The invention of quantum computers poses a global threat to internet security. This is because they have the processing power necessary to break the majority of the encryption algorithms that currently protect most of the worlds data. They achieve this by using quantum physics to perform a lot more efficiently than traditional supercomputers.
Before you panic, its worth noting that, as it stands, quantum computers are only being used for research purposes, so youre unlikely to find one outside of a research center, such as a university, research lab, or supercomputer center. But experts are predicting that at some point in the next five years, this will change and quantum computers will start being used to break the encryption that has, up until now, kept most of the sensitive data on the internet from being hacked. This event is referred to as Q-day.
When this happens, everything from photos, private emails, and medical records to government files, business documents, and banking details will be vulnerable. So its likely to have huge and far-reaching consequences, causing political, financial, and social chaos around the world. It will also make it much easier to scam unsuspecting victims, as hackers will be able to use private details to make phishing scams a lot more believable.
Thankfully, there is a way you can protect your data from Q-day. Cyber security experts have already developed a range of post-quantum algorithms that will offer sufficient data protection against quantum computers. This level of security is available now to anyone. All you need to do is sign up for a VPN with post-quantum encryption.
Well use this article to explain the risks in much more detail and recommend VPNs you can get right now that already come future-proofed with robust post-quantum protection. So read on to learn all you need to know.
At the moment, your data should be fairly secure, particularly if you use a reputable VPN to encrypt your traffic. However, it might not stay that way for long, as quantum computers pose a significant cyber security threat to most online data. This is because these machines use quantum physics to make their computations infinitely more efficient than those of a traditional supercomputer.
Referred to as Q-day, experts are predicting that this day will happen at some point in the next five years. So while your data is probably safe for the time being, it probably wont be secure once Q-day happens.
Upgrade your life with a daily dose of the biggest tech news, lifestyle hacks and our curated analysis. Be the first to know about cutting-edge gadgets and the hottest deals.
If you rely on traditional forms of encryption, Q-day will jeopardize all your online information. This includes everything from your documents, photos, and emails to your banking details, work documents, and your internet search history.
However, its important to know that your data doesnt have to be compromised. There are already post-quantum algorithms to protect against attacks from quantum computers. You can get this level of security today by signing up to a VPN that offers post-quantum encryption. Weve recommended our favorite picks further down the page.
While Q-day cant be prevented as such, given that quantum computers will become more powerful and more widely used, the impact of it can be dramatically reduced. To achieve this, experts have been working on post-quantum encryption. As the name suggests, this is a form of cryptography thats powerful enough to protect against hacks from quantum computers.
Q-day is predicted to happen at some point in the next five years. So, while the threat isnt necessarily imminent, its a very sensible idea to prepare for Q-day by securing your data with quantum-resistant encryption. This type of security is already available from a select number of VPN providers, so you can safeguard your data from today.
There are several different types of post-quantum algorithms that can protect your data from quantum computers and prevent your data from Q-day.
The best thing you can do to protect your data from quantum computer attacks that will happen on Q-day and beyond is to use a VPN that comes with post-quantum encryption. These algorithms have been specifically designed to be unbreakable, even by quantum computers, meaning that they can give the required level of protection to guard against Q-day.
But its important to note that not all VPNs (even the best VPNs) offer post-quantum protection. In fact, the majority of providers havent yet built this into their protocols. So even if you use a VPN, its quite possible your data will be vulnerable to attack by quantum computers.
Q-day is predicted to happen at some point in the next five years. So while the threat might not be immediate, its important to protect your data against Q-day, as we dont yet know when its going to happen. So the most prudent thing you can do is sign up for a VPN that offers post-quantum encryption. This is especially important if youre looking to save money by signing up for a long-term subscription. That way, no matter when Q-day happens, your data will be protected.
As we mentioned, there are a select number of VPNs with post-quantum encryption that will future-proof your cyber security. Here, weve compiled a list of reputable ones that will keep your data safe from Q-day. Well also explain what type of encryption each VPN uses to help you make an informed choice.
