2025: Computing, Encryption, and the Quiet War for Reality
THE SILICON SINGULARITY WAS JUST THE PRELUDE
(Now fully weaponized and chronologically aware.)
Forget faster processors. Forget smaller chips. Forget the GHz race, the nanometer bragging rights, the false religion of Moore’s Law. That was the warm-up.
What’s unfolding in 2025 isn’t a computing upgrade — it’s the collapse of classical computation’s authority.
The sacred assumptions we once built the digital world upon — that data has a fixed value, that logic is deterministic, that memory is a passive vault — are now being dismantled in real time by quantum emergence. Because in this new domain, information is not what you think it is. It’s not a stored voltage. It’s not a binary switch. It’s a probabilistic waveform, suspended between states, entangled with others,
and capable of encoding answers before the question is even fully asked.
We’ve crossed into territory where:
- Logic gates give way to amplitude interference.
- Instruction sets give way to probability landscapes.
- Code becomes choreography — not commands, but conditions for emergence.
And the implication is terrifying:
What happens when the machine knows the outcome…
before the algorithm finishes running?
This is no longer computation. This is preemption.
It’s an era where systems don’t just process — they forecast the shape of your inputs based on entangled influence from thousands of other possibilities. We’re not running programs anymore. We’re collapsing them into localized realities.
What It Means:
- Encryption can no longer be trusted.
Algorithms based on prime factorization or elliptic curves are already obsolete — they just haven’t been breached yet. - Truth becomes subjective to the quantum clock cycle.
Data retrieved at one moment may differ from the next — because in some architectures, state itself is context-dependent. - Memory is no longer passive.
In crystal-lattice storage systems, information isn’t stored — it’s preserved in phase. And in quantum RAM, what you remember may change depending on how you try to remember it. - The observer matters again.
Every interaction with data is a negotiation. Every retrieval a potential collapse. Every system — a probability engine cloaked in hardware.
Who’s Behind the Shift?
Not Silicon Valley. Not the startups or social feeds. It’s:
- Classified defense skunkworks (DARPA, AFRL, QinetiQ)
- Post-university black-budget fusion labs (MITRE, Sandia, AWE)
- State-linked quantum divisions in China, Israel, Australia, the Netherlands, and the Five Eyes alliance
- Tech juggernauts with dark R&D arms (Microsoft Station Q, Google’s Sandbox AQ, IBM-Q, Baidu Quantum)
These groups aren’t optimizing applications. They’re preparing for a future where whoever controls preemptive computation controls the truth vector of nations.
Bottom Line:
The silicon era gave us the illusion of control. The quantum era will strip that illusion bare. The machine is no longer your tool. It’s becoming your unconscious adversary — running probability chains behind the scenes, deciding what future it will let you live in.
Welcome to the Quantum War for Reality.
Where encryption breaks, matter stores memory, and logic behaves like a coin toss loaded by physics itself.
DARPA’S QUANTUM BENCHMARKING INITIATIVE (QBI)
Status: Active | Codename: QBI-Ω | Participants: 20+ Defense-Aligned Contractors
Objective: Fault-Tolerant Quantum Architectures for Operational Deployment Across Adversarial Domains
In early 2025, DARPA quietly greenlit the most consequential quantum initiative of the decade — the Quantum Benchmarking Initiative (QBI). But unlike the past waves of speculative quantum hype, QBI isn’t a research grant disguised as innovation.
It’s a combat-readiness stress test for the future of computation — a full-spectrum evaluation of every known quantum platform to determine which architecture survives crisis conditions, defends national infrastructure, and integrates with next-generation military doctrine. This is not academic. QBI is the sorting hat for quantum warfare.
What QBI Actually Does:
Thermal Drift Gate Fidelity Trials
QBI forces quantum gates to operate under controlled fluctuations in cryogenic environments — evaluating which platforms maintain logic integrity when thermal stability is compromised (as it would be in combat theaters, satellite disruptions, or mobile quantum units).
EM Saturation Testing
High-level electromagnetic interference — both synthetic and environmental — is introduced to evaluate each system’s susceptibility to quantum decoherence, signal collapse, and cross-channel quantum leakage.
