EXCLUSIVE: The NSA is archiving all encrypted emails and transactions, knowing they will be able to decrypt most digital files in about 3 years, thanks to quantum computing

This article may contain statements that reflect the opinion of the author

Bypass censorship by sharing this link:
Image: EXCLUSIVE: The NSA is archiving all encrypted emails and transactions, knowing they will be able to decrypt most digital files in about 3 years, thanks to quantum computing

(Natural News) EXCLUSIVE ANALYSIS – All encrypted emails, files and hard drives that currently rely on 256-bit encryption (such as AES or RSA) may be retroactively broken by the NSA in the next three years, thanks to rapid advances in quantum computing recently announced by Google scientists.

The NSA is currently archiving all encrypted communications and storing the digital files on offline storage servers in its “Bumblehive” domestic spying facility in Utah. Currently these digital files cannot be broken because classical computing presents a strongly asymmetrical complexity problem that makes breaking encrypted files prohibitively time consuming and expensive. Files encrypted with 2^n bits currently present computational complexity that requires 2^n computer power to break. In other words, encrypting files is easy (linear), but breaking encryption is incredibly difficult (logarithmic).

But rapid advances in quantum computing transform the breaking of encryption from a logarithmic mathematical problem to a linear problem, collapsing the complexity to 2 * n instead of 2 ^ n. The enormity of this difference can only be appreciated when you do the math. Calculate 2 ^ 512, versus 2 * 512 and compare the answers. Quantum computing effectively transforms certain logarithmic computations into linear computations, and its best application is breaking encryption. (Quantum computing isn’t really “computing” at all, by the way. For a more detailed mathematical explanation of the hyper-dimensional, hyper-computational capabilities of quantum phenomena, read this explanation at Natural News.)


The NSA will likely be able to break all 256-bit encryption within about three years, according to admissions from Google scientists

What all this means is that within the next three years, according to a recently released paper published by Google scientists — who appear to be conducting research on a D-Wave quantum computing framework — quantum computers will exceed 256 qubits, allowing them to almost effortlessly crack all 256-bit encryption (but not all at once, they still have to pick and choose which files to crack). Roughly each year beyond that, the capabilities of these quantum computers will reportedly double, meaning that cracking 512-bit, 1024-bit or even 2048-bit encryption is just a few years away. This obviously has huge implications for military communications and global geopolitics.

This means the NSA will be able to retroactively break all the encrypted emails, files and other digital communications that it has surreptitiously hoovered up and stored on its servers.

Importantly, whatever information you’ve sent via encrypted email services may be retroactively broken by the NSA, transforming your encrypted emails and files into plain text files. This is true across all the encrypted emails and files you’ve sent over the last decade or more.

None of this means encrypted email services have done anything wrong. Encrypted email providers like ProtonMail and HushMail have done an excellent job of providing secure communications for individuals and businesses. But the emergence of quantum computing sooner or later renders classical encryption obsolete. This also means, by the way, that the NSA will be able to spoof or break all cryptocurrency transactions within just a few years. In fact, your entire crypto wallet could be drained by the NSA in mere seconds, almost effortlessly, if they choose to target you with such an action. (The “crypto” in cryptocurrency means cryptography. Without cryptography, there is no cryptocurrency. And Google — which is little more than a tech front for the NSA — will soon render classical cryptography obsolete.)

The weaponization of quantum computing against human freedom

The high economic cost of quantum computing systems means the NSA will likely direct this digital weapon at targets with the highest payoff — such as the digital communications of members of Congress or U.S. Supreme Court justices who can be pressured into supporting abortion, gun control and the expansion of government tyranny.

The only thing protecting your past encrypted communications, at that point, will be the NSA’s relative lack of interest in your emails, since they probably have bigger targets to attack first. Fortunately for us all, quantum computers cost millions of dollars (at the moment, at least). So there is, at some level, an economic barrier to the NSA buying and deploying entire server farms of these systems. This means their capacity to break encrypted files is strictly limited, at least until quantum computers become several orders of magnitude more affordable.

Nevertheless, if you’ve previously sent encrypted emails or files, there’s nothing you can do to go back and erase those emails or files, since they’ve already been copied by the NSA into a massive (and highly illegal) database, thanks to laws passed after the staged 9/11 attacks that were engineered to launch a massive expansion of the surveillance state.

