{"id":13083,"date":"2025-10-10T13:51:29","date_gmt":"2025-10-10T13:51:29","guid":{"rendered":"https:\/\/bitunikey.com\/news\/interview-quantum-computing-threat-is-already-here-naoris-protocol-ceo\/"},"modified":"2025-10-10T13:51:32","modified_gmt":"2025-10-10T13:51:32","slug":"interview-quantum-computing-threat-is-already-here-naoris-protocol-ceo","status":"publish","type":"post","link":"https:\/\/bitunikey.com\/news\/interview-quantum-computing-threat-is-already-here-naoris-protocol-ceo\/","title":{"rendered":"Interview | Quantum computing threat is already here: Naoris Protocol CEO"},"content":{"rendered":"<p><\/p>\n<div class=\"post-detail__content blocks\">\n<p class=\"is-style-lead\">David Carvalho, Founder and CEO of Naoris Protocol, explains that state actors are already ready to use quantum computing for attacks.<\/p>\n<div id=\"cn-block-summary-block_3d0b3620234e51b564b3af84f513d1d3\" class=\"cn-block-summary\">\n<div class=\"cn-block-summary__nav tabs\">\n        <span class=\"tabs__item is-selected\">Summary<\/span>\n    <\/div>\n<div class=\"cn-block-summary__content\">\n<ul class=\"wp-block-list\">\n<li>David Carvalho of the Naoris Protocol explains how quantum computing threatens the financial system<\/li>\n<li>SEC has recently sounded the alarm on the dangers of this technology<\/li>\n<li>State actors are already gathering information that quantum computers can eventually compromise<\/li>\n<\/ul><\/div>\n<\/div>\n<p><!-- .cn-block-summary --><\/p>\n<p>The quantum computing threat is no longer theoretical. State actors across the globe are already positioning themselves to use this potential technology, which can break traditional security protocols and blockchains with ease, to compromise the financial systems of their rivals. <\/p>\n<p>The threat is so visible that the Securities and Exchange Commission published a report on its potential consequences. One of the projects mentioned in the <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.sec.gov\/files\/cft-written-input-daniel-bruno-corvelo-costa-090325.pdf\" target=\"_blank\" rel=\"nofollow\">report<\/a> was the Naoris Protocol, a cybersecurity mesh that uses a \u201cpost-quantum blockchain\u201d and distributed AI. Its founder and CEO, David Carvalho, spoke to crypto.news about the steps that the industry must take to tackle this threat. <\/p>\n<p><strong>crypto.news: When do you believe the first cryptographically relevant quantum computer will emerge? What are the risks to digital security as we know it?<\/strong><\/p>\n<p>David Carvalho: Anyone who tells you exactly when is either guessing or selling something. Credible timelines put it somewhere in the next decade; however, regulators are eyeing 2028 for mandatory quantum resilience. The scary part isn\u2019t the date\u2014it\u2019s how long migration actually takes. There\u2019s a naive assumption that you can just update the algorithm. In reality, we\u2019re talking about retooling the entire nervous system of digital trust: PKI, HSMs, code signing, TLS, VPNs, blockchains, banking rails\u2014the whole infrastructure. That\u2019s years of engineering, testing, and coordination. Once a cryptographically relevant quantum computer exists, all the mechanisms that keep digital identity, money, and software signatures safe become vulnerable. This opens the door to entity impersonation, transaction forgery, and compromised signed updates.<\/p>\n<p><strong>CN: What are the unique risks of quantum computing to blockchain networks?<\/strong><\/p>\n<p>DC: Blockchains are particularly vulnerable since most depend on ECDSA or EdDSA for signatures, and Shor\u2019s algorithm makes these trivial to break once quantum computers arrive. Private keys lose their privacy, wallets can be drained, validators spoofed, and bridges hijacked. The address reuse problem compounds this risk\u2014once a public key is revealed, that address becomes a target in a post-quantum world. Bitcoin UTXOs are especially exposed. Bridges and MPC-based custody setups that appear decentralized often rest on classical cryptographic assumptions, creating single points of failure. If validator identities can be forged, attackers don\u2019t need 51% of stake or hashpower\u2014they simply impersonate the right parties and the system accepts them as legitimate.<\/p>\n<p><strong>CN: The PQFIF report suggests only ~3% of banks support post-quantum computing today. How feasible is it for institutions to retrofit legacy systems with post-quantum protocols?<\/strong><\/p>\n<p>DC: It\u2019s feasible through layered, incremental adoption. Modern post-quantum solutions can work as overlays\u2014essentially decentralized trust meshes sitting on top of existing infrastructure. These systems attest devices, applications, keys, and data flows without requiring complete stack rewrites, making the transition more practical for institutions with extensive legacy systems.<\/p>\n<p><strong>CN: How vulnerable are today\u2019s blockchains and custody systems to Harvest-Now-Decrypt-Later (HNDL) attacks? Are state actors stockpiling encrypted blockchain data?