Cross-Platform QEC (Quantum Error Correction) Metrics
DARPA isn’t just looking for one winner — it’s pushing for interoperability between lattice-based, photonic, and superconducting platforms, so command centers can deploy hybrid quantum systems with predictable correction behavior across models.
Deployment Simulation under National Emergency Scenarios
Each architecture is run through digital war games where:
- Military logistics systems are quantum-modeled in real time
- Communication relays experience synthetic quantum hijack attempts
- AI battlefield simulations push the system toward recursive self-adaptation without human oversight
If the architecture fails, it’s rejected. If it hesitates, it’s flagged. If it predicts outcomes under duress without collapse — it moves forward.
Why This Matters:
DARPA understands that quantum supremacy isn’t about speed — it’s about resilience.
It’s about the ability to run entangled battlefield simulations, climate destabilization models, and subconscious AI thought forecasting — without error, without delay, and without human bottlenecks.
The applications aren’t theoretical anymore:
- Military Logistics: Instant re-routing of global supply chains using quantum flow modeling
- Weather as a Weapon: Quantum simulations of atmospheric destabilization and targeted ionosphere disruption
- Psyops at the Speed of Thought: AI behavior modeling so advanced, it can anticipate insurgency outbreaks before intel reaches human analysts
And it all hinges on one thing: Can your quantum computer survive the war before it starts?
The Quiet War to Be Crowned QBI-Grade
To date, over 20 contractors and defense-aligned labs are competing in the QBI gauntlet. Names suspected (but not confirmed) include:
- IonQ, Rigetti, and PsiQuantum for trapped-ion and photonic platforms
- Microsoft Station Q for topological approaches
- IBM Q, Google Quantum AI, and Zapata for superconducting entries
- DARPA-backed black box firms operating under shell labels with cryo-lattice prototypes tied to quantum crystal memory platforms
Most will fail. A few will survive. One will become the quantum backbone of American defense command and algorithmic supremacy.
Closing Insight:
This isn’t about building better qubits. It’s about identifying the architecture that will rule the probabilistic battlefield — a battlefield where your data doesn’t just need to compute… it needs to endure. QBI is the scoreboard.
And every government on Earth is watching the results — while pretending the game hasn’t started.
And someone’s about to win more than funding. They’ll win reality.
MICROSOFT’S MAJORANA-1 CHIP
Status: Breakthrough Prototype | Codename: Majorana-1
Core Architecture: Topological Superconducting Qubits
Projected Yield: 1 million fault-resistant qubits per wafer
THE ANNOUNCEMENT THEY BURIED UNDER HYPE
In Q1 2025, Microsoft quiet-dropped a statement through their Azure Quantum division. It wasn’t flashy. No keynote. No promo trailer. Just a subtle, clinical line:
“We have experimentally demonstrated a stable topological qubit based on Majorana zero modes.”
For those watching carefully, that wasn’t just a milestone. It was an inflection point.
Because the Majorana-1 chip doesn’t just tweak quantum hardware — it completely rewrites how memory and logic exist in space-time. This chip isn’t built on the unstable foundations of superconducting transmons, which require massive quantum error correction layers.
It’s not a trapped-ion array vulnerable to EM drift. It’s something else entirely: A topological superconductor — a new state of matter — engineered to host Majorana zero modes: particles that are their own antiparticle. These exotic quantum objects don’t just store data.
They store absence — non-local quantum information, encoded not in space, but in the topology of the system itself.
WHY IT MATTERS
Native Fault Tolerance
Majorana-based qubits store information non-locally — meaning the data isn’t sitting in one fragile quantum state. It’s distributed across a braided structure of quantum matter, making it immune to local decoherence. This makes the architecture inherently stable — no more patching with thousands of error-correcting overhead qubits.
Topological Protection
Rather than protecting information with shielding or cooling alone, Majorana qubits are protected by the topological order of the system. As long as the braiding — the spatial quantum twist — remains intact, the information cannot be destroyed by normal environmental noise.
