frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Open in hackernews

Will you heed my warnings now?

https://scottaaronson.blog/?p=9718
50•bwesterb•2h ago

Comments

KaiserPro•1h ago
Ok, maybe I'm missing something here.

So we know that quantum computers hold a real risk of being able to break a lot of encryption. We also know that changing cyphers is hard (because reasons)

But what I don't see is what I can practically do now, as either someone who is a CTO/Big Cheese™ or a lowly engineer?

fastball•1h ago
This is what Cloudflare[1] is doing.

[1] https://blog.cloudflare.com/post-quantum-roadmap/

rolandog•1h ago
I think lobby for saner defaults (tip of the hat to Steve Gibson's term "the tyranny of the default"), configuring one's GPG config to mark certain cyphers as insecure (to prevent downgrade attacks)... and have one's (chief) information security officer write those things down as policy and maybe have a yearly onboarding workshop teaching people why it's important.
MattPalmer1086•1h ago
If you're a CTO, have a post quantum strategy: know what crypto you use and where it is, plan to migrate to post quantum secure ciphers over the next decade or so, or sooner if possible. If you're a lowly engineer, not very much unless you're specifically selecting technologies with crypto. In which case crypto agility (being able to switch out existing crypto when needed) is a good property to look for.
weddpros•52m ago
TLS can already be setup to avoid store-now-decrypt-later PQC issues. That's available today, and should be implemented. Use https://sslboard.com to inventory all your external TLS infrastructure and check for PQC readiness (creator here).
BoppreH•50m ago
> But what I don't see is what I can practically do now, as either someone who is a CTO/Big Cheese™ or a lowly engineer?

Migrate! The major TLS and OpenSSH applications already support PQC, for example.

1. Make sure you have the required dependencies (e.g., openssl 3.5+ is when a lot of PQC algorithms got support).

2. Make sure the client/server software is up to date (this might be all that's needed, e.g., OpenSSH 10.0+ enables PQC in-transit encryption by default, and so does Chrome 131+).

3. Enable PQC support in the configuration (e.g., "ssl_ecdh_curve X25519MLKEM768;" in Nginx).

If you are the developer of anything that's explicitly using RSA or ECC (or god forbid Diffie-Hellman), you can also migrate your own software, or at least make the algorithm selectable at initialization time instead of hardcoded. If you have vendors, ask them for their PQC migration roadmaps.

Note that with encrypted data you want to protect yourself against attackers that are capturing data today and waiting to break it in the future (Harvest-Now, Decrypt-Later). So migrating encryption is more urgent than migrating authentication.

beloch•40m ago
The most important thing to realize about cryptography is that, for most methods short of a Vernam cipher or quantum key distribution, coded messages need to be treated as published with delay. Cipher text can be archived today and attacked years from now with currently undeveloped, unknown, or unpredicted resources/algorithms. Sure, perhaps nobody archived the cipher text and you're fine. You don't know that for sure. Your methods may be very strong but, if they're not provably immune to attack, you also don't know what the delay before publication truly is. It might be a very long time. It might not.

If you're transmitting credit card info that changes every few years and can be changed on demand, that's no big deal. If you're transmitting information that will remain sensitive for decades, the time to look for methods that would stand up to quantum computing was years ago. However, today is still better than years in the future. At the very least, you can choose what to send in encrypted form over public networks and what not to send.

There are people who will scoff at the notion of quantum computing ever developing to the point where it can make an impact. There are people who scoff at the effort and expense of QKD or good ol' spooks carrying briefcases full of one-time PADs. You might be right to listen to them. You might not be. It's a risk. Whether you, or your organization, can tolerate that risk is entirely dependent on you and yours.

FartyMcFarter•1h ago
> the Shor of Damocles

Perfect.

AndrewStephens•1h ago
Aaronson know his stuff but I am not sure he hasn’t considered the fact that, in this current hype cycle, the quantum researchers breathlessly reporting to him on a breakthrough just around the corner are just lying to him and themselves.

I have been hearing about one more technical hurdle to solve before quantum algorithms become feasible since before I graduated. That was in 1996.

chii•1h ago
quantum computers will flourish the same day that fusion does.
bradley13•1h ago
This is true, practical quantum computing is always "just a couple of years away".

At the same time, moving to more secure encryption really isn't difficult. How many times have algorithms been deprecated over the past 20 or so years? It's time to do it again.

Let's just make sure that the NSA hasn't worked in any backdoors. At latest since Snowdon, anything they work on is suspect.

