Menu
Sign In Pricing Add Podcast
Podcast Image

The Why Files: Operation Podcast

578: The Quantum Apocalypse: All Your Secrets Revealed

Tue, 14 Jan 2025

Description

A mysterious data transfer lights up NSA monitors at 3 AM. Within hours, hospital records flash across Times Square billboards. Dating app messages spill onto every screen in the city.  Bank accounts vanish. Traffic lights freeze. Autonomous vehicles crash through shopping malls. Intelligence agencies scramble as decades of encrypted messages suddenly unlock. Someone has broken the unbreakable - the mathematical foundations that protect everything from banking passwords to nuclear launch codes. The quantum apocalypse arrives years ahead of schedule. But as chaos spreads, patterns start to surface. The timing seems too perfect, the targets too precise.  Deep beneath the Pentagon, analysts notice something strange: some messages were decrypted months ago. The chaos isn't random - it's cover for something bigger. 

Audio
Transcription

Chapter 1: What are the implications of the quantum apocalypse?

0.189 - 23.079 Advertisement Narrator

It's time to turn your daydream into your dream job. Wix gives you the power to turn your passion into a moneymaker with a website that fits your unique vision and drives you towards your goals. Let your ideas flow with AI tools that guide you, but give you full control and flexibility. Manage your business from one dashboard and keep it growing with built-in marketing features.

0

23.44 - 28.342 Advertisement Narrator

Get everything you need to turn your part-time passion into a full-time business. Go to wix.com.

0

30.242 - 51.44 Narrator

It's human nature to keep secrets. Throughout history, we've made complex codes to hide our secrets. Most codes are eventually cracked, but not all of them. The Voynich manuscript is a book filled with drawings and symbols nobody can read. The Beale ciphers point to hidden treasure, if someone could decode them. There are entire ancient languages we can't understand because they're encrypted.

0

52.1 - 80.565 Narrator

Encryption can be simple or very complicated. Either way, it's just running a message through a series of mathematical rules. And for decades, even centuries, some codes used mathematical rules that remain unbreakable, but they're about to be challenged by something new, machines that don't care about math and don't follow any rules. Kate Price's morning started like any other.

0

80.925 - 103.102 Narrator

Her smart home system woke her at 6 a.m. with her usual playlist. The coffee maker fired up. Her iPhone read her schedule while she brushed her teeth. Normal, routine. She opened her banking app. Something was wrong. Her balance was zero. She blinked and checked again. Her balance was back. Just a temporary error, she thought. She took a sip of coffee and nearly dropped her mug.

107.731 - 146.868 Narrator

The smart speaker was playing someone else's conversation. A couple fighting about credit card debt. She unplugged it. Then her smart TV started cycling through her photos. Private photos. Intimate photos. She pulled the plug. And then her phone rang. Then she heard the sirens. The oldest code we know of isn't written in complex mathematics.

147.208 - 161.941 Narrator

It's carved in stone, in an Egyptian tomb from 4,000 years ago. The scribes simply replaced regular hieroglyphs with ones they made up. They weren't trying to keep secrets. They were showing off. These were prayers carved into tomb walls. The scribes wanted to prove they knew something others didn't.

162.302 - 163.683 Co-Host

Oh, those were ancient emojis.

164.244 - 164.704 Narrator

Not exactly.

Chapter 2: How have humans historically kept secrets?

351.709 - 370.033 Narrator

He wasn't. And the Zodiac Killer was never found. But quantum computers are about to change everything. All these ancient methods, substitutions, patterns, and tricks share one weakness, math. This is a weakness quantum computers can exploit. Soon these machines might reveal every secret message ever written, including yours.

0

372.782 - 415.555 Advertisement Narrator

I'll see you next time. and keep it growing with built-in marketing features. It's time to turn your daydream into your dream job. Go to Wix.com. Running a business can be exhausting. Building your website shouldn't be. With Wix, you can express your ideas, give direction, then leave the heavy lifting to AI. From site creation to branded content and images.

0

416.235 - 430.474 Advertisement Narrator

Have fun with the details, customize what you want the way you want, and manage your whole business from a centralized dashboard with expert AI tools. Build, scale, and enjoy the incredible results. You can do it all yourself on Wix.

0

437.403 - 460.096 Narrator

The quantum computer hissed as liquid helium circulated through the processor. Carl Bishop checked the temperature. Minus 460 degrees Fahrenheit, absolute zero. Quantum bits needed to be that cold to maintain coherence. Stanford's quantum lab was empty at 3 a.m. He'd been running simulations for 12 hours straight. His eyes burned. But CTEC's grant requirements were clear.

