Signal chat out of context.
Leading cryptography (ISE Crypto) at Google.
Opinions my own.
Content usually badly explained mathematics
| profession | cryptography engineer |
| hobby | Kerbal Space Program |
| hobby | Lego |
| hobby | Factory Sim Games |
Leading cryptography (ISE Crypto) at Google.
Opinions my own.
Content usually badly explained mathematics
| profession | cryptography engineer |
| hobby | Kerbal Space Program |
| hobby | Lego |
| hobby | Factory Sim Games |
And now also on Ars Technica:
Signal chat out of context.
Oh, and in case you weren't having enough fun, here are some updated resource estimates for running Shor's on elliptic curves, unfortunately weirdly focused on cryptocurrencies.
Fun fact: I almost found a soundness problem in that zero knowledge proof that was based on a quine. Unfortunately the circuit cannot produce quines.
Are we having fun yet?

Quantum computers have the potential to perform computational tasks beyond the reach of classical machines. A prominent example is Shor's algorithm for integer factorization and discrete logarithms, which is of both fundamental importance and practical relevance to cryptography. However, due to the high overhead of quantum error correction, optimized resource estimates for cryptographically relevant instances of Shor's algorithm require millions of physical qubits. Here, by leveraging advances in high-rate quantum error-correcting codes, efficient logical instruction sets, and circuit design, we show that Shor's algorithm can be executed at cryptographically relevant scales with as few as 10,000 reconfigurable atomic qubits. Increasing the number of physical qubits improves time efficiency by enabling greater parallelism; under plausible assumptions, the runtime for discrete logarithms on the P-256 elliptic curve could be just a few days for a system with 26,000 physical qubits, while the runtime for factoring RSA-2048 integers is one to two orders of magnitude longer. Recent neutral-atom experiments have demonstrated universal fault-tolerant operations below the error-correction threshold, computation on arrays of hundreds of qubits, and trapping arrays with more than 6,000 highly coherent qubits. Although substantial engineering challenges remain, our theoretical analysis indicates that an appropriately designed neutral-atom architecture could support quantum computation at cryptographically relevant scales. More broadly, these results highlight the capability of neutral atoms for fault-tolerant quantum computing with wide-ranging scientific and technological applications.
USA, March 2026.
Photo by Etienne Laurent / AFP / Getty
LAPD officers arrest a protester dressed as Lady Liberty in chains during the “No Kings” national day of protest in Los Angeles on March 28, 2026.
When I was a teenager in the '90s, my boyfriend at the time gave me his old skateboard.
The trucks and wheels were fine, but the deck was heavily used and the design had been scraped off most of the bottom, so I took some paint markers and decorated it by painting a black and white checkerboard background with a large stormtrooper head in the foreground because Star Wars and ska were two of my favorite things at the time.
I was mostly just a poser and barely rode it and it remained in the back of my car for several years until I was at a sporting goods store and saw a kid doing tricks on a demo deck and I told him he was really good and he said "Thanks! I have to practice here because I don’t have a skateboard."
At that moment, I remembered my backseat skateboard and told him he could have it, but warned him that the "graphic" was kind of nerdy so he was more than welcome to draw/paint over it.
I went out to my car and grabbed the skateboard and brought it to the front of the store where the kid was waiting and he flipped it over and said "Whoa! Star Wars and ska?!? These are two of my favorite things!"
I’m so glad that skateboard finally found the right owner.
Google is dramatically shortening its deadline readiness for the arrival of Q Day, the point at which existing quantum computers can break public-key cryptography algorithms that secure decades’ worth of secrets belonging to militaries, banks, governments, and nearly every individual on earth.