30+ sources. Zero spin.
Cross-referenced, unbiased news. Both sides of every story.
Physicists Are Building Cryptography That Survives Even If Quantum Mechanics Is Wrong

The Problem Nobody in the Security Industry Is Asking
Everybody in tech is talking about the quantum computing threat to encryption. Replace RSA with post-quantum algorithms. Upgrade before the cryptographically relevant quantum computer arrives. Done.
Nobody is asking the next question: what if quantum mechanics itself isn't the final word?
A growing number of physicists are now taking this question seriously — and it has direct implications for the security of every quantum-protected communication system being built today.
What Quantum Key Distribution Actually Assumes
Quantum key distribution — the gold standard of quantum-secured communication — works because of a property called the monogamy of entanglement. Two particles get entangled. Any outside party that tries to intercept or tamper with the entanglement breaks it, alerting the people communicating. The sabotage cannot be hidden.
That's the theory. It rests entirely on quantum mechanics being correct and complete.
According to Quanta Magazine, the security guarantee evaporates if quantum mechanics ever gets superseded by a more complete theory of nature — the same way quantum mechanics itself superseded Newtonian physics roughly a century ago.
Enter Quantum Jamming
Researchers are concerned about a specific attack scenario called quantum jamming.
Michał Eckstein, a theoretical physicist at the Jagiellonian University in Kraków, Poland, illustrates the concept with a thought experiment, according to Quantum Zeitgeist. Picture Alice and Bob communicating via entangled particles. Now picture a third party — call him Jim the Jammer — who quietly manipulates the entanglement between their particles. He changes the correlation without breaking it. Alice and Bob see no alarm. No trip wire triggers. The communication is compromised and they have NO idea.
This only works if the monogamy of entanglement breaks down. Under standard quantum mechanics, it can't happen. But if a post-quantum theory of nature allows it — even in principle — every quantum key distribution system built today could be vulnerable to an attack class it was never designed to detect.
Ravishankar Ramanathan, a quantum information theorist at the University of Hong Kong, put it bluntly, as quoted by both Quanta Magazine and Wired: "In terms of these cryptographic protocols, it's good to be paranoid. Let's try to minimize the assumptions behind the protocol. Let's suppose that at some future date people realize that quantum mechanics is not the ultimate theory of nature."
This reflects a genuine intellectual position about the limits of what we know.
The Deeper Issue: Causality Itself
The response from frontier researchers isn't to panic. It's to build on something more fundamental than quantum mechanics — specifically, causality.
Causality is the principle that causes precede effects. A happens, then B. It predates quantum mechanics by millennia. The idea is that if you can build cryptographic security on causal principles rather than quantum mechanical ones, you get a protocol that survives even a complete overhaul of our understanding of physics.
Wired reported separately on a parallel and deeply relevant line of research: physicists have spent the last decade demonstrating that causal order itself can be indefinite at the quantum level.
Časlav Brukner, a physicist at the University of Vienna, described the concept as "outrageous" — and he's one of its leading researchers. In experiments run in Austria, China, Australia, and elsewhere, physicists have used something called the quantum switch to demonstrate that a particle can experience two conflicting causal sequences simultaneously. A causes B AND B causes A, both at once.
Giulia Rubino, a researcher at the University of Bristol who led the first experimental demonstration of the quantum switch in 2017, told Wired this phenomenon could be "really something that could be useful in everyday life."
Useful — and also deeply unsettling for anyone trying to build security on causal foundations. If causality can be put into superposition, what exactly are you anchoring to?
What Mainstream Coverage Is Missing
Most technology journalism on quantum security focuses on one question: when will a quantum computer break RSA encryption? The timelines get debated. Post-quantum algorithms get celebrated. NIST finalizes standards. Everyone moves on.
That framing treats the problem as solved once you swap out the algorithm. It overlooks the foundational layer — the physical assumptions underneath the cryptography itself.
Neither Wired nor Quantum Zeitgeist connected the quantum jamming research directly to the billions of dollars governments and corporations are currently pouring into quantum-secured infrastructure. If the monogamy of entanglement is an assumption rather than a guaranteed law — and if a post-quantum theory could violate it — then quantum key distribution networks being deployed right now could have a silent vulnerability baked in by design.
What This Means for Real People
Your bank, your government, your military communications — they're all on a migration path toward quantum-secured encryption. The people building that infrastructure are making a bet that quantum mechanics is complete enough to trust.
It's probably a good bet. But the physicists doing the hard math are telling you it's still a bet.
The smart move is exactly what Ramanathan is calling for: minimize assumptions, build on the deepest principles available, and stay paranoid. The history of physics is a history of confident foundations collapsing under new evidence.
Security built on 'quantum mechanics is definitely correct' is only as strong as that assumption holds. And right now, nobody can prove it holds forever.