this post was submitted on 20 Oct 2025
290 points (97.1% liked)
Technology
76274 readers
2800 users here now
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related news or articles.
- Be excellent to each other!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
- Check for duplicates before posting, duplicates may be removed
- Accounts 7 days and younger will have their posts automatically removed.
Approved Bots
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Once quantum computers break classical cryptography, it's going to be too late to develop post-quantum cryptography, mate.
The best time to develop resilience is right now.
It's not going to happen this century, probably never
Even if quantum computing turns out to actually be infeasible and classical cryptography is secure for the next millennia, it's still a good feature to have a third independent encryption layer in the protocol. It makes it that much less likely reliant on the other two being bulletproof.
Maybe. I don't know at which point all that extra processing stops being worth it.
How sure are you? Assign a percentage chance to it and the cost of exposing old messages, and compare that to the cost of this dev effort.
We know governments are using it, and there's likely a lot of sensitive data transmitted through Signal, so the cost of it happening in the next 20 years would still be substantial, so even if the chance of that timeline happening is small, there's still value in investing in forward secrecy.
https://www.cs.auckland.ac.nz/~pgut001/pubs/bollocks.pdf
They also want nuclear fusion reactors and there is none in the horizon after 50 years of research and development (even though many want to sell the idea that there are).
You can start preparing for post hypercomputation cryptography too if you believe your argument.