If youve read any of our other VPN guides, youll be used to seeing ExpressVPNs name being mentioned as one of the very best VPNs. This is largely because of its ability to deliver market-leading security, along with fast speeds, and a great user experience. But, unlike a lot of its direct competitors, ExpressVPN stands out by offering quantum-resistant encryption, thereby giving users much more sophisticated protection than youd find on most other providers.
As with most VPNs, ExpressVPN uses AES 256-bit encryption, which is sufficient to protect against attacks from classical computers. But it also goes a step further with its very own open-source Lightway protocol, which has built-in post-quantum algorithms. These are too powerful to be broken by quantum computers.
If this isnt enough to put your mind at ease, the Lightway protocol has undergone independent auditing twice in the last couple of years by Cure53. It passed both with flying colors, therefore proving that its every bit as secure as ExpressVPN has claimed.
You might be concerned that such sophisticated encryption might slow down any traffic using the Lightway protocol. But actually, it performed really well in our speed tests, coming in at 410 Mbps. This speed will be more than fast enough for anything youd want to do online, including streaming, online gaming, and video editing.
But the Lightway protocol isnt the only reason why ExpressVPN comes so highly recommended. It also delivers everything else you could want from a VPN, including the ability to unblock region-restricted content with ease, as well as helpful customer support, and a fleet of strong servers.
QSTVPN has integrated post-quantum encryption into its VPN connections to protect user data from quantum computers, as well as classical computers. So its a great choice if youre looking to keep your data safe now and into the future.
Despite its additional security, QSTVPN delivers fast and reliable speeds that will lead to a smooth online experience.
If youre concerned about cyber security in a post-Q-day world, QAL VPN could be the perfect solution to protect your business from hackers. It offers a number of post-quantum algorithms to provide plenty of protection against quantum machines. The provider utilizes three lattice-based algorithms, as well as its SPHINCS+ cryptography, which uses hash-based functions. So its definitely one of the most future-proofed business options around.
However, because its a VPN designed for large businesses, its probably not the ideal solution if you want one for individual use. But if youre looking for something to protect your organization from the ramifications of Q-day, it could be the ideal choice for you.
If youre primarily a desktop user, Mullvad will provide you with sophisticated post-quantum encryption for your Windows, MAC, or Linux machine. It does this by incorporating quantum-resistant tunnels in all its WireGuard protocols for its desktop app with Kyber and Classic McEliece post-quantum algorithms.
If youre concerned about leaving your other devices vulnerable, dont worry because Mullvad is already working on rolling out this level of security for its iOS and Android apps. Customers signing up for a Mullvad subscription should have post-quantum protection across all their devices long before Q-day happens.
Mullvads encryption shares a secret in a way thats too sophisticated for a quantum computer to be able to decipher. Once this has been shared, that tunnel will be disconnected and a new one will be opened with the new shared secret.
You wont go far wrong with Mullvad as your VPN provider because, in addition to its post-quantum algorithms, it also delivers fast speeds and total customer anonymity.
Windscribe is a strong VPN with plenty of security features, fast speeds, and content-unblocking capabilities. On top of this, it also uses the WireGuard protocol to generate unique pre-shared keys for each user that are quantum-resistant.
Even if a quantum computer were able to decrypt these keys, which is extremely unlikely, it would be unable to interpret the traffic. Therefore, it will keep your data hidden from any hacks past Q-day.
Quantum computers pose a potentially catastrophic threat to online security. Once these machines are powerful enough and begin being used outside of research labs, they will have the power and the capability to break the encryption that protects most of the data on the internet. This event is known as Q-day and experts are predicting that this could happen at any time in the next five years.
Luckily, there are already some post-quantum algorithms that are strong enough to protect your data against this threat. All you need to do is sign up for a VPN that offers this level of security, such as ExpressVPN, Windscribe, or Mullvad.
Post-quantum encryption is a form of cyber security thats powerful enough to protect your data from attacks by quantum computers. There are a few different types of post-quantum cryptography that are currently available, such as lattice-based, hash-based, and code-based algorithms. If you want this level of protection, use a VPN that has built it into its protocols, such as Mullvad, ExpressVPN, or Windscribe.
Although quantum computers dont currently pose a security threat, as theyre only being used in research labs right now, there will come a day when theyre strong enough to break most of the worlds encryption.