0

460.636 - 483.275 Narrator

Demonstrate quantum error correction or lose funding. quantum computers were terrible at error correction. Quantum states are too fragile, too much noise. If the temperature changes by half a degree, they decohere. If radio waves leak in, they decohere. A truck hits a pothole a mile away, the vibration in the earth makes them decohere.

485.762 - 513.09 Narrator

But Carl noticed something strange in the error correction data. The errors weren't random. Then he realized they weren't errors at all. The quantum computer was cracking encryption keys, millions of them, keys that protect everything from banking passwords to nuclear launch codes. Carl decided to test this. He entered an RSA 4096 security key and ran down the hall for another coffee.

513.671 - 534.908 Narrator

He wasn't in a hurry. Even the world's most powerful supercomputers would need billions or trillions of years to break RSA 4096. But when he returned five minutes later, he couldn't believe it. The key was cracked. Carl now realized his computer was the most powerful and dangerous weapon on Earth. He started to panic.

535.328 - 565.003 Narrator

He tried to delete the data, but it was already uploaded to CTEK's private servers. By sunrise, three intelligence agencies had flagged the data transfer. By 9 a.m., the first bank security system was breached. By noon, every bank went dark. The quantum apocalypse had begun. Your entire digital life depends on two prime numbers. That's it, two numbers.

565.203 - 584.315 Narrator

And they protect everything, your passwords, your messages, your bank accounts, all of it. Modern encryption is based on this simple trick. Take two huge prime numbers and multiply them together. That creates your public key, a number anyone can use to send you secret messages. But only someone who knows those original prime numbers can read those messages.

Chapter 3: What is the significance of encryption?

750.642 - 767.958 Verizon Ad

In honor of Military Appreciation Month, Verizon thought of a lot of different ways we could show our appreciation. Like rolling out the red carpet. Giving you your own personal marching band. or throwing a bumping shindig. At Verizon, we're doing all that in the form of special military offers.

0

768.338 - 788.203 Verizon Ad

That's why this month only, we're giving military and veteran families a $200 Verizon gift card and a phone on us with a select trade-in and a new line on select unlimited plans. Think of it as our way of flying a squadron of jets overhead while launching fireworks. Now that's what we call a celebration because we're proud to serve you. Visit your local Verizon store to learn more.

0

788.963 - 803.912 Verizon Ad

$200 Verizon gift card requires smartphone purchase $799.99 or more with new line on eligible plan. Gift card sent within eight weeks after receipt of claim. Phone offer requires $799.99 purchase with new smartphone line on unlimited ultimate or postpaid unlimited plus. Minimum plan $80 a month with auto pay plus taxes and fees for 36 months.

0

804.052 - 810.536 Verizon Ad

Less $800 trade-in or promo credit applied over 36 months. 0% APR. Trade-in must be from Apple, Google, or Samsung. Trade-in and additional terms apply.

0

814.349 - 833.32 Narrator

When Liz Emery's phone buzzed at 4 a.m., she almost ignored it. After 15 years in cybersecurity, late-night calls usually meant someone at the hospital forgot their password. But caller IDs showed Mount Sinai's emergency line. The first report was in. Patient records appeared on digital billboards in Times Square.

833.801 - 853.775 Narrator

They included blood test results, psychiatric evaluations, and terminal diagnoses that patients had not yet told their families about. Senators, congressmen, CEOs, their private medical data was all over the internet. She was still coordinating the hospital's response when the news reported that every dating app was breached. Then they came back online.

854.516 - 876.421 Narrator

Suddenly, on every device in the city, smartphones, TVs, billboards, was a link to a site where anyone could look up any information that was part of the dating app breach. Direct messages, real names and emails, browser histories, private photos and videos, all revealed. Liz figured the only people celebrating were divorce attorneys. Then an email came in to hospital security.

876.781 - 900.127 Narrator

Pay $1 billion or every pacemaker control system on Earth will go down. Pay another billion or insulin pumps will go down, starting with diabetic children. The city started to crack. Police dispatch systems were offline. Traffic lights went dark. ATMs were dumping cash into the street. Bank balances were set to zero. Autonomous vehicles became killing machines.

900.588 - 923.792 Narrator

Delivery drones crashed into buildings like kamikaze pilots. A fleet of cyber trucks tore through a shopping mall before exploding all at once. News channels tried to cover the chaos, but their broadcasts were hijacked. CNN anchors watched helplessly as their personal emails were displayed on screen. The White House press secretary's private texts appeared during a briefing about the crisis.

Comments

There are no comments yet.

Please log in to write the first comment.