#RSA

Collectif RATORATO@piaille.fr
2026-01-22

Bonjour à toustes,
On vous retrouve pour l'AG de RATO ce soir à 18 heures 30 au 41 rue Van Dyck à Lille (Métro Porte des Postes).
Et le Café des Allocs vous accueille demain, vendredi 23, au 48 rue du Long Pot (Métro Fives) de 14h à 18 heures.
anamorphose.noblogs.org/cafe-d

#RATO #RSA #FranceTravail #collectif #resistance #autodefense #Lille #caf

Collectif RATORATO@piaille.fr
2026-01-14

Visiblement les collectifs, dont RATO, s'en étaient inquiétés avant la Cour des comptes....
basta.media/intelligence-artif

#RATO #franceTravail #chomage #RSA #collectif #Lille #IA

Aboumael ⏚🔻🇺🇦 🇵🇸Aboumael@piaille.fr
2026-01-14

Quand on entend "fraude sociale". Les #MédiasDesOligarques ont réussi à mettre dans la tête de beaucoup de gens que c'est dû aux vilains qui fraudent le #RSA. Eh bien non, la fraude est surtout le fait des patrons.
.
.
.
[Libération] - La fraude sociale évaluée à 14 milliards d’euros par an, toujours (et surtout) du fait d’entreprises

liberation.fr/economie/social/

#RevueDePresse
#FraudeSociale

らりお・ザ・.*ソムリエlo48576@mastodon.cardina1.red
2026-01-13

「電子署名=『秘密鍵で暗号化』」という良くある誤解の話 #RSA - Qiita
qiita.com/angel_p_57/items/d7f

> これは一般にも良く見られる典型的なネタなのですが、RSAに限っても正しくは「秘密鍵で復号」「公開鍵で暗号化」です。DiffieとHellmanの提唱したデジタル署名でも、RSAの最初の論文でも「秘密鍵で暗号化」とは書いていません。

そうなんだ

Collectif RATORATO@piaille.fr
2026-01-12

Des nouvelles des assistés...
(Piqué sur la page Facebook de Gabriel Zucman)

#RSA #chômage #RATO #Lille #resistance #travail

Photo d'Eric Lombard avec une légende qui explique que les plus riches ne paient pas d'impôts
Collectif RATORATO@piaille.fr
2026-01-07

Bonjour à toustes !

La prochaine AG du collectif c'est le jeudi 22 janvier à 18 h30 et non 18 h comme précédemment annoncé !
Toujours au CCL 2, rue Van Dyck à Lille, par contre 😜 (métro Porte des Postes - quartier Wazemmes)

#AG #RATO #collectif #Lille #travail #RSA #lutte

Collectif RATORATO@piaille.fr
2026-01-06

Tractage du matin, espoir !

#Lille #RSA #collectif #RATO #CAF #lutte

RSA sans condition écrit dans la neige. Un tract du collectif RATO devant
Collectif RATORATO@piaille.fr
2026-01-05

Bonjour à toustes.
Deux dates à noter, retenir et partager !
L'atelier "Et toi, c'est quoi pour toi le travail ?" le 9 janvier de 14 à 17 heures à la MDA, 27 rue Jean Bart à Lille (inscription recommandée par mail à lavoyette.asso@laposte.net)
L'AG de RATO le 22 Janvier à 18 heures au 41 rue Van Dyck à Lille.
#RSA #collectif #RATO #lutte #Lille #atelier

2026-01-04

Always thought these BMWs were among the most interesting. They went to all that trouble of a big facelift, then made only 1,400 of them.

autocade.net/index.php/BMW_180 #BMW #Glas #SouthAfrica #RSA #ZA #WeirdCarMastodon

DionyZack 🍉✊🏽♀️🌿dionyzack.bsky.social@bsky.brid.gy
2026-01-03

📽️ vidéo en ✊ Le RSA EXPLIQUÉ par un PARASITE SOCIAL !!: -- IFJ0heMsgk8?version=3 #RSA #Social #Économie #AideSociale

Le RSA EXPLIQUÉ par un PARASIT...

How Quantum Computing Could Change Cybersecurity

1,043 words, 6 minutes read time.

Quantum computing is no longer a distant dream scribbled on whiteboards at research labs; it is a looming reality that promises to disrupt every corner of the digital landscape. For cybersecurity professionals, from the analysts sifting through logs at 2 a.m. to CISOs defending multimillion-dollar digital fortresses, the quantum revolution is both a threat and an opportunity. The very encryption schemes that secure our communications, financial transactions, and sensitive corporate data could be rendered obsolete by the computational power of qubits. This isn’t science fiction—it’s an urgent wake-up call. In this article, I’ll explore how quantum computing could break traditional cryptography, force the adoption of post-quantum defenses, and transform the way we model and respond to cyber threats. Understanding these shifts isn’t optional for security professionals anymore; it’s survival.