<\/strong><\/p>\n<p>DC: HNDL is absolutely real and happening right now. The strategy is to collect encrypted traffic, keys at rest, backup files, and signed data for future decryption. While on-chain data is public, custody logs, wallet backups, encrypted API traffic, and internal server communications represent high-value targets. Nation-states with resources and patience are certainly accumulating this data.<\/p>\n<p>    <!-- .cn-block-related-link --><\/p>\n<p><strong>CN: If Q-Day arrived tomorrow, what would happen to Bitcoin, Ethereum, and the banking system?<\/strong><\/p>\n<p>DC: The timeline is almost irrelevant because Harvest-Now-Decrypt-Later attacks are already underway. Hostile governments and cybercriminal groups are stockpiling encrypted data\u2014medical files, financial transactions, classified intelligence, private communications\u2014confident that quantum computers will eventually crack it.<\/p>\n<p>If Q-Day arrived tomorrow, Bitcoin and Ethereum would experience selective theft targeting anything tied to exposed public keys. We\u2019d likely see chain reorganizations, forged validator identities, and exchanges freezing withdrawals during verification. DeFi would enter crisis mode. Banks would face PKI failures causing revocation storms, TLS session failures, and gateway connection drops. It wouldn\u2019t be apocalyptic, but it would create weeks of severe disruption.<\/p>\n<p><strong>CN: Are there efforts to engage with U.S. regulators or working groups on quantum computing risks?<\/strong><\/p>\n<p>DC: There\u2019s active engagement in public policy and standards discussions around crypto-agility and decentralized assurance. The quantum-resistant blockchain space has gained recognition in regulatory circles\u2014an independent analyst\u2019s submission on the SEC\u2019s site cited post-quantum blockchain protocols as models for protecting digital assets against quantum threats, marking the first time blockchain protocols have been explicitly referenced in this context for safeguarding trillions in digital assets.<\/p>\n<p>The sector has also been represented at high-profile gatherings like the 1640 Society Family Office Wealth Forum and the Volcano Innovation Summit, where discussions focused on how quantum-resistant blockchain and distributed security can protect high-value digital assets and critical infrastructure amid escalating cyber risks.<\/p>\n<p><strong>CN: How does decentralized cybersecurity differ from conventional validator networks?<\/strong><\/p>\n<p>DC: The fundamental difference is the validation target. Traditional validators only validate transactions, assuming the devices and code executing them are trustworthy\u2014a significant blind spot. Advanced approaches validate the environment itself: devices, software, identities, and data streams before they can transact. This creates a trust mesh that constantly attests endpoints using post-quantum cryptography and distributed AI. Every successful validation is cryptographically recorded, providing forensic proof-of-trust embedded in the chain. In essence, blockchains prove the state of things; next-generation systems prove the actors creating that state are legitimate.<\/p>\n<p><strong>CN: What trends in quantum or cryptography are experts underestimating?<\/strong><\/p>\n<p>DC: The focus on algorithms overshadows the real challenge: migration complexity, including key management, certificate lifecycles, and HSM upgrades. There\u2019s also an underestimation of the hybrid phase duration\u2014we\u2019ll likely run post-quantum and classical systems in parallel for decades, which requires careful operational planning. PQC alone won\u2019t provide security if endpoints are compromised; continuous attestation of devices, code, and data pipelines is essential. Looking ahead, AI and quantum computing are converging, and quantum-trained AI agents will eventually operate faster than human response times, fundamentally changing the threat landscape.<\/p>\n<p>    <!-- .cn-block-related-link --><\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>David Carvalho, Founder and CEO of Naoris Protocol, explains that state actors are already ready to use quantum computing for attacks. Summary David Carvalho of the Naoris Protocol explains how&hellip;<\/p>\n","protected":false},"author":1,"featured_media":1272,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-13083","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cryptocurrency"],"_links":{"self":[{"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/posts\/13083","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/comments?post=13083"}],"version-history":[{"count":1,"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/posts\/13083\/revisions"}],"predecessor-version":[{"id":13084,"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/posts\/13083\/revisions\/13084"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/media\/1272"}],"wp:attachment":[{"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/media?parent=13083"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/categories?post=13083"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/tags?post=13083"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}