Quantum Computers Just Got Much More Dangerous
For years, quantum computing felt like a distant threat — always powerful in theory, but never quite ready in practice. Last week changed everything. Google researchers announced a breakthrough algorithm that slashes the resources needed to crack encrypted codes by 95%, moving the so-called «Q-Day» from the mid-2030s to 2029. Meanwhile, a startup claims they can break encryption in just 10 days with a fraction of the qubits previously thought necessary. The question is no longer whether quantum computers will break today's encryption — but who will get there first, and what secrets will suddenly become readable.
Punti chiave
Google's new algorithm can break encryption with 20 times fewer qubits — just 500,000 instead of 10 million — collapsing the timeline for «Q-Day» from the mid-2030s to 2029.
Startup Oratomic claims it can crack codes in 10 days using only 26,000 qubits, leveraging neutral atom arrays that excel at long-range entanglement.
A third paper shows RSA encryption can be broken with 10 times fewer qubits than previously believed, accelerating the threat to current cryptographic standards.
Despite breakthroughs in codebreaking, quantum computers have delivered little practical progress in finance, logistics, or materials science — turning them into specialized decryption machines rather than general-purpose tools.
Researchers are now debating whether to publish quantum cryptography advances at all, given the geopolitical risks of enabling adversaries to decrypt state secrets.
In breve
Quantum computing has pivoted from a general-purpose dream to a codebreaking nightmare: the encryption protecting everything from Bitcoin to military secrets could fall within five years, yet practical applications in finance, logistics, and materials science remain elusive.
The Encryption Apocalypse Arrives Early
Google's new algorithm moves Q-Day from mid-2030s to 2029.
For years, quantum computing felt like reporting on nothing. But last week turned turbulent. A Google research group published findings showing they can crack encryption codes used to protect Bitcoin and countless other encrypted systems with 20 times fewer qubits than previously required. Instead of needing 10 million qubits, they now estimate just 500,000 would suffice to break these codes in about 10 minutes.
This isn't just about cryptocurrency. Encrypted data collected by hackers and spies over decades — military secrets, covered-up affairs, classified programs — could suddenly become readable. The algorithm that would take a standard computer a billion years to crack could be done in 10 minutes on a quantum computer. The problem was always that today's quantum computers are too small, working with only a few hundred qubits. That gap is closing faster than anyone expected.
Google has now revised its estimate for Q-Day — the day quantum computers can break these codes — from the mid-2030s to 2029. The quantum leap isn't in the technology itself, but in how fast we've moved from «this is impossible» to «maybe we shouldn't publish this.» Google's group didn't even release the revised algorithm; instead, they used a zero-knowledge proof to demonstrate it works without revealing the actual method.
Three Breakthroughs in One Week
Multiple teams found ways to slash qubit requirements dramatically.
The Neutral Atom Wild Card
Oratomic's approach sidesteps the entanglement problem plaguing superconducting qubits.
The Codebreaking Paradox
Quantum computers excel at one thing while failing at everything else.
The Codebreaking Paradox
Quantum computing was once promised as a revolution for stock market prediction, logistics optimization, quantum chemistry, and materials science. Yet we hear almost nothing about progress in these areas. The problem is that in all these fields, translating computational advantage into practical advantage is incredibly difficult. The exception? Cracking codes. If nothing else, this finally answers the question: What is quantum computing actually good for? It's the revenge of the nerds.
Too Dangerous to Publish?
Researchers debate withholding findings due to geopolitical risks.
“Ich weiß, dass sich Leute Gedanken darüber machen, welche Ressourcen Shores Algorithmus genau benötigt, um beispielsweise verschiedene heute eingesetzte Kryptosysteme mit einem Quantencomputer zu knacken. Und wer ist an dem Punkt angelangt, an dem man sich fragt: Sollten wir das veröffentlichen oder nicht?”
I know that people are thinking about what resources Shore's algorithm exactly needs to crack, for example, various cryptosystems in use today with a quantum computer. And who has reached the point where you ask yourself: Should we publish this or not?
Persone
Avviso: Questo è un riassunto generato dall'IA di un video YouTube a scopo educativo e di riferimento. Non costituisce consulenza in materia di investimenti, finanziaria o legale. Verificare sempre le informazioni con le fonti originali prima di prendere decisioni. TubeReads non è affiliato con il creatore del contenuto.