“Quantum computation is … nothing less than a distinctly new way of harnessing nature”*…

As the tools in the world around us change, the world– and we– change with them. The onslaught of AI is the change that seems to be grabbing most of our mindshare these days… and with reason. But there are, of course, other changes (in biotech, in materials science, et al.) that are also going to be hugely impactful.

Today, a look at the computing technology stalking up behind AI: quantum computing. As enthusiasts like David Deutsch (author of the quote above) argue, it can have tremendous benefits, perhaps especially in our ability to model (and thus better understand) our reality.

But quantum computing will, if/when it arrives, also present huge challenges to us as individuals and as societies– perhaps most prominently in its threat to the ways in which we protect our systems and our information: We’ve felt pretty safe for decades, secure in the knowledge that we could lose passwords to phising or hacks, but that it would take the “classical” computers we have 1 billion years to break today’s RSA-2048 encryption. A quantum computer could crack it in as little as a hundred seconds.

The technology has been “somewhere on the horizon” for 30 years… so not something that has seemed urgent to confront. But progress has accelerated; a recent Google paper reports on a programming and architectural breakthrough that greatly reduces the computing resources necessary to break classical cryptography… putting the prospect of “Q-Day” (the point at which quantum computers become powerful enough to break standard encryption methods (RSA, ECC), endangering global digital security) much closer, which would put everything from crypto-wallets to our e-banking accounts at risk.

Charlie Wood brings us up to speed…

Some 30 years ago, the mathematician Peter Shor took a niche physics project — the dream of building a computer based on the counterintuitive rules of quantum mechanics — and shook the world.

Shor worked out a way for quantum computers to swiftly solve a couple of math problems that classical computers could complete only after many billions of years. Those two math problems happened to be the ones that secured the then-emerging digital world. The trustworthiness of nearly every website, inbox, and bank account rests on the assumption that these two problems are impossible to solve. Shor’s algorithm proved that assumption wrong.

For 30 years, Shor’s algorithm has been a security threat in theory only. Physicists initially estimated that they would need a colossal quantum machine with billions of qubits — the elements used in quantum calculations — to run it. That estimate has come down drastically over the years, falling recently to a million qubits. But it has still always sat comfortably beyond the modest capabilities of existing quantum computers, which typically have just hundreds of qubits.

However, two different groups of researchers have just announced advances that notably reduce the gap between theoretical estimates and real machines. A star-studded team of quantum physicists at the California Institute of Technology went public with a design for a quantum computer that could break encryption with only tens of thousands of qubits and said that it had formed a company to build the machine. And researchers at Google announced that they had developed an implementation of Shor’s algorithm that is ten times as efficient as the best previous method.

Neither company has the hardware to break encryption today. But the results underscore what some quantum physicists had already come to suspect: that powerful quantum computers may be years away, rather than decades. “If you care about privacy or you have secrets, then you better start looking for alternatives,” said Nikolas Breuckmann, a mathematical physicist at the University of Bristol, who did not work on either of the papers.

While the new results may provide a jolt for the policymakers and corporations that guard our digital infrastructure, they also signal the rapid progress that physicists have made toward building machines that will let them more thoroughly explore the quantum world.

“We’re going to actually do this,” said Dolev Bluvstein, a Caltech physicist and CEO of the new company, Oratomic…

[Wood unpacks the history of the development of the technology and explores the challenges that remain; he concludes…]

… If any group succeeds at building a quantum computer that can realize Shor’s algorithm, it will mark the end an era — specifically, the “Noisy Intermediate Scale Quantum” era, as Preskill dubbed the pre-error-correction period in a 2018 paper. Each researcher has a vision for what to pursue first with a machine in the new “fault-tolerant” era.

[Robert] Huang said he would start by running Shor’s algorithm, just to prove that the device works. After that, he said he would try to use it to speed up machine learning — an application to be detailed in coming work.

Most of the architects building quantum computers, whether at Oratomic or other startups, are physicists at heart. They’re interested in physics, not cryptography. Specifically, they’re interested in all the things a computer fluent in the language of quantum mechanics could teach them about the quantum realm, such as what sort of materials might become superconductors even at warm temperatures. Preskill, for his part, would like to simulate the quantum nature of space-time.

The Caltech group knows it has years of work ahead before any of its dreams have a chance of coming true. But the researchers can’t wait to get started. “Pick a cooler life quest than building the world’s first quantum computer with your friends!” said a jubilant Bluvstein, reached by phone shortly before their paper went live, before rushing off to celebrate…

Eminently worth reading in full: “New Advances Bring the Era of Quantum Computers Closer Than Ever,” from @walkingthedot.bsky.social in @quantamagazine.bsky.social.

* David Deutsch, The Fabric of Reality

###

As we prepare, we might take a moment to appreciate just how vastly and deeply the legacy systems challenged by quantum computing run, recalling that on this date in 1959 Mary Hawes, a computer scientist for the Burroughs Corporation held a meeting of computers users, manufacturers, and academics at the University of Pennsylvania aimed at creating a common business oriented programming language. At the meeting, representative Grace Hopper suggested that they ask the Department of Defense to fund the effort to create such a language. Also attending was Charles Phillips who was director of the Data System Research Staff at the DoD and was excited by the possibility of a common language streamlining their operations. He agreed to sponsor the creation of such a language. This was the genesis of what would eventually become the COBOL language.