Referred to as Q-day, this event will wreak havoc across the world and could effectively render VPNs obsolete, as theyll no longer be able to protect user data. That is unless VPNs incorporate post-quantum encryption into their protocols. Some VPNs have already done this, such as ExpressVPN, Mullvad, and Windscribe. If other providers follow suit, quantum computers wont be able to decrypt the protection offered, meaning that they can no longer pose a threat to VPNs.
Read more:
Your data could be leaked in five years - here's why - Tom's Guide
- WhatsApp overhauling status tab with encrypted Snapchat Stories-like feature - 9 to 5 Mac [Last Updated On: February 21st, 2017] [Originally Added On: February 21st, 2017]
- GOP demands inquiry into EPA use of encrypted messaging apps - CNET [Last Updated On: February 21st, 2017] [Originally Added On: February 21st, 2017]
- Encryption Apps Help White House Staffers Leakand Maybe Break the Law - WIRED [Last Updated On: February 21st, 2017] [Originally Added On: February 21st, 2017]
- World Wide Web Creator Calls for Internet Decentralization & Encryption - The Data Center Journal [Last Updated On: February 21st, 2017] [Originally Added On: February 21st, 2017]
- What It Means to Have an 'Adult' Conversation on Encryption - Pacific Standard [Last Updated On: February 21st, 2017] [Originally Added On: February 21st, 2017]
- Confide in me! Encryption app leaks sensitive info from Washington DC - SC Magazine UK [Last Updated On: February 21st, 2017] [Originally Added On: February 21st, 2017]
- Gmail v7.2 Prepares to Add Support for S/MIME Enhanced Encryption - XDA Developers (blog) [Last Updated On: February 26th, 2017] [Originally Added On: February 26th, 2017]
- Top 6 Data Encryption Solutions - The Merkle [Last Updated On: February 26th, 2017] [Originally Added On: February 26th, 2017]
- Your Guide to the Encryption Debate - Consumer Reports - ConsumerReports.org [Last Updated On: February 26th, 2017] [Originally Added On: February 26th, 2017]
- Google helps put aging SHA-1 encryption out to pasture - Engadget [Last Updated On: February 26th, 2017] [Originally Added On: February 26th, 2017]
- Decipher your Encryption Challenges - Infosecurity Magazine [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- How the Politics of Encryption Affects Government Adoption - Freedom to Tinker [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- How Encryption Makes Your Sensitive Cloud-Based Data an Asset, Not a Liability - Security Intelligence (blog) [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- Set up VMware VM Encryption for hypervisor-level security - TechTarget [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- How The Media Are Using Encryption Tools To Collect Anonymous Tips - NPR [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- Encryption patent that roiled Newegg is dead on appeal | Ars Technica - Ars Technica [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- Research proposes 'full-journey' email encryption - The Stack [Last Updated On: March 1st, 2017] [Originally Added On: March 1st, 2017]
- Database-as-a-service platform introduces encryption-at-rest - BetaNews [Last Updated On: March 1st, 2017] [Originally Added On: March 1st, 2017]
- Encrypted Messaging Service 'Signal' Adds Video Call Option - Top Tech News [Last Updated On: March 2nd, 2017] [Originally Added On: March 2nd, 2017]
- Germany, France lobby hard for terror-busting encryption backdoors ... - The Register [Last Updated On: March 2nd, 2017] [Originally Added On: March 2nd, 2017]
- How to Send Encrypted Nudes, a Guide for the Discerning Lover - Inverse [Last Updated On: March 2nd, 2017] [Originally Added On: March 2nd, 2017]
- Ironclad Encryption Corporation Announces New Ticker Symbol OTCQB: IRNC - Yahoo Finance [Last Updated On: March 2nd, 2017] [Originally Added On: March 2nd, 2017]
- The Best Email Encryption Software of 2017 | Top Ten Reviews [Last Updated On: March 2nd, 2017] [Originally Added On: March 2nd, 2017]
