Close Menu
maincoin.money
    What's Hot

    7 Fast Methods to Prevent Hacks and Scams

    October 10, 2025

    7 Fast Methods to Prevent Hacks and Scams

    October 10, 2025

    Exciting Token Launches Disappoint as TGE Loses Momentum Before Airdrop Season

    October 10, 2025
    Facebook X (Twitter) Instagram
    maincoin.money
    • Home
    • Altcoins
    • Markets
    • Bitcoin
    • Blockchain
    • DeFi
    • Ethereum
    • NFTs
      • Regulation
    Facebook X (Twitter) Instagram
    maincoin.money
    Home»Ethereum»The Risk of Quantum Computing Has Arrived: Naoris Protocol
    Ethereum

    The Risk of Quantum Computing Has Arrived: Naoris Protocol

    Ethan CarterBy Ethan CarterOctober 10, 2025No Comments6 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    1760104397
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Post quantum cryptography world01

    David Carvalho, the Founder and CEO of Naoris Protocol, reveals that state actors are already gearing up to exploit quantum computing for attacks.

    Summary

    • David Carvalho from Naoris Protocol discusses the quantum computing threat to financial systems
    • The SEC has recently raised concerns about this technology’s risks
    • State actors are actively collecting data that quantum computers could eventually breach

    The threat posed by quantum computing is no longer just a hypothesis. State actors worldwide are positioning themselves to use this technology to easily undermine traditional security protocols and blockchains, jeopardizing the financial systems of their competitors.

    The risk is so pronounced that the Securities and Exchange Commission has released a report highlighting its potential impacts. One of the projects cited in the report is the Naoris Protocol, a cybersecurity framework that employs “post-quantum blockchain” technology and distributed AI. Its founder and CEO, David Carvalho, shared insights with crypto.news about the necessary steps the industry must undertake to confront this challenge.

    crypto.news: When do you anticipate the emergence of the first cryptographically relevant quantum computer? What risks does this pose to digital security?

    David Carvalho: Anyone claiming to know the exact timing is either speculating or promoting something. Credible estimates suggest it could emerge in the next decade, though regulators are focusing on 2028 for mandatory quantum resilience. The concerning factor isn’t the timeline—it’s the duration of the migration process. Many assume that updating the algorithm is straightforward, but we’re actually discussing a complete overhaul of the digital trust framework: PKI, HSMs, code signing, TLS, VPNs, blockchains, banking infrastructures—the entire ecosystem. This requires extensive engineering, testing, and coordination. Once a cryptographically significant quantum computer exists, all mechanisms safeguarding digital identity, finances, and software integrity will be at risk. This can lead to entity impersonation, transaction forgery, and compromised digital updates.

    CN: What specific risks does quantum computing present to blockchain networks?

    DC: Blockchains are especially susceptible, as most rely on ECDSA or EdDSA for signatures, which Shor’s algorithm would easily dismantle when quantum computers become available. Private keys can be exposed, wallets compromised, validators impersonated, and bridges hijacked. The issue of address reuse further heightens this risk—once a public key is made known, that address becomes a target in a post-quantum landscape. Bitcoin UTXOs are particularly vulnerable. Bridges and MPC-based custody solutions that seem decentralized often rely on classical cryptography, creating single points of failure. If validator identities can be forged, attackers do not need 51% control of the stake or hashpower; they can merely impersonate legitimate parties accepted by the system.

    CN: The PQFIF report indicates that only about 3% of banks currently support post-quantum computing. How possible is it for institutions to adapt legacy systems to post-quantum protocols?

    DC: It can be achieved through layered, gradual adoption. Modern post-quantum solutions can function as overlays—essentially decentralized trust frameworks built atop existing infrastructures. These systems validate devices, applications, keys, and data flows without necessitating complete rewrites of the technology stack, making the transition more feasible for organizations with extensive legacy systems.

    CN: How at risk are blockchain and custody systems to Harvest-Now-Decrypt-Later (HNDL) attacks? Are state actors accumulating encrypted blockchain data?

    DC: HNDL is certainly real and currently occurring. The strategy entails gathering encrypted communications, keys at rest, backup files, and signed data for future decryption. While on-chain data remains public, custody logs, wallet backups, encrypted API traffic, and internal server communications represent high-value targets. Nation-states possessing sufficient resources and patience are likely amassing this data.

    CN: If Q-Day were to arrive tomorrow, what would transpire for Bitcoin, Ethereum, and the banking system?

    DC: The timeline is somewhat irrelevant because Harvest-Now-Decrypt-Later attacks are already in motion. Hostile governments and cybercriminals are accumulating encrypted data—including medical records, financial transactions, classified intelligence, and private communications—believing that quantum computers will eventually crack it.

    If Q-Day occurred tomorrow, Bitcoin and Ethereum could face selective theft targeting anything associated with exposed public keys. We might witness chain reorganizations, forged validator identities, and exchanges halting withdrawals for verification. The DeFi sector would enter crisis mode. Banks could encounter PKI failures leading to widespread revocation issues, TLS session disruptions, and gateway connection losses. While it wouldn’t be apocalyptic, it would result in weeks of significant disruption.