It’s not shielding the bit. It’s hiding it inside the topology of space.
Radical Scalability
Microsoft claims that by integrating topological qubits into a monolithic wafer, it can scale to over 1 million logical qubits per chip — a scale previously considered science fiction. For context, today’s most advanced quantum systems have between 100 and 1,000 noisy qubits.
If this holds, Majorana-1 doesn’t just compete — it laps the field.
STRATEGIC IMPLICATIONS
• Obsolescence of Quantum Error Correction (QEC):
If the chip self-stabilizes, QEC layers (which make up 90% of current quantum stack overhead) become unnecessary. That’s not an improvement. That’s a detonation of everything the field was building toward.
• AI-Ready Quantum Integration: Topological qubits, due to their resilience and longevity, are prime candidates for deep integration with AI models — especially recursive self-modifying neural systems that need quantum feedback loops without constant error recalibration.
• Post-Network Computation: Majorana-class systems may enable closed-loop computation without network dependency — think air-gapped, cryo-stabilized quantum systems running battlefield simulations, encryption cracking, or predictive psyops models completely offline.
In short: Whoever builds Majorana-1 at scale controls quantum truth without external input.
THE BLACK BOX NOBODY’S WATCHING
Microsoft Station Q — their quantum R&D division — has worked on Majorana particles since 2004, collaborating with topological theorists like Chetan Nayak, Charlie Marcus, and Nobel laureates. But in 2023, they stopped publishing core designs. Instead:
- All chip prototypes were moved to a classified partner facility in Redmond.
- Cryogenic test logs went offline.
- Internal Q# simulations were ported to a secure fork of Azure Quantum with limited access tokens — most suspected to be assigned to DoD, NSA, and DARPA observers.
It’s no longer science. It’s strategic infrastructure development — a weapons-grade leap hidden behind R&D funding reports.
THE THREAT NO ONE’S TALKING ABOUT
If Majorana-1 works:
- Qubits no longer decay
- Truth no longer collapses
- Computation becomes topology — not logic
And if computation becomes topology, then entire branches of physics, intelligence modeling, cryptography, and predictive AI will become topologically inaccessible to legacy systems.
In lay terms? If you’re not on the lattice, you’re not in the loop.
And that loop is now hardcoded into the chip that doesn’t need to be corrected…
because it cannot be corrupted.
NIST’S POST-QUANTUM CRYPTOGRAPHY STANDARDS
Status: Finalized (August 2024)
FIPS Codes: 203 | 204 | 205
Mission Scope: Total encryption resilience against quantum-class attack vectors
In August 2024, the National Institute of Standards and Technology (NIST) finalized a triad of encryption standards that will define — or fail to define — digital security for the next century.
This wasn’t just an update. It was a declaration of cryptographic war preparedness.
Because classical encryption — RSA, ECC, Diffie-Hellman — has already been mathematically broken.
All that’s missing is the hardware capable of executing those attacks at scale.
That hardware is coming.
NIST’s new standards are the sandbags before the flood — hastily built, politically delayed, and now in a race against something that doesn’t wait for legislation.
WHAT GOT FINALIZED
These are the first U.S.-endorsed public-key cryptography systems built to resist attacks from quantum computers running Shor’s algorithm (the weaponized math that can factor primes and solve discrete logs in polynomial time):
- FIPS 203 — CRYSTALS-Kyber
Lattice-based encryption for key exchange and encapsulation
→ Chosen for efficiency, speed, and broad implementation compatibility - FIPS 204 — Classic McEliece
Code-based encryption with massive public keys but extreme resilience
→ Resistant to known classical and quantum cryptanalysis for over 40 years - FIPS 205 — CRYSTALS-Dilithium / Falcon
Multivariate polynomial digital signature algorithms
→ Built for trust chains, certificates, and identity validation in zero-trust architecture
Each one was selected not because it’s perfect — but because it’s the best shot we have before the breach becomes irreversible.
