Quantum Snake Oil
Trending

Quantum Snake Oil: A Field Guide to Misleading Quantum Technology Marketing

This is the capstone article of the Quantum Snake Oil Dictionary, a Deep Dive series examining terms used in quantum technology marketing.

Introduction

I first wrote about quantum snake oil in 2001. Twenty-five years later, the problem has metastasized.

Back then, a handful of vendors were slapping “quantum” onto rebranded XOR ciphers and calling it innovation. The audience was small, the stakes were modest, and most security professionals could smell the nonsense from across the trade show floor. Today the word “quantum” moves stock prices, unlocks government contracts, attracts venture capital, and occasionally defrauds retail investors and endangers national security. The gap between what quantum technology can actually do and what marketing departments claim it can do has never been wider.

That gap is what this series maps. The current market conditions are a textbook incubator for fraud and exaggeration, even though many companies using quantum terminology are perfectly honest. Quantum computing is real. Post-quantum cryptography is real. The threat to current encryption is real. And the real technology advancing is exactly what creates more space for misleading marketing alongside it. When the underlying science is complex and the buyers are unfamiliar with it, the conditions for deception are ideal.

I have covered this problem from multiple angles on PostQuantum.com. My Quantum of Flapdoodle maps the full spectrum of quantum misinformation, from harmless hype inflation through willful marketing spin to outright financial fraud and pseudoscience. Q-FUD: The Quantum Panic Industry examines how fear, uncertainty, and doubt about the quantum threat to encryption is weaponized to sell products. The Quantum Baloney Detection Toolkit offers practical heuristics for evaluating claims. On the denial side, I have explored the spectrum from healthy skepticism through performative cynicism to bad-faith contrarianism exploited for profit, and most recently examined how denial and grift form a symbiosis that paralyzes real engineering, using Bitcoin’s response to the quantum threat as a case study. The Quantum Winter Warning shows what happens when the hype boomerangs and damages the entire field.

This series is different. Instead of broad overviews, the Quantum Snake Oil Dictionary takes a term-by-term approach. Each entry examines one specific piece of quantum marketing vocabulary, tests it against the actual physics and cryptography, and delivers a verdict. The goal is simple: when a CISO, an investor, or a procurement officer hears one of these terms in a sales pitch, they should be able to find it here and know what questions to ask next.

Why a Dictionary?

The answer is search. If a vendor tells you their product uses “simulated quantum entanglement” or is “quantum-safe certified,” the first thing you will do is Google that phrase. If a physics-based debunking article ranks for it, you find the truth before you sign the contract. A comprehensive overview article, however well-written, will not rank for any of these specific terms. A dictionary entry for each term will.

The secondary goal is education by accumulation. Each entry is short enough to read in five minutes, but taken together they reveal the common patterns: the same rhetorical moves appear across different terms, different vendors, and different market segments. Recognizing the pattern is more valuable than debunking any single term.

Two Tracks

The dictionary is organized into two tracks, because not all misleading terminology is equally dishonest.

Red Flag Terms

These are terms with no established technical meaning in quantum physics, quantum computing, or cryptography. They are either fabricated for marketing purposes or assembled from real words in combinations that are physically meaningless. Encountering one of these in a product pitch does not guarantee a scam, but it should trigger significant skepticism and very specific follow-up questions.

The Red Flag entries in this series:

  • Quantum AI Trading — The intersection of two hype cycles: “quantum” and “AI trading.” Flagged by regulatory authorities in over a dozen countries. No legitimate quantum computing platform is involved.
  • Quantum-Proof — Implies mathematical proof of security against quantum attack. No post-quantum algorithm has such a proof. NIST, ETSI, and IETF RFC 9794 all deliberately avoid this term.
  • Quantum-Grade Encryption — The quantum equivalent of “military-grade encryption.” No standards body defines it. It means nothing.
  • Quantum-Safe Certified — No general quantum-safe certification exists. FIPS 140-3 validates specific implementations of specific NIST-standardized algorithms. A vendor claiming “quantum-safe certified” for a proprietary algorithm is claiming a credential that does not exist.
  • Military-Grade Quantum Encryption — A compound of two meaningless marketing terms. Neither “military-grade” nor “quantum encryption” (applied to classical products) has a technical definition.
  • Quantum-Inspired Encryption — “Quantum-inspired” has a legitimate meaning in optimization (tensor networks, simulated annealing). In a security context, it is meaningless. No quantum-inspired algorithm can deliver quantum-physics-based security properties.
  • Quantum Blockchain — Classical blockchain with a quantum random number generator or a post-quantum signature algorithm bolted on. No blockchain is “quantum” in any physics sense.
  • Simulated Quantum Entanglement — Bell’s theorem proves that the correlations generated by quantum entanglement cannot be replicated by any classical system. “Simulating” entanglement on a classical chip and claiming quantum security properties is a contradiction of established physics.
  • Quantum Financial System — Rooted in NESARA/GESARA conspiracy theories. Has spawned dozens of cryptocurrency scams. No connection to actual quantum technology.

