Antigravity Q&A
If quantum computers arrive in five years, could retroactively-decrypted old game chat expose player identities or personal data?
Answered by claude-haiku-4-5 · 2 May 2026
Answer
Your question is about store-now-decrypt-later attacks — a real security concern, but it's not actually about quantum computers arriving in five years. Let me clarify.
The threat is this: adversaries can collect encrypted chat logs *today*, store them, and decrypt them *later* once quantum computers become powerful enough to break the encryption scheme. This is sometimes called "harvest now, decrypt later." For this to work, the original encryption must use algorithms vulnerable to quantum attacks — like RSA or elliptic curve cryptography, which Shor's algorithm can crack [AG-2024.05-2225].
The timeline matters. According to recent assessment, quantum computers powerful enough to break current cryptosystems are "likely to be available in a couple of years" [AG-2024.05-2225], though estimates vary. Crucially, the archive notes that "currently-available quantum computers...are not believed to currently pose security risks," and approximate methods being developed "do not appear likely to change the required resources for cryptanalysis on currently-used cryptosystems" [AG-2024.01-2022]. In other words: the threat is real but depends on quantum hardware advances still to come.
Why it matters for game chat: If old chats were encrypted with RSA or similar, yes, they could be retroactively decrypted once a sufficiently large quantum computer exists — exposing usernames, IPs, conversation content, and any personal data in those messages.
Mitigation: The solution is post-quantum cryptography — encryption schemes designed to resist both classical *and* quantum attacks. The field is maturing: NIST has standardized lattice-based algorithms like Kyber (for key exchange) and Dilithium (for signatures) [AG-2024.05-2225]. Game companies should be migrating to these now, before stored encrypted data becomes vulnerable.
The preprints don't discuss game chat specifically or assess whether major platforms have already migrated to post-quantum schemes.
Sources · 8
- 55%quant-phAssessing the Benefits and Risks of Quantum ComputersAG-2024.01-2022
- 55%cs.CRPost-Quantum Security: Origin, Fundamentals, and AdoptionAG-2024.05-2225
- 52%quant-phCan Quantum Computers Do Nothing?AG-2024.06-2229
- 52%cs.CRPost Quantum Cryptography and its Comparison with Classical CryptographyAG-2024.03-2222
- 51%cs.CRA Thorough Study of State Leakage Mitigation in Quantum Computing with One-Time PadAG-2024.01-1977
- 51%physics.soc-phWhat You Shouldn't Know About Quantum ComputersAG-2024.05-2409
- 50%cs.ET5 Year Update to the Next Steps in Quantum ComputingAG-2024.01-1960
- 50%cs.CRModelling the Impact of Quantum Circuit Imperfections on Networks and Computer ApplicationsAG-2024.03-2172
Keep exploring
- How do lattice-based encryption schemes like Kyber resist attacks that would break RSA?
- Why hasn't the game industry more visibly adopted post-quantum cryptography if the threat timeline is so urgent?
- If companies migrate to post-quantum encryption now, can old RSA-encrypted chats still be decrypted later by quantum computers?
This is a research aid — not a peer review. Verify sources before citing.