←back to thread

429 points AbhishekParmar | 3 comments | | HN request time: 1.18s | source
Show context
andy_ppp ◴[] No.45676328[source]
I would be quite worried about advances in quantum computers if I had any Bitcoin after watching this DEFCON talk: https://www.youtube.com/watch?v=OkVYJx1iLNs
replies(5): >>45676454 #>>45676591 #>>45677387 #>>45677519 #>>45678889 #
1. qnleigh ◴[] No.45677387[source]
The quantum algorithm that would break certain kinds of public key cryptography schemes (not even the core part of Bitcoin blockchains, which are not vulnerable to quantum computers) will take days to weeks to break a single key [0]. This is another reason why we will have plenty of warning before quantum computing causes any major disruptions to daily life.

What I would start worrying about is the security of things like messages sent via end-to-end encrypted services like WhatsApp and Signal. Intercepted messages can be saved now and decrypted any time in the future, so it's better to switch to more robust cryptography sooner rather than later. Signal has taken steps in this direction recently: https://arstechnica.com/security/2025/10/why-signals-post-qu....

[0] https://arxiv.org/pdf/2505.15917

replies(2): >>45677619 #>>45678404 #
2. twothreeone ◴[] No.45677619[source]
Usually, the crypto should have Forward Secrecy already even without being PQ-safe (e.g., via https://en.wikipedia.org/wiki/Double_Ratchet_Algorithm) so in practice the attacker would need to break many successive session keys - which rotates every time a new message is sent.
3. dweekly ◴[] No.45678404[source]
Meta has been rolling out PQC: https://engineering.fb.com/2024/05/22/security/post-quantum-...

And Apple: https://security.apple.com/blog/imessage-pq3/

Cloudflare started rolling it out three years ago! https://developers.cloudflare.com/ssl/post-quantum-cryptogra...