8,464
edits
Paradox-01 (talk | contribs) (exchanging a dead link - this video about nuclear tests is boring and mind blowing at same time) |
Paradox-01 (talk | contribs) m (Quantum simulator within sight. Standard encryption gets useless. Network blackmailed WCG ? -- Why are the bad guys always one step ahead? Cuz... bureaucracy is slow.) |
||
Line 277: | Line 277: | ||
: To hamper identification, mobile communication is also carried out through peer to peer networks. These [[wikipedia:Wireless_ad_hoc_network#Security|mobile networks]] are preferred to have no intermediate nodes, reducing the risk of records been taken by any additional party. Data packages are much bigger than actually necessary. The modern bandwidths [[wikipedia:5G|(7G by 2055 ?)]] allow this and drives TCTF decryption attempts into pure frustration. | : To hamper identification, mobile communication is also carried out through peer to peer networks. These [[wikipedia:Wireless_ad_hoc_network#Security|mobile networks]] are preferred to have no intermediate nodes, reducing the risk of records been taken by any additional party. Data packages are much bigger than actually necessary. The modern bandwidths [[wikipedia:5G|(7G by 2055 ?)]] allow this and drives TCTF decryption attempts into pure frustration. | ||
'''The unspoken agreement''' | |||
Despite all the difficulties WCG should have removed the Syndicate when it became a major player. After all WCG literally has most of the world's resources and also the men power. | |||
Probably the Network blackmailed WCG and so their struggle became a cold war. | |||
The Network possesses knowledge and resources to hijack any important infrastructure. With that not enough, they stole state archives and copied traffic by their infiltrated telecommunication companies. | |||
Quantum computers weren't available yet but the Network acquired the next best thing to break gov encryptions: [http://phys.org/news/2016-11-quantum-physics-factor.html quantum simulators]. Being aware of the weakness of now factorable prime numbers the Syndicate themselves doesn't use such encryption anymore. | |||
As long as WCG doesn't attack the Network personal, they won't release state secrets or blow up some infrastructure. | |||
===Aftermath=== | ===Aftermath=== |
edits