Everything you’ve sent over the internet in encrypted form — including details of your purchases from encryption-protected websites and https / SSL communications — will be an open book to the NSA in just a few years. Over time, quantum computers will become less expensive, meaning the NSA will, over time, be able to retroactively break an increasingly large number of encrypted files. The only safe assumption here is to assume that ALL encrypted files possessed by the NSA will eventually be broken, very likely within the next decade if not sooner.

The NSA will, of course, weaponize this technology and use it to destroy its political opponents while rapidly expanding its own power and reach. Quantum computing will be used not to set humanity free but to enslave humanity to centralized, digitized authoritarian rule. The laws of physics, in other words, will be turned against humanity to create a hyper-dangerous, authoritarian techno-fascist regime that rules the world.

Denial is not a working strategy

In covering quantum computing, we’ve noticed a strong pattern of denial across independent media, which seems to dislike the idea that cryptocurrency, as currently structured, will likely be made horrifyingly vulnerable in just a few years by these advances in quantum computing. Many promoters of Bitcoin, in particular, have long operated in the dream world of self-delusion rather than reality, telling themselves that Bitcoin would rise to $1 million and take over global banking, for example. In truth, Bitcoin is absurdly slow to clear transactions, and the very concept of blockchain is in some ways self-defeating, since widespread use would make the sheer size of the blockchain ledger itself far larger than the storage capabilities of mobile devices. The more people use Bitcoin, the bigger the blockchain becomes in terms of sheer storage and computational requirements to update stored wallets.

That doesn’t mean cryptocurrency is a bad thing, of course. Any technology that achieves decentralization and challenges the pure evil of central banks is a good technology for humanity. Regardless of Bitcoin’s true origins — which remain shrouded in secrecy and myth — the underlying technology core of Bitcoin, as currently structured, looks like it’s about to be rendered potentially obsolete (unless radical changes are made, see below). The fact that China is also working feverishly on quantum computing means that U.S. interests cannot abandon the project, or they risk being beaten in the “quantum supremacy” game by a powerful geopolitical enemy.

Once quantum computing is achieved at the 256-bit level, the technology will quickly be stolen, copied or sold to other nations, and the deployment of 256-qubit systems will become widespread within a few years. It won’t be long before encryption breaking becomes ubiquitous, and all the old secrets protected by 256-bit encryption will be exposed to the surveillance state.

How Bitcoin and other crypto might survive the emergence of quantum computing

If Bitcoin (or any cryptocurrency) hopes to survive, it must develop a new encryption method that does much more than merely adding bits to the encryption keys. Shifting to 512-bit encryption is only a delaying tactic, since a 512-qubit quantum system won’t be far behind the achievement of 256-qubit computing.

Fortunately, the people behind Bitcoin and other cryptos are truly some of the smartest people in the world, and they may yet develop new cryptography solutions that can out-pace quantum computing in ways we can’t currently imagine. The incorporation of personal biometrics into encryption algorithms might be one solution. So-called “quantum encryption” is another possibility, but widespread deployment of that technology would require new hardware on all computing platforms (you have to read the spin states of atomic elements), making this solution less than feasible, given current technology.

My guess is that the very smartest encryption people involved in the crypto world are already well aware of the risk that quantum computing poses to the crypto backbone, and they are already exploring possible solutions. So I don’t think quantum computing automatically spells the end of cryptocurrency; I think it will force crypto to re-engineer itself in radical ways. Yes, there is a very real risk that some cryptocurrencies might not adapt quickly enough and could become obsolete, but the smartest cryptos will likely find a way to adapt and overcome. (Never underestimate the intelligence of the people who built Zcash, as a general rule.)

Personally, I hope crypto survives, and I hope we will still find ourselves living in a world where citizens can have secrets that can’t be read by government regimes. Because the alternative to that — a world where governments can break all encryption — is a very dangerous, dark, evil world in which no human can truly be free. Sadly, quantum computing research is marching us in precisely that direction, and there has never been a game-changing technology that wasn’t eventually used to murder, brainwash or enslave humanity.

Watch more videos on quantum computing, cryptocurrency and liberty at Brighteon.com, the free speech alternative to YouTube.