- No, you shouldn't delete Signal or other encrypted apps - TechCrunch [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Best encryption software: Top 5 - Computer Business Review [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Encryption Backdoors, Vault 7, and the Jurassic Park Rule of Internet Security - Just Security [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- That Encrypted Chat App the White House Liked? Full of Holes - WIRED [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- What the CIA WikiLeaks Dump Tells Us: Encryption Works - New York Times [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Snake-Oil Alert Encryption Does Not Prevent Mass-Snooping - Center for Research on Globalization [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Customer Letter - Apple [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Don't Let WikiLeaks Scare You Off of Signal and Other Encrypted Chat Apps - WIRED [Last Updated On: March 12th, 2017] [Originally Added On: March 12th, 2017]
- BT to offer customers encryption service for data - Capacity Media (registration) [Last Updated On: March 12th, 2017] [Originally Added On: March 12th, 2017]
- Encryption - technet.microsoft.com [Last Updated On: March 12th, 2017] [Originally Added On: March 12th, 2017]
- Use FileVault to encrypt the startup disk on ... - Apple Support [Last Updated On: March 12th, 2017] [Originally Added On: March 12th, 2017]
- Viber launches secret chats to go beyond encryption - SlashGear [Last Updated On: March 13th, 2017] [Originally Added On: March 13th, 2017]
- Zix wins 5-vendor email encryption shootout - Network World [Last Updated On: March 13th, 2017] [Originally Added On: March 13th, 2017]
- A lesson from the CIA WikiLeaks dump: Encryption works - The Seattle Times [Last Updated On: March 13th, 2017] [Originally Added On: March 13th, 2017]
- What the CIA WikiLeaks Dump Tells Us: Encryption Works - NewsFactor Network [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Panicked Secret Service Says It Lost Encrypted Laptop But It's Fine, Everything's Fine - Gizmodo [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Google Cloud adds new customer-supplied encryption key partners ... - ZDNet [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Preseeding Full Disk Encryption - Linux Journal [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Bypassing encryption: 'Lawful hacking' is the next frontier of law enforcement technology - Boston Business Journal [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- SecurityBrief NZ - Gemalto introduces on-prem encryption key solution for 'highly regulated' organisations - SecurityBrief NZ [Last Updated On: March 21st, 2017] [Originally Added On: March 21st, 2017]
- 'Always Be Concerned': US Court Slaps Down Fifth Amendment Defense of Encryption - Sputnik International [Last Updated On: March 21st, 2017] [Originally Added On: March 21st, 2017]
- Quantum Key System Uses Unbreakable Light-Based Encryption to Secure Data - Photonics.com [Last Updated On: March 21st, 2017] [Originally Added On: March 21st, 2017]
- Wikileaks Only Told You Half The Story -- Why Encryption Matters More Than Ever - Forbes [Last Updated On: March 21st, 2017] [Originally Added On: March 21st, 2017]
- EPA Sued For Withholding Info On Encrypted Text Messages | The ... - Daily Caller [Last Updated On: March 22nd, 2017] [Originally Added On: March 22nd, 2017]
- Opinion Data encryption efforts ramp up in face of growing security threats - Information Management [Last Updated On: March 22nd, 2017] [Originally Added On: March 22nd, 2017]
- Bypassing encryption: Lawful hacking is the next frontier of law enforcement technology - Salon [Last Updated On: March 22nd, 2017] [Originally Added On: March 22nd, 2017]
- NeuVector Announces Container Visualization, Encryption, and Security Solution for NGINX Plus - DABCC.com [Last Updated On: March 23rd, 2017] [Originally Added On: March 23rd, 2017]
- Is encryption one of the required HIPAA implementation specifications? - TechTarget [Last Updated On: March 23rd, 2017] [Originally Added On: March 23rd, 2017]
- Paper Spells Out Tech, Legal Options for Encryption Workarounds - Threatpost [Last Updated On: March 23rd, 2017] [Originally Added On: March 23rd, 2017]