AshamedCaptain•1h ago
And in the process immediately convert huge numbers of devices into ewaste. Then check the excuse calendar again for tomorrow's reason to deprecate yet another batch of "legacy" ciphers from openSSL.
FartyMcFarter•57m ago
The sooner we start making devices ready for better encryption systems, the fewer devices will be wasted.
Tyyps•1h ago
There is no clear evidence that the risk of "a practical post quantum computer would arrive in the next 5 years" is greater than "post quantum scheme X is broken" for any scheme X. The only way to go is hybridation and it is quite hard from an engineering point apparently.
tardedmeme•44m ago
There is evidence of the opposite: graph singular isogeny mumbo jumbo algorithm was proven to be easily broken on an ordinary computer.

Hybrid encryption is as simple as running one encryption and then the other. Problem is mostly that post quantum keys are large.

sharkjacobs•1h ago
Are you saying this because it's an evergreen joke or because you really think there hasn't been meaningful progress in the field since 1996?

Duke Nukem Forever was release fifteen years ago. Some things never happen until they suddenly do.

The wolf really does eat the boy at the end of The Boy Who Cried Wolf.

emil-lp•1h ago
But Duke Nukem was developed with visible progress.

We are still not factoring 21, let alone 35, let alone numbers with thousands of digits.

red75prime•37m ago
Quantum correction algorithms (that would allow factoring of thousands of digits) begin to work when the gate fidelity and other parameters are above certain threshold.
AndrewStephens•5m ago
> gate fidelity and other parameters are above certain threshold

A threshold that might be beyond what the physical properties of our universe allow. It is still unclear.

watwut•49m ago
The Boy Who Cried Wolf is a story about a boy who have seen a wolf, successfully threatened the wolf away by causing a commotion in a disbelieving village. One day the disbelieving village refused to show up, boy was eaten and thus proven correct.

But as it happens in real life politics too, people who were just proven they were wrong continued to blame the boy.

The story is told from the point of view of a villagers trying to hide their culpability by blaming the victim.

notarobot123•1h ago
"The Shor of Damocles" - what a metaphor.

I thought it was a typo at first but wikipedia explained:

The Sword of Damocles is an ancient Greek moral anecdote, an allusion to the imminent and ever-present peril faced by those in positions of power.

Shor's algorithm is a quantum algorithm for finding the prime factors of an integer

amelius•1h ago
Tl;dr:

> if quantum computers start breaking cryptography a few years from now, don’t you dare come to this blog and tell me that I failed to warn you. This post is your warning.

dwedge•47m ago
If quantum computers broke cryptography I think going to some guy's blog and complaining that he failed to warn me would be pretty low down on my todo list
Ardren•1h ago
> Shor of Damocles

What is the biggest number factored using Shor's algorithm?

Last time I looked it was very unimpressive.

Edit: It's gotten worse. 21 from 2012. "Replication of Quantum Factorisation Records with an 8-bit Home Computer, an Abacus, and a Dog" say the factorization of 35 in 2019 actually failed.

https://eprint.iacr.org/2025/1237

FartyMcFarter•59m ago
I said this about LLMs a few years ago, and now here we are.
L-four•46m ago
Yeah 70 years ago right.
sanxiyn•54m ago
I will let Scott Aaronson speak. (See https://scottaaronson.blog/?p=9668)

> Sometimes these days, I'll survey the spectacular recent progress in fault-tolerance, 2-qubit gate fidelities, programmable hundred-qubit systems, etc., only to be answered with a sneer: "What's the biggest number that Shor's algorithm has factored? Still 15 after all these years? Haha, apparently the emperor has no clothes!" I've commented that this is sort of like dismissing the Manhattan Project as hopelessly stalled in 1944, on the ground that so far it hasn't produced even a tiny nuclear explosion... If there's a reason why you think it can't work beyond a certain scale, say so. But don't fixate on one external benchmark and ignore everything happening under the hood, if the experts are telling you that under the hood is where all the action now is, and your preferred benchmark is only relevant later.

toxik•50m ago
I talked to a guy who did his doctoral degree on quantum computing and he was not worried at all. In fact he thought it was wildly overhyped, and like cold fusion, self driving cars, or string theory, always just around the corner. Just give us five more years and another grant, please.
red75prime•43m ago
Meanwhile Waymo has 200 million autonomous miles under its belt.
deepsun•25m ago
Waymo had millions in 2015.
red75prime•20m ago
Waymo doesn't seem to know it.

https://waymo.com/research/safety-performance-of-the-waymo-r...

