Quantum Computers & Data Dumps
Quantum computers perform in seconds computations that would have taken conventional computers millions of years…
John B. Wells Jade Helm 2 Decoded: Quantum computers overturn cybersecurity’s balance of power. Today we welcome a learned network/software engineer’s analysis of what’s really behind the exercise. AI (artificial intelligence) software to predict and react to human behavior, by passing human emotion clouded judgements. Air Date – 6-11-15
Quantum computing is about to overturn cybersecurity’s balance of power
By Vivek Wadhwa Use of quantum computers (for massive data dumps) will perform in seconds computations that would have taken conventional computers millions of years…
These will change the balance of power in business and cyber-warfare. They have profound national-security implications, because they are the technology equivalent of a nuclear weapon.
The D-Wave Two computer has 512 qubits and can, in theory, perform 2^512 operations simultaneously. That’s more calculations than there are atoms in the universe — by many orders of magnitude…As do all advancing technologies, they will also create new nightmares. The most worrisome development will be in cryptography. Developing new standards for protecting data won’t be easy. The RSA standards that are in common use each took five years to develop. Ralph Merkle, a pioneer of public-key cryptography, points out that the technology of public-key systems, because it is less well-known, will take longer to update than these — optimistically, ten years. And then there is a matter of implementation so that computer systems worldwide are protected. Without a particular sense of urgency or shortcuts, Merkle says, it could easily be 20 years before we’ve replaced all of the Internet’s present security-critical infrastructure. Read more
See links below from software engineer discussed in interview Level9News
- JADE HELM: “MASTERING THE HUMAN DOMAIN”-1033 Program & Exec Order 13684 According to SOCOM, THIS EXERCISE IS SCHEDULED TO END ON SEPTEMBER 11th, not the 15th as being reported. Coincidence?
Jade Helm appears to be an integral part of Obama’s executive order 13684, 21st Century Policing, in conjunction with his 1033 Program which were both quietly signed recently with virtually no MSM coverage or fanfare. - GeoINT: Casting A Neural Net On Humanity – RFID Not Required!
- The “JADE” In Jade Helm 15 Is An A.I. SOFTWARE Program