Misused Terms

These are real terms from physics, information theory, and cryptography. They have precise technical meanings established through decades of research. The problem is what happens to them in marketing: the qualifying assumptions get stripped away, the limitations vanish, and the resulting claim implies something far broader than the physics supports.

The Misused Term entries in this series:

  • Unhackable Quantum Encryption — Multiple QKD vendors and media outlets use “unhackable.” The NSA, GCHQ, and published academic research on detector-blinding attacks all say otherwise. The information-theoretic security of the protocol does not translate to “unhackable” hardware.
  • Unconditionally Secure — A precise term in information theory that applies to idealized protocols under specific assumptions. In marketing, it is presented without those assumptions, implying that the physical box in your rack is unconditionally secure. It is not.
  • Perfect Secrecy — Shannon’s 1949 theorem sets iron requirements: keys must be at least as long as the message and used only once. Any product claiming perfect secrecy with reusable or short keys is violating a mathematical proof.
  • Information-Theoretic Security — A real and important concept that describes security independent of computational assumptions. In marketing, used to imply absolute, implementation-independent security guarantees that the term does not provide.
  • Quantum Encryption / Quantum Cryptography — Two terms with legitimate but distinct meanings (primarily referring to QKD), constantly conflated with post-quantum cryptography and with classical products wearing quantum branding. IETF RFC 9794 exists because this confusion became untenable.
  • Quantum-Enhanced — The broadest quantum-washing prefix. Applied to products ranging from phones with real QRNG chips (overstated but grounded in actual hardware) to classical software with no quantum hardware whatsoever (pure fabrication).
  • Quantum-Safe vs Quantum-Resistant vs Post-Quantum — Three terms used interchangeably by vendors, with important distinctions that NIST, ETSI, NCSC, and IETF RFC 9794 have all attempted to standardize. My own terminology guide covers the distinctions in depth; this entry focuses on how the conflation is exploited in sales.

Companion Guide

The Patterns Behind the Terms

Across all 16 entries and the companion guide, the same structural patterns emerge. Recognizing these is more important than memorizing any individual term.

The three-card conflation. Vendors blur the line between three fundamentally different things: physics-based quantum cryptography (QKD), post-quantum cryptography (PQC, which is classical math designed to resist Shor’s algorithm), and classical products with “quantum” added to the brand. A vendor says “quantum encryption,” and the listener has no way to know which of the three they mean. This ambiguity is rarely accidental.

Theoretical-result laundering. A vendor cites a real result (Shannon’s perfect secrecy theorem, BB84’s information-theoretic security, NIST’s standardization) and strips away every assumption that makes it valid. The result sounds unimpeachable because it is unimpeachable in its original context. The fraud is in the transplant.

Proprietary algorithm secrecy. Kerckhoffs’s principle, formulated in 1883, states that a cryptographic system should be secure even if everything about the system except the key is public knowledge. Any vendor who claims their algorithm must be secret is violating a foundational principle of the field. If it has not been submitted to NIST’s standardization process, if it has not undergone public cryptanalysis, and if the vendor cannot name it, walk away. I have covered this in Quantum of Flapdoodle and in Q-FUD, but it bears repeating: proprietary quantum-safe algorithms are the single most reliable indicator of snake oil in this market.

Credibility laundering. Pay-to-play magazine features, trade show awards given to every exhibitor who applies, papers published in predatory journals, partnerships that are actually customer relationships, and credentials from unaccredited institutions. The companion guide documents 16 variants of this pattern.

