Monday 30 March 2026Afternoon Edition

ZOTPAPER

News without the noise


Cybersecurity

Quantum Computing Threatens Encrypted Messaging Apps With Harvest Now Decrypt Later Attacks

Experts warn that encrypted chats sent today could be cracked by future quantum computers

Zotpaper2 min read
Security experts are warning that quantum computing poses a threat not just to cryptocurrency but to the encrypted messaging apps used by billions of people daily, with adversaries potentially harvesting encrypted communications now to decrypt them when quantum computers become powerful enough.

The "harvest now, decrypt later" strategy involves state actors and other sophisticated adversaries intercepting and storing encrypted communications today, betting that future quantum computers will be able to break the encryption that currently protects them.

While quantum computers capable of breaking current encryption standards don't yet exist, the timeline is shrinking. The concern is that sensitive communications sent today — diplomatic messages, corporate secrets, personal conversations — could be retroactively exposed years from now.

Messaging platforms like Signal, WhatsApp, and iMessage use end-to-end encryption that relies on mathematical problems currently considered computationally infeasible. Quantum computers could potentially solve these problems, rendering today's encryption obsolete.

Some platforms have already begun implementing post-quantum cryptography. Signal added the PQXDH protocol in 2023, and Apple introduced PQ3 for iMessage in 2024. But adoption across the broader ecosystem remains patchy.

Analysis

Why This Matters

Every encrypted message sent today is potentially vulnerable to future quantum decryption. For journalists, dissidents, and anyone communicating sensitive information, this is not a theoretical risk but an active intelligence-gathering strategy.

Background

NIST finalized its first post-quantum cryptographic standards in 2024. The transition to quantum-resistant encryption is underway but will take years to complete across all systems and protocols.

Key Perspectives

Cryptographers are split on the timeline — estimates for cryptographically relevant quantum computers range from 5 to 20 years. But security hawks argue that the harvest-now strategy means the threat is already active regardless of when quantum computers arrive.

What to Watch

Adoption rates of post-quantum encryption across major platforms, government mandates for quantum-resistant communications, and breakthroughs in quantum computing hardware that could accelerate the timeline.

Sources