
Sign up to save your podcasts
Or


Some secrets are meant to stay secret for decades. Medical histories. Legal records. Trade agreements. Now imagine someone copying all of it today. Not to read it. Just to wait. Because someday, the lock changes.
This episode explains what quantum computing actually threatens about encryption and why the risk isn't as far away as it sounds. It starts by grounding two types of encryption in plain language, shared-secret and public-key, then explains why quantum computers can potentially shorten the math that keeps public-key systems safe. The core concept is "harvest now, decrypt later": attackers collecting encrypted data today with the intention of decrypting it once quantum capability arrives. The episode covers why post-quantum cryptography exists, what standards bodies and vendors are already doing, and closes with a starter kit covering long-life data identification, crypto inventory, crypto agility, vendor pressure, and practical steps for non-security professionals.
Whether you manage sensitive data with a long shelf life or you want to understand why your security team is talking about post-quantum planning, Plaintext with Rich makes the timeline and the tradeoffs clear.
Is there a topic/term you want me to discuss next? Text me!!
YouTube more your speed? → https://links.sith2.com/YouTube
Apple Podcasts your usual stop? → https://links.sith2.com/Apple
Neither of those? Spotify’s over here → https://links.sith2.com/Spotify
Prefer reading quietly at your own pace? → https://links.sith2.com/Blog
Join us in The Cyber Sanctuary (no robes required) → https://links.sith2.com/Discord
Follow the human behind the microphone → https://links.sith2.com/linkedin
Need another way to reach me? That’s here → https://linktr.ee/rich.greene
By Rich GreeneSome secrets are meant to stay secret for decades. Medical histories. Legal records. Trade agreements. Now imagine someone copying all of it today. Not to read it. Just to wait. Because someday, the lock changes.
This episode explains what quantum computing actually threatens about encryption and why the risk isn't as far away as it sounds. It starts by grounding two types of encryption in plain language, shared-secret and public-key, then explains why quantum computers can potentially shorten the math that keeps public-key systems safe. The core concept is "harvest now, decrypt later": attackers collecting encrypted data today with the intention of decrypting it once quantum capability arrives. The episode covers why post-quantum cryptography exists, what standards bodies and vendors are already doing, and closes with a starter kit covering long-life data identification, crypto inventory, crypto agility, vendor pressure, and practical steps for non-security professionals.
Whether you manage sensitive data with a long shelf life or you want to understand why your security team is talking about post-quantum planning, Plaintext with Rich makes the timeline and the tradeoffs clear.
Is there a topic/term you want me to discuss next? Text me!!
YouTube more your speed? → https://links.sith2.com/YouTube
Apple Podcasts your usual stop? → https://links.sith2.com/Apple
Neither of those? Spotify’s over here → https://links.sith2.com/Spotify
Prefer reading quietly at your own pace? → https://links.sith2.com/Blog
Join us in The Cyber Sanctuary (no robes required) → https://links.sith2.com/Discord
Follow the human behind the microphone → https://links.sith2.com/linkedin
Need another way to reach me? That’s here → https://linktr.ee/rich.greene