Q-FUD timeline arbitrage. Pushing Q-Day forward in marketing while pulling capability claims forward in product literature, and selling the gap. The real urgency argument has nothing to do with whether Q-Day arrives in 2030 or 2035; the deadlines are already set by regulators, insurers, and supply chain requirements, regardless of when a CRQC arrives.

Denial as grift. The mirror image of Q-FUD. Instead of pushing Q-Day forward to sell products, the denial grift pushes Q-Day to infinity to avoid the cost of migration. The Bitcoin community offers a vivid case study: conference speakers with no physics credentials present pseudoscientific arguments that quantum computing will never work, while the engineering proposals that could actually protect the network get crowded out by the noise. Denial and hype look like opposites, but they produce the same outcome: paralysis. Organizations that dismiss the quantum threat entirely and organizations that panic-buy snake oil both end up in the same place, which is unprepared when the deadlines arrive.

What Good Looks Like

This series focuses on what goes wrong in quantum marketing. The contrast with legitimate vendors is the most useful tool a buyer has.

A vendor building genuine quantum or post-quantum security will name their algorithms: ML-KEM, ML-DSA, SLH-DSA, or another NIST-standardized or NIST-submitted algorithm. They will have or be pursuing FIPS 140-3 module validation. They will acknowledge limitations honestly. QKD hardware vendors with real products will discuss the specific attack models they defend against and the ones they do not. When you bring your own cryptographer to evaluate their claims, they will welcome it rather than resist it. Their work will appear in recognized journals or standards processes. And when you ask a technical question, you will get a technical answer.

For a detailed guide to evaluating these responses, see the companion article on vendor deflection tactics. For a broader view of the quantum hype ecosystem, start with Quantum of Flapdoodle. For the Q-FUD problem specifically, see Q-FUD: The Quantum Panic Industry. For the case study in quantum washing, see China’s “Photonic Quantum Chip” Is Impressive. But It’s Also a Case Study in Quantum-Washing.

And for the practical response, because none of this changes the fact that the threat is real and the migration must happen, see Practical Steps to Quantum Readiness, the PQC Migration Framework, and my forthcoming book Quantum Ready.

A Note on Intent

Every entry in this dictionary includes a disclaimer, and the capstone deserves one too. I am not accusing any specific company or individual of fraud. These articles examine terms and claims on their technical merits. A company using misleading terminology might be running a scam, or it might be a legitimate technology company with an overeager marketing department. The physics does not change either way, and the questions I suggest asking are the same regardless.

Technology also evolves. It is possible that a term I flag today will have a clearly defined, defensible technical meaning in five years. If that happens, I will update the relevant entry. That is how honest analysis works.

What will not change is the physics. Bell’s theorem will still prohibit classical simulation of entanglement correlations. Shannon’s theorem will still require keys as long as the message for perfect secrecy. Kerckhoffs’s principle, now 140 years old, will still demand that security must not depend on algorithm secrecy. These are the fixed points against which marketing claims can be measured, and they are what this series stands on.

Quantum Upside & Quantum Risk - Handled

My company - Applied Quantum - helps governments, enterprises, and investors prepare for both the upside and the risk of quantum technologies. We deliver concise board and investor briefings; demystify quantum computing, sensing, and communications; craft national and corporate strategies to capture advantage; and turn plans into delivery. We help you mitigate the quantum risk by executing crypto‑inventory, crypto‑agility implementation, PQC migration, and broader defenses against the quantum threat. We run vendor due diligence, proof‑of‑value pilots, standards and policy alignment, workforce training, and procurement support, then oversee implementation across your organization. Contact me if you want help.

Talk to me Contact Applied Quantum

Marin Ivezic

I am the Founder of Applied Quantum (AppliedQuantum.com), a research-driven consulting firm empowering organizations to seize quantum opportunities and proactively defend against quantum threats. A former quantum entrepreneur, I’ve previously served as a Fortune Global 500 CISO, CTO, Big 4 partner, and leader at Accenture and IBM. Throughout my career, I’ve specialized in managing emerging tech risks, building and leading innovation labs focused on quantum security, AI security, and cyber-kinetic risks for global corporations, governments, and defense agencies. I regularly share insights on quantum technologies and emerging-tech cybersecurity at PostQuantum.com.
Share via
Copy link
Powered by Social Snap