Quantum computing isn’t widely available yet, but the time is likely coming—and with it, the ability for users to deploy the technology for encryption and cryptography. That includes threat actors. Marc Lijour, an Institute of Electrical and Electronics Engineers researcher, told IT Brew that attackers are already getting ready for the opportunity provided by quantum computing. They are “downloading everything they can at the moment and storing it, basically copying the internet and anything they can so they can open it later [using quantum technology],” he said. Big time. That probably only applies to nation-states, John Bruggeman, a consulting CISO, said. To Bruggeman, the likelihood is low that criminals are storing the information, but high that countries are. “Probably the world’s largest storage repository is out in [Bluffdale] Utah—thanks to [former Utah senator Orrin] Hatch and the NSA—and they are definitely, without a doubt, storing lots and lots of internet traffic waiting for the day when they can decrypt it using a quantum computer,” Bruggeman said. When that day comes, be ready.—EH |