Breaking Encryption: The Quantum Threat to Current Security

The first and most immediate concern for anyone in cybersecurity is that quantum computers can render our existing cryptographic systems ineffective. Traditional encryption methods, such as RSA and ECC, rely on mathematical problems that classical computers cannot solve efficiently. RSA, for example, depends on the difficulty of factoring large prime numbers, while ECC leverages complex elliptic curve relationships. These are the foundations of secure communications, e-commerce, and cloud storage, and for decades, they have kept adversaries at bay. Enter quantum computing, armed with Shor’s algorithm—a method capable of factoring these massive numbers exponentially faster than any classical machine. In practical terms, a sufficiently powerful quantum computer could crack RSA-2048 in a matter of hours or even minutes, exposing sensitive data once thought safe. Grover’s algorithm further threatens symmetric encryption by effectively halving key lengths, making AES-128 more vulnerable than security architects might realize. In my years monitoring security incidents, I’ve seen teams underestimate risk, assuming that encryption is invulnerable as long as key lengths are long enough. Quantum computing demolishes that assumption, creating a paradigm where legacy systems and outdated protocols are no longer just inconvenient—they are liabilities waiting to be exploited.

Post-Quantum Cryptography: Building the Defenses of Tomorrow

As frightening as the threat is, the cybersecurity industry isn’t standing still. Post-quantum cryptography (PQC) is already taking shape, spearheaded by NIST’s multi-year standardization process. This isn’t just theoretical work; these cryptosystems are designed to withstand attacks from both classical and quantum computers. Lattice-based cryptography, for example, leverages complex mathematical structures that quantum algorithms struggle to break, while hash-based and code-based schemes offer alternative layers of protection for digital signatures and authentication. Transitioning to post-quantum algorithms is far from trivial, especially for large enterprises with sprawling IT infrastructures, legacy systems, and regulatory compliance requirements. Yet the work begins today, not tomorrow. From a practical standpoint, I’ve advised organizations to start by mapping cryptographic inventories, identifying where RSA or ECC keys are in use, and simulating migrations to PQC algorithms in controlled environments. The key takeaway is that the shift to quantum-resistant cryptography isn’t an optional upgrade—it’s a strategic imperative. Companies that delay this transition risk catastrophic exposure, particularly as nation-state actors and well-funded cybercriminal groups begin experimenting with quantum technologies in secret labs.

Quantum Computing and Threat Modeling: A Strategic Shift

Beyond encryption, quantum computing will fundamentally alter threat modeling and incident response. Current cybersecurity frameworks and MITRE ATT&CK mappings are built around adversaries constrained by classical computing limits. Quantum technology changes the playing field, allowing attackers to solve previously intractable problems, reverse-engineer cryptographic keys, and potentially breach systems thought secure for decades. From a SOC analyst’s perspective, this requires a mindset shift: monitoring, detection, and response strategies must anticipate capabilities that don’t yet exist outside of labs. For CISOs, the challenge is even greater—aligning board-level risk discussions with the abstract, probabilistic threats posed by quantum computing. I’ve observed that many security leaders struggle to communicate emerging threats without causing panic, but quantum computing isn’t hypothetical anymore. It demands proactive investment in R&D, participation in standardization efforts, and real-world testing of quantum-safe protocols. In the trenches, threat hunters will need to refine anomaly detection models, factoring in the possibility of attackers leveraging quantum-powered cryptanalysis or accelerating attacks that once required months of computation. The long-term winners in cybersecurity will be those who can integrate quantum risk into their operational and strategic planning today.

Conclusion: Preparing for the Quantum Era

Quantum computing promises to be the most disruptive force in cybersecurity since the advent of the internet itself. The risks are tangible: encryption once considered unbreakable may crumble, exposing sensitive data; organizations that ignore post-quantum cryptography will face immense vulnerabilities; and threat modeling will require a fundamental reevaluation of attacker capabilities. But this is not a reason for despair—it is a call to action. Security professionals who begin preparing now, by inventorying cryptographic assets, adopting post-quantum strategies, and updating threat models, will turn the quantum challenge into a competitive advantage. In my years in the field, I’ve learned that the edge in cybersecurity always belongs to those who anticipate the next wave rather than react to it. Quantum computing is that next wave, and the time to surf it—or be crushed—is now. For analysts, architects, and CISOs alike, embracing this reality is the only way to ensure our digital fortresses remain unbreachable in a world that quantum computing is poised to redefine.

Call to Action

If this breakdown helped you think a little clearer about the threats out there, don’t just click away. Subscribe for more no-nonsense security insights, drop a comment with your thoughts or questions, or reach out if there’s a topic you want me to tackle next. Stay sharp out there.

D. Bryan King

Sources

NIST: Post-Quantum Cryptography Standardization
NISTIR 8105: Report on Post-Quantum Cryptography
CISA Cybersecurity Advisories
Mandiant Annual Threat Report
MITRE ATT&CK Framework
Schneier on Security Blog
KrebsOnSecurity
Verizon Data Breach Investigations Report
Shor, Peter W. (1994) Algorithms for Quantum Computation: Discrete Logarithms and Factoring
Grover, Lov K. (1996) A Fast Quantum Mechanical Algorithm for Database Search
Black Hat Conference Materials
DEF CON Conference Archives

Disclaimer:

The views and opinions expressed in this post are solely those of the author. The information provided is based on personal research, experience, and understanding of the subject matter at the time of writing. Readers should consult relevant experts or authorities for specific guidance related to their unique situations.

