Today, threat actors are quietly collecting data, waiting for the day when that information can be cracked with future technology.