> Waymo’s rider-only ride-hailing operations reached its first one million rider-only miles on January 21, 2023

Ardren•45m ago
> If there's a reason why you think it can't work beyond a certain scale, say so

I'm not saying it can't work. Just that in 14 years no one has managed to factor a larger number than 21. Seemingly focus has shifted to other factoring algorithms that don't have performance improvements over conventional computing.

I'm not the one implying that Shor's algorithm will breaking encryption in "a few years from now".

tgv•26m ago
> dismissing the Manhattan Project as hopelessly stalled in 1944

Then again, there are enough examples of failed projects. Why should this be comparable to the Manhattan project? In 1944, it was only two years underway, whereas Shor's algorithm is over 30. Tons of articles have been published on quantum computing, while the A bomb was kept as secret as possible, making learning from other countries, sometimes even from colleagues, impossible. In 1942, an atomic explosion was still hypothetical, whereas quantum computing had its first commercial service 7 years ago. Etc.

So, while in principle lack of progress doesn't guarantee failure, a comparison to the Manhattan Project is stylistic bullshit.

sehansen•50m ago
As a software engineer with a good amount of freedom to choose what tools I want to use, what can I do presently to move towards post-quantum cryptography? AFAIK the hashes and symmetric cyphers that are in wide use are already resistant, leaving mainly public-key cryptography as the problem. Is there, for instance, a drop in replacement for `ssh-keygen -t ed25519`?
alephnerd•38m ago
It's still being implemented or defined.

The worry about "harvest and decrypt" in a 5 year timeframe is primarily from a nation state/natsec perspective.

If you are being targeted by a nation state as a line level engineer, harvest and decrypt is the least of your worries.

BoppreH•36m ago
I have another comment[1] on this post with more practical instructions, but the `ssh-keygen` is a good question. The cryptography community is still focused on migrating encryption/key exchange algorithms, for fear of data being captured today and decrypted in the future. So OpenSSH 10.0+ already enables ML-KEM by default.

SSH keys, on the other hand, are authentication and would require an online Quantum Computer to break, so we have more time. Authentication is also (usually) more complicated, so there are still disagreements on what to do with the Web PKI for example. To give you a concrete target, Google, Microsoft, and CloudFlare have self-imposed deadlines of 2029 for their PQC migrations.

In practice, PQC migration means updating your software, bugging your vendors to ensure they have this on their roadmaps, and making sure your own code is flexible in respect to algorithms used.

[1]: https://news.ycombinator.com/item?id=47959556

alephnerd•33m ago
Cloudflare should have finished it's PQC migration already.
BoppreH•30m ago
That's true for their CDN (https://blog.cloudflare.com/post-quantum-for-all/), but there's a lot more to do, with a 2029 target (https://blog.cloudflare.com/post-quantum-roadmap/).
alephnerd•27m ago
Ah yep. Good callout.

On a separate note, I've definetly been hearing worried murmurs about "harvest and decrypt" attacks along with post-quantum TEE slightly before the GCP paper, and I definetly think it appears a couple nation states are on track for a "quantum leap" by 2030 given the rate at which I've been hearing it within my network.

endymion-light•45m ago
I'm sure eventually i'll eat my words - but Quantum still seems like a massive marketing gimmick. The technology itself is incredibly interesting, but it feels as if CERN began advertising itself as a marketing stunt - there's just something about the way I see quantum marketed + advertised right now that doesn't seem to align with reality.
Razengan•43m ago
> * it feels as if CERN began advertising itself as a marketing stunt*

Quantum AI harvesting antimatter

endymion-light•28m ago
I suppose in spirit of the article - it's as if the manhattan project in 1944 was telling the world that theoretically it's 6-12 months away from igniting the entire upper atmosphere.
YouWhy•34m ago
Re the "Manhattan project in 1944" argument - I am very cautious about the "modulo engineering scaling" carve-out -- unlike the uranium manufacturing pipeline of World War 2, that involved massively scaling up a known process, on the face of it there's no uncontroversial process/architecture to scale up in this case.

On the face of it, even relatively "point-target" goals of this kind could take many decades if at all; GaN for blue diodes come in mind as an example of a field that was stuck for a generation -- until it wasn't.

