This Man-Eating Crocodile Eats Man Alive While Kayaking!

Hendri Coetzee was an avid explorer from South Africa who was tragically eaten alive by a man-eating crocodile while kayaking in the Congo.

This video contains graphic descriptions of animal attacks and may include dramatic re-enactments of the attack. Viewer discretion is advised.

DISCLAIMER: The pictures, audio, and video used in the videos on this channel are a mix of paid stock, by attribution, royalty-free, public domain, and other copyright-free sources. No copyright infringement is intended. All rights belong to their respective owners. If you are or represent the copyright owner of materials used in this video and have an issue with the use of said material, please send an email to I will respond immediately.


The CAR WIZARD shares 6 Super Reliable vehicles under $10K!

The CAR WIZARD ๐Ÿง™โ€โ™‚๏ธ presents a new BTNT in his on going series, this video shares SIX super reliable cars, trucks or SUV's priced under $10,000.

Please remember these recommendations are based on his experiences with these cars as a mechanic and the services he has found they do or do not require.


1:40 00-05 LeSabre
3:50 99-06 Silverado or Sierra
6:50 04-09 RX330/350
8:45 98-12 Crown Vic
11:00 96-00 LS400
13:00 01-07 Highlander

How Quantum Computers Break The Internet... Starting Now

Quantum Computers and the Future of Encryption: Challenges and Solutions

Encryption has become a crucial aspect of our modern digital world. It allows us to securely transmit and store sensitive information, such as financial data, medical records, and personal communications. However, recent advancements in quantum computing have raised concerns about the security of our current encryption methods. In this article, we will explore the possibility of quantum computers breaking current levels of encryption and discuss some possible solutions to this problem.

The Rise of Quantum Computing

Quantum computing is a new technology that uses quantum mechanics to perform complex calculations at a speed that is significantly faster than classical computing. This is because quantum computers utilize qubits, which can exist in multiple states simultaneously, allowing them to perform many calculations at once. This makes quantum computers particularly effective at solving problems that are too complex for classical computers to handle.

The potential applications of quantum computing are vast, ranging from drug discovery to weather forecasting. However, quantum computing also poses a threat to our current encryption methods. This is because many encryption algorithms rely on the difficulty of factoring large numbers, a problem that can be solved quickly by a quantum computer using Shor's algorithm.

The Threat to Encryption

Our current encryption methods, such as RSA and elliptic curve cryptography, are based on mathematical problems that are difficult for classical computers to solve. For example, RSA encryption relies on the difficulty of factoring the product of two large prime numbers. However, these problems can be solved quickly by a quantum computer using Shor's algorithm.

This means that a quantum computer could potentially break current encryption methods, exposing sensitive information to malicious actors. This is particularly concerning for industries that rely on encryption, such as finance, healthcare, and government.

Possible Solutions

Despite the threat that quantum computing poses to encryption, there are possible solutions to this problem. One solution is to develop new encryption methods that are resistant to quantum attacks. This includes post-quantum cryptography, which uses mathematical problems that are believed to be difficult for both classical and quantum computers to solve.

Another solution is to implement quantum key distribution (QKD), which uses the principles of quantum mechanics to securely distribute encryption keys. This method relies on the fact that any attempt to intercept a quantum signal will disturb it, making it impossible to eavesdrop without being detected.

Finally, some experts suggest that a hybrid approach, using both classical and quantum computing, could be a viable solution. This approach would utilize the strengths of both types of computers to create a more secure encryption system.


Quantum computing has the potential to revolutionize many industries, but it also poses a threat to our current encryption methods. As quantum computing continues to develop, it is important to explore new encryption methods and solutions to ensure that our sensitive information remains secure. Whether it is post-quantum cryptography, QKD, or a hybrid approach, the key is to stay ahead of the threat and be prepared for the future of computing.