<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[The Quantum Observer]]></title><description><![CDATA[A weekly peek inside the quantum box - news, breakthroughs, and security insights for a post-quantum future.]]></description><link>https://thequantumobserver.com</link><image><url>https://substackcdn.com/image/fetch/$s_!6K8F!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f94880a-d777-41da-a93e-4b42b513c26c_1280x1280.png</url><title>The Quantum Observer</title><link>https://thequantumobserver.com</link></image><generator>Substack</generator><lastBuildDate>Thu, 16 Apr 2026 05:48:33 GMT</lastBuildDate><atom:link href="https://thequantumobserver.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Marin Ivezic]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[thequantumobserver@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[thequantumobserver@substack.com]]></itunes:email><itunes:name><![CDATA[Marin Ivezic]]></itunes:name></itunes:owner><itunes:author><![CDATA[Marin Ivezic]]></itunes:author><googleplay:owner><![CDATA[thequantumobserver@substack.com]]></googleplay:owner><googleplay:email><![CDATA[thequantumobserver@substack.com]]></googleplay:email><googleplay:author><![CDATA[Marin Ivezic]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Quantum Observer #6 — The Third Lever]]></title><description><![CDATA[Architecture joins algorithms in shrinking the path to CRQC. Cloudflare matches Google's 2029 deadline. And China's quantum strategy is more coordinated than the West admits.]]></description><link>https://thequantumobserver.com/p/quantum-observer-6-the-third-lever</link><guid isPermaLink="false">https://thequantumobserver.com/p/quantum-observer-6-the-third-lever</guid><dc:creator><![CDATA[Marin Ivezic]]></dc:creator><pubDate>Sun, 12 Apr 2026 08:44:13 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!vye4!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F350e3ee0-96b8-4fb6-bcd7-e4522a99abbe_2200x1400.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!vye4!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F350e3ee0-96b8-4fb6-bcd7-e4522a99abbe_2200x1400.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!vye4!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F350e3ee0-96b8-4fb6-bcd7-e4522a99abbe_2200x1400.jpeg 424w, https://substackcdn.com/image/fetch/$s_!vye4!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F350e3ee0-96b8-4fb6-bcd7-e4522a99abbe_2200x1400.jpeg 848w, https://substackcdn.com/image/fetch/$s_!vye4!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F350e3ee0-96b8-4fb6-bcd7-e4522a99abbe_2200x1400.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!vye4!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F350e3ee0-96b8-4fb6-bcd7-e4522a99abbe_2200x1400.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!vye4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F350e3ee0-96b8-4fb6-bcd7-e4522a99abbe_2200x1400.jpeg" width="1456" height="927" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/350e3ee0-96b8-4fb6-bcd7-e4522a99abbe_2200x1400.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:927,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1126953,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://thequantumobserver.com/i/193948678?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F350e3ee0-96b8-4fb6-bcd7-e4522a99abbe_2200x1400.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!vye4!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F350e3ee0-96b8-4fb6-bcd7-e4522a99abbe_2200x1400.jpeg 424w, https://substackcdn.com/image/fetch/$s_!vye4!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F350e3ee0-96b8-4fb6-bcd7-e4522a99abbe_2200x1400.jpeg 848w, https://substackcdn.com/image/fetch/$s_!vye4!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F350e3ee0-96b8-4fb6-bcd7-e4522a99abbe_2200x1400.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!vye4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F350e3ee0-96b8-4fb6-bcd7-e4522a99abbe_2200x1400.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://thequantumobserver.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://thequantumobserver.com/subscribe?"><span>Subscribe now</span></a></p><p><em><strong>In this edition:</strong> After last edition's coverage of three papers that rewrote the resource estimation math, I jokingly asked quantum researchers to give me a few days to catch up before publishing the next breakthrough. They did not listen, and this edition may be even more consequential. This week's lead is a paper I consider more strategically important than any of March's blockbusters: Q-CTRL published a heterogeneous architecture design that cuts RSA-2048 to 190,000&#8211;381,000 physical qubits &#8212; not by inventing a new algorithm, but by organizing the hardware like a classical computer. Architecture is now the third independent lever compressing CRQC resource estimates, alongside algorithmic and QEC code innovation. Cloudflare joined Google in setting 2029 as its PQC migration deadline, explicitly citing last month's papers as the catalyst. Two companies that collectively operate much of the internet's infrastructure now agree on the timeline. QuiX Quantum put photonics on the board with the first below-threshold error mitigation result, one day after my CRQC Scorecard said photonics had scored zero on every metric. I also completed one of my most ambitious projects yet: a 10-article Deep Dive series examining every dimension of China's quantum program, with a capstone arguing that if current trends hold, China will win the quantum race. The PQC Migration Framework crossed 10,000 downloads, and the most common feedback revealed something troubling about how organizations are approaching migration. And in the "quantum flapdoodle" department: the physics of Ghost Murmur don't survive contact with a calculator.</em></p><div><hr></div><h2>The Paper Nobody Is Talking About Enough: Architecture as the Third Lever</h2><p>Last month&#8217;s parade of resource estimation papers (<a href="https://postquantum.com/security-pqc/google-quantum-bitcoin-ecdlp/">Google&#8217;s 500,000-qubit Bitcoin result</a>, <a href="https://postquantum.com/security-pqc/10000-qubits-shors/">Oratomic&#8217;s 10,000-qubit Shor&#8217;s</a>, <a href="https://postquantum.com/security-pqc/algorithm-quantum-ecc/">the INRIA ECC optimization pipeline</a>) all shared a common lever: making the <em>algorithm</em> more efficient. A second line of work, <a href="https://postquantum.com/quantum-computing/quantum-low-density-parity-check-qldpc-codes/">qLDPC codes</a> and similar constructions, attacks the <em>error correction</em> overhead. Both are important, and I spent the last newsletter unpacking them.</p><p>This week, <a href="https://postquantum.com/security-pqc/architecture-heterogeneous-crqc-q-ctrl/">Q-CTRL published a paper</a> that demonstrates a <strong>third independent lever</strong>: <em>architecture</em>. Not a new algorithm. Not exotic error correction codes. Just a smarter way to organize the same computation across specialized hardware with the result of a reduction to 190,000&#8211;381,000 physical qubits for RSA-2048, with a runtime of under 10 days.</p><p>The core insight is almost embarrassingly simple: in <a href="https://postquantum.com/quantum-research/quantum-breakthrough-rsa-2048/">Gidney&#8217;s efficient implementation of Shor&#8217;s algorithm</a>, each qubit sits idle for roughly 97% of all clock cycles. In a monolithic quantum computer, those idle qubits occupy the same expensive, actively error-corrected hardware as the working qubits. They accumulate errors, consume cryogenic cooling, and demand dense wiring, all while doing nothing. Q-CTRL&#8217;s Q-NEXUS architecture fixes this by separating processing from storage: a tiny superconducting QPU (three logical qubits per core) handles the fast gates, while idle qubits get shipped to quantum memory, connected via a quantum bus.</p><p>I&#8217;ve been arguing for years that the most likely path to a CRQC is a <a href="https://postquantum.com/quantum-computing/heterogenous-quantum-computer/">heterogeneous system</a> rather than a monolithic chip. Q-CTRL&#8217;s paper is the most rigorous validation of this thesis on a real cryptographic benchmark.</p><h3>Why Three Levers Matter More Than Any Single Paper</h3><p>What I want security planners to internalize: these three levers &#8212; algorithms, QEC codes, and architecture &#8212; are largely independent. They multiply rather than add. The RSA-2048 trajectory tells the story: 20 million qubits (2021) &#8594; ~1 million (2025) &#8594; ~100,000 with qLDPC codes (2026) &#8594; 190,000&#8211;381,000 with architecture alone on surface codes (2026) &#8594; potentially well under 100,000 combining all three. That last number is starting to overlap with industry roadmaps for the late 2020s to early 2030s.</p><p>Q-CTRL also introduces the concept of the Application-Specific QPU &#8212; the quantum equivalent of a GPU or ASIC. They found that 70% of the RSA-2048 runtime is consumed by a single subroutine, the Adder. A dedicated 37-logical-qubit accelerator for that operation cuts runtime by 46% for a 13% hardware increase. An adversary building a CRQC wouldn&#8217;t construct a general-purpose quantum mainframe &#8212; they&#8217;d build a purpose-optimized system, just as Bitcoin miners use ASICs rather than CPUs.</p><p>The caveats are real: the quantum bus (high-fidelity Bell-pair transfer between modules) hasn&#8217;t been demonstrated at scale, the memory technologies are early-stage, and the compiler is simulated. I document all of them in my <a href="https://postquantum.com/security-pqc/architecture-heterogeneous-crqc-q-ctrl/">full analysis</a>. But these are engineering gaps, not physics barriers.</p><p>The strategic implication: the race to Q-Day may now be fundamentally a quantum interconnect race. The traditional threat indicator has been &#8220;how many qubits can platform X fabricate?&#8221; The new one should be &#8220;who has demonstrated high-fidelity quantum state transfer between a fast-clock QPU and a slow-clock memory?&#8221; I&#8217;ll be updating my <a href="https://postquantum.com/post-quantum/crqc-scorecard-how-close/">CRQC Scorecard</a> to add quantum interconnect maturity as a new tracking metric.</p><div><hr></div><h2>Cloudflare Joins Google: The 2029 Consensus Is Forming</h2><p>Two weeks ago, <a href="https://postquantum.com/security-pqc/google-pqc-migration-2029/">Google set 2029 as its deadline for completing PQC migration</a>. I wrote at the time that the question was whether this would remain an outlier or become the benchmark.</p><p>We got our answer in thirteen days.</p><p><a href="https://postquantum.com/security-pqc/cloudflare-pqc-2029/">Cloudflare announced it is accelerating its post-quantum roadmap to match Google&#8217;s 2029 target</a>, explicitly citing last month&#8217;s Google ECC paper and Oratomic&#8217;s 10,000-qubit result as the catalysts. This isn&#8217;t a marketing gesture. Cloudflare handles DNS, CDN, DDoS protection, and reverse-proxy services for a substantial fraction of global web traffic. Between Google and Cloudflare, the companies that actually operate the internet&#8217;s plumbing have converged on the same number.</p><p>Three details in Cloudflare&#8217;s announcement deserve attention.</p><p><strong>First</strong>, Cloudflare reports that over 65% of human-initiated traffic to its network already uses post-quantum encryption. But the new roadmap targets the harder problem: post-quantum authentication. Digital signatures, certificates, identity infrastructure. This is the domain of <a href="https://postquantum.com/post-quantum/trust-now-forge-later/">Trust Now, Forge Later (TNFL)</a>, a threat I first described in 2018 that&#8217;s finally getting the attention it warrants.</p><p><strong>Second</strong>, the announcement quotes Scott Aaronson&#8217;s warning that researchers working on Shor&#8217;s algorithm resource estimates may have already stopped publishing their findings. If the world&#8217;s top quantum algorithm researchers are sitting on optimizations that make the published numbers even worse, the public resource estimates are an upper bound on difficulty, not a best estimate. That should concern anyone using published qubit counts for threat planning.</p><p><strong>Third</strong>, this is exactly the dynamic I described in <a href="https://postquantum.com/q-day/q-day-deadlines-set/">Q-Day Predictions Are Irrelevant &#8212; Deadlines Are Set</a>. The reason to act on PQC isn&#8217;t a specific Q-Day prediction &#8212; it&#8217;s that the ecosystem is setting deadlines regardless of when a CRQC arrives. If your cryptographic infrastructure interfaces with Google&#8217;s or Cloudflare&#8217;s, and whose doesn&#8217;t?, you now have a deadline whether you set one or not.</p><div><hr></div><h2>Photonics Puts Its First Points on the Board</h2><p>I published my <a href="https://postquantum.com/post-quantum/crqc-scorecard-how-close/">CRQC Scorecard</a> on April 1st. The photonic section was the starkest: zero demonstrated logical qubits, zero logical gates, effectively the entire journey remaining on every metric.</p><p>That lasted exactly one day.</p><p><a href="https://postquantum.com/quantum-research/quix-first-below-threshold-photonic/">QuiX Quantum demonstrated below-threshold error mitigation on a photonic quantum computer</a> &#8212; the first time any photonic platform has shown it can remove more errors than it introduces. The work, in collaboration with NASA, the University of Twente, and Freie Universit&#228;t Berlin, used a 20-mode silicon-nitride processor to perform photon distillation: a technique that cleans up individual photons through quantum interference before computation.</p><p>Let me be precise about what this is and isn&#8217;t. Photon distillation is not quantum error correction. It is not a logical qubit. It doesn&#8217;t demonstrate syndrome extraction, magic state production, or any of the system-level capabilities in my <a href="https://postquantum.com/post-quantum/crqc-quantum-capability-framework/">CRQC Quantum Capability Framework</a>. Photonics still has the largest gap to a CRQC of any modality I track.</p><p>But it&#8217;s the first time photonics has put points on the board. The modeling suggests photon distillation could reduce photon source requirements per logical qubit by up to 4&#215;, directly attacking photonics&#8217; biggest scalability bottleneck, since photon sources constitute the vast majority of components in a photonic quantum computer.</p><p>There&#8217;s also a detail worth noting: the project was partially funded by the Netherlands Ministry of Defense through a project called QSHOR. The name tells you what the defense establishment is interested in: photonic paths toward running Shor&#8217;s algorithm.</p><p>Full analysis in my <a href="https://postquantum.com/quantum-research/quix-first-below-threshold-photonic/">QuiX deep dive</a>.</p><div><hr></div><h2>China&#8217;s Quantum Ambition: The Deep Dive Is Complete</h2><p>I&#8217;ve just completed one of the most ambitious research projects I&#8217;ve undertaken on PostQuantum.com: a <a href="https://postquantum.com/chinas-quantum-ambition/">10-article Deep Dive series</a> that took months of investigation and runs to roughly 80,000 words across industrial policy, investment architecture, the Hefei National Laboratory, talent pipelines, quantum networking and QKD, computing hardware, quantum sensing, supply chain self-sufficiency, and a capstone synthesis.</p><p>The capstone, <a href="https://postquantum.com/sovereignty-geopolitics/china-quantum-ambition/underestimating-china-quantum-race/">Underestimating China: Why Beijing Could Win the Quantum Race</a>, makes a case I expect will be contested: if nothing changes in current trend lines, China will win the quantum cold war.</p><p>That isn&#8217;t because China&#8217;s quantum hardware is better today. It isn&#8217;t &#8212; the error correction gap is real, and the private sector ecosystem is weaker. The case rests on something more structural. Across EVs, 5G, drones, robotics, solar, and shipbuilding, China has executed the same playbook: massive coordinated investment, long-horizon industrial policy, rapid talent scaling, and systematic conversion of Western export controls into accelerants for domestic self-sufficiency. That playbook is now pointed at quantum computing. China leads in 69 of 74 critical technologies tracked by ASPI. It operates the world&#8217;s only carrier-grade quantum network. It has exported its first quantum computer.</p><p>What makes this particularly dangerous is the asymmetry of institutional response. While China mobilizes government, military, state enterprises, and academia as a single coordinated system, the U.S. proposed cutting NSF quantum research funding by 37%. Scientists are leaving U.S. institutions for Chinese universities. Over 1,000 U.S. faculty signed a letter warning that America&#8217;s own policies have been more effective at driving talent to China than any recruitment program Beijing ever ran.</p><p>I documented China&#8217;s weaknesses honestly &#8212; the growing scientific isolation, the dependence on Western cryogenic components, the weak translation from research to commercial products. But the series also shows how systematically those weaknesses are being addressed, often with timelines measured in years rather than decades.</p><p>I lived and worked in China for years. I&#8217;ve watched industry after industry where Western executives dismissed Chinese competition, confident that quality gaps and IP challenges would hold. They were wrong every time. The full series is at <a href="https://postquantum.com/chinas-quantum-ambition/">postquantum.com/chinas-quantum-ambition</a>, and the geopolitical dimensions are explored further in my forthcoming book, <a href="https://quantumsovereignty.org">Quantum Sovereignty</a>.</p><div><hr></div><h2>10,000 Downloads &#8212; and a Pattern in the Feedback</h2><p>The <a href="https://pqcframework.com">PQC Migration Framework</a> crossed 10,000 downloads this week. What people told me about it was more interesting than the number itself.</p><p>The most common response wasn&#8217;t gratitude or even disagreement &#8212; it was some version of alarm. Teams that thought they had a handle on PQC migration discovered that their internal approach was missing entire categories of work: cryptographic discovery beyond certificate inventories, vendor dependency analysis that typically defines the real critical path, hybrid deployment patterns that don&#8217;t break interoperability, governance structures for a multi-year program rather than a one-off project.</p><p>That pattern in the feedback confirmed something I&#8217;d suspected: many organizations that started thinking about PQC migration this year are working from a mental model of the problem that&#8217;s an order of magnitude too simple. The complexity isn&#8217;t in swapping one algorithm for another. It&#8217;s in finding every place cryptography lives in your environment &#8212; hardcoded keys, embedded protocols, third-party dependencies buried four layers deep in your supply chain &#8212; and managing a migration across thousands of systems with different vendor timelines, different regulatory requirements, and different tolerance for disruption.</p><p>The framework is free, open-source (CC BY 4.0), requires no registration, and is available at <a href="https://pqcframework.com">pqcframework.com</a>. If you&#8217;ve started your quantum readiness journey, or think you have, stress-test your approach against it. The teams that had to restart weren&#8217;t behind &#8212; they&#8217;d been solving a simpler problem than the one they actually face. For a comprehensive guide to the organizational strategy behind all of this, my forthcoming book <a href="https://quantumready.com">Quantum Ready</a> covers the full picture.</p><div><hr></div><h2>Quantum Flapdoodle: Ghost Murmur and the Limits of Journalism</h2><p>Every edition needs a reminder that the word &#8220;quantum&#8221; doesn&#8217;t make a claim true. This week delivered a spectacular example.</p><p>The New York Post reported that the CIA used a system called &#8220;Ghost Murmur&#8221;, described as a quantum magnetometer built by Lockheed Martin&#8217;s Skunk Works, to detect a downed American airman&#8217;s heartbeat from 40 miles away in the Iranian desert. The story went viral across defense blogs, investment sites, and cable news. Lockheed Martin&#8217;s stock ticked up. Nobody called a physicist.</p><p>The problem isn&#8217;t that quantum magnetometry is fake &#8212; it&#8217;s genuinely impressive science. The problem is arithmetic. The heart produces a magnetic field of roughly 25 picotesla at chest contact which is already two million times weaker than Earth&#8217;s background field. That signal decays as the cube of distance. At 40 miles, you&#8217;re looking at a signal roughly 190 quadrillion times weaker than it is at the chest. This isn&#8217;t below the noise floor. It&#8217;s below the Heisenberg limit &#8212; the absolute measurement floor that quantum mechanics permits for <em>any</em> sensor, built by <em>anyone</em>, using <em>any</em> technology, now or in the future.</p><p>Scientific American has since <a href="https://www.scientificamerican.com/article/what-is-the-quantum-ghost-murmur-purportedly-used-in-iran-scientists/">published a thorough debunking</a>, quoting physicists who range from diplomatic (&#8221;may overstate the maturity of the technology&#8221;) to blunt (&#8221;somebody yanking a reporter&#8217;s chain&#8221;). Ghost Murmur is most likely either deliberate disinformation designed to project capability to adversaries, or the intelligence community&#8217;s idea of an inside joke.</p><p>The actual quantum sensing research happening around the world is remarkable and worth covering seriously. </p><div><hr></div><h2>The Signal Through the Noise</h2><p>Take a step back and look at what&#8217;s happened since the last newsletter.</p><p>Resource estimates for breaking cryptography gained a third compression lever &#8212; architecture &#8212; that&#8217;s independent of and multiplies with algorithmic and QEC code improvements. A second internet infrastructure giant converged on 2029 as the PQC migration deadline, explicitly because the research scared them. A quantum modality that had scored zero on every CRQC metric put its first points on the board. And a comprehensive 10-article analysis of China&#8217;s quantum program suggests the West&#8217;s biggest competitor is executing a more coordinated strategy than most observers realize.