🔒 Il rischio quantistico per la crittografia è più concreto di quanto pensiamo. E' tempo di prepararsi, la sicurezza digitale non aspetta! #Crittografia #QuantumRisk

🔗 https://www.tomshw.it/scienze/computer-quantistico-viola-la-crittografia-ci-siamo-2026-04-02

Crittografia, il rischio quantistico è più concreto

Due nuovi studi riducono drasticamente i qubit necessari per violare i sistemi crittografici alla base di finanza, web e comunicazioni.

Tom's Hardware

Good Read: Ethereum is facing pressure on multiple fronts and that is probably a good thing!

- L2 systems and scaling: concerns that layer 2 designs are drifting away from Ethereum’s core model and in their current form may not be delivering the kind of scaling Ethereum needs.

- The Quantum challenge: the network is taking the quantum risk seriously establishing dedicated research efforts focused specifically on post-quantum security.

- Moving into AI: proponents suggest Ethereum could act as a coordination layer for decentralized AI systems, enabling verifiable outputs, trust-minimized data sharing, and machine-to-machine economic activity.

https://www.coindesk.com/tech/2026/03/22/ethereum-faces-make-or-break-moment-in-high-stakes-balancing-act-as-scaling-quantum-and-ai-pressures-mount #Ethereum #BlockChain #ETH #Layer2 #Quantum #QuantumRisk #AI #Buterin #Cryptography #EthereumFoundation

Regulators are mandating comprehensive cryptographic inventories for quantum readiness - but what if that’s not feasible yet?

My latest article explores a pragmatic, risk-driven alternative to begin mitigating quantum threats without boiling the ocean.

#QuantumRisk #PQC #Cybersecurity #QuantumReady #CryptoAgility

https://postquantum.com/post-quantum/risk-driven-quantum-crypto-inventory/

Risk-Driven Strategies for Quantum Readiness When Full Crypto Inventory Isn’t Feasible

Given the practical challenges, organizations may need to begin their quantum-readiness journey with a risk-driven approach rather than a theoretically perfect one. The essence of this strategy is to focus limited resources where they matter most – addressing the highest quantum-vulnerability risks first and implementing interim safeguards for the rest. Even the U.S. government’s guidance recognizes the need for prioritization. For example, the federal memo mentioned above directs agencies to inventory high-impact systems, high-value assets (HVA), and any systems containing data that must remain sensitive through 2035 before worrying about less critical systems. In other words, not all cryptographic assets

PostQuantum - Quantum Computing, Quantum Security, PQC