this post was submitted on 16 Sep 2025
74 points (96.2% liked)

Technology

75406 readers
1647 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] wetbeardhairs@lemmy.dbzer0.com 16 points 1 week ago* (last edited 1 week ago) (7 children)

AFAIK quantum computing's only demonstrations of being able to break encryption using Shore's algorithm was in a toy problem where they already knew the answer and it was like 5 bits long and satisfied a particularly easy pattern. I'll be impressed when it can break 192-bit encryption with proper entropy.

[–] truthfultemporarily@feddit.org 21 points 1 week ago (1 children)

The threat model is that all communication is recorded and will be decrypted once the technology becomes available. The question then becomes for how long you want your data to be secure. If its for example 40 years, you need to chose an algorithm today that is still secure in 40 years.

load more comments (5 replies)