To this day COBOL is still the most common programming language used in business, finance, and administrative systems for companies and governments, primarily on mainframe systems, with around 200 billion lines of code still in production use… all of which are in question and/or at risk in a world of quantum computing.

source

#COBOL #computerSecurity #computers #computing #crypto #cryptocurrency #culture #GraceHopper #history #MaryHawes #quantum #quantumComputing #Science #security #Technology

Cybersecurity in the Age of Instant Software

AI is rapidly changing how software is written, deployed, and used. Trends point to a future where AIs can write custom software quickly and easily: “instant software.” Taken to an extreme, it might become easier for a user to have an AI write an ... https://www.schneier.com/blog/archives/2026/04/cybersecurity-in-the-age-of-instant-software.html

#computersecurity #vulnerabilities #Uncategorized #cybersecurity #patching #LLM #AI

Cybersecurity in the Age of Instant Software - Schneier on Security

AI is rapidly changing how software is written, deployed, and used. Trends point to a future where AIs can write custom software quickly and easily: “instant software.” Taken to an extreme, it might become easier for a user to have an AI write an application on demand—a spreadsheet, for example—and delete it when you’re done using it than to buy one commercially. Future systems could include a mix: both traditional long-term software and ephemeral instant software that is constantly being written, deployed, modified, and deleted. AI is changing cybersecurity as well. In particular, AI systems are getting better at finding and patching vulnerabilities in code. This has implications for both attackers and defenders, depending on the ways this and related technologies improve...

Schneier on Security

Hands-on web security, 2026-04-09, 12:00

A "Capture the Flag" (#CTF) is an ethical game for learning and practising #computersecurity skills in a legal environment. We will play #OverTheWire Natas, which teaches web application security. To solve each level, you need to find vulnerabilities by inspecting the website's source code, HTTP headers, or cookies, finding hidden directories, injecting SQL code, and more.

Open for all, no registration needed.

More info: https://www.uu.se/en/department/information-technology/events/archive/2026-04-09-cyberrisklab-hands-on-web-security

CyberRiskLab: Hands-on web security – Department of Information Technology – Uppsala University

New Password Stealer Bypasses 2FA—Chrome, Edge And Firefox Targeted https://share.google/yenfqgEdAFJPPYWrm
#2fauth #2FAattack2026 #computersecurity #firefox #chrome #edge
New Password Stealer Bypasses 2FA—Chrome, Edge And Firefox Targeted

This new Storm attack platform can exfiltrate passwords and session data, enabling 2FA bypass. Google Chrome, Microsoft Edge and Mozilla Firefox users have been warned.

Forbes

Ugh! Even after the 18.7.7 update, #Apple *still* nags you to “upgrade” to #iOS v26 though. 😒

Tim Apple, I *don’t* want that silly #LiquidGlass abomination. ✋🏽🙅🏽‍♂️

#Security #UX #ComputerSecurity #iPhone #iPad #DarkSword #Design #Nags #Nagging

We're meeting tonight! Friday 11th Apr at #Glasgow #hackerspace - @thegamerclub at 153 Bath Lane from 6pm 'til late - all welcome!

Hackers, crackers, geeks, hats of any colour, technology enthusiasts, hacktivists, and other like-minded folks are most welcome. We do not judge anyone and everyone has something to contribute, no matter their level of expertise!

Also join us in Matrix at #2600:glasgow.social (invite link: https://glasgow.social/matrix)

#infosec #hacker #computersecurity

You're invited to talk on Matrix

You're invited to talk on Matrix

Every dependency you add is a supply chain attack waiting to happen

Dependencies are a huge supply chain security risk; the more of them you have, and the more often you update, the bigger the attack surface.

Programming Linux Anti-Reversing Techniques by Jacob Baines is free with a Leanpub Reader membership! Or you can buy it for $7.99! https://leanpub.com/anti-reverse-engineering-linux #ComputerSecurity #CAndCpp
Programming Linux Anti-Reversing Techniques

In the 2010s, personal data belonging to millions of Facebook users was collected by British consulting firm Cambridge Analytica for political advertising without informed consent. #MostDiscussed #Internet #InternetCulture #ComputerSecurity #Conservatism #ElectionsAndReferendums https://www.mostdiscussed.com/article/412469
Most Discussed 📖 - Facebook–Cambridge Analytica Data Scandal

The course Cybersecurity Deconstructed by Steve T. is on sale on Leanpub! Its suggested price is $179.00; get it for $89.00 with this coupon: https://leanpub.com/c/cybersecurity-deconstructed/c/LeanpubWeeklySale20260324 #ComputerSecurity #CloudComputing #AmazonWebServices
Cybersecurity Deconstructed

Deep dive into cybersecurity internals. Master network evasion, EDR bypass, post-exploitation, cloud security & malware analysis techniques.