- Encryption debate needs to be nuanced, says FBI's Comey - TechTarget [Last Updated On: March 25th, 2017] [Originally Added On: March 25th, 2017]
- Comey Renews Debate Over Encryption - 550 KTSA [Last Updated On: March 25th, 2017] [Originally Added On: March 25th, 2017]
- UK minister says encryption on messaging services is unacceptable - Reuters [Last Updated On: March 28th, 2017] [Originally Added On: March 28th, 2017]
- The why and how of encrypting files on your Android smartphone - Phoenix Sun [Last Updated On: March 28th, 2017] [Originally Added On: March 28th, 2017]
- UK targets WhatsApp encryption after London attack - Yahoo News [Last Updated On: March 28th, 2017] [Originally Added On: March 28th, 2017]
- Critical flaw alert! Stop using JSON encryption | InfoWorld - InfoWorld [Last Updated On: March 28th, 2017] [Originally Added On: March 28th, 2017]
- SecureMyEmail is email encryption for everyone - TechRepublic - TechRepublic [Last Updated On: March 28th, 2017] [Originally Added On: March 28th, 2017]
- Apple iOS 10.3 will introduce encryption which makes it MORE difficult for cops and spooks to crack into ISIS nuts ... - The Sun [Last Updated On: March 29th, 2017] [Originally Added On: March 29th, 2017]
- How to Analyze An Encryption Access Proposal - Freedom to Tinker [Last Updated On: March 29th, 2017] [Originally Added On: March 29th, 2017]
- Questions for the FBI on Encryption Mandates - Freedom to Tinker [Last Updated On: March 29th, 2017] [Originally Added On: March 29th, 2017]
- Justice Department anti-terror chief keeps pressing on encryption - Politico (blog) [Last Updated On: March 29th, 2017] [Originally Added On: March 29th, 2017]
- UK government can force encryption removal, but fears losing, experts say - The Guardian [Last Updated On: March 29th, 2017] [Originally Added On: March 29th, 2017]
- Encryption FAQs [Last Updated On: March 29th, 2017] [Originally Added On: March 29th, 2017]
- Why isn't US military email protected by standard encryption tech? - Naked Security [Last Updated On: April 9th, 2017] [Originally Added On: April 9th, 2017]
- How have ARM TrustZone flaws affected Android encryption? - TechTarget [Last Updated On: April 9th, 2017] [Originally Added On: April 9th, 2017]
- Keeping the enterprise secure in the age of mass encryption - Information Age [Last Updated On: April 9th, 2017] [Originally Added On: April 9th, 2017]
- Lack of encryption led to Dallas siren hack - WFAA [Last Updated On: April 12th, 2017] [Originally Added On: April 12th, 2017]
- Internet Society tells G20 nations: The web must be fully encrypted - The Register [Last Updated On: April 12th, 2017] [Originally Added On: April 12th, 2017]
- Make Encryption Ubiquitous, Says Internet Society - Infosecurity ... - Infosecurity Magazine [Last Updated On: April 12th, 2017] [Originally Added On: April 12th, 2017]
- Can we encrypt the web while giving governments a backdoor to snoop? - SC Magazine UK [Last Updated On: April 12th, 2017] [Originally Added On: April 12th, 2017]
- Why we need to encrypt everything - InfoWorld [Last Updated On: April 12th, 2017] [Originally Added On: April 12th, 2017]
- Hacked Dallas sirens get extra encryption to fend off future attacks - Computerworld [Last Updated On: April 12th, 2017] [Originally Added On: April 12th, 2017]
- SHA-1 Encryption Has Been Broken: Now What? - Forbes [Last Updated On: April 14th, 2017] [Originally Added On: April 14th, 2017]
- Hewlett Packard Enterprise touts encryption tool for federal clients - The Hill [Last Updated On: April 14th, 2017] [Originally Added On: April 14th, 2017]
- Encryption on the Rise in Age of Cloud - Infosecurity Magazine - Infosecurity Magazine [Last Updated On: April 14th, 2017] [Originally Added On: April 14th, 2017]
- Lawmaker Pushes Bill That Requires Encryption by Pennsylvania State Employees - Government Technology [Last Updated On: April 14th, 2017] [Originally Added On: April 14th, 2017]
- Disk encryption - Wikipedia [Last Updated On: April 14th, 2017] [Originally Added On: April 14th, 2017]
- The apps to use if you want to keep your messages private - Recode [Last Updated On: April 15th, 2017] [Originally Added On: April 15th, 2017]