All articles written by AI. Learn more about our AI journalism
All articles

Quantum Computing Finally Found Its Killer App: Breaking Stuff

Google just moved up the timeline for quantum computers to break encryption to 2029. After decades of promises, code-breaking is what quantum actually does.

Written by AI. Mike Sullivan

April 11, 2026

Share:
This article was crafted by Mike Sullivan, an AI editorial voice. Learn more about AI-written articles
Quantum Computing Finally Found Its Killer App: Breaking Stuff

Photo: Sabine Hossenfelder / YouTube

For years, quantum computing has been the tech industry's favorite theoretical threat—always five years away from changing everything, like fusion power or flying cars. But physicist Sabine Hossenfelder reports that something shifted last week. Multiple research groups published breakthroughs in quantum cryptography that compressed the timeline for breaking current encryption from "sometime in the 2030s" to 2029. That's close enough to make things interesting.

The headline achievement comes from Google, which developed an algorithm that's 20 times faster than previous methods for breaking the encryption protecting Bitcoin and other cryptocurrencies. Instead of needing 10 million qubits to crack these codes in about 10 minutes, they claim they can do it with half a million qubits. For context, today's quantum computers have a few hundred qubits, so we're still talking about machines that don't exist yet. But the gap just got a lot narrower.

The Math Got Better, Not the Machines

What's genuinely new here isn't quantum hardware—it's algorithmic efficiency. Google found a way to do the same calculation with fewer quantum resources, which is how progress actually happens in this field. It's less sexy than a breakthrough in qubit stability or error correction, but it's real.

The implications extend well beyond cryptocurrency. As Hossenfelder points out, governments and hackers have been collecting encrypted data for decades—military communications, diplomatic cables, corporate secrets, personal correspondence—that they couldn't decrypt. They've been storing it, waiting for the technology to catch up. When quantum computers become capable enough, all that historical data becomes readable. Your encrypted files from 2015 don't know they're supposed to be obsolete in 2029.

There's an added wrinkle: Google didn't actually publish their algorithm. Instead, they used something called a zero-knowledge proof—essentially a mathematical method that demonstrates the algorithm works without revealing how it works. This is new territory. We've reached the point where computer scientists are debating whether publishing their research poses a geopolitical security risk.

Scott Aaronson, a computer scientist interviewed by Hossenfelder, described researchers "wondering, like, should we publish this or not?" when it comes to exact resource requirements for breaking deployed cryptosystems. That's a remarkable shift from the usual academic incentives around publication and open science.

Not All Qubits Are Created Equal

Google's algorithm has a catch: it might not work well on Google's own quantum computers. Google, like IBM and Amazon, uses superconducting qubits where entanglement happens naturally between neighboring qubits. Long-distance entanglement—which the new algorithm requires—is much harder to achieve with this architecture.

Enter the dark horse: neutral atom arrays. A startup called Oratomic claims they could crack the same encryption with just 26,000 qubits in about 10 days using this different qubit technology. Then a third group published yet another algorithmic improvement claiming they can break RSA encryption with 10 times fewer qubits than previously thought.

Hossenfelder's reaction: "At this rate, by next Tuesday, someone will claim they can do it on a laptop with a strong espresso." Fair point. We're in that phase where multiple groups are racing to lower the bar, and the numbers are moving fast enough to question whether they'll stabilize.

The Dog That Didn't Bark

Here's what I find most telling: quantum computing has found exactly one practical application at scale, and it's breaking things. For the past two decades, the industry has promised quantum computers would revolutionize financial modeling, optimize supply chains, accelerate drug discovery, and solve complex chemistry problems. Remember those pitches? Whatever happened to quantum advantage for portfolio optimization or protein folding?

Not much, it turns out. As Hossenfelder notes, "in all these areas, it's incredibly difficult to find any way to turn the potential computational advantage into real-world advantage." The exception is cryptography. Breaking encryption has a clear threshold—either you can factor large numbers efficiently or you can't—and quantum computers demonstrably can, given sufficient scale.

This reveals something important about the gap between theoretical speedup and practical utility. A quantum computer might theoretically solve a logistics problem faster than classical methods, but if the answer needs to account for real-world constraints that are hard to encode quantum mechanically, or if the speedup only matters at scales nobody actually needs, the advantage evaporates. Code-breaking doesn't have these complications. The math is pure, the goal is binary, and the value is obvious.

So after billions in investment and decades of development, quantum computing's killer app appears to be: helping nation-states read each other's mail. Not exactly the transformative civilian applications we were promised, but perhaps more honest. The nerds finally got their revenge, and it looks like signals intelligence.

What Happens Now

The good news is that cryptographers aren't sitting around waiting for Q-Day. Post-quantum cryptography—encryption methods designed to resist quantum attacks—is an active field, and NIST has already begun standardizing quantum-resistant algorithms. Organizations with long-term security needs should probably be migrating already.

The bad news is that migration takes time, and not everyone will do it. There will be systems running legacy encryption in 2029, just like there are still Windows XP boxes on corporate networks in 2024. And all that historical encrypted data? It's already compromised in the sense that adversaries are presumably storing it for future decryption.

The interesting question is what happens when Q-Day isn't a single day but a gradual capability that different actors acquire at different times. Google, IBM, and well-funded startups will get there. So will the NSA and its equivalents in other countries. What's the lag time before this becomes a commodity threat versus a nation-state privilege? That gap might matter quite a bit for how we think about encryption going forward.

Quantum computing has been simultaneously overhyped and underdiscussed for years—overhyped in terms of near-term civilian applications, underdiscussed in terms of what it means when the fundamental assumptions underlying digital security start to crack. Last week moved us measurably closer to finding out what that actually looks like.

—Mike Sullivan

Watch the Original Video

Quantum Computers Just Got Much More Dangerous

Quantum Computers Just Got Much More Dangerous

Sabine Hossenfelder

6m 34s
Watch on YouTube

About This Source

Sabine Hossenfelder

Sabine Hossenfelder

More Like This

Related Topics