FUD or Fact ?
Separating quantum computing hype from reality.
Evidence-based analysis of cryptographic threats and solutions.
Latest Verdicts
View all →RSA and ECC are vulnerable to quantum attacks
FACTShor's algorithm can efficiently factor large integers and solve discrete logarithms, breaking RSA and elliptic curve cryptography. This is mathematically proven.
Quantum computers will break all encryption by 2030
FUDWhile quantum computing poses real threats to some cryptographic systems, claims of imminent total cryptographic collapse are overblown. Post-quantum cryptography standards are already being deployed.
Harvest Now, Decrypt Later is a real threat
FACTNation-state actors are collecting encrypted data today to decrypt once quantum computers are available. Organizations with long-term secrets should migrate to post-quantum cryptography now.
Bitcoin will collapse when quantum computers arrive
MIXEDWhile Bitcoin's ECDSA signatures are theoretically vulnerable, the threat timeline is uncertain and migration paths exist. Panic is unwarranted, but preparation is prudent.
AES-256 is quantum-safe
MIXEDGrover's algorithm reduces AES-256 security to ~128 bits against quantum attacks. This is still considered secure, but 'quantum-safe' is an oversimplification.
We need to replace all cryptography immediately
FUDA measured, risk-based transition to post-quantum cryptography is appropriate. Panic-driven wholesale replacement creates more risk than it prevents.
From the Blog
View all →Stay Informed
Get our weekly digest of quantum computing news, fact-checks, and expert analysis delivered to your inbox.
No spam. Unsubscribe anytime.
Have a claim to verify?
Heard something about quantum computing and cryptography that sounds suspicious? We'll investigate and deliver a verdict.