Get your free personalized podcast brief

We scan new podcasts and send you the top 5 insights daily.

The first quantum computer capable of breaking encryption will not enable mass surveillance. It will be highly inefficient, potentially taking months to break a single code. This forces adversaries to choose targets with extreme care, focusing on high-value assets like nuclear codes rather than decrypting everything at once.

Related Insights

A rational actor with a quantum computer capable of breaking Bitcoin would not publicly reveal their ability, as this would crash the asset's price. The smarter strategy is to covertly crack and drain long-dormant wallets, extracting value without destroying the market, making the threat insidious and difficult to detect.

Brian Armstrong reframes the quantum threat not as crypto-specific, but as a challenge for all cryptography, including banking and data encryption. The solution is to upgrade networks to post-quantum algorithms, a process already underway, rather than abandoning the technology.

Progress in quantum computing is accelerating faster than most realize, with useful applications now expected within five years. A major milestone was achieving "below threshold error correction," where scaling up a quantum system now decreases error rates instead of increasing them, overcoming a fundamental barrier.

New Google research indicates that breaking Bitcoin's encryption requires 20 times fewer quantum resources than previously thought. This revision dramatically accelerates the timeline for a quantum attack to as early as 2029, creating urgent pressure on blockchains to migrate to post-quantum cryptography (PQC) to survive.

CZ dismisses fears that quantum computing will break crypto. He argues that quantum advancements will concurrently lead to new, quantum-resistant encryption algorithms. The crypto ecosystem will simply need to upgrade its protocols to adopt these new standards, neutralizing the threat and potentially improving security.

Google Research has revised its timeline for transitioning to post-quantum cryptography (PQC) to 2029. This is driven by new findings that the quantum computing power needed to break crypto wallet encryption is 20 times lower than previously estimated, adding significant urgency for blockchains to migrate to PQC standards.

New research from Google's quantum AI team reveals that breaking Bitcoin's encryption requires only 500,000 qubits, not the 10 million previously thought. This 20-fold reduction moves the threat from theoretical to imminent, with Google setting a 2029 deadline for a necessary upgrade.

Despite hype around its potential to solve famously complex problems like the "traveling salesman," experts in the field caution that the number of actual, practical problems quantum computing can currently solve is extremely small. The gap between its theoretical power and tangible business application remains vast, making its near-term commercial impact questionable.

Public announcements about quantum computing progress often cite high numbers of 'physical qubits,' a misleading metric due to high error rates. The crucial, error-corrected 'logical qubits' are what matter for breaking encryption, and their number is orders of magnitude lower, providing a more realistic view of the technology's current state.

The timeline for functional quantum computing that can break current encryption has shrunk from decades to just 5-7 years. This poses an imminent threat to cryptocurrencies like Bitcoin, which are obvious 'honeypots' for non-state actors. The crypto community must urgently organize a massive technological lift to become quantum-resistant.