🌌
Privacy Village Academy
Join The Community!AcademyAbout HGPE
  • Hitchhiker's Guide to Privacy Engineering
    • ❓What is HGPE?
      • ⚖️Who is this for?
      • 🧙‍♂️Privacy Engineering
      • 🎨Creative Privacy
      • 🔮Generative AI
      • 🧑‍💻About the Author
  • 🧙‍♂️The Ethical AI Governance Playbook 2025 Edition
    • 🤖Chapter 1 : AI Literacy
    • 🌍Chapter 2 : AI Governance in the 21st Century
    • ⌛Chapter 3 - Getting Started with AI Act Compliance
    • 🚀Chapter 4 : Rise of AI Governance: Building Ethical & Compliant AI
    • Chapter 5 : Introduction to the Lifecycle of AI
  • 🎓Privacy Engineering Field Guide Season 1
    • ❓Decoding the Digital World: Exploring Everyday Technology
    • 👁️Introduction: Why Privacy Matters?
      • Age of Mass Surveillance
      • Privacy & Democracy
      • Privacy & Government Surveillance
    • ⚡Chapter 1 : How Computers Work?
      • Electricity
      • Bits
      • Logic Gates
      • Central Processing Unit (CPU)
      • Graphic Processing Unit (GPU)
      • Motherboard
      • Data Storage
      • Databases
      • Operating System (OS)
      • Computer Code
      • Programming Languages
      • The File System
      • Bugs and Errors
      • Computer Virus
      • Internet of Things (IoT)
      • Cloud Computing
    • 🛰️Chapter 2 : How the internet works?
      • Physical Infrastructure
      • Network and Protocols
      • Switch
      • Routers
      • IP Address
      • Domain Name System (DNS)
      • Mac Address
      • TCP / IP
      • OSI Model
      • Packets
      • The Client - Server Architecture
      • Secure Socket Shell (SSH)
      • Transport Layer Security (TLS)
      • Firewall
      • Tunnels and VPNs
      • Proxy Server
    • 🖥️Chapter 3 : How Websites Work?
      • HTML
      • CSS
      • Javascript
      • Web Server
      • Browser
      • HTTP
      • Databases
      • Front End (Client Side)
      • Back End (Server Side)
      • Cookies
      • Local Storage
      • Session Storage
      • IndexedDB
      • XHR Requests
      • Web APIs
      • Webhooks
      • Email Server
      • HTTPS
      • Web Application Firewall
      • Single Sign-on (SS0)
      • OAuth 2.0
      • Pixels
      • Canvas Fingerprinting
      • Email Tracking
      • Containers
      • CI/CD
      • Kubernetes
      • Serverless Architecture
    • ⚛️Chapter 4 : How Quantum Computers Work?
      • Quantum Properties
      • Quantum Bits (Qubits)
      • Decoherence
      • Quantum Circuits
      • Quantum Algorithms
      • Quantum Sensing
      • Post-Quantum Cryptography
    • 📳Chapter 5 : Mobile Apps and Privacy
      • Battery
      • Processor
      • Mobile Operating Systems
      • Mobile Data Storage
      • Cellular Data
      • Mobile Device Sensors
      • Wireless Connectivity
      • Camera & Microphone
      • Mobile Apps
      • Software Development Kits (SDKs)
      • Mobile Device Identifiers
      • Bring Your Own Device (BYOD)
  • 🕵️‍♂️Privacy Engineering Field Guide Season 2
    • ❓Introduction to Privacy Engineering for Non-Techs
      • 🎭Chapter 1 : Digital Identities
        • What is identity?
        • Authentication Flows
        • Authentication vs. Authorization
        • OAuth 2.0
        • OpenID Connect (OIDC)
        • Self Sovereign Identities
        • Decentralized Identifiers
        • eIDAS
      • 👁️‍🗨️Chapter 2 : De-Identification
        • Introduction to De-Identification?
        • Input / Output Privacy
        • De-identification Strategies
        • K-Anonymity
        • Differential Privacy
        • Privacy Threat Modeling
  • 📖HGPE Story and Lore
    • 🪦Chapter 1 : The Prologue
    • ☄️Chapter 2 : Battle for Earth
    • 🦠Chapter 3 : A Nightmare To Remember
    • 🧙‍♂️Chapter 4 : The Academy
    • 🌃Chapter 5: The Approaching Darkness
    • ⚔️Chapter 6 : The Invasion
    • 🏰Chapter 7 : The Fall of the Academy
    • 🛩️Chapter 8 : The Escape
    • 🪐Chapter 9 : The Moon Cave
    • 🦇Chapter 10: Queen of Darkness
  • 📺Videos, Audio Book and Soundtracks
    • 🎧Reading Episodes
    • 🎹Soundtracks
  • 👾HGPE Privacy Games and Challenges
    • 🎮Data Privacy Day'23 / Privacy Treasure Hunt Game
    • 🧩Privacy Quest
  • 📬Subscribe Now!
Powered by GitBook
On this page
  • The History of Quantum Computing
  • What is Quantum Computing?
  • What is Quantum Supremacy?
  • What’s going to happen in the next decade?

