99% of digital data passes through the submarine cable
Or rather the submarine cables, the specialized site TeleGeography counted 486 of them, against less than half in 2009. The first cables were laid in the 1988th century between Europe and the American continent following the development of the telegraph. Since XNUMX the classic copper cables have been replaced by fiber optics. The geopolitical stakes are obvious, without cable more communication possible, and China and the United States clash openly via their operators.
Traditionally the major telephone operators were the operators of the submarine cables. Related to telephony, they manufactured them, installed them, maintained them, watched them and often operated them. These operators such as Alcatel Submarine Networks, Louis Dreyfus Travocean, Orange Marine, Telefonica, have become a minority or reduced to the rank of associates. Over the past fifteen years, silicone valley companies have invested heavily in it, meeting their growing needs for data transfers, reaching new markets in Third World countries and also enabling information control. . They openly pose a challenge to the digital sovereignty of States.
The so-called "quantum apocalypse" is not a typical end-of-the-world scenario, but a potential time when quantum computers become so powerful that existing encryption methods for everything from your password computer to your bank account, will become ineffective.
No matter how strong your password or how well it is encrypted, a sufficiently powerful quantum computer will be able to crack it in seconds.
"The evolution of quantum computers creates a significant threat to data security," Tim Callan, chief experience officer of cybersecurity firm Sectigo, told the Mail Online.
“Their immense processing power is capable of breaking encryption at high speed, leaving important data vulnerable, everything from bank account details to medical records to state secrets. »
But could such a scenario really happen and how much of an "apocalypse" would it be?
What those who warn of this possibility fail to take into account is the likelihood that encryption technologies will evolve and become more sophisticated as well.
Several years from now, it is likely that banks, for example, will use much more advanced security methods, or even take advantage of quantum computing themselves.
That said, outdated systems would certainly be vulnerable.
In the United Kingdom, the National Security Centre, aka "SitCen", a government agency, has contracted with the Spanish telecommunications company Telefonica, with the aim of using mobile data to obtain "information" on a range wide enough range of people's behaviors. And it's millions of people. A third of the UK's population, in fact – if the telecoms are to be believed.
The deal is to give big data-hungry SitCen access to information from Telefonica's O2 Motion Data & Insights service in the UK.
During this period, the SitCen – created last year as a centralized place run by the Cabinet Office for emergency response – and O2 will work together to turn data extracted from users' phones into "insights" about their movements ( location), their mobility habits (mode of transport), as well as information related to behavior and demographics.
This data will be both real-time and anonymous, promise the project promoters.