
I'd hate to be the one...
... on tech support having to find that atom if it falls out of the socket!
I'm the one with the electron microscope and penning trap in the pocket.
Entanglement is easy to generate, but if you want to prove you have entanglement - and that's one of the many holy grails of quantum computing - you have to pass what's called "Bell's inequality test". Doing it in silicon is even better, and that combination has the corks popping at the University of New South Wales. Their …
Personally, I think it would be naïve not to assume that they have every SSL certificate issued by every US-based certificate authority. Why go to the bother of trying to find weaknesses in encryption algorithms when one NSL gets you all the keys anyway?
Yes, there's much more to encrypted communication than SSL. But someone who thinks that a gold padlock at the end of the address bar protects them from Five-Eyes is living in a fantasy world.
> Personally, I think it would be naïve not to assume that they have every SSL certificate issued by every US-based certificate authority.
SSL certificates don't contain private keys. It doesn't matter if the government has all the certificates (which are publicly available anyhow). If you are doing it properly, the CA never learns your private key. You send the CA a certificate signing request which contains your public key, and they give you your signature. The private key never leaves the safety (hopefully) of your server.
One step closer to the NSA's wet dream of an insta-decryptor for all conventional encyption.
No, we aren't, because no quantum computer, of whatever size and (possible) speed, gives you instantaneous decryption for any symmetric or asymmetric algorithm, much less "for all conventional encryption".
QC is not a magical fairyland where everything is possible.