Last Monday you'll recall I blogged about the possibility of "rogue billionaires" creating their own nuclear weapons (or, short of creating them, buying them).  As I noted in that blog, the possibility became part of a DARPA study over a decade ago by came to the attention of a Wall Street Journal reporter during the administration of Donald Trump. (By the way, DARPA stands for Diabolically Apocalyptic Research Projects Agency, as we like to call it here.)

I have a similar concern today, with this very important article shared by V.T. (with our thanks), and the ideas and implications it contains:

Prepare Now for When Quantum Computers Break Biometric Encryption: Trust Stamp

Note that the central topic of the article are biometrically secured systems.  We're all familiar with these in some form or fashion: the voice-activated safe or vault door, that will only open to a particular word spoken by a specific individual or individuals. Voice prints are unique to individuals, as are fingerprints.  We are all familiar with those as well: the thumbprint or hand-scanner, the retina scanner, and so on.

But as our colleague and friend Catherine Fitts likes to remind us, there is no cyber system that is secure. technology always evolves, and a way around the "impenertable armor" or the highest possible speed is always and inevitably found.  The same holds true for biometric systems. For imagine a quantum computer able to process biometric security systems fast enough to literally contrive entirely fictitious thumb prints, voice prints, or retina scans that can through sheer volume eventually defeat such systems.

Now imagine using biometric systems to encrypt information. Quantum computers might be able even to decrypt these as well.

But, as the article notes, there's a catch, and this is where my high octane speculation of the day comes in:

Digital identity and trust provider Trust Stamp has released a white paper explaining the threat of quantum computing to biometric systems and making recommendations to minimize the risks.

Quantum computers will open opportunities to solve problems in biometrics, drug synthesis, financial modeling, and weather forecasting, among other areas, according to Trust Stamp. But they will also be able to decrypt most of the encryption systems used to secure the internet and protect data today.

While experts expect quantum computers will not be able to scale to defeat such systems for at least another ten years, the white paper claims, entities should address “harvest now, decrypt later” (HNDL) attacks proactively.

Through an HNDL approach, an attacker could capture encrypted data pending the availability of quantum computing-enabled decryption. It is worth noting that this cyber threat would be heavily resource-intensive to perform. Such an attack would most likely only be feasible by a nation-state and would target information that would remain extremely valuable for decades in the future. (Emphasis added)

In other words, given enough time and resources, quantum computers might even be able to punch through the encryption that biometric systems enable. But such would, as the article notes, be resource intensive, requiring massive computing power (and most likely, electrical and financial power to sustain), such as would "only be feasible by a nation-state."

Or, perhaps, by a large and powerful corporation, or for that matter, a "rogue billionaire", and I can think of a few rogue billionaires with backgrounds in information technology that have shown a proclivity to make bargains with nation-states for access to otherwise private data via back doors. Now imagine those back doors are enable by quantum computers, and you get the idea; it would be an INSLAW-Promis software scandal...

... on steroids.

And while we're exploring this high octane speculation and possibility, that "INSLAW-Promis scenario on steroids" promises (pun intended) quite a headache for Mr. Globaloney and his lackeys' plans for Central Bank Digital Currencies and one-way mirrors behind which they can hide their own activities and frauds, for all it would take is a rogue billionaire with the means and motivations to expose it all, to everyone.   That scenario is not new either, and was actually made the theme of a movie starring Sandra Bullock, titled The Net... Indeed, the quantum computer capability would enable vast new areas for fraud as biometric systems themselves are hacked and records are altered.

So are there such things as rogue billionaires?

Well, if you don't believe that, then you haven't been following the merry antics of the billionaires of the World Economic Forum as they get together every year to go rogue at Davos.

The bottom line is, biometric encryption systems will ultimately be vulnerable as well; there is, to say it once again, no cyber system that is secure.

See you on the flip side...

Joseph P. Farrell

Joseph P. Farrell has a doctorate in patristics from the University of Oxford, and pursues research in physics, alternative history and science, and "strange stuff". His book The Giza DeathStar, for which the Giza Community is named, was published in the spring of 2002, and was his first venture into "alternative history and science".

No Comments

  1. rohat77 on February 9, 2024 at 2:16 am

    Pure speculation and “what ifs”…. Full of words like “might” etc Waste of time.