#advancedPersistentThreat #AES #boardLevelCybersecurity #CISO #cloudSecurity #codeBasedCryptography #cryptanalysis #cryptographyMigration #cyberAwareness #cyberDefense #cyberDefenseStrategy #cyberInnovation #cyberPreparedness #cyberResilience #cyberRisk #cyberStrategy #cyberattack #cybersecurity #cybersecurityChallenges #cybersecurityFrameworks #cybersecurityTrends #dataProtection #digitalFortresses #digitalSecurity #ECC #emergingThreats #encryption #encryptionKeys #futureProofSecurity #GroverSAlgorithm #hashingAlgorithms #incidentResponse #ITSecurityLeadership #latticeBasedCryptography #legacySystems #MITREATTCK #nationStateThreat #networkSecurity #NISTPQC #postQuantumCryptography #quantumComputing #quantumComputingImpact #quantumEraSecurity #quantumReadiness #quantumRevolution #quantumThreat #quantumResistantCryptography #quantumSafeAlgorithms #quantumSafeProtocols #RSA #secureCommunications #securityBestPractices #securityPlanning #ShorSAlgorithm #SOCAnalyst #threatHunting #threatIntelligence #ThreatModeling #zeroTrust

Futuristic quantum computer inside a high-tech security operations center with digital encryption codes and holographic displays, illustrating the impact of quantum computing on cybersecurity.
Collectif RATORATO@piaille.fr
2025-12-29

Bonjour à toustes !

Un nouvel atelier autour du thème du travail pour bien démarrer 2026... Que vous soyez déjà venu-e ou non si vous voulez vous exprimer, échanger et cogiter, bienvenue !
Les places étant limitées, on vous conseille de vous inscrire par mail à lavoyette.asso@laposte.net

#RSA #travail #collectif #atelier #educpop #lille #RATO #lavoyette #resistance

Tract pour l'atelier "Et toi, c'est quoi pour toi le travail ?" avec les logos du collectif RATO et de l'association  La Voyette. Des engrenages en fond
2025-12-29

Réforme #RSA | Mesures injustes, inefficaces et contraires au droit à des moyens convenables d’existence : la #LDH et ses partenaires ont saisi le Conseil d'Etat. Il faut cesser de stigmatiser les personnes pour leur situation et rappeler les pouvoirs publics à leurs obligations.
mediapart.fr/journal/france/15

GREUBE HUMAINEGREUBELINUX
2025-12-27

Réforme | Mesures injustes, inefficaces et contraires au droit à des moyens convenables d’existence : la et ses partenaires ont saisi le CE. Il faut cesser de stigmatiser les personnes pour leur situation et rappeler les pouvoirs publics à leurs obligations.
mediapart.fr/journal/france/15

Jeanne de Brigue 🧶🎶🪥💀Fedi@piaille.fr
2025-12-27

STREAM DES VACANCES - RETOUR LE 5 JANVIER - Madao discute - LIVE DARK SOULS
twitch.tv/hip_connexion
#RSA stream des gueux

2025-12-27

Réforme #RSA | Mesures injustes, inefficaces et contraires au droit à des moyens convenables d’existence : la #LDH et ses partenaires ont saisi le CE. Il faut cesser de stigmatiser les personnes pour leur situation et rappeler les pouvoirs publics à leurs obligations.
mediapart.fr/journal/france/15

#LeMonde: "L’#AfriqueDuSud prête à assouplir ses règles en matière de #discriminationPositive pour #Starlink

Selon ces normes dites de #blackEmpowerment, les entreprises sont obligées d’ouvrir 30 % de leur actionnariat aux « groupes historiquement désavantagés » afin de corriger les inégalités [issues de l'#apartheid]. Une mesure à laquelle refuse de se plier Starlink, fournisseur d’accès à Internet par satellite de la société #SpaceX, propriété d’#ElonMusk."

#RSA #SAR

lemonde.fr/afrique/article/202

La Griffela_voix
2025-12-24

Contrôles intrusifs et menaces de radiation mncp.fr/avis-de-tempete-sur-le : la peur de la sanction paralyse les allocataires du

Le décret «sanctions» concernant le RSA est entré en vigueur cet été. Depuis, des allocataires font face à des exigences accrues de la part de France Travail et des départements. Un système de contrôle «abusif et déroutant», dénoncent des bénéficiaires... mcinformactions.net/controles-

2025-12-24

Mediapart
Contrôles intrusifs et menaces de radiation : la peur de la sanction paralyse les allocataires du RSA
mcinformactions.net/controles-
#RSA #FranceTravail #inegalites #sanctions #surveillance

Le Nouveau Paradigmelenouveauparadigme
2025-12-23

Pour Noël, le cadeau empoisonné du gouvernement aux plus pauvres

Derrière la promesse de « simplification », l’allocation sociale unique risque de fragiliser encore davantage les plus précaires.

L’exemple britannique du Universal Credit est là pour rappeler que ce type de réforme aggrave la pauvreté au lieu de la réduire.

lenouveauparadigme.fr/pour-noe

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst