Futures
Access hundreds of perpetual contracts
TradFi
Gold
One platform for global traditional assets
Options
Hot
Trade European-style vanilla options
Unified Account
Maximize your capital efficiency
Demo Trading
Introduction to Futures Trading
Learn the basics of futures trading
Futures Events
Join events to earn rewards
Demo Trading
Use virtual funds to practice risk-free trading
Launch
CandyDrop
Collect candies to earn airdrops
Launchpool
Quick staking, earn potential new tokens
HODLer Airdrop
Hold GT and get massive airdrops for free
Pre-IPOs
Unlock full access to global stock IPOs
Alpha Points
Trade on-chain assets and earn airdrops
Futures Points
Earn futures points and claim airdrop rewards
I recently read an interesting analysis by Filippo Valsorda on how quantum computing will actually impact our security systems. And honestly, it's more nuanced than what we usually hear.
The real threat is asymmetric encryption—RSA, ECDSA, all those algorithms we currently use for digital signatures and key exchange. That's where quantum computers could really cause damage. But here’s the interesting part: symmetric encryption like AES isn't as vulnerable as you might think.
Grover's algorithm is often presented as a deadly weapon against AES, but in practice, it's much more complicated. Parallelizing Grover isn't trivial, and launching an effective brute-force attack on 128-bit keys would still be extremely costly even with a quantum machine. NIST and cryptography experts agree that AES-128 can remain secure according to current post-quantum standards.
What really concerns me is the urgency to replace asymmetric encryption schemes. That's where action is needed. Organizations are already working on post-quantum alternatives, but the transition will take time. In the meantime, anything relying on RSA or ECDSA remains exposed to a theoretical but very real threat.
So yes, quantum is a serious threat, but it's not uniform. Asymmetric encryption demands immediate attention, while symmetric encryption can breathe a little.