March 4, 2026
Q-Day or Nay-Day?
The JVG algorithm could break RSA-2048 encryption with fewer than 5k qubits
Internet freaks out, commenters cry scam, sarcasm, and 'wait for Scott'
TLDR: A new algorithm claims a small quantum computer could break online encryption fast, igniting panic and skepticism. Commenters mock the hype, call quantum a scam, and say they’ll wait for expert verdicts, spotlighting real worries about “harvest now, decrypt later” data theft.
A research team dropped a bombshell: the JVG algorithm claims it could crack RSA-2048—the lock behind online banking and most secrets—with under 5,000 qubits and in about 11 hours. Cue the community chaos. Skeptics immediately waved the red flag on the word “could”, with one user deadpanning, “could carrying a lot of weight here.” Another went full tinfoil: “Quantum computing is a scam.” Meanwhile, the “adult in the room” crowd linked the preprint and said they’ll wait for Scott Aaronson’s take, the quantum celeb referee for every hype wave.
There’s also spicy corporate drama: a top comment points to a skeptic post calling “TLDR: No”, and alleging the hype comes from folks selling post‑quantum products, with a brand-new “University” tossed into the plot for extra flair. Techies joked “oh merely 5k qubits?” like someone asked for spare change. For non‑tech readers: RSA and ECC are math locks; quantum computers are sci‑fi machines that could pick those locks; PQC is the next-gen lock. The real fear isn’t today—it’s “harvest now, decrypt later”, where bad actors save encrypted data and wait for a future machine to open it. But for now, the thread’s split between apocalypse alarms and eye‑rolls, with memes beating math.
Key Points
- •AQTI announced the JVG algorithm, a hybrid quantum–classical approach to attacking RSA and ECC.
- •The JVG manuscript claims RSA‑2048 could be broken with fewer than 5,000 qubits, potentially in about 11 hours.
- •JVG reportedly replaces a key component of Shor’s algorithm, reducing qubit and operation requirements by orders of magnitude.
- •The research was posted on Preprints.org, presenting a substantial cut from Shor’s multi‑million‑qubit estimates.
- •The article situates the claim within ongoing PQC transitions, noting NIST’s 2024 standards work and CISA/NSA migration directives and warning of ‘harvest now, decrypt later’ risks.