The Imminent Risk of Quantum Computing
Cybersecurity researcher Gianluca Di Bella has issued a critical warning regarding the escalating threat that quantum computing presents to contemporary encryption systems. The fundamental cryptographic standards that currently safeguard a vast array of sensitive information, from financial transactions to private communications, are at risk of becoming obsolete due to anticipated advancements in quantum technology.
Quantum computers operate on principles fundamentally different from traditional machines. They utilize qubits, which possess the capability to process an exponentially larger volume of data. This enhanced processing power could enable them to break widely used encryption algorithms, such as RSA and ECC, in a remarkably short timeframe, potentially within minutes. The emergence of this powerful computing paradigm has heightened concerns about the security of confidential data across both public and private sectors.
Understanding "Harvest Now, Decrypt Later" Attacks
A particularly alarming strategy highlighted by Di Bella is the "harvest now, decrypt later" approach. This tactic involves malicious actors collecting encrypted data in the present, even though they lack the immediate capability to decrypt it. This harvested data is then stored, awaiting the future development of quantum computers powerful enough to break the encryption instantaneously. Consequently, data that is currently considered secure could face compromise in the near future.
This impending vulnerability places highly sensitive information, including state secrets, banking credentials, and personal data, in a precarious position. The timeframe for the widespread availability of practical quantum computing capabilities is rapidly diminishing, underscoring the urgency for encryption technologies to evolve.
NOW: Quantum computing is threatening today’s encryption, warns researcher Gianluca Di Bella.
— Cointelegraph (@Cointelegraph) November 11, 2025
“Harvest now, decrypt later” attacks could expose data. Will we move fast enough to adopt post-quantum cryptography? pic.twitter.com/VAthK9Xl6A
The Imperative of Post-Quantum Cryptography
The definitive solution to this escalating threat lies in the development and implementation of post-quantum cryptography. This category of advanced encryption algorithms is specifically engineered to resist the decryption capabilities of quantum computers. Prominent organizations, such as the National Institute of Standards and Technology (NIST), are actively engaged in the testing and standardization of these next-generation algorithms.
However, the transition to post-quantum cryptography is encountering significant obstacles. The widespread use of legacy systems, outdated technological infrastructure, and a general lack of awareness are collectively impeding the necessary shift. Di Bella and a consensus of cybersecurity experts are emphasizing that a swift and decisive response from governments and the technology industry is crucial to prevent widespread data insecurity.
The cryptocurrency and blockchain sector, which relies heavily on robust encryption for its integrity and security, must also proactively prepare for this paradigm shift. Projects focused on developing quantum-resistant blockchain solutions are likely to become increasingly vital in the near future.

