity in security, we always hear of data breaches, and other malicious software, such as viruses, trojan or malware attacks, worldwide. So, how is it that with such security, we’re so insecure. Well, like Hollywood, and other, unreputable sources had led us to believe, large scale hacking, and deep personal information doxxing (The act of stealing someone’s personal information), happens by some seventeen years old with a laptop, a Wifi connection and a few minutes. In reality, these events are lead by large groups of programmers and coders, working with a time frame of about 3-6 months to accomplish an attack of such scales.

With the development of quantum technology, and quantic processing, Hollywood scenes like that scene on “Swordfish,” where Hugh Jackman hacks a 128-Bit US Defense network, in under 60 seconds, might actually be possible. Even if it currently isn’t. As Quantum technology develops, it currently surpasses any form of classical computing methods.  Currently, the efficiency of our current encryption rates (Our online safety networks) is completely obliterated by advanced modern quantum computers, leading hackers, corporations, and our government into a constant state of technological competition.

There’s a chance you’ve been told not to reuse our passwords, or to make them too simple, and now, there might be even more of a reason to take that advice.    

Leave a Reply

Your email address will not be published. Required fields are marked *