2,112
edits
m (changing link from http->https) |
m (changing link from http->https) |
||
Line 361: | Line 361: | ||
: The TCTF was going to use quantum computing to eventually break the Network's strong encryption. | : The TCTF was going to use quantum computing to eventually break the Network's strong encryption. | ||
: The next logical step for the Network was to built quantum computers as well. With these, their [http://phys.org/news/2014-02-quantum-codes-harder.html encryption was safe again]. Also, state computers infected by ransomware are forced to connect to a Syndicate-controlled QC and enforce the encryption. [ | : The next logical step for the Network was to built quantum computers as well. With these, their [http://phys.org/news/2014-02-quantum-codes-harder.html encryption was safe again]. Also, state computers infected by ransomware are forced to connect to a Syndicate-controlled QC and enforce the encryption. [https://phys.org/news/2015-04-human-technical-ingenuity-required-defeat.html Shapeshifting] [https://phys.org/news/2015-02-malware-infecting-hard-disk-firmware.html firmware] viruses ensured persistent infection despite complete hard disk formatting and re-installation. | ||
: The latest expansion by the Network was in the drone and telecommunication sector. | : The latest expansion by the Network was in the drone and telecommunication sector. |