The practice of gathering password hashes, and waiting until Quantum Computing becomes commercialized to crack them.

This means that when quantum computing becomes available, there will be a widespread breach for many organizations.