    CN: Are there ongoing efforts to collaborate with U.S. regulators or working groups regarding quantum computing threats?

    DC: There is ongoing participation in public policy and standards dialogues surrounding crypto agility and decentralized assurance. The quantum-resistant blockchain sector has gained recognition within regulatory frameworks—an independent analyst’s submission to the SEC referenced post-quantum blockchain protocols as potential models for safeguarding digital assets against quantum risks, marking the first time blockchain protocols have been acknowledged in this context for the protection of trillions in digital assets.

    The industry has also been showcased at significant events like the 1640 Society Family Office Wealth Forum and the Volcano Innovation Summit, where discussions revolved around how quantum-resistant blockchains and distributed security can protect valuable digital assets and critical infrastructure amid rising cyber risks.

    CN: In what ways does decentralized cybersecurity differ from traditional validator networks?

    DC: The core distinction lies in what gets validated. Conventional validators only confirm transactions, assuming the devices and code executing them are trustworthy—this represents a considerable blind spot. Advanced methodologies validate the environment itself: devices, software, identities, and data streams before they are allowed to transact. This establishes a trust mesh that continually attests to endpoints utilizing post-quantum cryptography and distributed AI. Each successful validation is cryptographically logged, offering forensic proof-of-trust embedded in the blockchain. Essentially, traditional blockchains validate conditions; next-generation systems validate the legitimacy of the entities creating those conditions.

    CN: What trends in quantum or cryptography are experts often underestimating?

    DC: The emphasis on algorithms tends to overshadow the true challenges: migration complexity, including key management, certificate lifecycles, and HSM upgrades. There is also a significant underestimation of the duration of the hybrid phase—we will likely be running post-quantum and classical systems alongside each other for decades, necessitating careful operational strategies. PQC alone won’t ensure security if endpoints are compromised; ongoing validation of devices, software, and data flows is critical. Looking ahead, AI and quantum computing are converging, and quantum-trained AI agents will eventually operate faster than human responses, fundamentally altering the threat landscape.

    Arrived computing Naoris Protocol Quantum Risk
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Avatar photo
    Ethan Carter

      Ethan is a seasoned cryptocurrency writer with extensive experience contributing to leading U.S.-based blockchain and fintech publications. His work blends in-depth market analysis with accessible explanations, making complex crypto topics understandable for a broad audience. Over the years, he has covered Bitcoin, Ethereum, DeFi, NFTs, and emerging blockchain trends, always with a focus on accuracy and insight. Ethan's articles have appeared on major crypto portals, where his expertise in market trends and investment strategies has earned him a loyal readership.

      Related Posts

      BTC Short Positions Reach $600M, ETH Hits $300M

      October 10, 2025

      Leadership that Thrives Amid Cryptocurrency Turmoil

      October 10, 2025

      Phala Network Set to Transition to Ethereum Layer 2 After Community Decision

      October 10, 2025
      Altcoins

      7 Fast Methods to Prevent Hacks and Scams

      By Ethan CarterOctober 10, 20250

      Essential Insights: In the first half of 2025, over $2.4 billion was stolen, already exceeding…

      Regulation

      7 Fast Methods to Prevent Hacks and Scams

      By Ethan CarterOctober 10, 20250

      Key takeaways: In the first half of 2025, over $2.4 billion was stolen, already exceeding the…

      Markets

      Exciting Token Launches Disappoint as TGE Loses Momentum Before Airdrop Season

      By Ethan CarterOctober 10, 20250

      Recent token launches have experienced significant declines, raising questions about the token generation event (TGE)…

      Bitcoin

      7 Fast Methods to Prevent Hacks and Scams

      By Ethan CarterOctober 10, 20250

      Essential Insights:  In the first half of 2025, more than $2.4 billion has been stolen,…

      Recent Posts
      • 7 Fast Methods to Prevent Hacks and Scams
      • 7 Fast Methods to Prevent Hacks and Scams
      • Exciting Token Launches Disappoint as TGE Loses Momentum Before Airdrop Season
      • 7 Fast Methods to Prevent Hacks and Scams
      • Prestige Wealth Unveils New Brand as Nasdaq Launches Its First Tether Gold Treasury

      At MainCoin.Money, we cover everything from Bitcoin and Ethereum to the latest trends in Altcoins, DeFi, NFTs, blockchain technology, market movements, and global crypto regulations.

      Whether you’re a seasoned investor, a blockchain developer, or just curious about digital assets, our mission is to make crypto news accessible and reliable for everyone.

      Facebook X (Twitter) Instagram Pinterest YouTube
      Top Insights

      7 Fast Methods to Prevent Hacks and Scams

      October 10, 2025

      7 Fast Methods to Prevent Hacks and Scams

      October 10, 2025

      Exciting Token Launches Disappoint as TGE Loses Momentum Before Airdrop Season

      October 10, 2025
      Get Informed

      Subscribe to Updates

      Get the latest creative news from FooBar about art, design and business.

      Facebook X (Twitter) Instagram Pinterest
      • About Us
      • Contact us
      • Privacy Policy
      • Disclaimer
      • Terms and Conditions
      © 2025 maincoin.money. All rights reserved.

      Type above and press Enter to search. Press Esc to cancel.