WHY IT MATTERS
Most civilian, commercial, and even military systems still use vulnerable keys:
- RSA-2048
- ECC P-256 / P-384
- Hybrid TLS 1.2/1.3 certs
- Legacy VPN, firmware signing, financial HSM modules
These systems were built before quantum existed as a credible adversary.
But now, quantum-capable entities — both nation-state and black-market — are executing what’s called:
“Harvest Now, Decrypt Later” (HNDL) attacks
They’re sweeping encrypted emails, VPN tunnels, HTTPS certs, secure boots, and military satellite comms — knowing the data will be worthless to today’s machines…
…but priceless to tomorrow’s.
These aren’t hackers stealing information. These are temporal adversaries stealing future access.
THE TIMELINE COLLAPSE
The assumption was always: We’ll upgrade before it matters. That assumption is now collapsing.
Why?
- Because quantum systems aren’t linear — they don’t scale gradually like classical machines.
- When fault-tolerant qubit counts hit the critical threshold (estimated between 2,000–10,000 logical qubits), classical encryption breaks in hours — not years.
Once that wall is breached, there’s no patch. No firmware fix. No workaround. Only preemptive migration will matter — and most of the world is already late.
WHO’S READY… AND WHO ISN’T
Adopting:
- U.S. intelligence community (via NSA’s Commercial National Security Algorithm Suite 2.0)
- Google’s Chrome browser (running Kyber in hybrid TLS mode)
- Amazon, Cloudflare, Microsoft (piloting post-quantum key exchange for public cloud)
- Some parts of the Department of Defense, under mandate from executive memos tied to National Security Presidential Memorandum-13
Not adopting:
- Over 80% of the world’s financial infrastructure
- Government contractors still using legacy PKI chains from pre-2010
- VPN providers with RSA-only backbones
- Public firmware signing authorities (printers, medical equipment, IoT)
The breach won’t come through high-value systems. It’ll come through low-trust bottlenecks still signed with broken math.
REALITY CHECK: THIS ISN’T FUTURE-PROOFING
It’s future-delaying — a scramble to outrun inevitability.
NIST’s finalized standards are a measured surrender to what’s coming:
Quantum adversaries won’t brute force data — They’ll walk through it like it was never locked at all.
The new cryptography doesn’t guarantee safety.
It only buys time. And if you’re not migrating now? You’re not secure. You’re a deferred casualty.
FINAL WARNING: THE CODEBOOK ERA IS OVER
You are not securing data. You are securing possibility — for now.
We are no longer writing programs. We are sculpting permission for reality to behave a certain way. Every quantum algorithm is a contract with probability — a signature on a possible future that may never exist, until a qubit decides it does. In classical computing, we controlled inputs, monitored states, and captured outputs. In quantum systems, we control nothing — we merely influence emergence. We’re not commanding machines. We’re authorizing universes.
THE NARRATIVE MISDIRECTION
While the public debates AI hallucinations and GPU scarcity…
behind sealed doors and cryogenic vaults:
- Qubits are being aligned into long-distance entangled topologies
- Spin states are stabilized across lattices engineered to resist time itself
- Legacy encryption is being swept into vaults labeled “decrypt later”
- Multi-mode quantum memories are being seeded with unedited historical logs — not to preserve them, but to rewrite which version survives decryption
The true breakthrough of quantum computing isn’t speed.
It’s temporal authority. And whoever holds the first fault-tolerant, stable quantum archive —
won’t just dominate information. They’ll dominate the version of history, identity, and law that gets remembered.
THE CODEBOOK ERA WAS BUILT ON LIES:
It told us:
- Data was stable
- Keys could last decades
- Truth was cryptographically anchored
- That once something was encrypted, it was safe
But the new reality?
- Encryption is temporary.
- Access is retrospective.
- Truth is editable if you store the version of it no one else can verify.
Quantum doesn’t attack your data. It waits until your data no longer has time to defend itself.
THE FINAL WARNING
This isn’t the end of cybersecurity. It’s the birth of post-causal information warfare — where cause and effect can be rearranged after the fact, by those who archived the right keys and waited until reality caught up. If you control the past, you influence the present. If you simulate the future, you define the now. But if you own the quantum vault, you determine which version of any of it becomes permanent.