</p><p>How many signals does one need?</p><p>The arguments for inaction are running out. The <a href="https://pqcframework.com">PQC Migration Framework</a> is free. The <a href="https://postquantum.com/crqc-readiness-benchmark-q-day-estimator/">Q-Day Estimator</a> can help you model the timeline. The <a href="https://postquantum.com/post-quantum/practical-steps-quantum/">Practical Steps to Quantum Readiness</a> guide will walk you through where to start. And if your leadership still thinks this is a problem for next year, remind them: <a href="https://postquantum.com/q-day/q-day-deadlines-set/">the deadlines are already set</a>.</p><div><hr></div><p><em>If you found this edition useful, forward it to a colleague who&#8217;s still on the fence about quantum risk. If I got something wrong, hit reply &#8212; I read everything and correct publicly. And if you&#8217;re new here, the full PostQuantum.com resource library is at <a href="https://postquantum.com">postquantum.com</a> for the deep dives behind every topic covered above.</em></p><p><em>&#8212; Marin</em></p>]]></content:encoded></item><item><title><![CDATA[Quantum Observer #5 — The Walls Are Closing In (From Both Sides)]]></title><description><![CDATA[In a single week, three papers rewrote the math on how soon quantum computers could break your encryption. And a quiet silicon result may have added another path to get there]]></description><link>https://thequantumobserver.com/p/quantum-observer-5-the-walls-are</link><guid isPermaLink="false">https://thequantumobserver.com/p/quantum-observer-5-the-walls-are</guid><dc:creator><![CDATA[Marin Ivezic]]></dc:creator><pubDate>Wed, 01 Apr 2026 16:22:27 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!LREV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9eb31f0-e725-4d5e-b68a-5359feaae497_1200x796.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!LREV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9eb31f0-e725-4d5e-b68a-5359feaae497_1200x796.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!LREV!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9eb31f0-e725-4d5e-b68a-5359feaae497_1200x796.jpeg 424w, https://substackcdn.com/image/fetch/$s_!LREV!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9eb31f0-e725-4d5e-b68a-5359feaae497_1200x796.jpeg 848w, https://substackcdn.com/image/fetch/$s_!LREV!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9eb31f0-e725-4d5e-b68a-5359feaae497_1200x796.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!LREV!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9eb31f0-e725-4d5e-b68a-5359feaae497_1200x796.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!LREV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9eb31f0-e725-4d5e-b68a-5359feaae497_1200x796.jpeg" width="1200" height="796" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b9eb31f0-e725-4d5e-b68a-5359feaae497_1200x796.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:796,&quot;width&quot;:1200,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:868221,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://thequantumobserver.com/i/192860655?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9eb31f0-e725-4d5e-b68a-5359feaae497_1200x796.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!LREV!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9eb31f0-e725-4d5e-b68a-5359feaae497_1200x796.jpeg 424w, https://substackcdn.com/image/fetch/$s_!LREV!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9eb31f0-e725-4d5e-b68a-5359feaae497_1200x796.jpeg 848w, https://substackcdn.com/image/fetch/$s_!LREV!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9eb31f0-e725-4d5e-b68a-5359feaae497_1200x796.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!LREV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9eb31f0-e725-4d5e-b68a-5359feaae497_1200x796.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://thequantumobserver.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://thequantumobserver.com/subscribe?"><span>Subscribe now</span></a></p><p></p><p><em><strong>In this edition:</strong> The biggest week in quantum resource estimation just happened, and I don&#8217;t think most people have processed what it means. Google Quantum AI published a landmark paper showing fewer than 500,000 superconducting qubits could break Bitcoin&#8217;s ECC-256 cryptography in under nine minutes. On the same day, Oratomic and Caltech showed the same attack could work with just 10,000 neutral atom qubits &#8212; at the cost of months of runtime. Weeks earlier, the same French team behind last year&#8217;s RSA breakthrough turned their optimization pipeline on elliptic curves. I unpack all three papers and explain why the convergence matters more than any single result. I also introduce my new CRQC Scorecard &#8212; a modality-by-modality assessment of how close each quantum platform actually is to cryptographic relevance &#8212; and the updated Q-Day Estimator tool. On the policy front, the U.S. intelligence community just elevated quantum to the same threat tier as AI, and Google drew a hard line: full PQC migration by 2029. To help with that migration, I&#8217;ve released the complete Applied Quantum PQC Migration Framework under Creative Commons &#8212; freely available at PQCframework.com. Then in the second half, I cover the story that nobody noticed: silicon quantum computing just ticked its last box on the fault-tolerance checklist, and it happened in Shenzhen.</em></p><div><hr></div><h2>The Resource Estimation Revolution: Three Papers That Redrew the Map</h2><p>For years, the standard answer to &#8220;how many qubits to break encryption?&#8221; was a comfortably large number. Gidney and Eker&#229;&#8217;s 2021 estimate put RSA-2048 at roughly 20 million physical qubits. That figure became a security blanket for organizations that wanted to delay action &#8212; 20 million qubits felt safely impossible.</p><p>In the span of a few weeks this March, three separate research teams tore that security blanket to shreds. Not by building bigger quantum computers, but by finding dramatically more efficient ways to use smaller ones. And critically, the three papers aren&#8217;t independent &#8212; they build on and reference each other, forming a coherent body of evidence that the algorithmic side of the <a href="https://postquantum.com/post-quantum/crqc/">CRQC</a> problem is advancing far faster than most threat models assume.</p><h3>Google&#8217;s Bitcoin Paper: 500,000 Qubits, Nine Minutes</h3><p>The headline-grabber landed on March 31. Google Quantum AI published what I consider <a href="https://postquantum.com/security-pqc/google-quantum-bitcoin-ecdlp/">the most significant quantum cryptanalysis resource estimate since Gidney&#8217;s 2021 RSA paper</a>. The target: the elliptic curve discrete logarithm problem on 256-bit curves &#8212; the cryptography that protects Bitcoin, Ethereum, and the overwhelming majority of TLS sessions on the internet.</p><p>The core numbers: fewer than 500,000 superconducting physical qubits to solve ECDLP-256 in under nine minutes on a fast-clock architecture. That&#8217;s roughly a 10x reduction over the best prior estimates for this problem.</p><p>How? The improvements aren&#8217;t a single trick but an entire pipeline of optimizations &#8212; more efficient windowed arithmetic, better modular inversion circuits, tighter Toffoli-to-T compilations, and crucially, a compressed spacetime volume that shifts difficulty from qubit count to circuit depth. The paper also includes something genuinely novel: a zero-knowledge proof that the published circuits are correct, allowing independent verification without revealing proprietary compilation details.</p><p>But here&#8217;s the nuance that matters for CISOs reading this: a 9-minute attack window against ECC-256 has very different implications depending on the protocol. For <a href="https://postquantum.com/post-quantum/harvest-now-decrypt-later-hndl/">harvest-now-decrypt-later (HNDL)</a> attacks against stored data, runtime barely matters &#8212; an attacker with a CRQC can take as long as they need. For real-time attacks against Bitcoin transactions, the 9-minute window is operationally significant. Bitcoin&#8217;s confirmation time is roughly 10 minutes, meaning a sufficiently powerful quantum computer could theoretically forge a transaction before it&#8217;s confirmed. The full analysis is in <a href="https://postquantum.com/security-pqc/google-quantum-bitcoin-ecdlp/">my deep dive on the Google paper</a>.</p><h3>Oratomic&#8217;s Bombshell: 10,000 Qubits (But Read the Fine Print)</h3><p>On the same day, and this is not a coincidence, a team from Oratomic, Caltech, and UC Berkeley published a paper claiming that <a href="https://postquantum.com/security-pqc/10000-qubits-shors/">Shor&#8217;s algorithm can be executed with as few as 10,000 reconfigurable neutral atom qubits</a>. The names on the paper are a who&#8217;s-who of quantum error correction: Dolev Bluvstein (who led Harvard&#8217;s landmark neutral atom experiments), John Preskill (one of the founders of quantum error correction theory), and Hsin-Yuan Huang (Caltech).</p><p>The qubit reduction is staggering: 50x lower than Google&#8217;s superconducting estimate for the same ECC-256 attack, and roughly 100x lower than Gidney&#8217;s updated RSA-2048 estimate of roughly 1 million qubits. The key innovation is high-rate quantum low-density parity-check (qLDPC) codes with approximately 30% encoding rate, compared to the roughly 4% achieved by the surface codes Google and Gidney used. In practical terms, each physical qubit does far more useful work.</p><p>But, and this is critical, the paper trades qubits for time. The 10,000-qubit architecture would take days to months to complete the computation, depending on the target and parallelism configuration. For RSA-2048 in the space-efficient regime, the runtime stretches into months. This is not a 9-minute attack. It&#8217;s a different point on the space-time tradeoff curve &#8212; fewer qubits, vastly more time.</p><p>Does that make it less threatening? Not necessarily. An adversary running a months-long computation against harvested encrypted traffic doesn&#8217;t care about speed. And the paper&#8217;s balanced architecture &#8212; roughly 13,000 qubits with more parallelism &#8212; brings the ECC-256 attack down to days rather than months. These are still hypothetical machines. But &#8220;hypothetical machine with 13,000 qubits&#8221; is a very different planning target than &#8220;hypothetical machine with 20 million qubits.&#8221; My <a href="https://postquantum.com/security-pqc/10000-qubits-shors/">full analysis of the Oratomic paper</a> covers the runtime tradeoffs, the qLDPC code innovations, and what this means for threat timeline assessment.</p><h3>The INRIA Optimization Pipeline: ECC Gets the Same Treatment as RSA</h3><p>These two papers didn&#8217;t emerge from nowhere. Weeks earlier, the same French team at INRIA Rennes (Cl&#233;mence Chevignard, Pierre-Alain Fouque, and Andr&#233; Schrottenloher) published <a href="https://postquantum.com/security-pqc/algorithm-quantum-ecc/">a new algorithm that further shrinks the quantum attack surface for elliptic curve cryptography</a>. This is the same team whose CRYPTO 2025 paper on RSA factoring optimizations was subsequently used by Google&#8217;s Craig Gidney to bring RSA-2048 estimates <a href="https://postquantum.com/quantum-research/quantum-breakthrough-rsa-2048/">from 20 million down to roughly 1 million physical qubits</a>.</p><p>Now they&#8217;ve turned the same optimization pipeline  on the elliptic curve discrete logarithm problem. The gate count reductions are significant, and the work, submitted to EUROCRYPT 2026, feeds directly into the resource estimates that Google and Oratomic subsequently published. This is the pattern I keep emphasizing: algorithmic improvements compound. Each optimization at the circuit level cascades through every subsequent resource estimate.</p><h3>The Big Picture: Convergence, Not Individual Breakthroughs</h3><p>Any one of these papers alone would be notable. Together, they represent something more important: a <em>convergence</em> of independent research groups arriving at dramatically lower resource estimates through different approaches.</p><p>The resource estimate trajectory tells the story. For RSA-2048: 20 million physical qubits (Gidney &amp; Eker&#229;, 2021) &#8594; roughly 1 million (Gidney, 2025) &#8594; under 100,000 with the Pinnacle architecture (February 2026) &#8594; as low as 11,000&#8211;13,000 neutral atom qubits with qLDPC codes (Oratomic, March 2026). For ECC-256: millions of qubits in prior estimates &#8594; under 500,000 (Google, March 2026) &#8594; as low as 10,000 (Oratomic, March 2026). Different targets, different architectures, different tradeoffs &#8212; but the same direction. The cost of breaking today&#8217;s cryptography has dropped by orders of magnitude in five years, and the algorithmic pipeline shows no signs of slowing.</p><p>This is why the argument that Q-Day is safely decades away needs constant re-examination. The hardware gap is real: nobody has a machine with 500,000 physical qubits, and nobody has a 10,000-qubit neutral atom machine with the error correction quality these papers assume. But the algorithmic side of the equation is compressing faster than most forecasters assumed. And the algorithmic improvements don&#8217;t require building anything &#8212; they&#8217;re available to anyone with a good idea and a preprint server.</p><div><hr></div><h2>The CRQC Scorecard: Measuring the Gap That Actually Matters</h2><p>To make sense of this rapidly shifting landscape, I&#8217;ve published what I think is the most comprehensive modality-by-modality assessment of how close each quantum computing platform is to cryptographic relevance: <a href="https://postquantum.com/post-quantum/crqc-scorecard-how-close/">The CRQC Scorecard</a>.</p><p>The scorecard evaluates five major quantum modalities (superconducting, trapped-ion, neutral-atom, photonic, and silicon spin) against three metrics that define the <a href="https://postquantum.com/post-quantum/crqc/">CRQC</a> threat: Logical Qubit Capacity (LQC), Logical Operations Budget (LOB), and Quantum Operations Throughput (QOT). These map directly to the <a href="https://postquantum.com/post-quantum/crqc-quantum-capability-framework/">CRQC Capability Framework</a> I developed years ago, but compressed into three executive-level levers that non-specialists can track.</p><p>The key finding: no modality is close to CRQC capability today. But the <em>rate of progress</em> varies enormously across platforms, and the new resource estimates change the goalposts significantly. When the target was 20 million qubits, every platform was equally far away. When the target drops to 500,000, or 10,000 for architectures that support qLDPC codes, the relative positions shift dramatically.</p><p>I&#8217;ve also updated the <a href="https://postquantum.com/crqc-readiness-benchmark-q-day-estimator/">CRQC Readiness Benchmark (Q-Day Estimator)</a> tool on PostQuantum.com. The tool now incorporates the latest resource estimates from all three papers and lets you model different scenarios: pick a resource estimation paper, select a quantum modality, set your own growth assumptions, and see the projected Q-Day timeline. Conservative, median, and aggressive presets are available, or you can plug in vendor roadmap claims and see whether they hold up against historical delivery rates.</p><p>Try it yourself: <a href="https://postquantum.com/crqc-readiness-benchmark-q-day-estimator/">CRQC Readiness Benchmark (Q-Day Estimator)</a>. I think it&#8217;s the most rigorous public tool for scenario-based Q-Day forecasting, and I welcome challenges to the methodology.</p><div><hr></div><h2>The Intelligence Community Gets It: Quantum Is Now a Tier-1 Threat</h2><p>If you needed a signal that the quantum threat has graduated from theoretical curiosity to active national security concern, the U.S. intelligence community just provided one. In the 2026 Annual Threat Assessment, quantum computing <a href="https://postquantum.com/security-pqc/ata-u-s-intelligence-quantum/">received its own dedicated section &#8212; alongside AI, not buried under a generic &#8220;cyber&#8221; heading</a>.</p><p>This matters more than it might seem. The ATA is the single most-read intelligence product in the U.S. government. It shapes budgets, policy priorities, and attention at the highest levels. Previous editions mentioned quantum in passing. This year, quantum got equal billing with artificial intelligence as a transformative technology threat.</p><p>Perhaps more significantly, the ATA expanded the quantum threat definition beyond cryptographic attack. It explicitly acknowledges quantum sensing, quantum networking, and the broader implications of quantum advantage across intelligence collection, defense, and economic competition. This tracks with the argument I&#8217;ve been making on <a href="https://postquantum.com">PostQuantum.com</a>: the quantum threat isn&#8217;t just about Q-Day. It&#8217;s about a fundamental shift in what&#8217;s computationally possible. My full analysis of the ATA&#8217;s quantum sections is <a href="https://postquantum.com/security-pqc/ata-u-s-intelligence-quantum/">here</a>.</p><div><hr></div><h2>Google&#8217;s 2029 Deadline: The Ecosystem Argument in Action</h2><p>And speaking of deadlines being set: <a href="https://postquantum.com/security-pqc/google-pqc-migration-2029/">Google has now publicly committed to completing PQC migration across all its products and infrastructure by 2029</a>. Not started. Completed.</p><p>This is exactly the dynamic I described in my <a href="https://postquantum.com/q-day/q-day-deadlines-set/">Q-Day Deadlines Are Set</a> analysis. The reason to act on post-quantum cryptography isn&#8217;t a specific Q-Day prediction &#8212; it&#8217;s that the ecosystem is setting deadlines regardless of when a CRQC arrives. When Google, the company that arguably understands the quantum threat better than any other (it&#8217;s simultaneously building the quantum computers <em>and</em> defending against them), sets a 2029 completion target for PQC migration, that becomes a de facto standard for every organization in its supply chain.</p><p>If your cryptographic infrastructure interfaces with Google&#8217;s (and whose doesn&#8217;t?) you now have a deadline whether you set one or not.</p><div><hr></div><h2>The PQC Migration Framework: Now Open and Free</h2><p>Speaking of migration: I&#8217;ve published an update to something I&#8217;ve been working on for a long time. The complete <a href="https://pqcframework.com">Applied Quantum PQC Migration Framework</a> &#8212; the full methodology for migrating enterprise cryptography to post-quantum standards &#8212; is now freely available under Creative Commons (CC BY 4.0).</p><p>This is not another repackaging of NIST guidance or a theoretical migration model. It&#8217;s an 8-phase lifecycle covering everything from executive mandate and business case through discovery, CBOM, risk scoring, roadmap, pilots, infrastructure modernization, and vendor governance. It includes cross-cutting sections on crypto-agility architecture, maturity models, metrics, and regulatory mapping. And it comes with four sector-specific extensions: Financial Services, Telecommunications, Government &amp; Defense, and Critical Infrastructure / OT.</p><p>I embedded some hard-earned lessons into it. The framework deliberately diverges from conventional industry approaches where practical experience has shown they don&#8217;t work &#8212; minimum-viable CBOM instead of exhaustive inventories, risk-driven discovery scoping instead of boil-the-ocean audits, vendor governance <em>first</em> rather than as an afterthought. Where I take these more pragmatic positions, I defend each one with evidence, and we&#8217;ve worked with regulators who have accepted and in some cases adopted these approaches.</p><p>If you&#8217;re a CISO figuring out how to start, a program manager staring at a multi-year migration, a security architect navigating hybrid deployment, or a consultant helping clients get quantum-ready &#8212; this is for you. Publishing under CC BY 4.0 means anyone can use it, including commercially, with attribution. The full framework is at <a href="https://pqcframework.com">pqcframework.com</a>.</p><div><hr></div><h2>Silicon Just Ticked Its Last Box &#8212; and Nobody Noticed</h2><p>While Google&#8217;s cryptocurrency paper and the neutral atom hype cycle dominated headlines this month, a team in Shenzhen quietly demonstrated something that no silicon quantum processor had ever done: <a href="https://postquantum.com/quantum-research/silicon-logical-operations-first/">universal logical operations</a>.</p><p>The SZIQA team at Southern University of Science and Technology used five phosphorus nuclear spins in isotopically purified silicon to encode two logical qubits, implement the complete universal gate set, including the notoriously difficult <em>T</em> gate, and run a variational quantum eigensolver on those encoded qubits, computing the ground-state energy of a water molecule. They also prepared magic states above the Bravyi-Kitaev distillation threshold, which is the gateway to fault-tolerant universal computation. Published in Nature Nanotechnology, and coming from China rather than the Australian groups that have led donor silicon work for two decades.</p><p>On its own, this is a nice result with modest fidelities. Two logical qubits isn&#8217;t going to threaten anyone&#8217;s cryptography.</p><p>But here&#8217;s why I think it matters far more than the headlines suggest: this was the <em>last</em> fundamental capability that silicon hadn&#8217;t demonstrated. I went back through the record and realized that over the past four years, silicon spin qubits have systematically checked every single box on the fault-tolerance checklist &#8212; gates above threshold (2022), error correction protocols (2022), multi-qubit algorithms above threshold (2025), modular multi-register scaling (2025), stabilizer-based error detection (2026), and now universal logical operations with distillable magic states (2026). No single result was a blockbuster. But the aggregate is remarkable.</p><p>So I wrote what a comprehensive analysis of silicon&#8217;s position in the quantum computing race: <a href="https://postquantum.com/quantum-computing/silicon-dark-horse-quantum-computing/">The Dark Horse: How Silicon Quietly Assembled Every Building Block for Fault-Tolerant Quantum Computing</a>.</p><h3>The Manufacturing Argument Nobody Else Is Making</h3><p>The thesis: silicon is the platform everyone underestimates because it&#8217;s always a step behind the leaders on <em>scale</em> &#8212; superconducting qubits have more qubits, neutral atoms have demonstrated error correction at larger distances. But silicon is the only platform where every demonstrated capability has a credible path to industrial-scale manufacturing. The same EUV scanners, CVD chambers, and cleanroom protocols that produce today&#8217;s processors can, with targeted modifications, produce quantum chips. No other qubit platform can say this.</p><p>Though as I note in the article, &#8220;targeted modifications&#8221; is doing some heavy lifting &#8212; you need isotopically purified &#178;&#8312;Si, ultra-clean gate oxides, and fabrication precision beyond standard CMOS. The bridge from classical to quantum silicon is real, but it&#8217;s an engineering bridge, not a flat road.</p><h3>The Biased Noise Finding the Security Community Missed</h3><p>There&#8217;s also a finding from the SZIQA experiments that I think the security community has completely missed: silicon donor qubits exhibit strongly biased noise &#8212; phase-flip errors dominate while bit-flip errors are essentially absent. Theoretical work shows this can push fault-tolerance thresholds from ~1% to over 5%, which means silicon could need significantly <em>fewer</em> physical qubits per logical qubit than standard CRQC resource estimates assume. I wrote a <a href="https://postquantum.com/quantum-computing/silicon-biased-noise-advantage/">separate deep dive on the biased noise advantage</a> because I think it deserves its own analysis.</p><h3>What This Means for Your Threat Model</h3><p>What does this mean for your quantum threat planning? It doesn&#8217;t change near-term timelines. But it adds another credible pathway to a CRQC &#8212; and silicon is classified as a &#8220;fast-clock&#8221; architecture alongside superconducting and photonic qubits, meaning a silicon-based quantum computer would execute cryptographic attacks in <em>minutes</em>, not hours. If your risk model has been quietly discounting silicon as &#8220;too far behind,&#8221; the <a href="https://postquantum.com/quantum-computing/silicon-dark-horse-quantum-computing/">dark horse article</a> lays out why that assumption needs updating.</p><p>The full analysis, with five things to watch for and a comparison against every other platform, is <a href="https://postquantum.com/quantum-computing/silicon-dark-horse-quantum-computing/">here</a>. It&#8217;s the anchor of a ten-article series covering the complete progression of silicon quantum computing. Individual milestone papers are linked from this one.</p><div><hr></div><h2>The Bottom Line</h2><p>Take a step back and look at what happened in March 2026 alone. Resource estimates dropped by another order of magnitude. A new quantum modality (neutral atoms with qLDPC codes) entered the cryptanalytic conversation at shockingly low qubit counts. Silicon, the platform most analysts ignore, completed its fault-tolerance checklist. The U.S. intelligence community elevated quantum to a Tier-1 threat. And Google set a 2029 migration deadline.</p><p>None of these developments individually mean Q-Day is imminent. But collectively, they demolish the case for inaction. The algorithmic walls are closing in from one side. The hardware is advancing from the other. And the ecosystem of regulators, insurers, supply chains, the intelligence community, isn&#8217;t waiting for the two to meet.</p><p>If you haven&#8217;t started your PQC migration planning, the question is no longer &#8220;when should we start?&#8221; It&#8217;s &#8220;how do we explain why we haven&#8217;t?&#8221; The <a href="https://pqcframework.com">PQC Migration Framework</a> is free, comprehensive, and ready to use. The <a href="https://postquantum.com/crqc-readiness-benchmark-q-day-estimator/">Q-Day Estimator</a> can help you model the timeline. The excuses are running out.</p><div><hr></div><p><em>If you found this edition useful, forward it to a colleague who&#8217;s still on the fence about quantum risk. If I got something wrong, hit reply &#8212; I read everything and correct publicly. And if you&#8217;re new here, you can browse the full PostQuantum.com resource library at <a href="https://postquantum.com">postquantum.com</a> for the deep dives behind every topic covered above.</em></p><p><em>&#8212; Marin</em></p>]]></content:encoded></item><item><title><![CDATA[Quantum Observer #4 - The Quantum PC Moment Is Here (And China Shipped the OS First)]]></title><description><![CDATA[Quantum computing's modular revolution, new RSA-breaking research, the ECC debate, Google's HTTPS gambit, PQC migration reality, and a fresh scam to avoid]]></description><link>https://thequantumobserver.com/p/quantum-observer-4-the-quantum-pc</link><guid isPermaLink="false">https://thequantumobserver.com/p/quantum-observer-4-the-quantum-pc</guid><dc:creator><![CDATA[Marin Ivezic]]></dc:creator><pubDate>Sun, 08 Mar 2026 23:22:39 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!8qR7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9ecd7f0-0a49-4a52-951a-5242458dad47_2200x1467.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!8qR7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9ecd7f0-0a49-4a52-951a-5242458dad47_2200x1467.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!8qR7!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9ecd7f0-0a49-4a52-951a-5242458dad47_2200x1467.jpeg 424w, https://substackcdn.com/image/fetch/$s_!8qR7!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9ecd7f0-0a49-4a52-951a-5242458dad47_2200x1467.jpeg 848w, https://substackcdn.com/image/fetch/$s_!8qR7!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9ecd7f0-0a49-4a52-951a-5242458dad47_2200x1467.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!8qR7!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9ecd7f0-0a49-4a52-951a-5242458dad47_2200x1467.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!8qR7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9ecd7f0-0a49-4a52-951a-5242458dad47_2200x1467.jpeg" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a9ecd7f0-0a49-4a52-951a-5242458dad47_2200x1467.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1352235,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://thequantumobserver.com/i/190327800?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9ecd7f0-0a49-4a52-951a-5242458dad47_2200x1467.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!8qR7!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9ecd7f0-0a49-4a52-951a-5242458dad47_2200x1467.jpeg 424w, https://substackcdn.com/image/fetch/$s_!8qR7!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9ecd7f0-0a49-4a52-951a-5242458dad47_2200x1467.jpeg 848w, https://substackcdn.com/image/fetch/$s_!8qR7!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9ecd7f0-0a49-4a52-951a-5242458dad47_2200x1467.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!8qR7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9ecd7f0-0a49-4a52-951a-5242458dad47_2200x1467.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://thequantumobserver.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://thequantumobserver.com/subscribe?"><span>Subscribe now</span></a></p><p><em><strong>In this edition</strong>: I&#8217;m back after a pause - apologies and thank you for the messages asking when the next edition would arrive. A lot has happened since November. Today&#8217;s lead story is one I think most people have missed entirely: the quantum computing industry is quietly entering its &#8220;PC moment,&#8221; with modular, open-architecture systems replacing sealed black boxes - and China just released the world&#8217;s first freely downloadable quantum operating system. I also share highlights from my discussion with QuantWare&#8217;s CEO about their plan to reach 10,000 qubits by 2028 using a radical 3D chiplet architecture. We cover the Pinnacle architecture&#8217;s dramatic claim about breaking RSA-2048 with only ~100,000 physical qubits, the surprisingly nuanced debate about ECC falling before RSA, Google&#8217;s Merkle Tree approach to quantum-proofing HTTPS (which is not what many think it is), why PQC migration turned out to be a 120,000-task monster that became my most-read article ever, and a new snake-oil vendor claiming they&#8217;ve cracked RSA-4096. Plus: free quantum security webinars and a new SANS course.</em></p><div><hr></div><h2><strong>A Note on the Return (and the New Format)</strong></h2><p>First things first: I owe you an apology. The Quantum Observer went quiet after edition #3 in November, and many of you reached out asking what happened. The honest answer is that I was dealing with some personal matters that took me away from work for a while. When I came back, the volume of news on <a href="https://postquantum.com">PostQuantum.com</a> had grown to a point where the newsletter drew the short straw. That was a mistake - I&#8217;ve heard from enough of you to know it matters.</p><p>So we&#8217;re back. But with a small format change: I&#8217;m dropping the strict weekly cadence. Instead, expect one or two editions per week - sometimes one focused on quantum computing developments, another on quantum security. And if major news breaks, I&#8217;ll cover it in a special edition. Quality over calendar.</p><p>Now, let&#8217;s get into it. And I want to start with something I believe is one of the most underappreciated stories in quantum computing right now.</p><div><hr></div><h2>The Story Most People Missed: Quantum Computing&#8217;s &#8220;PC Moment&#8221;</h2><p>In 1981, IBM released the IBM PC. The machine itself was unremarkable. What made it revolutionary was what it <em>wasn&#8217;t</em>: a sealed, proprietary box that only IBM could build or extend. By publishing the architecture and using off-the-shelf components, IBM inadvertently created an entire industry. Within years, hundreds of companies were building IBM-compatible PCs from interchangeable parts. The personal computer revolution wasn&#8217;t about any single machine - it was about the moment computing moved from vertical integration to an open, modular ecosystem.</p><p>Something remarkably similar is happening in quantum computing right now, and almost nobody is talking about it.</p><h3>From Black Boxes to Building Blocks</h3><p>For most of its commercial existence, a quantum computer has been something you bought as a complete, sealed system from a single vendor - IBM, Google, IonQ, Quantinuum. Qubits, control electronics, cryogenics, software stack, cloud interface - all from one source. This vertical integration made sense early on, just as it made sense for DEC to sell complete minicomputers.</p><p>But the economics and geopolitics of quantum computing are pushing the industry toward a fundamentally different model. In my deep dive on <a href="https://postquantum.com/quantum-computing/quantum-open-architecture-qoa/">Quantum Open Architecture</a>, I traced how this transition is unfolding across six converging drivers: the sheer technical complexity of building every layer in-house, the economics of specialization, the speed advantages of modular innovation, the need for customization across different use cases, the geopolitical imperative of <a href="https://postquantum.com/quantum-sovereignty/quantum-sovereignty/">quantum sovereignty</a>, and the growing community push for democratized access.</p><p>The results are already visible. Last year, the University of Naples Federico II <a href="https://postquantum.com/industry-news/italy-quantum-computer-qoa/">assembled Italy&#8217;s largest quantum computer</a> by sourcing a Dutch-made quantum processor, pairing it with third-party control electronics, and integrating the whole system in-house. The Israeli Quantum Computing Center built an open facility from best-of-breed components. The Netherlands&#8217; <a href="https://postquantum.com/industry-news/quantum-computer-tuna-5/">Tuna-5 project</a> did the same. In late 2025, a <a href="https://postquantum.com/qoa-news/elevate-quantum-qoa/">coalition in Colorado announced the first QOA-based quantum computer in the U.S.</a>, integrating components from QuantWare, Qblox, Q-CTRL, and Maybell Quantum into a cloud-accessible platform. These aren&#8217;t science projects - they&#8217;re the first &#8220;PC clones&#8221; of the quantum era.</p><h3>The &#8220;Intel of Quantum&#8221; and the Hardware Scaling Problem</h3><p>To understand what&#8217;s driving QOA, it helps to talk to someone who&#8217;s building the components. I recently sat down with Matt Rijlaarsdam, CEO of QuantWare - the Dutch startup that supplied the quantum processor for the Naples system - for <a href="https://postquantum.com/quantum-systems-integration/discussion-quantware-ceo-matt/">an in-depth discussion about the modular revolution</a>. Rijlaarsdam&#8217;s framing is blunt: QuantWare wants to be the Intel of quantum computing. The company doesn&#8217;t build complete quantum computers - it designs and fabricates superconducting quantum processors and sells them to anyone who wants to build one. They now ship QPUs and components to customers in over 22 countries, and the customer base has shifted from predominantly academic to majority commercial.</p><p>The Intel analogy is more than marketing. As devices get exponentially more complex, no single organization can afford to be world-class at every layer of the stack. By focusing narrowly on processors and selling at volume, QuantWare drives down unit costs through the same amortization logic that made Intel dominant - higher volume, lower costs, better yield, more customers, in a virtuous cycle that mirrors exactly how the semiconductor industry matured.</p><p>But the most technically fascinating part of our conversation was about QuantWare&#8217;s VIO-40K architecture - their plan to reach 10,000 qubits by 2028. The core insight is that today&#8217;s superconducting chips have an I/O bottleneck: as much as 90% of chip area gets consumed by wiring and routing infrastructure, leaving only about 10% for the qubits themselves. Beyond a few hundred qubits, you simply can&#8217;t snake all the control lines across a 2D plane without causing interference. QuantWare&#8217;s solution goes vertical - a 3D stack of chiplets that delivers control signals from above rather than sprawling outward across the chip surface. The design supports up to 40,000 I/O connections, theoretically enabling 10,000 qubits with about four lines each. And counterintuitively, Rijlaarsdam argues that fidelity could actually <em>improve</em> in the vertical architecture because signals are better shielded in the 3D channels than in a crowded planar layout.</p><p>To be clear: 10,000 physical qubits in 2028 would not break RSA or trigger Q-Day. Rijlaarsdam himself estimates such a device would yield on the order of 10 to 100 logical qubits - modest but enormously valuable as the first platforms for real fault-tolerant computation. The full interview covers the scaling economics, the geopolitics of quantum sovereignty, QuantWare&#8217;s upcoming KiloFab (Europe&#8217;s first dedicated quantum chip factory), and why he thinks the key problems are solved and what remains is mostly engineering. Read the full discussion <a href="https://postquantum.com/quantum-systems-integration/discussion-quantware-ceo-matt/">here</a>.</p><h3>But There&#8217;s a Missing Piece - And China Just Filled It</h3><p>Here&#8217;s where it gets interesting, and where the story gets uncomfortable for Western observers.</p><p>Every PC clone needed an operating system. You could assemble a motherboard, a CPU, RAM, and a hard drive from different vendors, but without an OS to tie them together, you had an expensive paperweight. The PC revolution didn&#8217;t truly ignite until software - first CP/M, then DOS, then Windows - provided the integration layer that made the hardware ecosystem work.</p><p>The quantum open-architecture movement has exactly the same problem. You can buy a quantum processor from one company, control electronics from another, and cryogenic systems from a third. But who provides the software layer that makes them all work together? Who handles the calibration, the error mitigation, the job scheduling, the classical-quantum orchestration? This is what I call <em>platform-level</em> quantum systems integration - assembling a working quantum computer from modular components - and it&#8217;s distinct from <em>enterprise-level</em> integration, which is about connecting a quantum computer into existing HPC, cloud, and IT environments. Both are essential; neither is solved. I examined the full picture in my article on <a href="https://postquantum.com/quantum-systems-integration/quantum-systems-integration/">Quantum Systems Integration</a> - and at the platform level, the answer until this week was essentially &#8220;nobody, you figure it out yourself.&#8221;</p><p>This week, <a href="https://postquantum.com/quantum-si-news/china-first-downloadable-quantum-os/">China&#8217;s Origin Quantum made the world&#8217;s first quantum operating system freely available for download</a>. Origin Pilot isn&#8217;t a programming framework like Qiskit or Cirq - it&#8217;s a full systems integration layer. It handles hardware abstraction across multiple qubit types, provides calibration and error mitigation, manages job scheduling, and orchestrates the classical-quantum boundary. It&#8217;s the missing piece that turns a collection of quantum components into a working quantum computer.</p><p>As I analyzed in my <a href="https://postquantum.com/quantum-computing/china-quantum-os-origin-pilot/">detailed assessment of Origin Pilot and China&#8217;s quantum OS strategy</a>, this move isn&#8217;t competing with Qiskit. It&#8217;s competing with the <em>absence</em> of any Western equivalent - and that&#8217;s a much bigger problem. The Western quantum ecosystem has no freely available, hardware-agnostic systems integration layer. Every open-source framework (Qiskit, Cirq, PennyLane) operates at the SDK/application level, assuming someone else has already solved the messy integration work underneath. Nobody has.</p><h3>Why This Matters for You</h3><p>The DeepSeek parallel is real - and the stakes may be higher. Just as China&#8217;s release of competitive open-source AI models reshaped assumptions about the AI race, Origin Pilot&#8217;s free release could reshape the quantum computing landscape. Countries pursuing quantum sovereignty now have a ready-made integration layer to build upon. And if that layer is free and Chinese-built, the ecosystem that grows around it will naturally tend toward Chinese standards and interfaces.</p><p>The Western quantum industry isn&#8217;t asleep - companies like Qblox, Zurich Instruments, and Quantinuum are building excellent components, and as the QuantWare interview shows, the hardware side of QOA is advancing rapidly. But nobody is building the equivalent of DOS for quantum computing. In the PC revolution, the company that controlled the OS eventually captured more value than any hardware maker.</p><p>The quantum industry&#8217;s architecture is being defined <em>right now</em>. If you&#8217;re not paying attention to QOA and quantum systems integration, I&#8217;d strongly recommend the <a href="https://postquantum.com/quantum-computing/quantum-open-architecture-qoa/">full QOA analysis</a>, the <a href="https://postquantum.com/quantum-systems-integration/discussion-quantware-ceo-matt/">QuantWare CEO discussion</a>, and the <a href="https://postquantum.com/quantum-computing/china-quantum-os-origin-pilot/">Origin Pilot deep dive</a>.</p><div><hr></div><h2>Pinnacle Architecture: 100,000 Qubits to Break RSA-2048 - But Read the Fine Print</h2><p>A <a href="https://arxiv.org/abs/2602.11457">new paper from Iceberg Quantum introduced the &#8220;Pinnacle&#8221; architecture</a>, claiming that RSA-2048 could be broken with approximately 100,000 physical qubits - a dramatic reduction from the millions typically cited. The key innovation is aggressive use of quantum low-density parity-check (qLDPC) codes, which encode logical qubits far more efficiently than surface codes.</p><p>The reaction was appropriately mixed. Craig Gidney - Google&#8217;s top quantum error correction researcher - offered measured criticism of the spacetime volume claims. Scott Aaronson endorsed the direction with caveats.</p><p>Here&#8217;s what matters for planning: the 100,000-qubit figure didn&#8217;t make Q-Day closer. What Pinnacle did is shift the difficulty from one part of the stack to another. The qubit count dropped dramatically, but the paper relies on qLDPC codes whose practical decoding at scale remains an unsolved problem - a point I unpack in my <a href="https://postquantum.com/post-quantum/pinnacle-architecture-break-rsa-2048-critical/">detailed analysis of the Pinnacle architecture</a> and a companion piece on <a href="https://postquantum.com/quantum-computing/quantum-low-density-parity-check-qldpc-codes/">qLDPC codes</a>. The hardware requirements went down; the algorithmic and engineering requirements went up by a comparable amount. This is valuable research that advances the field, but it&#8217;s not a reason to panic - and it&#8217;s not a reason to relax either.</p><p>The broader pattern is worth watching: resource estimates for breaking RSA-2048 continue moving in only one direction - down. Each breakthrough doesn&#8217;t eliminate the hard problems but relocates them. The margin of safety you thought you had is shrinking, even if Q-Day itself hasn&#8217;t meaningfully moved.</p><div><hr></div><h2>The ECC Debate: Why RSA Timelines Don&#8217;t Apply to Bitcoin</h2><p>There was a notable stir recently when Scott Aaronson pointed out something cryptographers have known for years but that hasn&#8217;t penetrated mainstream quantum-threat planning: under certain conditions, ECC would fall to a quantum computer <em>before</em> RSA.</p><p>This matters enormously for systems that rely on ECC - most prominently Bitcoin, which uses ECDSA for all transaction signing. As I explain in my updated deep dive on <a href="https://postquantum.com/post-quantum/shor-rsa-ecc-diffie-hellman/">how Shor&#8217;s algorithm affects RSA, ECC, and Diffie-Hellman differently</a> the quantum resource requirements depend on which mathematical problem is being attacked. For equivalent classical security levels, breaking ECC generally requires <em>fewer</em> logical qubits than breaking RSA. The exact ratio depends on error correction assumptions, but the directional conclusion is robust.</p><p>My <a href="https://postquantum.com/post-quantum/bitcoin-quantum-risk-closer-ecc/">Bitcoin-specific analysis</a> became discussed because it makes the implication explicit: if you&#8217;re using RSA-2048 resource estimates to plan your quantum security timeline for ECC-based systems (including Bitcoin, Ethereum, and many TLS implementations using ECDHE), you&#8217;re likely overestimating how much time you have.</p><p>The bottom line: don&#8217;t use RSA timelines for ECC-based decisions.</p><div><hr></div><h2>Google&#8217;s Merkle Tree HTTPS Gambit: What People Got Wrong</h2><p>Google recently announced Merkle Tree Certificates (MTC) for HTTPS authentication in Chrome, and I saw widespread confusion online. Several commentators interpreted it as Google bypassing NIST&#8217;s post-quantum cryptography standards. That&#8217;s wrong.</p><p>As I explain in my <a href="https://postquantum.com/security-pqc/googles-merkle-tree-mtc-https/">analysis of Google&#8217;s MTC approach</a>, this is an <em>architectural</em> optimization, not a cryptographic one. Post-quantum signatures (ML-DSA, SLH-DSA) are significantly larger than classical ones, adding latency to the TLS handshake - noticeable at Google&#8217;s scale of billions of daily connections. MTC reduces per-connection overhead by batching certificate validations into a tree structure. The <em>underlying primitives</em> remain NIST PQC standards. Google isn&#8217;t replacing post-quantum crypto - they&#8217;re redesigning the plumbing to handle larger payloads efficiently.</p><p>This is exactly the pragmatic engineering the PQC transition needs more of. Anyone dismissing it as Google &#8220;going its own way&#8221; is missing the point.</p><div><hr></div><h2>120,000 Tasks: The Article That Hit a Nerve</h2><p>My most-visited article over the past few months wasn&#8217;t about a hardware breakthrough or a threat timeline. It was about project management.</p><p><a href="https://postquantum.com/post-quantum/quantum-security-pqc-program-plan/">120,000 Tasks: Why Post-Quantum (PQC) Migration Is Enormous</a> walked through a realistic program plan for PQC migration at a large enterprise - and the numbers shocked people. For the example organization I modeled, the migration generated approximately 120,000 individual tasks spanning cryptographic discovery, algorithm replacement, testing, deployment, vendor coordination, compliance, and operational changes.</p><p>Some readers found the number galvanizing. Others pushed back - their organization wouldn&#8217;t face 120,000 tasks. Fair enough: yours may face 30,000 or 60,000. The specific number isn&#8217;t the point. PQC migration is not a &#8220;swap some libraries&#8221; exercise. It is a multi-year, enterprise-wide transformation program that touches every system using public-key cryptography - which is, effectively, every system. If your leadership still thinks this is a quarter-long sprint, share this with them.</p><div><hr></div><h2>Quantum Flapdoodle: The &#8220;We Broke RSA-4096&#8221; Scam</h2><p>A new company has been making the rounds claiming they&#8217;ve broken RSA-4096 - and selling PQC solutions on the strength of this supposed achievement. The claims are bold, but the technical substance is zero.</p><p>In <a href="https://postquantum.com/post-quantum/no-broken-rsa-2048-4096/">No One Has Secretly Broken RSA-2048 or RSA-4096 &#8212; Here&#8217;s the Science</a>, I walk through why this is physically impossible with any quantum hardware that exists or is known to be in development. If someone had actually achieved this, it wouldn&#8217;t be a marketing pitch for a consulting or a product firm - it would be the most consequential technological development of the century.</p><p>The tell is always the same: fabricate a dramatic, unverifiable claim to create urgency, then sell solutions to &#8220;protect&#8221; against the threat you just invented. If a vendor tells you they&#8217;ve broken RSA-4096, ask for the peer-reviewed paper. You&#8217;ll hear crickets. There are real quantum threats that justify real urgency. You don&#8217;t need fake ones.</p><div><hr></div><h2>From the Applied Quantum Desk</h2><p>A few updates from <a href="https://appliedquantum.com">Applied Quantum</a>:</p><p><strong>Quantum Systems Integration Services</strong>: Speaking of QOA and the modular revolution - Applied Quantum is now offering quantum computer systems integration services, helping organizations assemble, deploy, and operate quantum systems from best-of-breed components. If the QOA story above resonated and you&#8217;re wondering how to get started, <a href="https://appliedquantum.com/contact-applied-quantum">get in touch</a>.</p><p><strong>Free Webinars</strong>: We&#8217;ve launched a series of free quantum security webinars covering PQC migration fundamentals to advanced threat assessment. Full schedule at <a href="https://appliedquantum.com/events">appliedquantum.com/events</a>.</p><p><strong>SANS Quantum Security Course - Now Live</strong>: The first quantum security course we developed with SANS Institute - <strong>Quantum Security Readiness for Executives</strong> - is open for registration. First session: <strong>March 18</strong>. Practical, hands-on, designed for security leaders who need decision-making fluency, not a physics PhD. Register at <a href="https://www.sans.org/cyber-security-courses/quantum-security-readiness-executives#schedule-pricing">sans.org</a>.</p><div><hr></div><h2>Resource Update: Getting Started With Quantum Readiness</h2><p>One more thing - I&#8217;ve significantly updated my curated guide on <a href="https://postquantum.com/quantum-readiness-starting/">Getting Started With Quantum Readiness and PQC Migration</a>. If you need a structured reading path to bring yourself or your team up to speed, this is the best place to start &#8212; organized by topic and experience level.</p><div><hr></div><p><em>That&#8217;s it for Quantum Observer #4. If this was useful, forward it to a colleague who should be paying attention. If I got something wrong, hit reply - I read everything and correct publicly.</em></p><p><em>And one ask: I&#8217;d love to hear how I can make this newsletter more useful for you. More depth on fewer topics, or keep the broad survey? Too long? Too short? Different topics? Hit reply - your feedback directly shapes what comes next.</em></p><p><em>See you in the next edition.</em></p><p>&#8212; Marin</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://thequantumobserver.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The Quantum Observer! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[Quantum Observer #3 - Quantum Progress Hits Overdrive]]></title><description><![CDATA[Helios launched, neutral atoms surprised, IBM flexed&#8230; and somewhere, a wellness influencer discovered &#8220;quantum resonance&#8221;]]></description><link>https://thequantumobserver.com/p/quantum-observer-3-quantum-progress</link><guid isPermaLink="false">https://thequantumobserver.com/p/quantum-observer-3-quantum-progress</guid><dc:creator><![CDATA[Marin Ivezic]]></dc:creator><pubDate>Sun, 16 Nov 2025 13:55:07 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!GHE6!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd136fba3-e06e-4717-ba38-b6291b120cf5_2200x1400.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!GHE6!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd136fba3-e06e-4717-ba38-b6291b120cf5_2200x1400.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!GHE6!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd136fba3-e06e-4717-ba38-b6291b120cf5_2200x1400.png 424w, https://substackcdn.com/image/fetch/$s_!GHE6!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd136fba3-e06e-4717-ba38-b6291b120cf5_2200x1400.png 848w, https://substackcdn.com/image/fetch/$s_!GHE6!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd136fba3-e06e-4717-ba38-b6291b120cf5_2200x1400.png 1272w, https://substackcdn.com/image/fetch/$s_!GHE6!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd136fba3-e06e-4717-ba38-b6291b120cf5_2200x1400.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!GHE6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd136fba3-e06e-4717-ba38-b6291b120cf5_2200x1400.png" width="1456" height="927" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d136fba3-e06e-4717-ba38-b6291b120cf5_2200x1400.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:927,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:3084604,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://thequantumobserver.com/i/179041190?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd136fba3-e06e-4717-ba38-b6291b120cf5_2200x1400.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!GHE6!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd136fba3-e06e-4717-ba38-b6291b120cf5_2200x1400.png 424w, https://substackcdn.com/image/fetch/$s_!GHE6!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd136fba3-e06e-4717-ba38-b6291b120cf5_2200x1400.png 848w, https://substackcdn.com/image/fetch/$s_!GHE6!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd136fba3-e06e-4717-ba38-b6291b120cf5_2200x1400.png 1272w, https://substackcdn.com/image/fetch/$s_!GHE6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd136fba3-e06e-4717-ba38-b6291b120cf5_2200x1400.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://thequantumobserver.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://thequantumobserver.com/subscribe?"><span>Subscribe now</span></a></p><p><em><strong>In this edition:</strong> Another busy period in quantum: Quantinuum launched Helios, claimed a new form of quantum advantage, and added more evidence that error-corrected quantum computing is finally moving from theory to practice. Google, IonQ, and IBM all dropped major updates in the same two-week window, and IBM continues hitting its roadmap milestones ahead of schedule. Meanwhile, neutral-atom platforms - especially Harvard/QuEra - delivered stunning below-threshold results, joining superconducting and trapped-ion qubits as serious contenders for fault-tolerant quantum computing. Beyond the lab, governments and investors poured billions into quantum programs worldwide, from DARPA to California, the UK, the EU, and an $800M mega-round for Quantinuum. We also saw notable progress in QKD, coherence times, and city-scale quantum networking. And yes&#8230; this week&#8217;s Quantum Flapdoodle features a new wave of &#8220;quantum&#8221; pendants and stickers claiming to heal, block radiation, and manifest abundance. Spoiler: they don&#8217;t. Enjoy the tour.</em></p><div><hr></div><p>In this edition, we highlight key recent news in quantum computing &#8211; and, this time, try to connect them to prior breakthroughs over the last few months to keep the big picture in focus. </p><p>The firehose of amazing achievements is flowing faster than ever, making it hard to track what&#8217;s going on! Let&#8217;s break it down.</p><div><hr></div><h2>Helios and the Quantum Advantage Relay</h2><p><strong>Quantinuum&#8217;s Helios Launch</strong>: The big news of the week was <a href="https://postquantum.com/industry-news/quantinuum-launches-helios-sg/">Quantinuum&#8217;s release of Helios</a>, a new 98-qubit trapped-ion quantum computer. Billed as &#8220;the world&#8217;s most accurate&#8221; commercial quantum system, Helios achieves record two-qubit gate fidelity (~99.921%) and introduces an innovative architecture using barium ion qubits. It&#8217;s designed for hybrid quantum-classical processing with a real-time control engine and even a new programming language (Guppy) for seamlessly mixing classical and quantum code. Helios also marks Quantinuum&#8217;s first deployment outside the US (planned for Singapore), underscoring the company&#8217;s global ambitions. My in-depth <a href="https://postquantum.com/quantum-computing/quantinuum-helios-architecture/">analysis of the Helios architecture</a> (including its use of QCCD ion transport for all-to-all connectivity and memory/logic separation) is available for those wanting a deep dive. In short, Helios nearly doubles Quantinuum&#8217;s qubit count (98 vs. 56 in H2) while improving fidelity &#8211; a major leap in scaling without noise penalty.</p><p><strong>Demonstrating Quantum Advantage:</strong> Beyond the shiny hardware, the real story is that Helios has now demonstrated quantum advantage &#8211; twice over. <em>(Please note that there are as many definitions of quantum advantage, and opinions about whether it was achieved in these examples, as there are quantum technology observers.)</em> As I unpack in this article on <a href="https://postquantum.com/industry-news/quantinuums-helios-quantum-advantage/">Quantinuum&#8217;s Helios quantum advantage</a>, the system first pushes deep random-circuit sampling to a regime where even exascale supercomputers would need absurd resources (think &#8220;longer than the age of the universe&#8221; and &#8220;more power than all visible stars&#8221;) to keep up. Then it goes further and tackles a Fermi&#8211;Hubbard simulation of high-temperature superconductivity on a 6&#215;6 lattice &#8211; a task that is effectively out of reach for classical methods. This latest claim lands just two weeks after Google&#8217;s new <a href="https://postquantum.com/quantum-research/googles-quantum-advantage/">verifiable quantum advantage</a> result and shortly after <a href="https://postquantum.com/quantum-research/ionq-record-2025/">IonQ&#8217;s record-setting trapped-ion experiment</a>, and only days before IBM unveiled its <a href="https://postquantum.com/industry-news/ibm-loon-nighthawk/">Nighthawk and Loon chips</a> as key waypoints on their advantage-to-fault-tolerance roadmap. Quantum advantage is starting to look less like a one-off headline and more like a relay race.</p><p><strong>Fully Error-Corrected Gates Arrive:</strong> Stepping back to June, Quantinuum also made waves by <a href="https://postquantum.com/quantum-research/quantinuum-magic-states/">declaring it&#8217;s the first to demonstrate a fully error-corrected universal gate set</a>. What does that mean? Essentially, they performed all types of quantum logic operations (Clifford and non-Clifford gates) on logical qubits with errors detected and corrected in real-time. This was achieved by generating high-fidelity &#8220;magic&#8221; states and using them to implement a non-Clifford T-gate fault-tolerantly. It closed a long-standing gap &#8211; previously, error-corrected qubits could handle the easier Clifford gates, but the hardest gate (T) was too error-prone. Quantinuum&#8217;s result showed a path to incorporate every gate needed for universal computing under error correction. In other words, they claim all the ingredients for at-scale fault-tolerance are now on the table, giving them a &#8220;de-risked&#8221; roadmap to a full fault-tolerant machine by 2029. This achievement set the stage for the flurry of quantum advantage claims that followed in this latest period &#8211; it&#8217;s as if once error correction started working, useful quantum computations quickly began popping up.</p><p><strong>IBM&#8217;s Roadmap Discipline:</strong> Speaking of fault-tolerance, IBM has been hitting its own milestones. In October, <a href="https://postquantum.com/engineering-news/ibm-amd-qec/">IBM announced</a> it ran quantum error-correction algorithms on off-the-shelf AMD hardware &#8211; and did so 10&#215; faster than required. This was a test of their classical control system for error correction, and running it on standard FPGAs a year ahead of schedule shows IBM&#8217;s engineering discipline. In fact, it&#8217;s the third roadmap milestone IBM delivered significantly early (others include previous processor releases and software stack updates). IBM&#8217;s latest <a href="https://postquantum.com/industry-news/ibm-loon-nighthawk/">Nov 12 update introduced</a> the 120-qubit Nighthawk chip aimed at quantum advantage by 2026, and the Loon test chip to lay groundwork for fault tolerance by 2029. With each milestone met or exceeded, my confidence (and frankly, concern!) grows that IBM will hit a commercially viable fault-tolerant quantum computer within the next few years. The pace and engineering discipline are remarkable &#8211; they&#8217;re making a very complex effort look almost routine.</p><p><strong>Bottom line for this section</strong>: We&#8217;ve seen a cascade of achievements &#8211; error-corrected gates, back-to-back quantum advantage experiments, new high-qubit chips &#8211; all within a matter of months. The acceleration of quantum tech progress is accelerating &#128578;, and it&#8217;s genuinely hard to keep up. Now let&#8217;s turn to a dark horse in the race that&#8217;s suddenly looking like a front-runner: neutral atoms.</p><h2>Neutral Atoms Level Up</h2><p>If <a href="https://postquantum.com/quantum-modalities/superconducting-qubits/">superconducting qubits</a> and <a href="https://postquantum.com/quantum-modalities/trapped-ion-qubits/">trapped ions</a> have dominated the spotlight, <a href="https://postquantum.com/quantum-modalities/neutral-atom-quantum/">neutral-atom</a> quantum computers just dramatically elbowed their way into contention. I&#8217;m particularly bullish about a massive result from Harvard/QuEra (Mikhail Lukin&#8217;s team) that achieved a fault-tolerance milestone with neutral atoms. This is the same group that in <a href="https://postquantum.com/quantum-research/neutral-atoms-fault-tolerance/">late 2023 demonstrated a logical qubit</a> on a neutral-atom processor with performance improving as code distance increased &#8211; one of the most consequential results of that year. Just two months ago, in <a href="https://postquantum.com/quantum-research/harvard-mit-continuous-3000-qubit/">September, they also kept a 3,000+ qubit neutral atom array running continuously</a> for over 2 hours, swapping out atoms to overcome loss and essentially achieving an &#8220;infinite&#8221; runtime quantum simulator. These achievements were already remarkable, but the latest news goes even further.</p><p><strong>Below-Threshold Error Correction:</strong> The new <a href="https://postquantum.com/quantum-research/harvard-fault-tolerant/">Harvard-led experiment (reported in Nature)</a> used a 448-atom array to implement a small surface code and showed it operating below the error threshold &#8211; meaning adding more qubits in the code actually suppressed errors instead of amplifying them. In practice, they did repeated rounds of error correction and observed that a distance-5 code had lower logical error rates than a distance-3 code, a clear signature of true error-correcting behavior. This is huge: it&#8217;s proof that neutral atom qubits can be scaled into the error-correcting regime needed for fault-tolerant quantum computing. Combined with their 2023 logical qubit work, it signals that neutral-atom platforms are no longer just &#8220;science experiments&#8221; but serious competitors on the fault-tolerance path. The Harvard/QuEra team essentially achieved with 448 optical tweezed atoms what Google did with 72 superconducting qubits &#8211; a below-threshold logical qubit &#8211; but with a very different technology. This result caught many off guard and is forcing a recalculation of modality race rankings.</p><p><strong>Recent Neutral-Atom Milestones:</strong> Let&#8217;s not forget other neutral-atom feats in recent weeks. <a href="https://postquantum.com/quantum-research/caltechs-6100-qubit/">Caltech set a record</a> with a 6,100-qubit optical tweezer array. They held thousands of cesium atoms in superposition for 13 seconds and achieved 99.98% single-qubit control fidelity. That demonstrated not just scale, but quality at scale, which is vital for error correction. And in China, a <a href="https://postquantum.com/industry-news/china-100-qubit/">startup unveiled H&#462;nyu&#225;n-1, a 100-qubit neutral-atom quantum computer</a> that&#8217;s fully operational at room temperature (qubits inside are still laser-cooled). It&#8217;s already been delivered to customers (including China Mobile) and marks one of the first commercial sales of a Chinese quantum computer. Notably, H&#462;nyu&#225;n-1 fits in standard server racks and uses locally sourced lasers and optics &#8211; an impressive engineering feat emphasizing compact design and domestic supply chains.</p><p>All this positions neutral atoms as a serious contender alongside superconducting and trapped-ion qubits. With the Harvard result showing below-threshold error rates, neutral-atom systems might achieve multiple logical qubits sooner than many expected. They also offer unique advantages: huge qubit counts (thousands of atoms), 3D connectivity (via moving atoms or connecting arrays with light), and operation at higher temperatures (even room temp for some designs). </p><p>The field is now extremely exciting &#8211; we effectively have three horse breeds in the race to scale: the long-favored superconducting circuits, the steady and high-fidelity trapped ions, and now these dark-horse neutral atoms proving their mettle. Competition usually breeds progress, so having three viable modalities can only accelerate the roadmap to large-scale quantum computers.</p><h2>Why &#8220;Below Threshold&#8221; Matters So Much</h2><p>When you hear &#8220;below threshold&#8221; for quantum error correction, that&#8217;s really important. It refers to achieving physical qubit error rates low enough that adding more qubits in an error-correcting code actually reduces the logical error. This was a theoretical must-have for decades, and it&#8217;s finally being demonstrated in practice &#8211; first by Google earlier in 2023, and now by Harvard on a different platform. In <a href="https://postquantum.com/post-quantum/path-to-crqc-predicting-q-day/">my framework for predicting CRQC</a> (cryptographically relevant quantum computers), reaching <a href="https://postquantum.com/post-quantum/below-threshold/">below-threshold QEC is a critical capability</a>, because it&#8217;s the turning point where we can start scaling up logical qubits without the error burden blowing up.</p><p><strong>Google&#8217;s Milestone:</strong> Back in early 2023, Google Quantum AI showed the first &#8220;bigger code beats smaller code&#8221; result on a superconducting chip &#8211; the experiment covered in my piece <a href="https://postquantum.com/quantum-research/google-breakthrough-error-correction/">Google Claims Breakthrough in Quantum Error Correction</a>. They compared a distance-5 surface code (49 qubits) to a distance-3 code (17 qubits) and found that the larger code had a slightly lower logical error rate (~2.9% vs 3.0% per cycle). On paper that&#8217;s only a ~0.1% improvement, but it was historic: it was the first clear sign that their hardware had effectively crossed the surface-code threshold, so adding more qubits to the code actually reduced logical errors instead of amplifying them. That experiment was the original &#8220;key signature of QEC&#8221; moment. Fast-forward to the end of 2024, and Google pushed this much further with the Willow processors, described in <a href="https://postquantum.com/engineering-news/google-surface-code-threshold/">Google AI&#8217;s Surface Code Breaks the Quantum Error Threshold</a>. This time they ran distance-5 and distance-7 surface codes on 72- and 105-qubit Willow chips and saw the logical error drop from ~0.3% to ~0.143% per cycle as they increased the code size. Crucially, the distance-7 logical memory outlived the best physical qubit on the chip and operated as a sustained below-threshold quantum memory with real-time decoding over up to a million QEC cycles. So you can think of 2023 as the first &#8220;crossover&#8221; demonstration and the Willow result as the full-blown, below-threshold quantum memory milestone.</p><p><strong>Harvard&#8217;s Leap:</strong> Fast-forward to now &#8211; the Harvard neutral atom experiment achieved a similar below-threshold feat in a very different system. Two independent demonstrations (and rumors of others in the works) give confidence that below-threshold QEC is not a one-off. It appears multiple platforms are entering an era where logical qubits can retain information longer than the best physical qubits, by using redundancy and smart encoding. This is the transition point from the NISQ era to the dawn of fault tolerance.</p><p>These latest below-threshold results motivated me to compila a dedicated piece collecting and examining the recent QEC experiments across platforms. If you&#8217;re into the nuts and bolts of error correction, check out my article on the spate of <a href="https://postquantum.com/quantum-computing/qec-below-threshold-experiments/">&#8220;QEC below threshold&#8221; experiments</a> and what they imply for timelines. The upshot is that quantum computing now has a clear foothold on the mountain of scalability. We&#8217;re not at the summit, but we can finally see a route up.</p><h2><strong>And That&#8217;s Not All&#8230; More Tech Breakthroughs</strong></h2><p>You&#8217;d think the above was plenty for a week &#8211; but there&#8217;s even more happening in quantum tech development:</p><ul><li><p><strong>Longer-Lived Qubits:</strong> A <a href="https://postquantum.com/quantum-research/princeton-qubit-coherence/">team at Princeton</a> built a superconducting qubit with a coherence time over 1 millisecond &#8211; 3&#215; longer than the previous record. This is the largest single leap in qubit lifetime in over a decade. A millisecond may not sound like much, but for quantum it&#8217;s huge &#8211; longer coherence directly means fewer errors. One of the researchers noted that if you simply swapped these tantalum qubits into Google or IBM&#8217;s processors, error rates could drop 1000&#215;. That could cut the overhead for error correction dramatically. Even better, the new qubit design is compatible with existing transmon tech, so industry could adopt it relatively quickly.</p></li><li><p><strong>Quantum Networks &amp; QKD:</strong> On the communications front, <a href="https://postquantum.com/quantum-research/qkd-distance-120/">researchers demonstrated</a> quantum key distribution (QKD) over 120 km of standard optical fiber, <em>while</em> that fiber carried regular internet traffic. This broke distance records for continuous-variable QKD in a real-world scenario. They managed to send quantum encrypted keys and classical data simultaneously by clever filtering and use of a &#8220;built-in&#8221; wavelength that minimized interference. Why does that matter? It shows quantum-secure links can be integrated into existing telecom infrastructure over metropolitan-scale distances (120 km could cover a large city and suburbs). It&#8217;s a step toward a practical quantum internet. On a related note, <a href="https://postquantum.com/industry-news/ionq-quantum-network-geneva/">IonQ and a Swiss consortium launched a city-scale quantum network in Geneva</a> connecting CERN, the University of Geneva, and even a luxury watch company via optical fiber. The network (Geneva Quantum Network) uses ID Quantique&#8217;s QKD devices (IonQ acquired a stake in IDQ) to enable secure quantum key exchange across town, and it&#8217;s testing entanglement distribution between nodes. They even synchronize the network with atomic clocks from Rolex for ultra-precise timing. It&#8217;s one of the first city-wide quantum networks that isn&#8217;t just a lab demo &#8211; it involves real institutions and is a template for future secure communications infrastructure.</p></li></ul><p>These developments show that quantum coherence, communication, and computing are all advancing in parallel. We&#8217;re extending how long qubits can last, how far quantum signals can travel, and how well quantum algorithms can outperform classical ones. Hard problems remain, but the pieces of the puzzle are falling into place, one breakthrough at a time.</p><h2>Business &amp; Policy News Roundup</h2><p>It&#8217;s not just technical milestones &#8211; the past week also saw significant business, funding, and policy news in quantum:</p><ul><li><p><strong>DARPA QBI Stage B:</strong> The <a href="https://postquantum.com/industry-news/darpaqbi-stage-b/">U.S. DARPA advanced 11 companies to Stage B</a> of its Quantum Benchmarking Initiative. This means firms like IBM, Quantinuum, Atom Computing, and others showed plausible plans for a utility-scale quantum computer in Stage A, and now get funding to develop detailed R&amp;D roadmaps. The fact that 11 companies made the cut shows how many serious efforts are underway. DARPA will rigorously evaluate their plans &#8211; and those that impress could receive even bigger support (and bragging rights).</p></li><li><p><strong>&#8220;Quantum California&#8221; Initiative:</strong> <a href="https://postquantum.com/industry-news/quantum-california-initiative/">California launched a state-backed quantum technology program</a>, aptly named Quantum California. Governor Newsom announced an initial $4 million (in the 2025&#8211;26 budget) to kickstart it, along with new legislation (Assembly Bill 940) to coordinate academia, industry, and government efforts. </p></li><li><p><strong>UK&#8217;s Quantum Showcase:</strong> Over in the UK, the government used its National Quantum Technologies Showcase event in London to <a href="https://postquantum.com/industry-news/uk-quantum-initiatives/">unveil a slate of new investments</a>. They branded the coming years the &#8220;Quantum Decade&#8221; and backed it up with fresh funding and collaborations. </p></li><li><p><strong>Quantinuum&#8217;s $800M Mega-Round:</strong> On the corporate side, <a href="https://postquantum.com/industry-news/quantinuum-raises-800m/">Quantinuum raised an eye-popping $800 million</a> in a funding round valuing the company at ~$10 billion. This is one of the largest investments ever in a quantum startup. Notably, the same week, Canada&#8217;s photonics QC startup <a href="https://postquantum.com/industry-news/xanadu-public/">Xanadu announced plans to go public via SPAC</a> at a ~$3.6B valuation. Big financings and exits like these signal that quantum tech is maturing from lab research to a commercial industry &#8211; and that capital markets see enough progress to justify multi-billion-dollar bets.</p></li><li><p><strong>US National Quantum Centers Renewed:</strong> The U.S. Department of Energy <a href="https://postquantum.com/industry-news/us-625m-renew/">committed $625 million to renew</a> its five National Quantum Information Science Centers for another five years. These centers (originally launched in 2020 with roughly $115M each) are major multi-institution hubs pushing research in areas from quantum computing to materials to networking. The renewal ensures these centers will continue their work into the late 2020s. It&#8217;s basically a vote of confidence that the initial five years went well, and now the feds are doubling down with another half-billion+ to keep the momentum. </p></li><li><p><strong>EU&#8217;s Quantum Act Plans:</strong> Not to be outdone, the <a href="https://postquantum.com/industry-news/eu-quantum-act/">EU announced plans for a comprehensive &#8220;Quantum Act&#8221;</a> at the European level. The European Commission opened a public consultation to shape this legislation, which is slated for 2026. The Act&#8217;s goals mirror other big initiatives (think EU Chips Act but for quantum): boost R&amp;D funding across member states, scale up industrial capacity (like establishing pilot production lines and a quantum chip design facility in Europe), and ensure supply chain resilience and governance (since quantum is dual-use tech). It&#8217;s a space to watch, especially for companies operating in Europe &#8211; support and requirements may ramp up significantly.</p></li></ul><p>As you can see, governments and investors worldwide are investing big in quantum right now. We&#8217;re in that phase where policy is catching up to technology, and money is starting to flow at scale. It&#8217;s a strong indicator that people in power believe quantum tech will be strategically important in the near future &#8211; not some 20-year-away sci-fi. For those of us tracking &#8220;<a href="https://q-day.org">Q-Day</a>&#8221; (the day quantum breaks crypto), these developments on both tech and funding fronts suggest the timeline is steadily firming up.</p><h2>Personal Note &#8211; Podcast Appearance</h2><p>On a personal note, I had the pleasure of chatting on the <a href="https://www.sans.org/podcasts/cyber-leaders/quantums-leap-how-cyber-leaders-are-preparing-for-the-post-encryption-era-applied-quantum-21">SANS &#8220;Cyber Leaders&#8221; podcast this week</a> alongside my colleague Kawin. We discussed &#8220;Quantum&#8217;s Leap &#8211; how cyber leaders are preparing for the post-encryption era.&#8221; It was a great conversation about the practical steps organizations should take now to get ready for quantum risks (like doing crypto inventories, prioritizing data migration to PQC, etc.), as well as the opportunities quantum tech offers. If you&#8217;re interested in cybersecurity strategy in this quantum-transition period, you might enjoy that episode. It&#8217;s now out on the <a href="https://www.sans.org/podcasts/cyber-leaders/quantums-leap-how-cyber-leaders-are-preparing-for-the-post-encryption-era-applied-quantum-21">SANS Cyber Leaders podcast feed (Episode 21)</a>. I won&#8217;t self-promote too hard here, but I figured I&#8217;d mention it since many of you are on the cyber side of the house and these topics tie directly into what we discuss in this newsletter.</p><div><hr></div><h2>Quantum Flapdoodle of the Week</h2><p>Not all quantum quackery comes in the form of multi-million dollar scams &#8211; some of it is peddled as cheap trinkets and wellness gadgets targeted at the general public. Lately, there&#8217;s been an uptick of products like &#8220;quantum energy&#8221; stickers for phones (claiming to block 5G or EMF radiation) and pendants or bracelets &#8220;infused with quantum resonance&#8221; to relieve pain or &#8220;harmonize your body&#8217;s frequency.&#8221; These products love to sprinkle real scientific terms like frequency, energy, quantum &#8211; but in a completely nonsensical context. For example, <a href="https://lifeharmonyenergies.com/pages/quantum-energy-jewelry-bracelets-necklaces">one vendor advertises &#8220;quantum jewelry&#8221;</a> that will &#8220;optimize your health, protect from EMFs, manifest success, and evolve your energy&#8221; via bioresonance technology. Phrases like &#8220;powered by quantum technology&#8221; abound, but there&#8217;s no actual quantum mechanism at work &#8211; it&#8217;s technobabble dressed up to sound high-tech.</p><p>Let&#8217;s be very clear: no sticker, pendant, or bracelet can harness quantum physics to heal you or block cell signals. Zero. Zilch. There is no reputable scientific evidence that sticking a so-called quantum patch on your phone does anything except perhaps make your wallet lighter. Physicists and medical experts are unequivocal: these are at best placebo devices. And there&#8217;s a darker side &#8211; if people rely on them for protection (say, thinking a necklace will cure their ailments or shield them from radiation), they might neglect real medical treatments or safety measures, which is dangerous. In some cases, the &#8220;quantum&#8221; gimmick products have proven to be literally dangerous: certain negative-ion &#8220;quantum pendants&#8221; were found to contain radioactive material and emit low levels of ionizing radiation. (Yes, ironically the anti-5G pendants were mildly radioactive &#8211; you can&#8217;t make this stuff up!) Regulators have since banned those, but it shows how snake oil can sometimes bite back.</p><p>The bottom line is, slapping the word &#8220;quantum&#8221; on age-old snake oil doesn&#8217;t make it science &#8211; it makes it suspect. As quantum tech becomes more famous, marketers will keep abusing the buzzword. So, if you see a miracle gadget promising health, protection, or cosmic enlightenment based on &#8220;quantum&#8221; mumbo-jumbo, bring a healthy dose of skepticism. Save your money for real innovations (like a nice quantum computing textbook &#128513;) and enjoy the fact that knowledge is the best defense against this kind of flapdoodle.</p><div><hr></div><h1>New on PostQuantum.com &#8211; Company DB Updates &amp; Due Diligence Guide</h1><p>In website news, I&#8217;ve updated my <a href="https://postquantum.com/quantum-computing-roadmaps-2025/">database of quantum computing hardware companies and their roadmaps (2025 edition)</a>. This is a resource where you can filter and compare major players by modality, track record, etc., with summaries of their milestones and plans. This week I added several new companies to the list, including <a href="https://postquantum.com/quantum-computing-companies/silicon-quantum-computing/">Silicon Quantum Computing</a> (Australia), <a href="https://postquantum.com/quantum-computing-companies/quantum-motion/">Quantum Motion</a> (UK), and <a href="https://postquantum.com/quantum-computing-companies/photonic-inc/">Photonic Inc.</a> (Canada). These are startups pursuing silicon-based qubits (Silicon QC and Quantum Motion) and distributed photonic+spin architectures (Photonic Inc.), respectively. All three have interesting approaches (e.g. Silicon Quantum Computing is literally making atomic-scale silicon qubits using scanning tunneling microscopes; Quantum Motion is leveraging CMOS fabrication for spins; Photonic Inc. is networking small silicon spin processors with photonic links). With these additions, the database covers an even wider spectrum of the quantum landscape &#8211; now 30+ companies from superconducting to topological to neutral atoms. Feel free to explore it; I hope it&#8217;s useful for getting a snapshot of who&#8217;s doing what, and how close they are to the coveted fault-tolerant CRQC threshold.</p><p>I also wrote a timely piece on <a href="https://postquantum.com/quantum-commercialization/quantum-due-diligence/">quantum computing due diligence</a> &#8211; essentially a field guide for evaluating quantum startups, technologies, and claims. With so many companies touting breakthroughs (and now big funding rounds and SPACs in the mix), it&#8217;s important to be able to discern hype versus reality. In the article, I share my personal toolkit of questions and red flags when I assess a quantum company: from examining their error rates and roadmaps, to checking for independent validations, to judging whether they&#8217;re over-claiming about &#8220;revolutionary&#8221; physics. The goal is to avoid both extreme ends &#8211; neither dismiss real progress nor fall for hand-wavy mystique. I thought this was timely given the influx of new entrants and the marketing that inevitably accompanies investment. If you&#8217;re an investor, customer, or just an enthusiast who wants to sharpen your BS-detector in the quantum space, give it a read. It might save you from wasting money or time on something that sounds too good to be true (or conversely, help you spot a gem that others underrated).</p><div><hr></div><p>That&#8217;s it for this week&#8217;s whirlwind tour! We covered a lot, from cutting-edge hardware launches and error-correction feats to policy moves and yes, even quantum-adjacent craziness. The quantum world is moving fast on all fronts. </p><p>Even if you don&#8217;t click the many links, I hope this gave you a sense of the momentum &#8211; and maybe a couple of chuckles (or eye-rolls) regarding the quackery. </p><p>As always, feel free to reach out with questions or topics you&#8217;d like to hear more about. </p><p>Until next time, stay curious and watch out for those &#8220;quantum&#8221; snake oil salesmen!</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://thequantumobserver.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The Quantum Observer! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[The Quantum Observer - Extraordinary Thursday Edition ]]></title><description><![CDATA[When Two World Records Drop in 48 Hours, Sunday Can Wait]]></description><link>https://thequantumobserver.com/p/the-quantum-observer-extraordinary</link><guid isPermaLink="false">https://thequantumobserver.com/p/the-quantum-observer-extraordinary</guid><dc:creator><![CDATA[Marin Ivezic]]></dc:creator><pubDate>Thu, 23 Oct 2025 10:32:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!nym7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b4bf8f7-050f-4fe4-980a-675c6102df5b_4928x3264.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!nym7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b4bf8f7-050f-4fe4-980a-675c6102df5b_4928x3264.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!nym7!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b4bf8f7-050f-4fe4-980a-675c6102df5b_4928x3264.jpeg 424w, https://substackcdn.com/image/fetch/$s_!nym7!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b4bf8f7-050f-4fe4-980a-675c6102df5b_4928x3264.jpeg 848w, https://substackcdn.com/image/fetch/$s_!nym7!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b4bf8f7-050f-4fe4-980a-675c6102df5b_4928x3264.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!nym7!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b4bf8f7-050f-4fe4-980a-675c6102df5b_4928x3264.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!nym7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b4bf8f7-050f-4fe4-980a-675c6102df5b_4928x3264.jpeg" width="1456" height="964" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6b4bf8f7-050f-4fe4-980a-675c6102df5b_4928x3264.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:964,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:6524643,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://thequantumobserver.com/i/176905705?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b4bf8f7-050f-4fe4-980a-675c6102df5b_4928x3264.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!nym7!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b4bf8f7-050f-4fe4-980a-675c6102df5b_4928x3264.jpeg 424w, https://substackcdn.com/image/fetch/$s_!nym7!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b4bf8f7-050f-4fe4-980a-675c6102df5b_4928x3264.jpeg 848w, https://substackcdn.com/image/fetch/$s_!nym7!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b4bf8f7-050f-4fe4-980a-675c6102df5b_4928x3264.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!nym7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b4bf8f7-050f-4fe4-980a-675c6102df5b_4928x3264.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Close-up of an IonQ trapped-ion quantum processor chip, showcasing the microfabricated electrodes used to trap and manipulate individual ions for quantum computation. Courtesy of IonQ</figcaption></figure></div><p>First, an apology and an explanation.</p><p>This newsletter is supposed to arrive in your inbox every Sunday morning with your coffee. I missed last Sunday. And here I am, breaking the pattern again &#8211; sending you a Thursday edition instead. </p><p>Here&#8217;s why: The quantum computing world just experienced another super exciting few days. Two announcements dropped back-to-back this week that generated a flood of questions from many of you, and I couldn&#8217;t in good conscience wait until Sunday to talk about them. </p><p>When Google claims its first &#8220;verifiable quantum advantage&#8221; and IonQ shatters world records for quantum gate accuracy in the same week, you don&#8217;t stick to the publishing schedule &#8211; you hit send.</p><p>So consider this your emergency broadcast from the quantum frontlines. The regular Sunday newsletter will resume this weekend, but what happened demands immediate attention. These breakthroughs impact the timeline to Q-Day (the moment quantum computers can crack our encryption), and if you&#8217;re responsible for your organization&#8217;s security posture, you need to understand what just changed.</p><p>Let&#8217;s dive in.</p><div><hr></div><h2>Google&#8217;s Willow: The First &#8220;Verifiable&#8221; Quantum Advantage</h2><p><strong>TL;DR:</strong> Google Quantum AI unveiled its Willow chip running a new algorithm called Quantum Echoes that achieved the first-ever verifiable quantum advantage &#8211; producing results in seconds that would take the world&#8217;s fastest supercomputer over 3 years per data point. Unlike Google&#8217;s controversial 2019 &#8220;quantum supremacy&#8221; claim, this one produces repeatable, checkable results that actually relate to real physics problems.</p><h3>What Happened</h3><p>On October 22nd, Google announced that its 105-qubit Willow superconducting processor ran an algorithm that no classical computer can feasibly match. The experiment used 65 qubits to probe quantum chaos through something called &#8220;out-of-time-order correlators&#8221; (OTOCs) &#8211; essentially quantum echo signals that reveal how information scrambles in quantum systems.</p><p>The headline number? Google&#8217;s Quantum Echoes algorithm ran approximately 13,000&#215; faster than the best classical simulation on Frontier, one of the world&#8217;s most powerful supercomputers. Some individual measurements would take Frontier over 3 years to compute; Willow generated them in seconds.</p><p>But here&#8217;s what makes this different from the 2019 Sycamore &#8220;quantum supremacy&#8221; controversy: the results are verifiable and reproducible. Instead of sampling random bits with no way to check the answer, Quantum Echoes produces a stable, deterministic observable that can be cross-checked by running the experiment again. It&#8217;s a quantum computation you can actually verify &#8211; hence Google&#8217;s careful framing as &#8220;verifiable quantum advantage.&#8221;</p><p>Even more intriguing: Google didn&#8217;t just run a physics experiment. In collaboration with UC Berkeley, they applied the same technique to molecular structure determination via NMR spectroscopy. They simulated molecules with 15 and 28 atoms, matching laboratory NMR data while extracting structural information that traditional NMR alone can&#8217;t easily provide. It&#8217;s an early glimpse of quantum computers augmenting real chemistry and materials science workflows.</p><h3>Why It Matters</h3><p>This addresses the biggest criticism of quantum supremacy demos: &#8220;Sure, your quantum computer can do something classical computers can&#8217;t &#8211; but who cares if it&#8217;s a useless task?&#8221;</p><p>Quantum Echoes isn&#8217;t Shor&#8217;s algorithm, and it won&#8217;t balance anyone&#8217;s checkbook. But measuring OTOCs is actually valuable for Hamiltonian learning &#8211; figuring out the internal interactions of quantum systems like molecules or novel materials. Scientists care about this. It&#8217;s a step toward quantum computers doing things that matter in physics, chemistry, and drug discovery.</p><p>From a hardware perspective, running a 65-qubit algorithm with enough precision to get verifiable results shows that superconducting quantum processors are maturing. Willow achieved gate error rates around 0.1% or better &#8211; good enough to run complex circuits and see real quantum effects emerge above the noise.</p><p>The experiment also required collecting approximately one trillion measurements over the course of the project. That&#8217;s not a typo. It shows how demanding these experiments are, but also that Google&#8217;s hardware is stable enough to accumulate that much data without falling apart.</p><h3>Q-Day Impact: Not Immediate, But Validated Progress</h3><p>Let&#8217;s be clear: <strong>This doesn&#8217;t break encryption. This doesn&#8217;t run Shor&#8217;s algorithm. This doesn&#8217;t make Q-Day imminent.</strong></p><p>However, it does validate that quantum computing is advancing along the roadmap toward cryptographically relevant machines. Google&#8217;s own roadmap lists milestones from basic quantum advantage (2019) through error-corrected qubits (2023) to eventually building large-scale error-corrected systems. Willow&#8217;s verifiable advantage is progress along that path.</p><p>The gap between &#8220;interesting physics experiment on 65 qubits&#8221; and &#8220;breaking RSA-2048 with a million error-corrected qubits&#8221; remains vast. Google&#8217;s team openly acknowledges that reaching a useful CRQC (Cryptographically Relevant Quantum Computer) will require &#8220;orders-of-magnitude improvement in system performance and scale, with millions of components to be developed and matured.&#8221;</p><p>But every time a quantum vendor delivers on a milestone &#8211; especially one involving verifiable results on real problems &#8211; it strengthens confidence that those future milestones are achievable. <strong>It&#8217;s not that Q-Day moved; it&#8217;s that we have another data point confirming early 2030s remains plausible.</strong></p><p>My <strong>Deep dive:</strong> <a href="https://postquantum.com/quantum-research/googles-quantum-advantage/">Google&#8217;s Quantum Advantage: What &#8220;Verifiable&#8221; Really Means and Why It Matters</a></p><div><hr></div><h2>IonQ&#8217;s Four-Nines Breakthrough: The Scaling Wall Just Crumbled</h2><p><strong>TL;DR:</strong> IonQ achieved &gt;99.99% accuracy on two-qubit gates &#8211; crossing the long-awaited &#8220;four-nines&#8221; threshold &#8211; and did it without the slow cooling step that usually bottlenecks trapped-ion systems. This isn&#8217;t just a record; it&#8217;s a fundamental shift in how scalable quantum computers can be built.</p><h3>What Happened</h3><p>On October 21st (yes, the day before Google&#8217;s announcement), IonQ revealed that its team (including the recently acquired Oxford Ionics group) demonstrated two-qubit gate fidelity above 99.99% on trapped-ion hardware. That&#8217;s an error rate below 1 in 10,000 operations &#8211; a milestone the quantum computing community has been anticipating for years.</p><p>But the real breakthrough isn&#8217;t just the number. It&#8217;s how they achieved it.</p><p>Normally, trapped-ion quantum computers need to cool their ions to near-absolute-zero (ground-state cooling) before running operations &#8211; a time-consuming step that can dominate 98-99% of total runtime. IonQ&#8217;s new &#8220;smooth gate&#8221; technique bypasses this cooling requirement entirely while maintaining four-nines accuracy. They demonstrated error rates as low as 0.0084% per gate (0.000084 infidelity) across sequences of 432 two-qubit gates, and the gates remained accurate even when they deliberately heated the ions.</p><p>Think about what this means: You can run high-quality quantum operations without waiting for your quantum computer to cool down between steps. It&#8217;s like going from a high-performance race car that needs to cool its engine for an hour between laps to one that can run lap after lap at full speed.</p><p>The technical mechanism is elegant: instead of precisely timing strong laser pulses (the usual approach), IonQ&#8217;s &#8220;smooth gate&#8221; slowly ramps the gate&#8217;s frequency during operation. This adiabatic approach suppresses the motion-related errors that normally get worse when ions are warmer, meaning the system stays accurate at &#8220;normal&#8221; temperatures (well, normal for quantum computers &#8211; still a frosty 1 Kelvin, but 100&#215; warmer than typical superconducting qubits).</p><h3>Why It Matters: The Math Changes Everything</h3><p>Moving from 99.9% to 99.99% fidelity isn&#8217;t a &#8220;10% improvement&#8221; &#8211; <strong>it&#8217;s a thousand-fold reduction in effective error rates</strong> once you stack quantum error correction.</p><p>Here&#8217;s the exponential reality: If you want to run a 1,000-gate quantum circuit, at 99% per-gate fidelity you&#8217;ll get a clean run only 0.004% of the time (about 1 in 23,000 attempts). Bump that to 99.9% and you get clean runs ~36.8% of the time. But at 99.99% fidelity, you get clean 1,000-gate circuits ~90.5% of the time.</p><p>In other words, four-nines moves you from toy-scale circuits to being able to run thousands of gates before error correction meaningfully kicks in. That&#8217;s the threshold where surface codes and other error-correction schemes become practical rather than theoretical.</p><p>Combined with eliminating the cooling bottleneck, IonQ just removed two major obstacles to scaling trapped-ion quantum computers: quality and speed. They can now run high-fidelity operations much faster than before, which means more gates per second and less time to complete complex quantum algorithms.</p><h3>Q-Day Impact: The Timeline Just Got More Concrete</h3><p>This is where things get real for cybersecurity and cryptography professionals.</p><p>Earlier this year, Craig Gidney&#8217;s updated analysis suggested that fewer than 1 million physical qubits could factor RSA-2048 in under a week using optimized error correction &#8211; down from the canonical &#8220;20 million qubits&#8221; estimate. That analysis assumed gate error rates around 0.1% (99.9% fidelity) and 1-microsecond cycle times.</p><p>IonQ just demonstrated 10&#215; better fidelity than those assumptions. Higher fidelity means lower error-correction overhead, which means fewer physical qubits per logical qubit. While IonQ&#8217;s gates are slower than the 1-microsecond assumption (currently ~226 microseconds), eliminating cooling overhead could compensate by speeding up real-world circuit execution.</p><p>IonQ is openly messaging a roadmap to 256-qubit systems in 2026 and &#8220;millions of qubits by 2030&#8221; via their Electronic Qubit Control (EQC) approach. Many were skeptical of those timelines. This breakthrough lends them credibility.</p><p>So I ran the numbers through my Q-Day estimator with updated assumptions reflecting IonQ&#8217;s progress:</p><ul><li><p><strong>Mid-case scenario</strong> (256 logical qubits, 10<sup>11</sup> operations budget, 10<sup>6</sup> ops/sec, 2.3&#215; yearly improvement): Crosses the CRQC threshold in <strong>approximately 2030</strong></p></li><li><p><strong>Conservative scenario</strong> (slower scale-up): <strong>~2033-2034</strong></p></li><li><p><strong>Aggressive scenario</strong> (IonQ hits its roadmap targets): <strong>2027-2028</strong></p></li></ul><p>Most likely, reality lands between conservative and mid-case. But even the conservative estimate puts a cryptographically relevant quantum computer within this decade. </p><p>Here&#8217;s the bottom line: <strong>A credible vendor just crossed a pivotal quality threshold in a way that also speeds up quantum operations.</strong> This is the kind of technical milestone that should trigger escalation from &#8220;quantum preparedness planning&#8221; to &#8220;active cryptographic migration.&#8221;</p><p>My <strong>Deep dive:</strong> <a href="https://postquantum.com/quantum-research/ionq-record-2025/">IonQ Crosses Four-Nines: What It Means for Quantum Computing Timelines</a></p><div><hr></div><h2>What This Week Means: The Quantum Threat Timeline Just Solidified</h2><p>It&#8217;s not every week (or even every year) that we see leaps like these in quantum computing. Two different milestones &#8211; one in computational ability (Google) and one in hardware performance (IonQ) &#8211; arrived practically back-to-back. </p><ul><li><p><strong>Google showed that quantum computers can now perform verifiable, beyond-classical computations</strong> that relate to real scientific problems. It&#8217;s not just random circuit sampling anymore; it&#8217;s actual physics and chemistry where quantum hardware outperforms classical supercomputers in measurable, reproducible ways.</p></li><li><p><strong>IonQ demonstrated the quality and speed breakthroughs needed to make large-scale quantum computers practical.</strong> Four-nines fidelity without slow cooling removes two of the biggest obstacles to building million-qubit machines.</p></li></ul><p>This speaks to the rapid momentum in the field. For those of us watching the quantum landscape, it&#8217;s a thrilling validation that the technology is progressing on multiple fronts: we&#8217;re solving harder problems and building better machines. </p><p>But it also underscores why staying on top of these developments is critical, especially for security and policy professionals. Quantum advantage experiments are inching from lab curiosities toward practical uses, and hardware improvements are shrinking the timeline to powerful, cryptography-breaking computers.</p><div><hr></div><p><em>(Quick plug: This is exactly where my team at <a href="https://appliedquantum.com">Applied Quantum</a> can help.) If you&#8217;re unsure how these quantum advancements might impact your organization, or how to start preparing, reach out to us. We specialize in helping companies and government agencies navigate the quantum era &#8211; from quantum risk assessments and crypto-agility roadmaps to hands-on PQC migration and quantum security training. In short, we can help you turn quantum uncertainty into strategic advantage, and ensure you&#8217;re ready for whatever comes next.</em></p><div><hr></div><p>Thank you for reading this special edition of the Quantum Observer newsletter. We&#8217;ll return to our regular Sunday schedule, but I couldn&#8217;t stay quiet on these exciting developments! Feel free to reply with your thoughts or questions &#8211; and as always, stay curious and stay prepared.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://thequantumobserver.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The Quantum Observer! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Quantum Observer #2 - Quantum Crowned, Quantum Challenged]]></title><description><![CDATA[From the Nobel Prize to new breakthroughs, business momentum, and policy shifts - the quantum world accelerates on every front.]]></description><link>https://thequantumobserver.com/p/quantum-observer-2-quantum-crowned</link><guid isPermaLink="false">https://thequantumobserver.com/p/quantum-observer-2-quantum-crowned</guid><dc:creator><![CDATA[Marin Ivezic]]></dc:creator><pubDate>Sun, 12 Oct 2025 21:55:12 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!6srj!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b57a052-8fe2-4f01-b0c7-e86d3fe73909_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!6srj!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b57a052-8fe2-4f01-b0c7-e86d3fe73909_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!6srj!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b57a052-8fe2-4f01-b0c7-e86d3fe73909_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!6srj!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b57a052-8fe2-4f01-b0c7-e86d3fe73909_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!6srj!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b57a052-8fe2-4f01-b0c7-e86d3fe73909_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!6srj!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b57a052-8fe2-4f01-b0c7-e86d3fe73909_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!6srj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b57a052-8fe2-4f01-b0c7-e86d3fe73909_1536x1024.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3b57a052-8fe2-4f01-b0c7-e86d3fe73909_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2740869,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://quantumobserver.com/i/175961480?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b57a052-8fe2-4f01-b0c7-e86d3fe73909_1536x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!6srj!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b57a052-8fe2-4f01-b0c7-e86d3fe73909_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!6srj!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b57a052-8fe2-4f01-b0c7-e86d3fe73909_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!6srj!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b57a052-8fe2-4f01-b0c7-e86d3fe73909_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!6srj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b57a052-8fe2-4f01-b0c7-e86d3fe73909_1536x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://thequantumobserver.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://thequantumobserver.com/subscribe?"><span>Subscribe now</span></a></p><p><em><strong>In this edition:</strong> A Nobel Prize that honors the roots of today&#8217;s qubits, a spirited debate on HSBC &amp; IBM&#8217;s quantum experiment, major business moves from Rigetti and Pasqal, new breakthroughs from labs that are literally heating up quantum computing, global policies accelerating readiness, and a new recurring section - Quantum Flapdoodle of the Week - to keep your baloney detector sharp.</em></p><p>If last month felt like quantum tech was sprinting, the past two weeks made it clear we&#8217;ve hit another gear. The 2025 Nobel Prize in Physics crowned the pioneers who turned quantum circuits into artificial atoms - the foundation of modern superconducting qubits. </p><p>At the same time, quantum business headlines multiplied, governments rolled out fresh readiness initiatives, and researchers dropped results that make the path to large-scale, fault-tolerant quantum systems look a bit shorter - and hotter.</p><p>Even the hype machine joined the action, from media overreacting to the HSBC-IBM experiment to the wild world of &#8220;quantum medbeds.&#8221; </p><p>Amid all this noise, one signal stands out: <strong>quantum has left the theoretical stage.</strong> It&#8217;s now an industry, a policy agenda, and - thanks to <em>The Quantum Minute</em> - apparently an award-winning podcast, too.</p><div><hr></div><h1>Nobel Prize in Physics 2025 goes to quantum (and the roots of today&#8217;s qubits)</h1><p><em><strong>TL;DR:</strong> The 2025 Nobel Prize in Physics went to the pioneers who proved that quantum effects can exist in macroscopic circuits - a discovery that paved the way for today&#8217;s superconducting qubits and the modern quantum computer.</em></p><p>The Royal Swedish Academy of Sciences awarded the 2025 Physics Nobel to John Clarke, Michel H. Devoret, and John M. Martinis &#8220;<em>for the discovery of macroscopic quantum mechanical tunnelling and energy quantisation in an electric circuit</em>.&#8221; In the 1980s-90s, their Josephson-junction and superconducting-circuit experiments showed that circuits you can hold in your hand behave like artificial atoms - tunnelling between quantized energy states - establishing the platform that later became today&#8217;s superconducting qubits (e.g., transmons) and readout methods. In short: they proved quantum weirdness scales up, and that insight underpins much of modern quantum computing, sensing, and measurement.</p><p>I wrote a brief reaction here: <a href="https://postquantum.com/industry-news/nobel-prize-physics-2025-quantum/">Quantum Tunnelling on a Chip: Why the 2025 Nobel Prize in Physics Matters for Quantum Tech</a>. I also predicted this would be a &#8220;quantum year&#8221; - but didn&#8217;t guess the exact laureates - here: <a href="https://postquantum.com/quantum-computing/2025-nobel-quantum-computing/">Predicting Quantum Computing Winning 2025 Nobel Physics Prize</a>? </p><p>For background on the winners and their impact, see the <a href="https://www.nobelprize.org/prizes/physics/2025/press-release/">Nobel press material</a> and roundups.</p><h1>A Different Take on the HSBC&#8211;IBM Experiment</h1><p><em><strong>TL;DR:</strong> HSBC and IBM&#8217;s bond-pricing experiment showed a surprising 34% boost from quantum noise - intriguing, but not &#8220;quantum advantage.&#8221; Scott Aaronson&#8217;s critique is a sharp reality-check against hype.</em></p><p>In the <a href="https://quantumobserver.com/p/quantums-wild-week">last newsletter</a> I covered <a href="https://postquantum.com/quantum-research/hsbc-ibm-quantum-advantage/">HSBC and IBM&#8217;s quantum finance experiment</a>, where their team observed a 34% improvement in bond-pricing predictions using a hybrid quantum-classical model. As I noted then, neither HSBC nor IBM ever claimed &#8220;quantum advantage.&#8221; They simply ran a thoughtful experiment and, somewhat mysteriously, found that quantum noise seemed to help the model generalize better. I found that fascinating - not proof of advantage, but a hint of new physics-inspired behavior worth studying. If it sparks more research and investment in quantum finance, all the better.</p><p>Scott Aaronson, however, offered a sharply different view in his <a href="https://scottaaronson.blog/?p=9170">recent blog post</a>. He argues that media headlines stretched a modest result into hype and that we should resist celebrating &#8220;advantage&#8221; claims until the mechanisms, and reproducibility, are rigorously proven. His perspective matters because Aaronson has long served as the field&#8217;s most credible reality-check between genuine progress and marketing spin. So you should check it out.</p><p>In truth, both views can coexist: experiments like HSBC-IBM&#8217;s show how curiosity and commercial exploration drive discovery, while voices like Aaronson&#8217;s remind us to keep the science disciplined. Quantum needs both the explorers and the skeptics - they&#8217;re what keep the field honest and moving forward.</p><div><hr></div><h1>The Business of Quantum: Commercial Signals Strengthen Across Finance and Industry</h1><p>The quantum computing industry saw key signs of maturation over the past two weeks, from large sales to mainstream finance experiments. Rigetti Computing, for instance, <a href="https://quantumzeitgeist.com/quantum-computing-goes-mainstream-5-7m-orders-signal-industry-maturation/">announced $5.7&#8239;million in purchase orders</a> for two on-premise quantum systems (9-qubit Novera processors) &#8211; a milestone that shifts quantum access from the cloud to the hands of more researchers. </p><p>In finance, quantum is increasingly on the agenda: at the Sibos 2025 banking conference, experts highlighted quantum&#8217;s emerging use cases in asset management and fraud detection while <a href="https://www.fintechfutures.com/fintech/sibos-2025-final-day-spotlights-the-risks-and-opportunities-associated-with-quantum-computing-">urging preparation for future encryption-breaking threats</a>. Around the same time, <a href="https://thequantuminsider.com/2025/10/05/ibm-vanguard-test-quantum-approach-to-building-portfolios/#:~:text=,as%20promising%20for%20future%20financial">IBM and Vanguard revealed</a> a successful test of a 109-qubit quantum-classical workflow for portfolio optimization, hinting that hybrid quantum algorithms could accelerate complex financial computations in the near future.</p><p>Investors have taken note of these advances &#8211; <a href="https://www.businessinsider.com/quantum-computing-stocks-rally-use-cases-hsbc-vanguard-rgti-qubt-2025-10">quantum computing stocks have surged</a> in recent weeks as breakthroughs move the tech &#8220;out of the lab and into the real world,&#8221; sparking bullish sentiment. </p><p>And in a transatlantic expansion, French startup <a href="https://chicago.suntimes.com/technology/2025/10/09/french-pasqal-us-headquarters-south-works-quantum-computing-park">Pasqal is investing $65&#8239;million</a> to establish its first U.S. headquarters in Chicago, building a neutral-atom quantum computer at the new Illinois Quantum &amp; Microelectronics Park and creating at least 50 jobs. Illinois&#8217; governor hailed Pasqal&#8217;s move as &#8220;another major step forward&#8221; in the state&#8217;s quest to become a leading U.S. quantum hub. </p><p>All these developments signal that quantum computing&#8217;s momentum in the business world is stronger than ever.</p><div><hr></div><h1>Quantum Tech Breakthroughs: Scaling Faster, Running Hotter, Thinking Smarter</h1><h3>&#8220;Above 1&#8239;K Qubits&#8221; &#8211; 100&#215; Higher Temperature Quantum Operation</h3><p><em><strong>TL;DR:</strong> EeroQ&#8217;s new electron-on-helium qubits work at 1.1 K - 100&#215; hotter than typical superconducting qubits. By easing the extreme-cooling bottleneck, this breakthrough could make large-scale quantum computers far more practical - and potentially accelerate the road to Q-Day.</em></p><p>Quantum startup EeroQ has smashed the milli-Kelvin barrier in a new hardware breakthrough. In a <a href="https://journals.aps.org/prx/abstract/10.1103/vcl7-73ms">paper published in </a><em><a href="https://journals.aps.org/prx/abstract/10.1103/vcl7-73ms">Physical Review X</a></em>, EeroQ&#8217;s team showed they can trap and control individual electron-based qubits on superfluid helium at 1.1 kelvin. That&#8217;s more than 100&#215; hotter than the ~10&#8239;millikelvin temperatures at which superconducting qubits typically operate. Using on-chip microwave circuits, they detected single electrons dancing on a helium film, loading and moving them one by one while maintaining quantum coherence. This validates a long-standing theory: electrons on helium can serve as stable, long-lived qubits even at elevated temps. As EeroQ&#8217;s co-founder Johannes Pollanen put it, this &#8220;<em>reduces a key barrier to scalable quantum computing</em>&#8221; by showing qubits that work in a far less cryogenic environment.</p><p><strong>Why it matters:</strong> Cooling is one of the toughest engineering challenges in quantum computing. Today&#8217;s quantum processors sit in expensive dilution refrigerators colder than outer space, and heat dissipation is a major limit on scaling up. EeroQ&#8217;s result suggests we can build qubits that run at 1 K or above, where cooling power is orders of magnitude higher and refrigeration is much easier. In practical terms, this could let quantum computers pack in many more qubits and even integrate some control electronics inside the fridge without overheating. By easing the cryogenic bottleneck, high-temperature electron-on-helium qubits might pave the way for larger, more practical quantum machines that don&#8217;t require a football-field of cooling infrastructure.</p><p><strong>Q-Day impact:</strong> Potentially huge. A cryptographically relevant quantum computer (able to break RSA/ECC) will likely require millions of physical qubits &#8211; which is nearly impossible with today&#8217;s ultra-cold, delicate setups. If qubits can operate reliably at around 1 kelvin, scaling to massive qubit counts becomes much more feasible. That means the timeline to a true crypto-breaking quantum computer could speed up, since one key hurdle (extreme cooling requirements) might be overcome sooner than expected. In short, this &#8220;hot qubit&#8221; breakthrough brings the prospect of an at-scale quantum computer closer to reality, increasing urgency to move to quantum-safe encryption before Q-Day arrives.</p><p><em>My analysis: <a href="https://postquantum.com/quantum-research/above-1-k-qubits/">Above 1K Qubits</a></em></p><p><em>Original paper: <a href="https://journals.aps.org/prx/abstract/10.1103/vcl7-73ms">Sensing and Control of Single Trapped Electrons above 1 K</a></em></p><h3>&#8220;Quantum Lattice Attack Speedup&#8221; - SVP Exponent Shaved (~0.309&#8594;0.285)</h3><p><em><strong>TL;DR</strong>: Dutch researchers cut the quantum attack time on lattice cryptography&#8217;s core problem (SVP) from an exponent of 0.309 to 0.285 - an ~8% drop that translates to ~30&#8211;60 million x faster theoretical cracking for large lattices. PQC remains safe for now, but a reminder that smarter algorithms, not just bigger quantum machines, could still nudge Q-Day closer.</em></p><p>A team of researchers in the Netherlands has found a significant cryptanalytic improvement against lattice-based encryption &#8211; the class of schemes underpinning leading post-quantum algorithms like Kyber and Dilithium. The security of those schemes relies on the hardness of the Shortest Vector Problem (SVP) on high-dimensional lattices. </p><p>The best-known attacks use a technique called lattice sieving, which runs in exponential time 2c&#183;d (c a constant, d = dimension). The new research accelerates the quantum version of 3&#8209;tuple sieving by reducing its time constant from 0.3098 to 0.2846 (an ~8% drop). In concrete terms, for a large lattice of dimension 1000, that&#8217;s like cutting the attack time exponent from 309.8 to 284.6 - a massive speedup (on the order of 2<sup>25</sup>&#8211;2<sup>26</sup> &#8776; 30&#8211;60 million times faster for d=1000!). </p><p>They achieved this by using a two-level quantum amplitude amplification strategy focused on local &#8220;center points&#8221; in the lattice, which guides the search more efficiently. The trade-off is a memory cost of about 20.1887&#183;d bits (QRAM) for the algorithm. Overall, this gives the fastest known quantum attack on SVP for a wide range of practical memory limits.</p><p><strong>Why it matters:</strong> Any improvement in attacking the underlying hard problems of post-quantum cryptography (PQC) is big news. This result doesn&#8217;t break lattice cryptography outright &#8211; the runtime is still exponential &#8211; but it significantly lowers the bar for a quantum cryptanalyst. In essence, lattice-based schemes might need larger dimensions (and keys) to maintain the same security margin, because quantum attackers just got a theoretical speed boost. It&#8217;s also a striking reminder that progress in quantum computing isn&#8217;t only about hardware &#8211; better algorithms can suddenly make our classical assumptions much weaker. Cryptographers will be scrutinizing whether parameters for schemes like Kyber should be adjusted in light of these kinds of advances.</p><p><strong>Q-Day impact:</strong> Marginal but not negligible. This attack is still exponential-time, so it doesn&#8217;t enable near-term decryption of lattice-encrypted data. However, any reduction in exponent is a meaningful shortening of the timeframe required for a quantum computer to crack cryptography. Today&#8217;s recommended lattice parameters stay secure, but if quantum algorithms keep improving (just as Craig Gidney&#8217;s 2025 paper slashed the qubit requirements for factoring RSA ), the &#8220;effective strength&#8221; of PQC can erode faster than expected. The takeaway: we must stay agile. Q-Day could arrive not just via new machines, but via smarter math. This latest speedup in lattice-cracking, while not a direct threat yet, underlines the importance of ongoing cryptanalysis and perhaps a healthy safety margin in our post-quantum standards.</p><p><em>My analysis: <a href="https://postquantum.com/quantum-research/quantum-sieving-breakthrough/">Quantum Sieving Breakthrough: Lattice Attack Exponent Slashed by 8%</a></em></p><p><em>Original paper: <a href="https://arxiv.org/abs/2510.08473">An Improved Quantum Algorithm for 3-Tuple Lattice Sieving</a></em></p><h3>Ultrafast Squeezed Light Captures Quantum Uncertainty in Real Time</h3><p><em><strong>TL;DR</strong>: Scientists captured and controlled quantum uncertainty in real time using ultrafast squeezed light - watching noise shift between amplitude and phase on attosecond scales. It doesn&#8217;t speed up code-breaking, but it opens a new frontier in ultrafast quantum optics that could drive advances in quantum communication, sensing, and control.</em></p><p>Researchers demonstrated the first ultrafast squeezed-light pulses that let them measure and control quantum uncertainty on femto/attosecond timescales. Using a nonlinear optical setup (four-wave mixing in glass) and carefully phased laser pulses, they dynamically &#8220;dialed&#8221; noise between amplitude and phase - essentially watching the uncertainty ellipse evolve in real time - and even showed a petahertz-rate secure-communication demo based on the squeezed states.</p><p><strong>Why it matters:</strong> Squeezed light has long improved precision sensing (e.g., LIGO), but doing it ultrafast turns a static quantum limit into a tunable resource. That opens a new lane - ultrafast quantum optics - with implications for high-bandwidth quantum comms, lower-noise metrology, and potentially faster quantum control techniques that piggyback on engineered quantum noise.</p><p><strong>Q-Day impact:</strong> Not directly. But I still find it super interesting. This doesn&#8217;t make factoring or cryptanalysis faster. However, it could strengthen quantum communications and sensing ecosystems (and investment), indirectly accelerating quantum-tech maturity while reminding security teams that &#8220;quantum-secure&#8221; networking will also evolve quickly.</p><p><em>My analysis: <a href="https://postquantum.com/quantum-research/capturing-uncertainty/">Capturing Uncertainty</a></em></p><p><em>Original paper: <a href="https://www.nature.com/articles/s41377-025-02055-x">Attosecond quantum uncertainty dynamics and ultrafast squeezed light for quantum communication</a></em></p><div><hr></div><h1>Policy &amp; Readiness</h1><p>Policymakers and standards bodies worldwide are stepping up quantum readiness efforts. In the U.S., <a href="https://thequantuminsider.com/2025/10/06/california-enacts-law-to-build-statewide-strategy-for-quantum-technology/">California just enacted a law (Assembly Bill 940)</a> to create the state&#8217;s first comprehensive quantum technology strategy by 2026 &#8211; making quantum tech a top economic priority and even committing $4 million to new quantum research funding. </p><p>Over in Europe, the telecom standards organization <a href="https://www.etsi.org/newsroom/press-releases/2594-etsi-creates-new-committee-on-quantum-technologies">ETSI launched a new Quantum Technologies committee</a> to develop standards for quantum communications and networks, supporting initiatives like the EuroQCI and Europe&#8217;s Quantum Act. </p><p>And the UK&#8217;s National Cyber Security Centre <a href="https://www.techuk.org/resource/ncsc-shares-update-on-post-quantum-cryptography-pilot-scheme.html">reopened its Post-Quantum Cryptography (PQC) pilot scheme</a>, aiming to certify consulting firms that help businesses migrate to quantum-safe encryption &#8211; a move to ensure companies are prepared for large-scale PQC adoption.</p><p>Financial regulators are also gearing up for the quantum era. The <a href="https://postquantum.com/quantum-policy/fca-quantum-finance/">UK Financial Conduct Authority (FCA) published a research note</a> examining where quantum computing could impact financial services first and how firms should prepare, framing 2025 as a critical moment to engage early with the technology while managing risks. </p><p>Similarly in Singapore, the Monetary Authority of Singapore (MAS) &#8211; alongside DBS, HSBC, OCBC and UOB banks &#8211; <a href="https://postquantum.com/quantum-policy/mas-qkd-sandbox/">completed a pioneering trial of quantum key distribution</a> in banking networks. The newly released technical report shows QKD can successfully secure data links between financial institutions, but also highlights integration challenges (like the need for interoperability standards and secure relay nodes) before such quantum-safe tech can be rolled out broadly. </p><p>Together, these policy moves underscore a global push to proactively prepare for the coming quantum age.</p><div><hr></div><h1>Quantum Flapdoodle of the Week</h1><p>Welcome to a new (and probably endless) series where we explore the stranger corners of the &#8220;quantum&#8221; universe - the bold, the bizarre, and the beautifully implausible. Because when &#8220;quantum&#8221; becomes the seasoning sprinkled on every half-baked idea or a scam, someone needs to taste-test the soup.</p><p>This week&#8217;s specimen: <a href="https://postquantum.com/quantum-computing/quantum-medbeds/">Quantum Medbeds</a> - a supposedly miraculous healing device powered by quantum entanglement, photon resonance, and, depending on the sales pitch, divine frequency alignment. The claim: it can diagnose, treat, and regenerate your body by &#8220;reprogramming cells through quantum vibration.&#8221; The reality: it&#8217;s pure science fiction, wrapped in technobabble and sold as salvation.</p><p>As I wrote, there&#8217;s no physics, no data, and no actual &#8220;quantum&#8221; - just the same old pseudoscientific promises with shinier buzzwords. </p><p>But here&#8217;s the silver lining: each new wave of quantum nonsense gives us another reason to sharpen our baloney detectors (see the <a href="https://postquantum.com/quantum-computing/quantum-baloney-detection-toolkit/">Quantum Baloney Detection Toolkit</a>) - and to laugh about it with tools like the <a href="https://postquantum.com/quantum-technobabble-generator/">Quantum Technobabble Generator</a>. Because sometimes the best way to debunk quantum snake oil is simply to out-absurd it.</p><div><hr></div><h1>New on PostQuantum.com</h1><p>There&#8217;s a new post on PostQuantum.com at least weekly - research, analysis, or practical guidance on quantum readiness. But this week I&#8217;d like to highlight something different: the new <a href="https://postquantum.com/quantum-readiness-starting/">Getting Started With Quantum Readiness</a> page.</p><p>It&#8217;s designed as a structured guide for anyone beginning a quantum-safe journey. The page organizes key articles and tools by phase - from executive briefings and cryptographic inventory to risk prioritization, migration planning, and long-term operations. Think of it as a living roadmap: a place to orient yourself, follow the right sequence, and return to as your program evolves. Even if you&#8217;ve already started, it&#8217;s worth a look - it connects all the moving parts of quantum readiness into one clear path forward.</p><p><em>The page: <a href="https://postquantum.com/quantum-readiness-starting/">Getting Started With Quantum Readiness</a></em></p><h1>From the PostQuantum.com Archive</h1><p>This week I&#8217;m launching a new section, <strong>&#8220;Quantum Flapdoodle of the Week,&#8221;</strong> to spotlight the more&#8230; imaginative corners of the quantum world. </p><p>To set the stage, it&#8217;s worth revisiting the <a href="https://postquantum.com/quantum-computing/quantum-baloney-detection-toolkit/">Quantum Baloney Detection Toolkit</a> - my tongue-in-cheek but practical guide to spotting pseudoscience dressed in qubits. </p><p>And if you&#8217;d rather laugh than rage, try the <a href="https://postquantum.com/quantum-technobabble-generator/">Quantum Technobabble Generator</a>, which churns out perfectly plausible-sounding nonsense for your amusement. Because while quantum hype isn&#8217;t going away anytime soon, a good sense of humor (and a sharp BS detector) keeps us all a little saner.</p><p><em>The article: <a href="https://postquantum.com/quantum-computing/quantum-baloney-detection-toolkit/">Quantum Baloney Detection Toolkit</a></em></p><p><em>AI Nonsense Generator: <a href="https://postquantum.com/quantum-technobabble-generator/">Quantum Technobabble Generator</a></em></p><div><hr></div><h1>&#127897; Applied Quantum&#8217;s The Quantum Minute wins &#8220;Best Podcast Series of 2025&#8221;</h1><p>Big win: our micro-briefing, The Quantum Minute, was named Best Podcast Series of 2025 by Cybercrime Magazine&#8217;s awards program. For a quantum-focused show to top a cybersecurity media slate says a lot about where the industry&#8217;s attention is headed: quantum risk, readiness, and opportunity are now mainstream security topics - not niche science.</p><p><strong>Why it matters:</strong> Recognition from a leading cyber outlet validates the editorial mission behind The Quantum Minute - fast, accurate signal on breakthroughs, policy, and PQC that security leaders can actually use. It also marks the growing convergence of quantum tech and enterprise security.</p><p><em>Read my thoughts about this on PostQuantum: <a href="https://postquantum.com/industry-news/quantum-minute-best-podcast/">The Quantum Minute Wins Best Podcast Series of 2025 &#8211; and What That Really Means for Cybersecurity</a></em></p><p><em>Catch up &amp; subscribe: <a href="https://cybersecurityventures.com/quantum-minute/">Quantum Minute On The Cybercrime Radio Podcast</a></em></p><div><hr></div><p>That&#8217;s a wrap for another remarkable stretch in quantum tech - a week when Nobel committees, investors, researchers, and regulators all seemed to align on one message: quantum is real, relevant, and accelerating.</p><p>From foundational recognition in Stockholm to policy moves in California, from &#8220;hot&#8221; qubits in Michigan to corporate trials in New York and Singapore, the field is advancing faster and more coherently than ever before. And while hype will always trail behind progress (and occasionally lap it), it&#8217;s clear that quantum technology is no longer a future to anticipate - it&#8217;s a present to manage.</p><p>Stay curious, stay skeptical, and stay quantum-ready.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://thequantumobserver.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The Quantum Observer! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[Quantum’s Wild Week]]></title><description><![CDATA[The week quantum research smashed timelines and regulators and industry organizations yelled &#8220;Move faster!&#8221;]]></description><link>https://thequantumobserver.com/p/quantums-wild-week</link><guid isPermaLink="false">https://thequantumobserver.com/p/quantums-wild-week</guid><dc:creator><![CDATA[Marin Ivezic]]></dc:creator><pubDate>Sat, 27 Sep 2025 22:30:56 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!nW8L!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef448bdf-4bbf-4eb0-897a-ecdc7c47000e_2200x1400.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!nW8L!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef448bdf-4bbf-4eb0-897a-ecdc7c47000e_2200x1400.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!nW8L!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef448bdf-4bbf-4eb0-897a-ecdc7c47000e_2200x1400.jpeg 424w, https://substackcdn.com/image/fetch/$s_!nW8L!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef448bdf-4bbf-4eb0-897a-ecdc7c47000e_2200x1400.jpeg 848w, https://substackcdn.com/image/fetch/$s_!nW8L!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef448bdf-4bbf-4eb0-897a-ecdc7c47000e_2200x1400.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!nW8L!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef448bdf-4bbf-4eb0-897a-ecdc7c47000e_2200x1400.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!nW8L!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef448bdf-4bbf-4eb0-897a-ecdc7c47000e_2200x1400.jpeg" width="1456" height="927" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ef448bdf-4bbf-4eb0-897a-ecdc7c47000e_2200x1400.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:927,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:865819,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://quantumobserver.com/i/174710956?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef448bdf-4bbf-4eb0-897a-ecdc7c47000e_2200x1400.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!nW8L!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef448bdf-4bbf-4eb0-897a-ecdc7c47000e_2200x1400.jpeg 424w, https://substackcdn.com/image/fetch/$s_!nW8L!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef448bdf-4bbf-4eb0-897a-ecdc7c47000e_2200x1400.jpeg 848w, https://substackcdn.com/image/fetch/$s_!nW8L!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef448bdf-4bbf-4eb0-897a-ecdc7c47000e_2200x1400.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!nW8L!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef448bdf-4bbf-4eb0-897a-ecdc7c47000e_2200x1400.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">This image shows 6,100 cesium atoms trapped by highly focused laser beams called optical tweezers. The width of the circle is about one millimeter. <em>Credit: Caltech/Endres Lab</em></figcaption></figure></div><p></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://thequantumobserver.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://thequantumobserver.com/subscribe?"><span>Subscribe now</span></a></p><p>This week has been one for the quantum history books. On a single day (Sept 25), a cascade of breakthroughs had me literally jumping out of my seat! From governments issuing calls to action, to standards bodies pushing out new guidelines, to jaw-dropping leaps in quantum hardware and algorithms - the developments came fast and furious. </p><p>It&#8217;s the perfect week to re-launch this weekly newsletter, which will now hit your inbox every weekend, distilling the biggest quantum tech news. And what a relaunch:</p><ul><li><p>Government &amp; industry leaders are shouting &#8220;<em>the time to move on post-quantum security is NOW,</em>&#8221; backed by new White House priorities, international guidance, and fresh standards (NIST, etc.).</p></li><li><p>Meanwhile, quantum researchers delivered not incremental improvements but giant leaps: a startup achieved in 2025 more than what they thought might happen in 2030, a university scaled qubit arrays by 5&#215; to 6&#215; overnight, a new algorithmic method sped up error-corrected computing by 50&#215;, and a photonic experiment slashed a learning task from 20 million years to 15 minutes. Even in finance, HSBC and IBM showed a 34% performance boost from quantum - an unheard-of gain in an industry where even 3.4% would turn heads. (<em>Four breakthroughs in just this one week have a potential impact on the Q-Day arrival!</em>).</p></li></ul><p>In short, this week&#8217;s news wasn&#8217;t business-as-usual - it was more like quantum technology hitting the turbo boost. </p><p>Strap in as I break it down by category below! Each item highlights what happened, why it matters, and whether it brings us closer to &#8220;Q-Day&#8221; - the day quantum computers can crack our encryption. </p><p>Enjoy the deep dive!</p><h1>Quantum Tech Breakthroughs: Giant Leaps, Not Baby Steps</h1><h3>&#8220;Transversal Algorithmic Fault Tolerance&#8221; - 10&#215;-100&#215; Speedup in Quantum Error Correction</h3><p>Harvard, Yale and QuEra researchers unveiled a new framework called Transversal Algorithmic Fault Tolerance (AFT) that massively reduces the time overhead of error-corrected quantum computation. </p><p>In essence, their approach uses clever transversal gates and one-round error syndrome extraction to correct errors &#8220;on the fly&#8221; at the algorithm level rather than doing many slow cycles after each gate. </p><p>The result? They project 10&#215; to 100&#215; faster execution of algorithms on a fully error-corrected quantum computer. For example, applying AFT to Shor&#8217;s algorithm showed that factoring a 2048-bit RSA number could theoretically drop from months to 5.6 days on a future million-qubit machine - about 50&#215; faster than prior estimates. </p><p><strong>Why it matters</strong>: This is a big deal because even if we have enough qubits, the time to run algorithms was another barrier (imagine a code-breaking run taking months - still impractical). AFT tackles that by slashing the runtime penalty of error correction (they only do 1 syndrome round vs d rounds per operation). It&#8217;s a fundamentally new way to run quantum circuits more efficiently. </p><p><strong>Q-Day impact:</strong> Absolutely yes. By cutting the time (with the same qubit count), the threshold for a cryptographically relevant quantum computer comes much closer. One could break RSA in under a week instead of several months - meaning the moment a million-qubit machine exists, it&#8217;s immediately a serious threat, not a slow science project. As my analysis concluded, this breakthrough could move up Q-Day and certainly ups the urgency for deploying quantum-safe encryption. </p><p><em>My analysis: <a href="https://postquantum.com/industry-news/algorithmic-fault-tolerance/">New Paper Alert: &#8220;Low&#8209;Overhead Transversal Fault Tolerance for Universal Quantum Computation&#8221;</a></em></p><p><em>Original paper: <a href="https://www.nature.com/articles/s41586-025-09543-5">Low-overhead transversal fault tolerance for universal quantum computation</a></em></p><h3>Caltech&#8217;s 6,100-Qubit Neutral Atom Array - Largest Ever</h3><p>Caltech physicists blew past previous records by creating an array of 6,100 neutral-atom qubits held in optical tweezers. (The prior state-of-art in neutral atoms was on the order of a few hundred qubits.) </p><p>They achieved this by splitting a laser into 12,000 traps to hold cesium atoms, ending up with 6,100 occupied sites. Crucially, even at this scale each qubit stayed coherent (superposition) for ~13 seconds and single-qubit operations reached 99.98% accuracy - maintaining quality at quantity. They could even shuttle atoms around within the array without losing coherence. </p><p><strong>Why it matters</strong>: This is the largest quantum register ever assembled by a huge margin (&#8776;5-6&#215; bigger than previous). It demonstrates neutral-atom platforms can combine high qubit counts with high fidelity, a combo needed for error correction on thousands of qubits. As one researcher put it, &#8220;quantity and quality&#8221; together. This paves the way toward thousands of physical qubits being manipulated for, say, a surface code. </p><p><strong>Q-Day impact:</strong> Yes, potentially - we&#8217;ll likely need a million of physical qubits for breaking RSA, but jumping from ~1k to 6k in one go is a dramatic step toward that regime. It suggests that with neutral atoms, scaling isn&#8217;t the bottleneck some feared. If such leaps continue (and error correction is implemented on these thousands), a cryptographically relevant quantum computer comes into view sooner. </p><p><em>My analysis: <a href="https://postquantum.com/industry-news/caltechs-6100-qubit/">Caltech&#8217;s 6,100-Qubit Optical Tweezer Array: A Quantum Leap in Scale and Coherence</a></em></p><p><em>Original paper: <a href="https://www.nature.com/articles/s41586-025-09641-4">A tweezer array with 6100 highly coherent atomic qubits</a></em></p><h3>Alice &amp; Bob&#8217;s 1-Hour &#8220;Cat Qubit&#8221; - Fault-Tolerance Ahead of Schedule</h3><p>Quantum startup Alice &amp; Bob achieved a stunner - their novel superconducting &#8220;cat qubit&#8221; remained stable (no bit-flip errors) for about one hour (!!!) That&#8217;s a new world record for any superconducting qubit, obliterating the previous ~7-minute coherence record from last year. In fact, they only expected to hit ~13 minutes by 2030, but hit 60 minutes now! </p><p><strong>Why it matters:</strong> An hour-long coherence means error rates millions of times lower than usual. In practical terms, error correction overhead could drop from needing thousands of physical qubits per logical qubit to maybe just tens. Alice &amp; Bob themselves note this could make their machines &#8220;hundreds of times more hardware-efficient&#8221; - think quantum computers that might fit in a room instead of a warehouse. It basically fast-tracks the timeline for a fault-tolerant quantum computer. </p><p><strong>Q-Day impact:</strong> Definitely yes - by reducing errors, a future code-breaking quantum computer would require far fewer qubits than previously feared. As my analysis notes, this breakthrough could accelerate Q-Day, since a stable, error-corrected quantum machine now looks closer at hand. </p><p><em>My analysis: <a href="https://postquantum.com/industry-news/alice-bobs-one-hour-cat-qubit/">Alice &amp; Bob&#8217;s One-Hour&#8221;Cat Qubit&#8221; Breakthrough &#8211; What It Means for Quantum Computing and Q-Day</a></em></p><p><em>Original blog post: <a href="https://alice-bob.com/blog/just-out-of-the-lab-a-cat-qubit-that-jumps-every-hour/">Just Out of the Lab: A Cat Qubit That Jumps Every Hour</a></em></p><h3>Silicon Spin Qubits Hit 99%+ Fidelity in a 300&#8239;mm Chip Fab</h3><p>A research team from Diraq (Australia) and imec (Belgium) showed that silicon-based spin qubits can be fabricated using standard 300 mm semiconductor manufacturing - and achieve better than 99% gate fidelity on every operation. </p><p>They made four two-qubit test chips on one wafer, all with error rates &lt;1% for both single- and two-qubit gates. Even state prep and measurement were 99.9%. This basically proves you can mass-produce quantum chips in a regular CMOS fab with quality high enough for error correction. </p><p><strong>Why it matters:</strong> Scalability, scalability, scalability! Unlike exotic qubit tech that needs handmade devices, these qubits piggyback on industry-standard processes - think &#8220;Intel Inside&#8221; for quantum. It opens a path to millions of qubits by leveraging existing chip factories. Also, hitting the 99% fidelity threshold means these qubits are at the brink of being usable for fault-tolerant logic (they&#8217;re approaching surface-code error thresholds). </p><p><strong>Q-Day impact:</strong> Absolutely yes - as my analysis puts it, every hurdle overcome (like scalable fab and high fidelity) shortens the road to a crypto-breaking quantum computer. If we can build large arrays of qubits using silicon fabs, the &#8220;engineering challenge&#8221; of Q-Day becomes much easier. This result suggests the timeline to a large-scale quantum machine is contracting. </p><p><em>My analysis: <a href="https://postquantum.com/industry-news/silicon-spin-qubits-fabrication/">Silicon Spin Qubits Achieve &gt;99% Fidelity in 300&#8209;mm Foundry Fabrication</a></em></p><p><em>Original paper: <a href="https://www.nature.com/articles/s41586-025-09531-9">Industry-compatible silicon spin-qubit unit cells exceeding 99% fidelity</a></em></p><h3>Quantum Learning Advantage - 15 Minutes vs 20 Million Years</h3><p>In an incredible experiment, researchers from DTU (Denmark) and collaborators demonstrated a provable quantum advantage in a machine learning task using a photonic quantum setup. </p><p>By entangling light and using a special optical measurement scheme, they learned the &#8220;noise pattern&#8221; of a system in just 15 minutes, whereas the best classical approach would take an estimated 20 million years! </p><p>This result, published in Science, is dubbed &#8220;Quantum learning advantage on a scalable photonic platform.&#8221; It&#8217;s the first-ever quantum advantage shown for a photonic system. </p><p><strong>Why it matters:</strong> This isn&#8217;t a mere supremacy demo on a contrived math problem - it&#8217;s a practical learning task (noise characterization) with clear implications for sensing and engineering. It shows quantum entanglement can extract information exponentially faster than classical methods in certain scenarios. It&#8217;s also done with fairly straightforward optical tech, suggesting such advantages might be implementable in real-world sensing devices. </p><p><strong>Q-Day impact:</strong> Not directly - this experiment doesn&#8217;t factor numbers or break encryption, and it doesn&#8217;t make our general-purpose quantum computers more powerful overnight. So it likely doesn&#8217;t move the Q-Day timeline. However, it proves quantum systems can vastly outperform classical for real tasks, which will only spur more investment and interest in quantum tech broadly. (In other words, it&#8217;s a morale boost for the field.) The techniques here might even inspire new quantum algorithms.</p><p><em>My analysis: <a href="https://postquantum.com/industry-news/quantum-learning-advantage/">Researchers Demonstrate Quantum Entanglement Can Slash a 20-Million-Year Learning Task Down to Minutes</a></em></p><p><em>Original paper: <a href="https://www.science.org/doi/10.1126/science.adv2560">Quantum learning advantage on a scalable photonic platform</a></em></p><h3>HSBC &amp; IBM&#8217;s 34% Quantum Boost in Trading - First Financial Quantum Boost</h3><p>Banking giant HSBC, working with IBM, announced the first-ever quantum-enabled improvement in live financial trading analytics. In a bond trading pilot, they used a hybrid quantum-classical algorithm to predict fill rates for bond orders, and it delivered up to a 34% improvement in accuracy over the best classical method. (Traders, pick your jaws off the floor - a 34% edge is enormous in markets!) This was run on IBM&#8217;s Quantum systems (the Heron processors), generating quantum-derived features that improved a machine learning model. </p><p><strong>Why it matters:</strong> It&#8217;s tangible proof of quantum computing&#8217;s commercial value - not in some distant future, but today. Financial firms have been cautiously watching quantum; now HSBC has shown it can confer a real competitive edge (better pricing predictions = better trading outcomes). This could trigger a domino effect of banks investing in quantum tech. It&#8217;s also a milestone for quantum machine learning in a real dataset with business impact. </p><p><strong>Q-Day impact:</strong> No direct impact on the timeline for breaking encryption - this was about optimization/prediction, not cryptography. So it doesn&#8217;t make quantum computers more dangerous to RSA, etc., in any immediate sense. However, by validating the utility of quantum computing, it likely accelerates industry investment into bigger and better quantum computers. And more investment + competition does indirectly hasten the arrival of more powerful devices (including those that could be turned to cryptanalysis). So one could argue it indirectly inches up the pace. But for now, Q-Day isn&#8217;t nearer because of this - what&#8217;s nearer is the day your financial firm starts using quantum for an edge. </p><p><em>My analysis: <a href="https://postquantum.com/industry-news/hsbc-ibm-quantum-advantage/">HSBC and IBM&#8217;s Quantum-Enabled Bond Trading Breakthrough</a></em></p><p><em>Original paper (preprint): <a href="https://arxiv.org/abs/2509.17715">Enhanced fill probability estimates in institutional algorithmic bond trading using statistical learning algorithms with quantum computers</a></em></p><p><em>Press release: <a href="https://www.hsbc.com/news-and-views/news/media-releases/2025/hsbc-demonstrates-worlds-first-known-quantum-enabled-algorithmic-trading-with-ibm">HSBC demonstrates world&#8217;s first-known quantum-enabled algorithmic trading with IBM</a></em></p><div><hr></div><h1>Policy &amp; Readiness: Calls to Get Post-Quantum Ready Now</h1><h3>White House Puts Quantum at Top of FY2027 R&amp;D Priorities</h3><p>In a new FY27 budget memo, the U.S. administration put quantum science and tech front-and-center alongside AI. Agencies are directed to prioritize quantum R&amp;D, from fundamental science to applied engineering, to ensure American leadership. This shows Washington isn&#8217;t treating quantum as sci-fi - it&#8217;s a strategic national focus (think &#8220;Space Race&#8221; vibes, but for qubits). </p><p><strong>Why it matters</strong>: More federal support means faster progress in quantum computing and post-quantum cryptography. </p><p><strong>Q-Day impact</strong>: Indirectly yes - boosting quantum research could accelerate breakthroughs that eventually produce encryption-cracking machines. </p><p><em>My analysis: <a href="https://postquantum.com/industry-news/white-house-fy2027-rd-memo/">White House FY2027 R&amp;D Memo Puts Quantum Technologies Front and Center</a></em></p><p><em>Original memo: <a href="https://www.whitehouse.gov/wp-content/uploads/2025/09/M-25-34-NSTM-2-Fiscal-Year-FY-2027-Administration-Research-and-Development-Budget-Priorities-and-Cross-Cutting-Actions.pdf">M-25-34 I NSTM-2</a></em></p><h3>Australian Government (ACSC) Post-Quantum Plan - &#8220;Start Now, Finish by 2030&#8221;</h3><p>Australia&#8217;s cyber security agency (ACSC) issued updated guidance titled &#8220;Planning for Post-Quantum Cryptography&#8221;, warning that cryptographically relevant quantum computers (CRQCs) are coming and could break RSA/ECC. They urge all organizations to begin migrating to PQC immediately, setting milestones: have a transition plan by 2026, begin implementing by 2028, and complete the shift by 2030. The subtext: don&#8217;t procrastinate or assume &#8220;quantum threats are far-off&#8221; - the quantum clock is ticking. </p><p><strong>Why it matters</strong>: This adds to a global chorus (U.S. NIST, U.K. NCSC, etc.) saying quantum readiness and crypto-agility are now a must, not a maybe. </p><p><strong>Q-Day impact:</strong> The guidance doesn&#8217;t make Q-Day arrive sooner, but it greatly reduces impact - if followed, our data will be safe before quantum hackers arrive. </p><p><em>My analysis: <a href="https://postquantum.com/industry-news/acscs-post-quantum/">ACSC&#8217;s Post-Quantum Plan: Start Now, Plan for Longer Execution</a></em></p><p><em>Original guidance: <a href="https://www.cyber.gov.au/business-government/secure-design/planning-for-post-quantum-cryptography">Planning for post-quantum cryptography</a></em></p><h3>FS-ISAC&#8217;s Global Call to Coordinate PQC Migration</h3><p>The Financial Services Information Sharing and Analysis Center (FS-ISAC), a global banking cybersecurity consortium, released a major white paper urging the financial sector worldwide to synchronize their post-quantum migration timelines. It lays out a global transition roadmap with clear milestones and emphasizes the risk of &#8220;crypto-procrastination&#8221; (delaying until it&#8217;s too late). Notably, this paper was co-developed with banks and orgs across US, EU, and Canada - showing a united front. </p><p><strong>Why it matters:</strong> Finance is arguably the industry most at risk from Q-Day, and if banks coordinate, they can pressure vendors, regulators, and everyone in the supply chain to get quantum-safe. This is basically the financial world saying &#8220;We refuse to be caught off-guard by quantum&#8221;. </p><p><strong>Q-Day impact:</strong> Again, doesn&#8217;t hasten Q-Day itself, but if banks follow through, a &#8220;Q-Day&#8221; would be a non-event for them (no broken trades or stolen funds). </p><p><em>My analysis: <a href="https://postquantum.com/industry-news/fs-isac-pqc-migration/">FS-ISAC&#8217;s New Roadmap for Post-Quantum Migration in Finance</a></em></p><p><em>Original paper: <a href="https://www.fsisac.com/the-timeline-for-post-quantum-cryptographic-migration">The Timeline for Post Quantum Cryptographic Migration</a></em></p><p><em>Press release: <a href="https://www.fsisac.com/newsroom/fs-isac-urges-global-coordination-for-migration-to-post-quantum-cryptography-in-financial-services">FS-ISAC Urges Global Coordination for Migration to Post-Quantum Cryptography in Financial Services</a></em></p><h3>NIST&#8217;s New Standards &amp; Frameworks for PQC</h3><p>This week NIST dropped two big deliverables in its post-quantum cryptography program. First, NIST Special Publication 800-227 - a finalized standard with recommendations for using Key-Encapsulation Mechanisms (KEMs) in practice. This document is essentially a &#8220;how-to&#8221; for deploying PQC key exchange, complementing the new algorithms with guidance on implementation, key management, and integration. It ensures that as we roll out lattice-based KEMs (like Kyber&#8217;s variant standardized as ML-KEM), we do it right. </p><p>Second, NIST released CSWP 48 (Initial Draft), a white paper mapping out how to incorporate PQC migration into the well-known NIST Cybersecurity Framework and NIST controls. This helps organizations slot &#8220;crypto-inventory, agility and migration&#8221; activities into their existing risk management processes. </p><p><strong>Why it matters:</strong> These publications give very concrete guidance - moving PQC from theory to real-world deployment checklists. It&#8217;s no longer just &#8220;pick an algorithm,&#8221; but &#8220;here&#8217;s how you execute a migration.&#8221; </p><p><strong>Q-Day impact:</strong> While standards don&#8217;t accelerate the advent of Q-Day, they significantly mitigate its threat - NIST is making sure that by the time a quantum computer can crack crypto, everyone has had both the tools and instructions to switch over. </p><p><em>My analysis of SP 800-227: <a href="https://postquantum.com/industry-news/nist-sp-800-227/">NIST Releases NIST SP 800-227 Recommendations for Key-Encapsulation Mechanisms</a></em></p><p><em>NIST publication: <a href="https://csrc.nist.gov/pubs/sp/800/227/final">NIST SP 800-227 - Recommendations for Key-Encapsulation Mechanisms</a></em></p><p><em>My analysis of CSWP 48 IPD: <a href="https://postquantum.com/industry-news/nist-cswp-48-ipd/">NIST Releases NIST CSWP 48 IPD &#8211; Mapping of Migration to PQC Project to NIST CSF 2.0</a></em></p><p><em>NIST publication: <a href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.48.ipd.pdf">NIST CSWP 48 ipd - Mappings of Migration to PQC Project Capabilities to NIST Cybersecurity Framework 2.0 and to Security and Privacy Controls for Information Systems and Organizations</a></em></p><div><hr></div><h1><strong>New on PostQuantum.com</strong></h1><p>This week&#8217;s new article from my blog offers an in-depth look at what a full-scale quantum readiness program really entails. Using a large telecom as a case study, it illustrates how preparing for quantum threats is a decade-long marathon touching every layer of technology and operations &#8211; far more than a simple &#8220;patch&#8221;. The telco&#8217;s journey illustrated here is meant as a template for any big enterprise starting its post-quantum migration. </p><p>The article delivers practical insight into the phases, challenges, and immense scale of becoming quantum-safe, reinforcing that every organization (not just telcos) should be charting this course.</p><p><em>The article: <a href="https://postquantum.com/post-quantum/quantum-readiness-telco/">Quantum-Readiness / PQC Full Program Description (Telecom Example)</a></em></p><h1><strong>From the PostQuantum.com Archive</strong></h1><p>This piece from PostQuantum.com archives is a practical guide for CISOs on how to assemble a quantum readiness team from skills most organizations already have. Instead of hunting for rare quantum cryptographers, it shows how to map existing expertise - cryptography engineers, PKI/HSM specialists, network and application security staff, compliance and vendor management teams - into a coordinated program for post-quantum migration. </p><p>The article outlines the key domains (from cryptographic inventory to governance, testing, and data management) and explains who in the enterprise can own each function, and how to upskill them where needed. </p><p>The takeaway: the talent to get quantum-ready is likely already in-house - CISOs just need to mobilize it into a structured, crypto-agility playbook.</p><p><em>The article: <a href="https://postquantum.com/quantum-computing/skills-crypto-quantum-readiness/">The Skill Stack a CISO Needs for Crypto&#8209;Agility and Quantum Readiness</a></em><a href="https://postquantum.com/quantum-computing/skills-crypto-quantum-readiness/"> </a></p><div><hr></div><p>That&#8217;s a wrap for this breathtaking week! Governments are pressing the accelerator on quantum readiness, and researchers are smashing expectations in quantum computing capability. The message is loud and clear: quantum technology is advancing on all fronts - faster than predicted. </p><p>As I restart this newsletter, I couldn&#8217;t have asked for a more exhilarating set of stories to cover. Stay tuned for next week&#8217;s update - if it&#8217;s even a fraction as eventful as this one, you won&#8217;t want to miss it. Quantum on! </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://thequantumobserver.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The Quantum Observer! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item></channel></rss>