Skip to main content

About FUD or Fact

Quantum computing is generating a lot of noise. Some of it is legitimate concern about post-quantum attacks, some of it is overblown fear, and some of it is marketing hype. FUD or Fact exists to cut through the noise.

What We Do

We analyze claims about quantum computing's impact on cryptography and security, particularly concerning post-quantum attack scenarios and their real-world implications, then deliver a clear verdict:

FUD

Fear, Uncertainty, and Doubt. The claim is exaggerated, misleading, or false.

FACT

Verified truth backed by evidence, research, and expert consensus.

MIXED

It's complicated. The claim has elements of truth but requires nuance.

Our Approach

Every verdict is backed by:

  • Academic research and peer-reviewed papers
  • Official standards from NIST, IETF, and other bodies
  • Expert consensus from the cryptographic community
  • Practical, real-world considerations

Understanding Post-Quantum Attacks

A post-quantum attack refers to cryptographic attacks that leverage quantum computing capabilities, specifically using algorithms like Shor's algorithm (for breaking RSA and ECC) or Grover's algorithm (for weakening symmetric encryption). We analyze claims about when such attacks might become practical and what systems are truly at risk.

Why This Matters

The transition to post-quantum cryptography is one of the largest cryptographic migrations in history. Organizations need accurate information to make good decisions. Fear-mongering leads to poor security choices. Complacency leads to unpreparedness.

We aim to provide the balanced, evidence-based perspective needed to navigate the post-quantum transition and protect against future quantum threats.

Contact

Have a claim you'd like us to investigate? Found an error in our analysis?
Reach out at hello@fudorfact.com