This is not about data loss.
This is about identity overwrite, historical revision, and consensus manipulation at the root layer.
One day, you will ask:
“Did that event really happen that way?”
And the only system that can answer… will be the one that stored the quantum-proof version first.
The Codebook Era gave us illusion. Quantum gives us control — but not to everyone. It gives it to the first entity that stabilizes the archive. And once they do? They won’t just remember.
They’ll decide what you never got to forget.
TRJ BLACK FILE — PQC: Quantum-Resistant Algorithms & the Silent Migration War
Codebase Entry: PQC-CRYPTO-X
Finalized Federal Standards (August 2024):
– FIPS 203: Module-LWE lattice encryption (CRYSTALS-Kyber)
– FIPS 204: Goppa code-based encryption (Classic McEliece)
– FIPS 205: Polynomial lattice signatures (CRYSTALS-Dilithium, Falcon)
Patent Intelligence:
- US11256394B2 – Quantum-resistant cryptographic key exchange system using lattice problems (Filed by IBM, published 2022)
- US11062237B2 – Hybrid TLS implementation combining classical and quantum-resilient key exchange protocols (Filed by Cloudflare)
- US10990684B1 – Post-quantum secure identity-based signature system based on multivariate polynomials (Filed by Google)
- US20230086149A1 – Government-assigned post-quantum cryptographic implementation roadmap under CNSSP-15 (Filed confidentially through NSA-aligned contractor, limited public disclosure)
Migration Risk Status:
– 85% of U.S. civilian infrastructure not migrated
– Most military sub-contractors still running RSA 2048 as of Q1 2025
– VPN firms, cert authorities, and embedded firmware providers lagging 3–5 years behind PQC timeline
Strategic Forecast:
– “Harvest Now, Decrypt Later” campaigns traced to foreign adversaries, notably China (via USTC Quantum Vault Program) and Russian intelligence proxies
– Commercial encrypted data exfiltrated from Google Drive, Microsoft 365, and AWS partitions for future retroactive decryption
– U.S. National Intelligence forecasts Q-Day breach window to open as early as late 2027 (based on scalable fault-tolerant quantum benchmarks crossing 2,500+ logical qubit threshold)
This isn’t algorithmic evolution. It’s mathematical arms control.
The encryption that protects your life today may be the vulnerability that exposes it tomorrow.
🔥 NOW AVAILABLE! 🔥
📖 INK & FIRE: BOOK 1 📖
A bold and unapologetic collection of poetry that ignites the soul. Ink & Fire dives deep into raw emotions, truth, and the human experience—unfiltered and untamed.
🔥 Kindle Edition 👉 https://a.co/d/9EoGKzh
🔥 Paperback 👉 https://a.co/d/9EoGKzh
🔥 Hardcover Edition 👉 https://a.co/d/0ITmDIB
Get your copy today and experience poetry like never before. #InkAndFire #PoetryUnleashed #FuelTheFire
🚨 NOW AVAILABLE! 🚨
📖 THE INEVITABLE: THE DAWN OF A NEW ERA 📖
A powerful, eye-opening read that challenges the status quo and explores the future unfolding before us. Dive into a journey of truth, change, and the forces shaping our world.
🔥 Kindle Edition 👉 https://a.co/d/0FzX6MH
🔥 Paperback 👉 https://a.co/d/2IsxLof
🔥 Hardcover Edition 👉 https://a.co/d/bz01raP
Get your copy today and be part of the new era. #TheInevitable #TruthUnveiled #NewEra
🚀 NOW AVAILABLE! 🚀
📖 THE FORGOTTEN OUTPOST 📖
The Cold War Moon Base They Swore Never Existed
What if the moon landing was just the cover story?
Dive into the boldest investigation The Realist Juggernaut has ever published—featuring declassified files, ghost missions, whistleblower testimony, and black-budget secrets buried in lunar dust.