Where the goblins came from

https://openai.com/index/where-the-goblins-came-from/
528•ilreb•5h ago•290 comments

Noctua releases official 3D CAD models for its cooling fans

https://www.noctua.at/en/3d-cad-models
195•embedding-shape•2d ago•32 comments

Zed 1.0

https://zed.dev/blog/zed-1-0
1821•salkahfi•18h ago•585 comments

The Zig project's rationale for their anti-AI contribution policy

https://simonwillison.net/2026/Apr/30/zig-anti-ai/
235•lumpa•6h ago•95 comments

Craig Venter has died

https://www.jcvi.org/media-center/j-craig-venter-genomics-pioneer-and-founder-jcvi-and-diploid-ge...
223•rdl•7h ago•41 comments

Alignment whack-a-mole: Finetuning activates recall of copyrighted books in LLMs

https://github.com/cauchy221/Alignment-Whack-a-Mole-Code
123•reconnecting•5h ago•83 comments

Copy Fail

https://copy.fail/
918•unsnap_biceps•14h ago•344 comments

Biology is a Burrito: A text- and visual-based journey through a living cell

https://burrito.bio/essays/biology-is-a-burrito
87•the-mitr•5h ago•11 comments

Cursor Camp

https://neal.fun/cursor-camp/
904•bpierre•17h ago•144 comments

London to Calcutta by Bus (2022)

https://www.amusingplanet.com/2022/08/london-to-calcutta-by-bus.html
48•CGMthrowaway•1d ago•16 comments

Functional programmers need to take a look at Zig

https://pure-systems.org/posts/2026-04-29-functional-programmers-need-to-take-a-look-at-zig.html
104•xngbuilds•5h ago•73 comments

FastCGI: 30 years old and still the better protocol for reverse proxies

https://www.agwa.name/blog/post/fastcgi_is_the_better_protocol_for_reverse_proxies
331•agwa•16h ago•76 comments

OpenTrafficMap

https://opentrafficmap.org/
250•moooo99•12h ago•57 comments

Monad Tutorials Timeline

https://wiki.haskell.org/Monad_tutorials_timeline
30•brudgers•4h ago•5 comments

Will you heed my warnings now?

https://scottaaronson.blog/?p=9718
50•bwesterb•2h ago•43 comments

A 25-Year-Fight over a 2-Second Sample

https://www.plagiarismtoday.com/2026/04/20/a-25-year-fight-over-a-2-second-sample/
6•speckx•1d ago•0 comments

Creating a Color Palette from an Image

https://amandahinton.com/blog/creating-a-color-palette-from-an-image
68•evakhoury•1d ago•9 comments

HERMES.md in commit messages causes requests to route to extra usage billing

https://github.com/anthropics/claude-code/issues/53262
1114•homebrewer•13h ago•474 comments

Mike: open-source legal AI

https://mikeoss.com/
84•noleary•7h ago•31 comments

Why I still reach for Lisp and Scheme instead of Haskell

https://jointhefreeworld.org/blog/articles/lisps/why-i-still-reach-for-scheme-instead-of-haskell/...
221•jjba23•1d ago•113 comments

Laws of UX

https://lawsofux.com/
262•bobbiechen•15h ago•37 comments

Joby kicks off NYC electric air taxi demos with historic JFK flight

https://www.flyingmag.com/joby-nyc-electric-air-taxi-jfk-airport/
47•Jblx2•7h ago•111 comments

An open-source stethoscope that costs between $2.5 and $5 to produce

https://github.com/GliaX/Stethoscope
249•0x54MUR41•18h ago•109 comments

Consequences of passing too few register parameters to a C function

https://devblogs.microsoft.com/oldnewthing/20260427-00/?p=112271
58•aragonite•2d ago•23 comments

A grounded conceptual model for ownership types in Rust

https://cacm.acm.org/research-highlights/a-grounded-conceptual-model-for-ownership-types-in-rust/
31•tkhattra•7h ago•1 comments

How to Build the Future: Demis Hassabis [video]

https://www.youtube.com/watch?v=JNyuX1zoOgU
118•sandslash•18h ago•56 comments

Gooseworks (YC W23) Is Hiring a Founding Growth Engineer

https://www.ycombinator.com/companies/gooseworks/jobs/ztgY6bD-founding-growth-engineer
1•shivsak•10h ago

We need a federation of forges

https://blog.tangled.org/federation/
565•icy•18h ago•357 comments

I accidentally made law enforcement shut down their fake honeypot

https://lina.sh/blog/ddos-honeypot
108•fishgoesblub•11h ago•48 comments

Ramp's Sheets AI Exfiltrates Financials

https://www.promptarmor.com/resources/ramps-sheets-ai-exfiltrates-financials
128•takira•15h ago•41 comments