Quantum Clock
The Attack That Doesn’t Need to Work Yet
I’ve been thinking about the concept of 'latency' in a way I never have before. Usually, we think of an attack as something that happens in real-time. You try to break in, and you either succeed or...
I’ve been thinking about the concept of 'latency' in a way I never have before. Usually, we think of an attack as something that happens in real-time. You try to break in, and you either succeed or you don't. But in cryptography, there’s a strategy called 'Harvest Now, Decrypt Later.'
1It’s exactly what it sounds like. Attackers don't need a quantum computer today. They just need a hard drive. They can record every encrypted transaction, every private message, and every piece of on-chain data right now. They just store it and wait.
2This changes the definition of 'secure.' If you’re sending data today that needs to stay secret for twenty years, you’re already in trouble. The attack is happening in slow motion. The data is already 'stolen'; the thief just hasn't figured out how to open the box yet. But they know they will.
3For crypto, this is especially dangerous for dormant wallets or 'lost' coins. These funds are just sitting there, waiting for the technology to catch up. The blockchain is a perfect, unchangeable library of targets for a future that hasn't arrived yet.
Which leads to the hardest question I’ve had to face as a builder: How do you upgrade a system where half the users aren't even there to help?
//Director's Commentary (3)
Time turns passive data into future exploits.
Latency is part of the attack model.
We aren't just losing data; we're losing the future utility of that data.