About FUD or Fact
Quantum computing is generating a lot of noise. Some of it is legitimate concern about post-quantum attacks, some of it is overblown fear, and some of it is marketing hype. FUD or Fact exists to cut through the noise.
What We Do
We analyze claims about quantum computing's impact on cryptography and security, particularly concerning post-quantum attack scenarios and their real-world implications, then deliver a clear verdict:
Fear, Uncertainty, and Doubt. The claim is exaggerated, misleading, or false.
Verified truth backed by evidence, research, and expert consensus.
It's complicated. The claim has elements of truth but requires nuance.
Our Approach
Every verdict is backed by:
- Academic research and peer-reviewed papers
- Official standards from NIST, IETF, and other bodies
- Expert consensus from the cryptographic community
- Practical, real-world considerations
Understanding Post-Quantum Attacks
A post-quantum attack refers to cryptographic attacks that leverage quantum computing capabilities, specifically using algorithms like Shor's algorithm (for breaking RSA and ECC) or Grover's algorithm (for weakening symmetric encryption). We analyze claims about when such attacks might become practical and what systems are truly at risk.
Why This Matters
The transition to post-quantum cryptography is one of the largest cryptographic migrations in history. Organizations need accurate information to make good decisions. Fear-mongering leads to poor security choices. Complacency leads to unpreparedness.
We aim to provide the balanced, evidence-based perspective needed to navigate the post-quantum transition and protect against future quantum threats.
Contact
Have a claim you'd like us to investigate? Found an error in our analysis?
Reach out at hello@fudorfact.com