Surfshark is proactively defending against the looming threat of quantum computing by launching post-quantum protection on WireGuard for macOS, Linux, and Android, with further platform expansion planned. This move is critical as a new analysis reveals a startlingly low level of preparedness across everyday apps – only 8% currently utilize post-quantum cryptography (PQC). “Quantum computing is advancing rapidly, and it poses a threat to current encryption methods used to secure data online,” warns Donatas Budvytis, Chief Technology Officer at Surfshark. Surfshark’s assessment of 40 popular apps across banking, shopping, social media, and messaging found a significant gap in defenses, highlighting the vulnerability of sensitive data as quantum computing power increases and potentially compromises current encryption systems.
Surfshark Launches Post-Quantum WireGuard Protection on Key Platforms
Surfshark has initiated post-quantum cryptographic protection within its WireGuard protocol, currently available on macOS, Linux, and Android, with forthcoming support for iOS and Windows. This preemptive measure addresses a looming vulnerability: the potential for quantum computers to rapidly break existing encryption algorithms, a concern substantiated by analysis showing only 8% of popular apps currently employ post-quantum cryptography (PQC). Surfshark assessed 40 commonly used applications—spanning banking, shopping, social media, and messaging—to gauge preparedness for this technological shift. The urgency stems from quantum computers’ ability to solve complex mathematical problems exponentially faster than classical computers.
He notes that hackers are already stockpiling encrypted data, anticipating the day quantum computing unlocks its decryption. Within the banking and shopping sectors, no apps currently utilize PQC, with only 20% actively researching solutions. Notably, TikTok stands alone among social media apps as quantum-resistant, while messaging apps demonstrate the most progress, with 18% featuring PQC. Budvytis cautions that even secure connections, like those using a post-quantum VPN, are insufficient if the receiving party—such as a bank—lacks similar defenses. “Imagine someone making a bank transfer… hackers equipped with quantum computing capabilities could easily decipher the data,” he warns.
Surfshark advocates for continuous education and the immediate adoption of quantum-resistant technologies to mitigate these future risks.
Low Post-Quantum Cryptography Adoption Across Popular App Categories
A recent assessment of 40 widely-used applications reveals a concerning lack of preparation for the incoming threat of quantum computing, with only 8% currently employing post-quantum cryptography (PQC). While 30% of developers are actively researching or planning for quantum resistance, a substantial 65% remain silent on their adoption strategies. Within the critical financial sectors of banking and shopping, no apps have yet implemented PQC, though 20% are showing initial initiative. Notably, TikTok is currently the sole quantum-resistant application among those analyzed in the social media category. However, major players like Google and Meta are acknowledging the quantum threat and beginning proactive measures.
Quantum Computing Threatens Current Encryption & Stored Sensitive Data
This limited resilience underscores the vulnerability of individuals and organizations to future decryption capabilities. The speed at which quantum computers can break modern encryption is alarming; a problem requiring millennia for classical computers could be solved in hours with sufficient quantum processing power. Budvytis highlights a critical concern: malicious actors are actively accumulating encrypted data now, anticipating the future availability of decryption tools. This stored data, currently secure, will become increasingly vulnerable as quantum computing matures, potentially leading to widespread privacy breaches.
Quantum computing is advancing rapidly, and it poses a threat to current encryption methods used to secure data online. Although nowadays it is used in very limited capabilities, soon it could become powerful enough to compromise today’s encryption systems, leading to significant digital security threats.
Donatas Budvytis, Chief Technology Officer at Surfshark
