Gather 'round classical friends and semiquantum adversaries, it's story fucking time.

You may have heard of this fun new thing called "quantum key distribution" that uses the laws of physics to guarantee secure, unbreakable encryption. The first demonstration of QKD, known as "BB84" after its authors and the fact that it was built in 1984, had a bit of a problem, though. Sure, it was unbreakable but the mirrors used to send bits made different sounds based on whether they were sending a 0 or 1.

So you didn't need to "break" BB84, you just needed to sit there with a microphone and you could read out the whole key. It doesn't matter how much physics guarantees the safety of your encryption if you go and tell the adversary what your key is.

For BB84, that deeply did not matter, it was a proof of principle. But in the 41 years since, that problem — that side channels exist — keeps getting forgotten.

A lot of current QKD devices use what are called "single-photon regime CCDs" as part of how they work. Those devices have a well-known problem that if you shine a very bright light on them, you can synthesize whatever output you'd like them to produce. An attacker can basically remotely control your QKD system that way and make it produce a fake key that they already know.

A bit over a decade ago, my partner @crazy4pi314 got their PhD in large part by showing that if you shine an *even brighter* laser into commercial QKD systems, you can even destroy the detectors they use to prevent that kind of attack. That attack involves things like putting 60W of laser power down a telecom fiber, but they came up with novel ways of doing so, despite that being wildly out of safety specs.

It's very fun work.

So like, QKD is probably useful in some ways, but the biggest practical challenge with it is always finding out how to not either let your attacker control the QKD system or leak your key to the attacker once you have it. Physics doesn't help you with either of those parts of the problem.

This is a thread about adopting PQC for security while also adding AI to all of your fucking data handling workflows.

Like, PQC is good, I like PQC to the extent that I have the expertise necessary to have an opinion such as "I like PQC." But I am not personally helped by an institution that holds custodianship over my data adopting PQC if they also just directly give my data to nefarious actors like the US government or Anthropic or Palantir.

This is why I say that Y2Q / q-day discourse is a great thing for very specific infosec contexts, and is actively irrelevant to laypeople outside those contexts.

My *personal* infosec posture is not affected by quantum computing, full stop. It's affected by that my data is held by people who do not share my interests, who do not hold that data responsibly, who do wildly fucking malicious things with that data, and who extract that data from me by using designed-in vulnerabilities like "tracking pixels," "facial recognition cameras," "AI transcription of doctor's appointments," and "routers that funnel shit to the NSA."

Your infosec posture may be affected by QC and thus you might be more interested in questions like whether FTQC at cryptographically relevant scales is closer to 20 or 100 years away. I'm not you, I'm not an infosec expert, and while I was once one of the world's foremost experts on several topics within QC that are relevant to the discussion I have since retired from that field. I'm also not your consultant, and I do not accept liability for you.

I'm talking about my personal posture.