#512: All Encryption Hacked in 3 Years?
Update: 2025-09-15
Description
Big thanks to Brilliant for sponsoring this video. To try everything Brilliant has to offer for free for a full 30 days, visit https://brilliant.org/davidbombal or scan the QR code onscreen – You’ll also get 20% off an annual premium subscription.
Quantum computing isn’t a far-off sci-fi threat. In a hybrid model (CPU + GPU + quantum), it could land within ~3 years—and that’s enough to break today’s
asymmetric cryptography (RSA/ECC/PKI) used for TLS/HTTPS and VPN key exchange via Shor’s algorithm. Result? Session keys exposed, mass decryption possible, and a risky “post-quantum gap” before new hardware/software are widely deployed.
In this frank discussion, OTW joins David Bombal to explain:
• Why asymmetric key exchange is the weak link for TLS/VPNs
• How hybrid quantum + CUDA-Q accelerates timelines
• Nation-states’ “collect now, decrypt later” strategy
• The painful window before post-quantum cryptography (PQC) rolls out
• Risks of client-side scanning and on-device AI
• NSA backdoors, PGP/Phil Zimmermann, and the San Bernardino iPhone case
// Occupy The Web SOCIAL //
X: / three_cube
Website: https://hackers-arise.net/
// Occupy The Web Books //
Linux Basics for Hackers 2nd Ed
US: https://amzn.to/3TscpxY
UK: https://amzn.to/45XaF7j
Linux Basics for Hackers:
US: https://amzn.to/3wqukgC
UK: https://amzn.to/43PHFev
Getting Started Becoming a Master Hacker
US: https://amzn.to/4bmGqX2
UK: https://amzn.to/43JG2iA
Network Basics for hackers:
US: https://amzn.to/3yeYVyb
UK: https://amzn.to/4aInbGK
// OTW Discount //
Use the code BOMBAL to get a 20% discount off anything from OTW's website: https://hackers-arise.net/
// Playlists REFERENCE //
Linux Basics for Hackers: • Linux for Hackers Tutorial (And Free Courses)
Mr Robot: • Hack like Mr Robot // WiFi, Bluetooth and ...
Hackers Arise / Occupy the Web Hacks: • Hacking Tools (with demos) that you need t...
// YouTube video REFERENCE //
• USA stops UK creating Apple backdoor. Why ...
• Will this Tiny Chip Change EVERYTHING in Q...
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: www.twitter.com/davidbombal
Instagram: www.instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: www.facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
YouTube: / @davidbombal
Spotify: open.spotify.com/show/3f6k6gE...
SoundCloud: / davidbombal
Apple Podcast: podcasts.apple.com/us/podcast...
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// MENU //
0:00 - Coming Up
01:00 - Intro
01:49 - OTW's Books
02:46 - Brilliant Advert
04:01 - Encryption and Apple Backdoors
05:12 - Nation-states Racing for Quantum Computing
08:35 - Jensen Huang's Hybrid Quantum Computer
10:57 - The Threat of National Agencies
12:10 - China Collecting Encrypted Data
13:56 - Post-Quantum Cryptography
17:58 - The NSA Collecting Data
19:21 - The NSA and Encryption
24:40 - Concerns Against Cryptography
28:09 - Client-Side Scanning
30:46 - Should you Run AI on your Devices?
34:56 - NVIDIA's Role on Cryptography
37:37 - Conclusion
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
Quantum computing isn’t a far-off sci-fi threat. In a hybrid model (CPU + GPU + quantum), it could land within ~3 years—and that’s enough to break today’s
asymmetric cryptography (RSA/ECC/PKI) used for TLS/HTTPS and VPN key exchange via Shor’s algorithm. Result? Session keys exposed, mass decryption possible, and a risky “post-quantum gap” before new hardware/software are widely deployed.
In this frank discussion, OTW joins David Bombal to explain:
• Why asymmetric key exchange is the weak link for TLS/VPNs
• How hybrid quantum + CUDA-Q accelerates timelines
• Nation-states’ “collect now, decrypt later” strategy
• The painful window before post-quantum cryptography (PQC) rolls out
• Risks of client-side scanning and on-device AI
• NSA backdoors, PGP/Phil Zimmermann, and the San Bernardino iPhone case
// Occupy The Web SOCIAL //
X: / three_cube
Website: https://hackers-arise.net/
// Occupy The Web Books //
Linux Basics for Hackers 2nd Ed
US: https://amzn.to/3TscpxY
UK: https://amzn.to/45XaF7j
Linux Basics for Hackers:
US: https://amzn.to/3wqukgC
UK: https://amzn.to/43PHFev
Getting Started Becoming a Master Hacker
US: https://amzn.to/4bmGqX2
UK: https://amzn.to/43JG2iA
Network Basics for hackers:
US: https://amzn.to/3yeYVyb
UK: https://amzn.to/4aInbGK
// OTW Discount //
Use the code BOMBAL to get a 20% discount off anything from OTW's website: https://hackers-arise.net/
// Playlists REFERENCE //
Linux Basics for Hackers: • Linux for Hackers Tutorial (And Free Courses)
Mr Robot: • Hack like Mr Robot // WiFi, Bluetooth and ...
Hackers Arise / Occupy the Web Hacks: • Hacking Tools (with demos) that you need t...
// YouTube video REFERENCE //
• USA stops UK creating Apple backdoor. Why ...
• Will this Tiny Chip Change EVERYTHING in Q...
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: www.twitter.com/davidbombal
Instagram: www.instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: www.facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
YouTube: / @davidbombal
Spotify: open.spotify.com/show/3f6k6gE...
SoundCloud: / davidbombal
Apple Podcast: podcasts.apple.com/us/podcast...
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// MENU //
0:00 - Coming Up
01:00 - Intro
01:49 - OTW's Books
02:46 - Brilliant Advert
04:01 - Encryption and Apple Backdoors
05:12 - Nation-states Racing for Quantum Computing
08:35 - Jensen Huang's Hybrid Quantum Computer
10:57 - The Threat of National Agencies
12:10 - China Collecting Encrypted Data
13:56 - Post-Quantum Cryptography
17:58 - The NSA Collecting Data
19:21 - The NSA and Encryption
24:40 - Concerns Against Cryptography
28:09 - Client-Side Scanning
30:46 - Should you Run AI on your Devices?
34:56 - NVIDIA's Role on Cryptography
37:37 - Conclusion
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
Comments
In Channel