Receive Our Free Email Newsletter

Get independent news alerts on natural cures, food lab tests, cannabis medicine, science, robotics, drones, privacy and more.

About the author: Mike Adams (aka the “Health Ranger“) is a best selling author (#1 best selling science book on Amazon.com called “Food Forensics“), an environmental scientist, a patent holder for a cesium radioactive isotope elimination invention, a multiple award winner for outstanding journalism, a science news publisher and influential commentator on topics ranging from science and medicine to culture and politics. Follow his videos, podcasts, websites and science projects at the links below.

Mike Adams serves as the founding editor of NaturalNews.com and the lab science director of an internationally accredited (ISO 17025) analytical laboratory known as CWC Labs. There, he was awarded a Certificate of Excellence for achieving extremely high accuracy in the analysis of toxic elements in unknown water samples using ICP-MS instrumentation. Adams is also highly proficient in running liquid chromatography, ion chromatography and mass spectrometry time-of-flight analytical instrumentation. He has also achieved numerous laboratory breakthroughs in the programming of automated liquid handling robots for sample preparation and external standards prep.

The U.S. patent office has awarded Mike Adams patent NO. US 9526751 B2 for the invention of “Cesium Eliminator,” a lifesaving invention that removes up to 95% of radioactive cesium from the human digestive tract. Adams has pledged to donate full patent licensing rights to any state or national government that needs to manufacture the product to save human lives in the aftermath of a nuclear accident, disaster, act of war or act of terrorism. He has also stockpiled 10,000 kg of raw material to manufacture Cesium Eliminator in a Texas warehouse, and plans to donate the finished product to help save lives in Texas when the next nuclear event occurs. No independent scientist in the world has done more research on the removal of radioactive elements from the human digestive tract.

Adams is a person of color whose ancestors include Africans and American Indians. He is of Native American heritage, which he credits as inspiring his “Health Ranger” passion for protecting life and nature against the destruction caused by chemicals, heavy metals and other forms of pollution.

Adams is the author of the world’s first book that published ICP-MS heavy metals analysis results for foods, dietary supplements, pet food, spices and fast food. The book is entitled Food Forensics and is published by BenBella Books.

In his laboratory research, Adams has made numerous food safety breakthroughs such as revealing rice protein products imported from Asia to be contaminated with toxic heavy metals like lead, cadmium and tungsten. Adams was the first food science researcher to document high levels of tungsten in superfoods. He also discovered over 11 ppm lead in imported mangosteen powder, and led an industry-wide voluntary agreement to limit heavy metals in rice protein products.

In addition to his lab work, Adams is also the (non-paid) executive director of the non-profit Consumer Wellness Center (CWC), an organization that redirects 100% of its donations receipts to grant programs that teach children and women how to grow their own food or vastly improve their nutrition. Through the non-profit CWC, Adams also launched Nutrition Rescue, a program that donates essential vitamins to people in need. Click here to see some of the CWC success stories.

With a background in science and software technology, Adams is the original founder of the email newsletter technology company known as Arial Software. Using his technical experience combined with his love for natural health, Adams developed and deployed the content management system currently driving NaturalNews.com. He also engineered the high-level statistical algorithms that power SCIENCE.naturalnews.com, a massive research resource featuring over 10 million scientific studies.

Adams is well known for his incredibly popular consumer activism video blowing the lid on fake blueberries used throughout the food supply. He has also exposed “strange fibers” found in Chicken McNuggets, fake academic credentials of so-called health “gurus,” dangerous “detox” products imported as battery acid and sold for oral consumption, fake acai berry scams, the California raw milk raids, the vaccine research fraud revealed by industry whistleblowers and many other topics.

Adams has also helped defend the rights of home gardeners and protect the medical freedom rights of parents. Adams is widely recognized to have made a remarkable global impact on issues like GMOs, vaccines, nutrition therapies, human consciousness.

In addition to his activism, Adams is an accomplished musician who has released over fifteen popular songs covering a variety of activism topics.

Click here to read a more detailed bio on Mike Adams, the Health Ranger, at HealthRanger.com.

Find more science, news, commentary and inventions from the Health Ranger at:


Diaspora: (uncensored social network)



Online store:

#1 Bestselling Science Book Food Forensics:



Health Ranger’s science lab

Health Ranger bio

Search engine: