The point @conordeegan is making is that there is a large opportunity space, currently unexplored in both hardware architectures and algorithmic improvements, for quantum computers capable of attacking private keys. Small shifts in architecture, error correction, qubit networking, memory, etc., all present massive shifts in the threat model timeframes and resource needs. That makes the threat more existential because it is rapidly shifting and includes many unknowns (due to secrecy among potential attackers and, more importantly, yet-to-be-discovered improvements in quantum tech).

Conor Deegan
@conordeegan
03-31
Now a quantum lesson. The reason Oratomic gets to 10,000 qubits where previous estimates needed a million is not because of "faster" qubits or better gates. They use a different approach to error correction. Surface codes, which are the current standard (used by Google),
From Twitter
Disclaimer: The content above is only the author's opinion which does not represent any position of Followin, and is not intended as, and shall not be understood or construed as, investment advice from Followin.
Like
Add to Favorites
Comments