  2. Richard on February 7, 2024 at 8:24 pm

    It’s no-longer a matter of whether a State has the financing, assets, resources, and intellectual populace to pursue goals as a collective; It’s a matter of those [the rogue billionaire class] with assets, resources, and intellectual populace in pursuit of self-serving goals of having a State at their beck’n’call. An island chain well-guarded or a mountain chunk well bored into with submariner capacity with a submarine or two, even an underwater location with a well secured basin retrieval/launch facility as well as Satellite and Moon base(s) are not that impossible these days. They’ll all do for purpose. They just need the dedication support of its inhabitants to foster goals of accomplishment. Begging the question of what that IS. . . . . A rogue billionaire now in charge of a State. . . . Almost as if playing out those requisites of a false flag of sorts. Sounds like a movie or two or few more that have been merged.

    Promis’, Promis’, . . One PROMIS for “PRosecutor Management Information Software” and yet another for “Patient-Reported Outcomes Measurement Information System” with this second one an NIH-funded initiative to develop and validate Patient Reported Outcomes (PROs) for clinical research and practice.

    From birth records to vaccination records to social security number tags to driver licenses to blood types (and a few more); What a menagerie of data links for controlling the masses and, especially, for collecting, collating, and concentrating specific types and groups. This stuff requires a level of trust. Now, where might that be found? What type of interface would be useful, reliable, transportable, and even storable?

    The Others may have a crystalline interface to merge, allocate, relocate, and modify a particalized combination of frequency-matter-energy, as is crudely known to be, but they [the Others] also have the background, longevity, and experience at doing so. They’re very stingy and particular about whom they allow access, interface, and the wherewith all of doing so. This upright simian type would be privileged but very concerned about making mistakes on a quantum level that transcends this space-time continuum as terrestrial physics allows. An educated guess, one has yet to pass that exam. Indelible exposure is not enough.

    • InfiniteRUs on February 7, 2024 at 10:31 pm

      Rogue Billionaires who control governments through blackmail and million dollar payoffs are called Oligarchs. It’s why a representative government is doomed to ultimately fail. Simple majority Democracies are also doomed to fail because the bad and retarded often join forces and then outnumber the third that are good and smart. That’s why I suspect a 90% majority consensual requirement is needed in the US. If 9 out of 10 are unwilling to vote approval for any new legislation it should not get passed. That’s the best and only way to have a real government for and by the people. With our current technology and weaponry, having corrupt politicians and power mad oligarchs is guaranteed extinction of the species. Only hope we have is a 90% or more majority Democracy worldwide. But I don’t see that ever happening so I’ll see all of you on the other side sooner than you think. LOL. It’s about over folks,

      • anakephalaiosis on February 8, 2024 at 2:20 pm

        According to Chief Seattle, forefathers are still around, meddling, from the other side, which means, that Noah & the winos always vote, against sobriety and teetotalism.

        • anakephalaiosis on February 8, 2024 at 2:33 pm

          BTW, even though a 90% majority vote, in favour of teetotalism, were to occur, then 90%, of the 90%, would still be tippling behind the curtain. The grass is always greener, on the other side of the fence.

  3. Robert Barricklow on February 7, 2024 at 6:51 pm

    Voice prints and thumbs prints and other biometric security measures are leading up “the print chain” towards? Drum roll…. Brain prints. Turns out you signature brain wave patterns; are more unique than any other biometrics, like fingerprints. That’s where this is all headed[IMO].
    Once that happens; look for PBA’s[personal brain assistants, cybernetic implants at the base of your brain to alter your senses.] plus; look for governments punishments to rewrite your PBA’s, in what everyone would call “mind burns”[making you someone else, by erasing all you had been and creating a new person; a legal person. A person who is not you.]

    Virus update patches are the establishment’s chosen way to forge new back doors across the population spectrum.

  4. marcos toledo on February 7, 2024 at 6:05 pm

    Does the Enigma Machine ring a bell how about The Third Reich’s successful counterfeiting of UK Five Pound Notes during WW 2? The more you try to secure yourself the more someone wants to break that barrier.

  5. cobo on February 7, 2024 at 5:18 pm

    Let’s give it a KISS. Just like AADHAAR was early on hacked, so too can every system running today, including the most, supposedly, secure systems – witness Experian. So, no matter how ‘personal’ your biometric data, the ‘data’ that secures it is just another string of bits and bytes stored in a database. Think that through, no need for quantum enstranglement.

    • anakephalaiosis on February 7, 2024 at 11:29 pm

      Another approach could be, to obliterate the “I” pronoun, and express total insensitivity, towards the ego, which, in return, does not invite curious dogs.

      Normally, a man is caught, between his “I” and his “self”, and, when a man seeks, to live in his self only, then his ego always catches up with him.

      The alternative is to kill the ego, completely, which is, to kill the survival instinct, by confronting it, and tame it, which renders the self supreme.

      Yet, the higher self needs a persona, as a conduit, which becomes a reconstructed ego, an Echo.

      Theodore Roosevelt:

      • anakephalaiosis on February 7, 2024 at 11:32 pm

        To destroy fake royalty, one can’t simply be a tree in the forest. One needs good theatre, to confront bad theatre, because fake royalty is a roleplay.

        Dressing up, as a Cossack on Halloween, and chanting poetry, in Old Norse, before the collective press in Scandinavia, is playing to the gallery.

        The higher self channels, through a worn mask, and causes ripples, throughout Scandinavia, because the line is drawn in the sand, at Alamo.

        Disgracefully manhandled, by Mexican uniforms, Travis kept honour.

        Johnny Cash:

  6. anakephalaiosis on February 7, 2024 at 12:49 pm

    A parallel observation sees all these running termites, coming out of the woodwork, these days, attempting to throw more Slavs under the bus, which is playing musical chairs.

    This lockstep ceremony of Jesuit-Freemasonry, that normally is the eyes and ears of the Vatican, while secretly assassinating locals, is now focusing its attention abroad.

    In so doing, these papal spooks become visible, and the indigenous Europeans can observe the faces of their former torturers, in live action, sacrificing Slavic lives to Moloch.

    These spooks are always talking, about their American protection, as their best buddy neighborhood bully. Go figure!

    Mad King George & Co:

    • anakephalaiosis on February 7, 2024 at 1:23 pm

      What is implied here, is, that, to defeat local spookery, its power source must be cut, which means reducing American influence in Europe.

      It means cutting off the transatlantic, Freemasonic handshake, which is done, by choosing the battlefield, invoking the Protestant-Catholic conflict.

      As a consequence, of rebooting the European wars of religion, America will find no friends in Europe, with the exception of Russia, that never partook.

      Once, Icelanders set afloat American corpses, in Reykjavik harbour, as an atavistic reminiscence of Scythian past:


  7. Robert Barricklow on February 7, 2024 at 11:52 am

    That is if the quantum leap hasn’t already occurred.
    Whoever breaks the quantum encryption; certainly won’t be advertising, said “discovery”.
    Yet, is there’s a third possibility not being discussed?
    AS no human speaks in the computer algorithm language developed by Ai’s, whose to say?
    To say the encryption language, is like our intelligence agencies. Made to fit the “most wanted” scenarios?
    In other words, intelligence made to order – but not true?

    Unfortunately, time running short.[only read very first part of blog]
    Return to it this afternoon…

    White Rabbit

    • Robert Barricklow on February 7, 2024 at 6:59 pm

      This looks to be another one of those “myths in the making}. Like AI being smart, and the real narrative being AI will betaking the rap; for what in essence, the bad boy black ops did.
      So this quantum computer will be doing intelligence that produces a product that; surprise, surprise – was dreamed up by the bad boy black ops crowd.
      That, or the AI itself concocts its own version of what the “truth” is. But, it’s just a means to an end. The question is then – whose end? The one who controls the quantum computer. Really controls it; or, who is – believed to be in control?

  8. anakephalaiosis on February 7, 2024 at 10:14 am

    1. The seven seals are a biometric encryption, to safeguard access to power, which is, what the hypothesised “Elijah’s curriculum” represents.

    2. The sundial is used, as a system of measurement, to map the progression of lifespan, which only allows maturity access to higher function.

    3. It is endorsement of this approach, that becomes the rapprochement in Crimea, which later is confirmed, by the Scythian skull cup, at the Last Supper.

    4. The skull cup encapsulates the Scythian century of retaliatory tribal activists, who resist, and defeat, the surveillance state of the Assyrian empire.

    5. Modern parallels are no coincidence, because the ongoing battle has never ceased. The long-term memory has failed to retain it, since high antiquity.

    6. Safeguarding the pyramid, is safeguarding the Olam idea, inside the compass idea, which is the circle, and the axis, of the spinning top.

    7. A pyramid is a spinning top, upside-down, that always moves, towards the equilibrium of the perpendicular, in the centre of the Genesis idea.

    8. The epistemology, of the “divine right of kings” doctrine, is a fake spinning top, that can only stand, by static support, not by naturally occurring spin.

    9. The integrity of the spinning top is, that it has no strings attached, whereas Pinocchio will always fail, in pirouette, because of his invisible sectarian strings.

    10. Many-headed trolls are sectarian keyhole spies, who are always trying, to emulate the spinning top, that effortlessly dances the Bolshoi pirouette.

    Farscape’s Dorothy Gale takes a spin, in wormholes for dummies.

    • anakephalaiosis on February 7, 2024 at 11:04 am

      BTW, the battle, against the globotroll, is carried out in parallel universes, by effortless shape-shifting, between realities, of traditional shamanism.

      The original myth of Narcissus is a wormhole experience, travelling through the event horizon, transcending time and space, Echoing footsteps.

      A thousand-yards stare, without a thousand-years gaze, is doomed to repeat yesterday’s mistakes, unable to gaze across the karma wheel.

      I came, before I left, in the standstill of crossover.


      • anakephalaiosis on February 7, 2024 at 11:54 am

        Or, to be more paradoxical, “I left, before I came”, which explodes the timeline.

        Today, Christianity has been given an alternative, explanatory model, with a power locus in Scythian Crimea, and, a synoptic comparison will automatically undermine the Vatican, whose “divine right of kings” doctrine is beheaded, by Occam’s Razor:

        1. A comparative synopsis of Ashtanga Yoga, and Odin’s sports, produces Scythian martial arts.

        2. A comparative synopsis of Old English, and Old Norse rune poetry, produces sundial ideology.

        3. A comparative synopsis of the Old Testament, and Norse mythology, produces logic and reason.

        4. A comparative synopsis of Scythian tactics, and Assyrian infiltration, produces Occam’s Razor.

        “I bring sword, not peace”. Matthew 10:34.


  9. Michael UK on February 7, 2024 at 5:38 am

    Here in the UK, there is a big push to centralize patients health data of all citizens. An aim is to look for patterns and trends.

    The report advises that one of the companies being considered is US tech firm Palantir which has performed data analytics work for the US security services, border forces and police. If you don’t know Palantir, you may be familiar with the company’s chair, Peter Thiel, a tech billionaire and Trump supporter.

    • ExternalObserver on February 7, 2024 at 11:35 pm

      Trump and his cronies are working on it too. on Trumps last visit to Davos he was asked by a reporter and he said, “…We will have a global biometric ID”

      • ExternalObserver on February 7, 2024 at 11:49 pm

        Biometric Tracking System – President Trump Promised This But what is it?

        Don’t worry folks, he will only use it on those evil, evil foreign tourorists.

        • anakephalaiosis on February 8, 2024 at 9:17 am

          Donald Trump is onboard a sinking ship, together with the Assyro-Zionist holy land reboot, which is a fakery, that today is threatened, by the potent idea of the Crimean rapprochement of the twelve tribes, in the 7th century BC.

          It is bad for holy land tourism, when the centre of gravity shifts, from Jerusalem to Crimea, based on ancient political necessity, when the British tin trade moved into the Black Sea, and switched seaport, to Troy, in the 7th century BC.

          As a result, the Assyro-Zionist oligarchy is losing control of the narrative, because the thinking man recognises the Crimean rapprochement, as the historical axiom, that forged the future, and populated Europe.

          Donald Trump can’t possibly make a solid deal, based on a false paradigm, built on sand, which only an autist can do, in denial of reality.

          • ExternalObserver on February 8, 2024 at 11:17 am

            You had me at sinking ship.

          • anakephalaiosis on February 8, 2024 at 1:35 pm

            Simplified, America is ideologically bankrupt, and Crimea is a Scythian lifeboat, a Noah’s ark.

            In serious matters, one shouldn’t take oneself too seriously, and Scythian winos never do that.

            Jack Sparrow & Co are already onboard, and Donald Trump would be wise, doing the same. Ship ahoy!


          • Brendan on February 8, 2024 at 4:59 pm

            The Titanic??? 😉

Leave a Comment

Help the Community Grow

Please understand a donation is a gift and does not confer membership or license to audiobooks. To become a paid member, visit member registration.

Upcoming Events