DEV Community

Garry
Garry

Posted on

QUANTUM HORIZONS Your Passwords Have an Expiry Date. Nobody Told You.

By The Architect NEO | April 2026


You know that friend?

The one at every barbecue who, somewhere between the third burger and the dying embers, starts talking about encryption? The one who makes you check if your webcam has tape over it? The one who said "don't use that free Wi-Fi" at the airport in 2019 and you thought they were being dramatic?

That friend was right about everything.

And they're about to be right again — about something much, much bigger.


THE QUIET HEIST NOBODY'S REPORTING

Right now, while you're reading this on a Tuesday lunchbreak or doomscrolling at 11pm, encrypted data is being stolen.

Not decrypted. Not read. Not yet.

Stored.

Intelligence agencies across the globe have a name for it: "Harvest Now, Decrypt Later." The idea is brutally simple. Steal encrypted data today — bank transactions, medical records, contracts, emails — and stash it. Wait for quantum computers to arrive. Then crack the lot like eggs at a Sunday fry-up.

If that sounds like science fiction, Google would like a word.

On March 31st 2026, Google researchers published findings warning that future quantum computers may break the cryptography protecting digital assets — including Bitcoin — with fewer resources than previously estimated. They're not saying it's happening tomorrow. They're saying the walls are thinner than we thought, and someone's already measuring the door.

Two days later, Google opened early access to Willow — their 105-qubit quantum processor — inviting researchers to submit proposals by May 15th. This isn't a prototype collecting dust in a lab. This is a machine that completed a benchmark task in under five minutes that would take a traditional supercomputer ten septillion years.

That number has twenty-five zeros, in case you were counting.


WHY SHOULD YOU CARE? YOU'RE NOT A BANK.

No. But you are a business.

Perhaps you're a sole trader with a Shopify store. Maybe you run a consultancy with six employees. Maybe you're a trades firm with a van, a website, and a filing cabinet full of client details you keep meaning to digitise.

Here's the uncomfortable bit.

Forty-three percent of UK businesses experienced a cyber attack in the past year. That's 612,000 businesses. Not banks. Not GCHQ. Businesses like yours.

The average cost to a small firm? Around £3,400 for a standard breach. For medium firms, the recovery cost from a serious incident sits at roughly £7,960. And that's just the direct cost — it doesn't include lost clients, reputational damage, or the three weeks of your life you'll never get back.

One in four SMBs that suffered a breach reported financial losses between £7,500 and £75,000. For a small business, that's not a bad quarter. That's an extinction event.

And this is before quantum computing arrives.


THE TIMELINE NOBODY WANTS TO LOOK AT

Let's say you sent a contract by email in 2020. Standard stuff. Your email provider encrypted it. Safe as houses, right?

Here's the problem. That encryption — almost certainly RSA or elliptic curve — was designed to resist classical computers. Not quantum ones. When a sufficiently powerful quantum machine arrives (most credible estimates say between 2030 and 2035), that 2020 email can be cracked in hours.

NIST — the U.S. National Institute of Standards and Technology — didn't wait for the panic. They finalised three new post-quantum cryptography standards in August 2024: ML-KEM, ML-DSA, and SLH-DSA. Standards specifically built to withstand quantum-grade attacks.

The NSA has set compliance deadlines starting January 2027 for national security systems. Google, Amazon, and Microsoft have already begun integrating post-quantum protections into their cloud platforms.

The Boston Consulting Group put it bluntly: "Starting in 2030 will already be too late."

And yet.

Forty-seven percent of businesses with fewer than fifty employees have no cybersecurity budget. Seventy-four percent of SMB owners self-manage their cybersecurity — or rely on an untrained family member. Fifty-one percent of small businesses have no security measures in place whatsoever.

Read that last one again. No security measures. At all. In 2026.


THE GAP IN THE MARKET IS THE SIZE OF THE MARKET

Here's where it gets interesting.

The large enterprises — the Barclays, the BPs, the NHSes — they'll be fine. They have CISO teams, seven-figure security budgets, and vendors queueing up to sell them quantum-safe infrastructure. QSE Corp launched an enterprise-grade post-quantum migration platform just last week. Palo Alto, Fortinet, and Zscaler are all pivoting hard.

But you?

You, with your WooCommerce store and your Gmail account and your one laptop that still runs Windows 10?

Nobody's building anything for you.

There is no "post-quantum readiness tool" for a plumber in Croydon. No "harvest now, decrypt later" calculator for a freelance accountant in Manchester. No fraud-language scanner that helps your nan figure out if that Royal Mail text is actually Royal Mail.

The enterprise security industry is building nuclear bunkers for people who already own castles. Meanwhile, the rest of us are standing in an open field wondering why the weather feels funny.


THE WEIRD FRIEND HAS ENTERED THE CHAT

So. About that friend.

The one who talks about encryption at barbecues. The one who reads NIST publications for fun. The one who can tell you, just by reading a phishing email, exactly which psychological manipulation technique it's using and why the grammar is deliberately bad (it filters for gullible targets — you didn't know that, did you?).

That friend is building something.

Not an enterprise platform. Not a product with a six-figure price tag and a sales team that calls you "valued partner" while billing by the syllable. Something simpler. Something you can actually use.

