Anonymous ID: 571997 Dec. 8, 2018, 5:39 p.m. No.4220278   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>0291

>>4220236

So do we have any idea of the hardware they are using?

How about something like STUXNET?

 

The malware has both user-mode and kernel-mode rootkit capability under Windows,[53] and its device drivers have been digitally signed with the private keys of two certificates that were stolen from separate well-known companies, JMicron and Realtek, both located at Hsinchu Science Park in Taiwan.[43][51] The driver signing helped it install kernel-mode rootkit drivers successfully without users being notified, and therefore it remained undetected for a relatively long period of time.[57] Both compromised certificates have been revoked by Verisign.

Anonymous ID: 571997 Dec. 8, 2018, 5:49 p.m. No.4220380   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>0385

>>4220291

>factor RSA2048 on the fly

 

FFS! Someone posted a block diagram on it earlier today

 

The quantum Fourier transform is applied to a quantum circuit built just out of 1-Qbit and 2-Qbit gates, making the physical implementation of Shorโ€™s algorithm one of the easiest tasks for a quantum computer.

 

https://medium.com/quantum-bits/break-rsa-encryption-with-this-one-weird-trick-d955e3394870