You can simply just download a binary and run it.
You can simply just download a binary and run it.
TL;DR - Quantum computing is great, if you’re the bad guy. For the rest of us, there’s a cost/value tradeoff in defending against quantum computing threats. People will tell us it’s too much hassle to upgrade our encryption, but it can be done with reasonable effort.
And a big point is, it is a technology that we have to develop anyway, since big targets like governments, military or big financial or economic companies would want to defend against anyway.
To my knowledge there exists exactly one reactor in china, and this is a test project. We know very little about it. I have seen many many talks in the last 10ish years but for such a “break trough idea” very very little actual physical proof for any of the big claims.
Edit: Wikipedia article of said reactor: https://en.m.wikipedia.org/wiki/TMSR-LF1
I’m also of the opinion that if a bad actor capable of navigating the linux file system and getting my information from it has physical access to my disk, it’s game over anyway.
I am sorry but that is BS. Encryption is not easy to break like in some Movies.
If you are referring to that a bad actor breaks in and modifies your hardware with for example a keylogger/sniffer or something then that is something disk encryption does not really defend against.
Full disk encryption on everything. My Servers, PCs etc. Gives me peace of mind that my data is safe even when the device is no longer in my control.
Depends on the root setting. And depends on your goal. What is the purpose of the proxy? I doubt that it is easy to bypass, but you still could run a Proxy or VPN as user, this would not bypass the proxy but any filtering/blocking would not be possible. Etc