Tools that run in your browser. That don't send your data anywhere. That explain, in actual English, what your risks are and what to do about them.

A scorecard that tells a small business owner whether their current setup is quantum-vulnerable — and what to fix first.

A scanner that reads a suspicious message and tells you, pattern by pattern, why it's trying to rob you.

A timeline that shows you, personally, when your old encrypted data could be cracked — based on when you started banking online, storing documents in the cloud, or emailing contracts.

Free. Private. No login. No tracking. No upsell to a product you can't afford.

Just the information you need, built by someone who actually understands both the threat and the audience.


WHAT YOU CAN DO RIGHT NOW

Before you close this tab and go back to pretending the padlock icon on your browser means you're invincible, here are five things that cost nothing and take less than an hour:

One. Check your email provider's encryption. If you're on a free Gmail or Outlook account, your emails are encrypted in transit but stored in a way that's quantum-vulnerable long-term. If you're emailing contracts or sensitive documents, start using encrypted file-sharing instead.

Two. Stop reusing passwords. Eighty percent of data breaches involve weak or stolen credentials. Use a password manager. Not "the same password with a number at the end." An actual password manager.

Three. Ask your cloud provider about post-quantum readiness. Google, AWS, and Microsoft are all implementing quantum-safe encryption in their infrastructure. Your provider should have a public position on this. If they don't, that's your answer.

Four. Audit your old data. That Dropbox folder from 2017? That email archive from your old business? If it contains anything you wouldn't want published, it needs to be re-encrypted with modern standards or securely deleted.

Five. Find your weird friend. Or better yet — find someone who's building the tools to help you. They're out there. They're often not on LinkedIn posting about "synergy." They're in GitHub repos at midnight, building fraud-detection algorithms because they've seen how the system actually fails, from the inside.


THE HORIZON ISN'T COMING. IT'S HERE.

Quantum computing isn't a tomorrow problem dressed up in a lab coat. It's a today problem wearing yesterday's encryption.

The data being stolen now will be readable within a decade. The businesses being targeted now are overwhelmingly small. The tools being built now are overwhelmingly for the wealthy.

The gap between the threat and the response is the size of an industry. And into that gap walk the people nobody expected — the ones who are weird enough to care, skilled enough to build, and stubborn enough to give it away until the world catches up.

You know the friend.

Maybe it's time you listened.


The Architect NEO Speak writes about security, fraud, and the uncomfortable space between what we know and what we do about it. Follow the work at https://github.com/The-Architect-Neo


Sources

Quantum Computing & Post-Quantum Cryptography:

  • NIST Post-Quantum Cryptography Standards (FIPS 203, 204, 205) — finalised August 2024. nist.gov/pqc
  • Google Willow Quantum Processor — 105-qubit chip, early access program announced March 2026. blog.google/technology/research/google-willow-quantum-chip
  • Google Willow Early Access Program — proposals due May 15, 2026. thequantuminsider.com (March 28, 2026)
  • Google researchers warn quantum computing may break cryptocurrency encryption with fewer resources than estimated. Bloomberg (March 31, 2026)
  • "Harvest now, decrypt later" threat actively warned about by intelligence agencies across multiple countries. Multiple sources including DHS.gov, Gray Group Intl (February 2026)
  • NSA compliance deadlines (CNSA 2.0) for national security systems begin January 2027. guptadeepak.com (March 2026)
  • QSE Corp launches QPA v2 enterprise post-quantum migration platform. March 31, 2026.
  • NIST NCCoE draft practice guide for migration to post-quantum cryptography. thequantuminsider.com (September 2025)

UK Cyber Attack Statistics:

  • 43% of UK businesses faced a cyber attack in the past year (~612,000 businesses). UK Government Cyber Security Breaches Survey, via paulreynolds.uk (2025/26)
  • 82% of UK organisations reported at least one breach in the past 12 months. Cyber Security Longitudinal Survey 2026, via redpalm.co.uk
  • Average breach cost for micro/small businesses: £7,960 (serious incidents). BT / Be the Business (2025)
  • Average breach cost for small UK businesses: £3,398. UK Government data via cybersecstats.com
  • Financial losses from breaches: £7,500–£75,000 for a majority of affected SMBs. Proton SMB Cybersecurity Report 2026
  • One in four SMBs experienced a cyberattack or data breach in the past year. Proton SMB Cybersecurity Report 2026 (3,000 business leaders surveyed)

SMB Security Gaps:

  • 47% of businesses under 50 employees have no cybersecurity budget. StrongDM / CrowdStrike 2025, via stationx.net
  • 74% of SMB owners self-manage cybersecurity or rely on an untrained family member. VikingCloud, via heimdalsecurity.com
  • 51% of small businesses have no security measures in place. StrongDM, via stationx.net
  • 39% of cybersecurity incidents linked to human error. Proton SMB Cybersecurity Report 2026
  • 80% of data breaches involve weak or stolen passwords. Verizon DBIR, via paulreynolds.uk
  • Global SMB cybersecurity spending projected to reach $109 billion by 2026. Analysis Mason, via heimdalsecurity.com
  • 28% of UK SMEs say a single cyber attack could put them out of business. cybersecstats.com (2026)

© 2026 The Architect NEO. All rights reserved.
Permission granted for non-commercial sharing with full attribution.

Top comments (0)