After clipping the anchors for Godzilla, my belayer lowered me slowly to the ground. As I descended, I passed a striking pencil thin crack that ran the entire way from the shared anchors to the forest floor.
Cleaning new routes in the Pacific Northwest kind of feels like going to war with the jungle, as I scrubbed and bolted alone in miserable heat, blasting away mosquitoes with a battery powered leaf blower whenever the cloud around me got too thick. As the moss fell away, cracks and face holds were revealed underneath; just enough for the route to go at Index 5.11.
The climbing was every bit the dessert I had spent all these years working towards; pitch after pitch of easy yet perfect crack climbing as I raced upward, climbing fast so we could hopefully make it home before midnight. It was still warm enough not to need a jacket as the setting sun illuminated Mt. Index, Baring, and Persius in a soft pink glow. What a gift it was to be here right now, sharing yet another unforgettable moment in this spectacular place with one of my favorite people. Then it was over; not in a blaze of glory like redpointing at your limit, but more like the slow burn of topping out a long multipitch and finally collapsing on a craggy summit. Like one where the celebration lies far more in cherishing the experience than taking pride in the accomplishment.
Unlike QKD, all these algorithms are not provably secure from a mathematical perspective. Therefore, within the process of standardisation, all these algorithms are rigorously tested and analysed, including the implementation. There is no worst case where a quantum-resistant algorithm with bugs in implementation could be cracked by a classical computer . The most followed standardisation process is the one by the U.S. National Institute of Standards and Technology (NIST). The standardisation process is in the third round , with three finalists (algorithms based on the lattice, code-based and multivariate) and several alternate candidates. The NIST standardisation process is expected to conclude in 2023-24. Regardless, more and more commercial vendors are offering new quantum-resistant encryption solutions now.
One has to assume that such offensive operations already exist or that intense research is being done. In 10 years, most sensitive communication or subjects of interest will be using the post-quantum cryptography or QKD implemented in the next six years. That means by the time a quantum computer able to crack PKE becomes available, most of the security-sensitive data will be using a quantum-safe solution.
Quantum 3D cameras exploiting quantum entanglement and photon-number correlations will introduce fast 3D imaging with unprecedented depth of focus with low noise aiming at sub-shot noise or long-range performance. This capability can be used to inspect and detect deviation or structural cracks on jets, satellites and other sensitive military technology. Long-range 3D imaging from UAV can be used for reconnaissance and to explore mission destination or hostile facilities and equipment.
But there is no hope for me! I am wasting away! Traitors continue to betray, and their treachery grows worse and worse. 17 Listen to me, everyone! There are terrors, pits, and traps waiting for you. 18 Anyone who tries to escape from the terror will fall in a pit, and anyone who escapes from the pit will be caught in a trap. Torrents of rain will pour from the sky, and earth's foundations will shake. 19 The earth will crack and shatter and split open. 20 The earth itself will stagger like a drunk, sway like a hut in a storm. The world is weighed down by its sins; it will collapse and never rise again. 2b1af7f3a8