Deep Dive Series

Long-form research across quantum computing and quantum security

Multi-article series with capstone analyses, interactive tools, and companion databases.


Getting Started With Quantum Security & PQC Migration

Getting Started With Quantum Security

A practitioner’s roadmap from mandate to migration


Quantum Security Reference

Quantum Security Reference

Essential concepts for security leaders


CRQC Quantum Capability Framework

CRQC Capability Framework

Nine capabilities needed to break cryptography


Predicting Q-Day

Predicting Q-Day

Frameworks, forecasts, and the real deadline


Quantum Computing Modalities

Quantum Computing Modalities

Every hardware approach compared


What It Takes to Build a Quantum Computer

What It Takes to Build a QC

From qubits to fault tolerance


Quantum Computing Companies & Roadmaps

Quantum Computing Companies

60+ hardware companies profiled and compared


The Quantum Utility Map

The Quantum Utility Map

What fault-tolerant quantum computers will actually do


Quantum Systems Integration & QOA

Quantum Systems Integration

Open architecture and multi-vendor design


China's Quantum Ambition

China’s Quantum Ambition

Could Beijing win the quantum race?


Quantum Sovereignty

Quantum Sovereignty

Strategic independence in the quantum era


Quantum Snake Oil Dictionary

Quantum Snake Oil Dictionary

Spotting hype, scams, and misused terms

Articles & Analysis

Quantum Computing, Quantum Security, PQC & Quantum Sovereignty

The 2027 Procurement Gate: Why CNSA 2.0 Compliance Starts Now

January 1, 2027 is when CNSA 2.0 stops being guidance and becomes a procurement gate. Combined with the FIPS 140-2 sunset in September and CMMC enforcement in November, it creates a five-month compliance squeeze that cannot be solved by urgency ...

CNSA 2.0: The Complete Guide to NSA’s Post-Quantum Requirements

The definitive vendor-neutral reference to NSA's Commercial National Security Algorithm Suite 2.0 — the most operationally specific post-quantum cryptography mandate in the world. This guide breaks down every component of CNSA 2.0 in one place: the complete algorithm suite with ...

Preparing for Crypto’s Quantum Future: A Practical Guide

The quantum threat to cryptocurrencies is real but not imminent. The migration will take years. This guide translates the full series into specific actions, segmented by who you are and what you control ...

Beyond Bitcoin and Ethereum: Quantum Vulnerabilities Across the Blockchain Ecosystem

Zcash aims for full post-quantum security by 2027. Solana's two core teams independently chose Falcon. Algorand deployed PQ signatures in 2022. QRL has been quantum-safe since 2018. The blockchain ecosystem's quantum readiness varies from leading-edge to nonexistent ...

Bitcoin’s Quantum Migration: The Decade Is Political, Not Technical

Jameson Lopp proposed freezing 6.5 million quantum-vulnerable Bitcoin. The community called it authoritarian within hours. The engineering exists. Whether Bitcoin's decentralized governance can coordinate action against a time-bounded threat is the open question ...

Fixing the Lightning Network: A Protocol-Level Migration Roadmap

Fixing Lightning requires changes to every layer of the protocol stack, from Noise transport through Sphinx routing to on-chain HTLC settlement. This is the BOLT-by-BOLT migration roadmap, structured by what can be shipped now versus what requires a Bitcoin consensus ...

The Lightning Network’s Quantum Problem: Why Layer 2 Is Harder Than Layer 1

Lightning's quantum vulnerability runs deeper than Bitcoin Layer 1. The protocol requires continuous public key exposure across funding, routing, gossip, and revocation. Application-layer upgrades can protect metadata, but fund security demands a base-layer consensus change ...

Ethereum’s Five Quantum Vulnerabilities: Why Smart Contracts Change Everything

Ethereum's quantum exposure goes far beyond wallet signatures. Five distinct vulnerability classes threaten accounts, admin keys, smart contracts, validator consensus, and the data availability layer, each with different attack mechanics and different mitigation paths ...

Fixing Bitcoin: The Post-Quantum Migration Technical Roadmap

Making Bitcoin quantum-safe requires a new output type, a signature algorithm ten times larger than ECDSA, a multi-year UTXO migration, and emergency escape hatches for when the timeline slips. This is the full engineering roadmap ...

Bitcoin’s Quantum Vulnerability: Anatomy of the Attack Surface

Roughly 6.7 million Bitcoin sit in addresses with exposed public keys, including 1.7 million in Satoshi-era P2PK scripts that can never be migrated. This is the full anatomy of Bitcoin's quantum attack surface ...

How Close Is the Quantum Threat? Resource Estimates for Breaking Blockchain Cryptography

Resource estimates for breaking blockchain cryptography have collapsed by orders of magnitude in half a decade. Two parallel hardware paths, fast-clock superconducting and slow-clock neutral atom, are converging on the same target from opposite directions ...

The Quantum Threat to Cryptocurrencies: What’s Real, What’s Hype, and What to Do About It

Google Quantum AI estimates that breaking the 256-bit elliptic curve cryptography protecting Bitcoin and Ethereum would require fewer than 500,000 physical qubits and roughly nine minutes of runtime on a superconducting architecture. The same day that paper landed, a separate ...

PostQuantum.com AI Explainer

An AI tool that answers questions using a curated corpus of information from PostQuantum.com, NIST, NSA, and ENISA and other reliable sources. Ask anything related to quantum computing or quantum security.