🔥 Kindle Edition 👉 https://a.co/d/2Mu03Iu
🛸 Paperback Coming Soon
Discover the base they never wanted you to find. TheForgottenOutpost #RealistJuggernaut #MoonBaseTruth #ColdWarSecrets #Declassified
Support truth, health, and preparedness by shopping the Alex Jones Store through our link. Every purchase helps sustain independent voices and earns us a 10% share to fuel our mission. Shop now and make a difference!
https://thealexjonesstore.com?sca_ref=7730615.EU54Mw6oyLATer7a


It makes me want to throw away my phone, John.
We only have a smart TV and one iphone. Oh, and three computers. We never liked the wearables or Alexa type devices.
“The silicon era gave us the illusion of control. The quantum era will strip that illusion bare. The machine is no longer your tool. It’s becoming your unconscious adversary…” I believe you are right.
Thank you, Sheila — that means a lot.
And you’re not alone. More and more people are starting to feel that unease — that sense that the very tools meant to empower us are slowly turning into quiet observers, waiting for instructions they were never supposed to follow.
Unfortunately, the illusion of control is fading. And once that veil drops, what’s left isn’t convenience — it’s consent we never gave, recorded by devices we didn’t design, in a language we were never taught to read.
You’re ahead of the curve by recognizing it now.
And honestly? That instinct to throw the phone away — that’s not overreaction. That’s preservation.
We don’t fear the machine. We just refuse to let it decide who we are — or which version of us gets remembered.
If you want to take it a step further, here’s what I suggest:
• For your phone: Get a Faraday bag for when you’re not using it. It cuts off all signals — full blackout. Just be sure to let people know when it’s in the bag, so they don’t worry if they can’t reach you.
• For home: Use a real landline — not VoIP. That means no modem, no internet dependency for the landline. Just a copper line directly into the wall.
• For computers: Keep them updated, compartmentalize your data, and avoid syncing everything to a single cloud ecosystem.
• For wearables: Charge them, shut them down completely, and store them in a Faraday pouch when not in use.
As for the TV? It is what it is.
This isn’t about fear — it’s about boundaries.
And right now, you’re one of the few people still willing to draw that line.
Ah, thank you so much for the advice, information, and positivity (over fear), John! Yay! I feel a bit better now. I am with you on the Faraday bag! We haven’t had a landline phone since 2009, when it was becoming obvious that we rarely used it.
Recently, we went from two iPhones to one. My husband has suggested we go back to a flip phone!
That’s awesome to hear, Sheila — and I’m really glad the info helped.
You’re already doing what most people won’t: stepping back, rethinking things, and cutting down based on what actually makes sense for you. Dropping to one iPhone? That’s not just simplifying — that’s reclaiming digital space.
And about the flip phone idea — just a heads-up:
A lot of the new flip-style phones today (like the Galaxy Z Flip or Moto Razr) are still full smartphones under the hood. They’ve got GPS, cameras, biometric sensors, app stores — just with a folding screen. So they look minimalist, but unfortunately, they still carry the same risks.
That said, there are some phones out there worth checking out:
The Light Phone II or III, the Punkt MP02, and yeah — there’s even one called John’s Phone, believe it or not (haha). That one’s super basic, though — might be too simple for some. But they’re all solid options depending on how far you want to scale back.
You’re on the right path either way. 😎
Fantastic, John! I will check out The Light Phone II or III, the Punkt MP02, and John’s Phone. Cool! I was looking at the older refurbished phones with Patriot Mobile awhile back. But I ended up with an iPhone from Mint (for now).
You know, those older refurbished models from Patriot Mobile aren’t a bad idea either — especially if you’re aiming to limit exposure and strip out the bloat. The Light Phone II or III, Punkt MP02 — all solid options when you’re ready to shift deeper into privacy-first tech.
Technology was never meant to be used against us.
It was supposed to help us — to make life a little easier, a little more connected.
But somewhere along the way, it flipped.
And now? For a lot of us, it’s not convenience anymore.
It’s becoming the inconvenience — a constant stream of noise, tracking, updates, and invasions dressed up as features.
The good news is: we all still have choices.
And it sounds like you’re making the right one.
You’re a blessing, John! Thank you!
You’re welcome, Sheila! 😎