Was this helpful?

  1. Privacy Engineering Field Guide Season 1

Chapter 4 : How Quantum Computers Work?

Privacy engineers need to become familiar with quantum computing, quantum communications, quantum networks, and quantum key distribution in order to assess the risks of the next decades.

PreviousServerless ArchitectureNextQuantum Properties

Last updated 2 years ago

Was this helpful?

Quantum computers exploit quantum principles to transform how information is acquired, encoded, manipulated, and applied.

Quantum computers, which use qubits and quantum operations, will solve certain complex computational problems more efficiently than classical computers.

Quantum communications use entanglement or a transmission channel to transfer quantum information between different locations. For quantum information applications to be successfully completed, fragile quantum states must be preserved or kept coherent.

The basic challenges in quantum technologies are so great that we are still so early in their development.

In classical computing, the transistor is the basic technology used to create bits, and that technology scaled dramatically but the basic idea of silicon-based transistors has not changed.

Unfortunately in quantum computing, no consensus has emerged for the fundamental qubit technology. This is caused by the scaling problem of quantum computers. Where scaling is so much more difficult due to the noise generated with each added qubit to the computer.

Quantum computing will shine through as taking computing to a whole new generation or whether we will face a quantum winter scenario is yet to be seen. It is depending on a transistor-like invention for quantum states to become the scalable machine where the privacy of humanity will face a new challenge like never before.

This chapter will dive into quantum computers and how they work.

As privacy engineers of the following decades will eventually face of with the privacy risks of quantum computers. Some of these scenarios might be an encryption-breaking weapon or a quantum sensor that will elevate government and private industry surveillance on individuals to new heights.

The History of Quantum Computing

In the 1980s, Richard Feynman proposed that the kinds of mathematical problems that quantum physicists need to solve might be more efficiently worked on using a computer based on quantum mechanics.

The idea was that computer engineers would embrace the uncertainty, non-determinism, and inherent randomness that come with quantum properties.

It's a proposal for a new type of computation that is based on quantum mechanics. In the last couple of decades, we have seen quantum computers go from theory to working machines that can solve real problems.

Quantum computers do not generally produce the same results as classical computers.

So there are no right answers in quantum computing but there is a range of possible answers.

What is Quantum Computing?

Quantum Computing is a family of approaches for building computers that switch information with quantum interactions, rather than with the electronic interactions that power today’s computers.

What is Quantum Supremacy?

You can use the quantum computer to solve a well-defined task much faster than any known algorithm in any classical computer.

Everything a quantum computer can do, a classical computer can eventually do if it has no limits on time or memory. Quantum computers are efficiently computable that’s the core difference from classical computers.

Before delving into the details of how quantum computers work and their possible effects on privacy here is a little summary of what you need to know.

Quantum computers don’t work by trying every possibility at once.

Quantum computing is reversible.

Quantum computers are faster for only a certain set of problems.

What’s going to happen in the next decade?

People are racing to build quantum simulations with thousands of qubits in the next decade.

The first use case will not be going to be breaking cryptography in because it requires too much in way of error correction, the best shot is to show the quantum simulations something that is useful for telling the material scientists, chemists, and nuclear physicists that they don't already know.

A next-gen focusing on surveillance perhaps?

Manhattan Project
🎓
⚛️
As Red and Kyle hurtled through the vastness of space toward D'adana, Red couldn't help but stare out into the endless expanse and contemplate the mysterious signal they'd received. She was sure it was from Ray, and she was eager to investigate.
Page cover image