📰 Stay Informed with My Patriots Network!
💥 Subscribe to the Newsletter Today: MyPatriotsNetwork.com/Newsletter
🌟 Join Our Patriot Movements!
🤝 Connect with Patriots for FREE: PatriotsClub.com
🚔 Support Constitutional Sheriffs: Learn More at CSPOA.org
❤️ Support My Patriots Network by Supporting Our Sponsors
🚀 Reclaim Your Health: Visit iWantMyHealthBack.com
🛡️ Protect Against 5G & EMF Radiation: Learn More at BodyAlign.com
🔒 Secure Your Assets with Precious Metals: Get Your Free Kit at BestSilverGold.com
💡 Boost Your Business with AI: Start Now at MastermindWebinars.com
🔔 Follow My Patriots Network Everywhere
🎙️ Sovereign Radio: SovereignRadio.com/MPN
🎥 Rumble: Rumble.com/c/MyPatriotsNetwork
▶️ YouTube: Youtube.com/@MyPatriotsNetwork
📘 Facebook: Facebook.com/MyPatriotsNetwork
📸 Instagram: Instagram.com/My.Patriots.Network
✖️ X (formerly Twitter): X.com/MyPatriots1776
📩 Telegram: t.me/MyPatriotsNetwork
🗣️ Truth Social: TruthSocial.com/@MyPatriotsNetwork
Summary
Transcript
I get it. It’s scary hearing about what quantum computers could do to Bitcoin one day. If or when they actually arrive. But here’s the thing. Understanding how Bitcoin’s encryption actually works is the key to understanding how quantum can, or more importantly, can’t disrupt it. And what I’m about to show you will completely flip the script on your perspective. Because while everybody else is panic selling based on fear, on headlines, you’ll have the technical knowledge to stay calm and potentially profit from their fear. Now, I’ve been building tech companies for decades. I’m a partner at a leading Bitcoin venture fund.
I’m an officer of a publicly traded Bitcoin company. And this is the same analysis that we use internally. And now you can profit from it too. So let’s go. All right, we’re going to jump right in. We’re going to talk about quantum computing and Bitcoin. Now, first of all, this is technical discussion, but I’m going to make it as simple and easy to understand. So no matter where you’re at with your age, your technical ability, we’re going to make it clear for you. I’m also going to tell you just right up front, spoiler alert, there is some Bitcoin that is at risk and some that’s not as at risk.
And if the stuff is at risk, there’s things we can do about it. Okay. I’m going to give you all that. But the first thing we have to understand is that quantum computing is not here. So in the world, everything is possible, but not everything is probable. So we don’t want to worry about everything that’s possible to happen in the world. Aliens could come destroy the world tomorrow. It’s possible. It’s not very probable. So quantum computing, Google put out a alert, an update. They said quantum computing could, it could break Bitcoin like encryption.
It could, because it’s hypothetical. We don’t have it. Now, potentially, we don’t know. It could be eight to 10 years away. So we don’t even really have to worry about this right now. However, we’re going to address this front on. So Google update, it’s coming eventually. They said that it could come faster than we think it could use 20 times less resources. And finding didn’t find it didn’t mention Bitcoin, they said Bitcoin like encryption. Okay, so let’s just dispel some of that fud right off the bat. But let’s get right into this and see what part of Bitcoin is at risk and what’s it not.
So you have to understand, first of all, that Bitcoin is encrypted, obviously, right? That’s the crypto part of the cryptocurrency, the cryptography. Okay. Now, within that, you have what’s called a public key and a private key. Let me explain this for you real simply. So if I had a locker at my school, and I would, that locker is let’s say C 19. So that’s my public address. And I could say, hey, go put this, this letter in my public address in my C 19. You can walk over there, slide it in, but only I would have a private key to actually open it up and move the contents.
So that’s how Bitcoin and cryptocurrency works in general. There’s a public key that everybody could see, but then only you would have a private key that you could open up. That’s the basics of it. Now, there’s different types of cryptography that we’ve had to secure those keys. And it changes over time. I’m going to take you through some of these changes, because understanding that is the key to understand if you’re at risk. So a couple of that we’ve had the first version of the key was a the public key was used instead of a hash.
So what this means is that everybody could see the public key, all the types of signature schemes that we’ve had since then do it differently. Instead of showing the world the public key, they use a hash in the blockchain. So they they put a signal inside the main blockchain to the public key, but the public key is
[tr:trw].
See more of Mark Moss on their Public Channel and the MPN Mark Moss channel.