You cannot select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
mercury-parser/fixtures/www.newyorker.com/1611473608343.html

6 lines
79 KiB
HTML

<!DOCTYPE html><html lang="en-us" data-reactroot=""><head><title>Hacking, Cryptography, and the Countdown to Quantum Computing | The New Yorker</title><meta charset="utf-8"><meta http-equiv="X-UA-Compatible" value="IE=edge"><meta name="msapplication-tap-highlight" value="no"><meta name="viewport" value="width=device-width, initial-scale=1"><meta name="author" value="Alex Hutchinson"><meta name="copyright" value="Copyright (c) Cond&#xE9; Nast 2021"><meta name="description" value="Alex Hutchinson reports on a workshop in Toronto that explored how information-security experts will prepare for the advent of quantum computing."><meta name="id" value="5924f12d9d80dc1acda75fce"><meta name="keywords" value="annals of technology,cryptography,quantum computing,yahoo,security,web"><meta name="news_keywords" value="annals of technology,cryptography,quantum computing,yahoo,security,web"><meta name="robots" value="index, follow, max-image-preview:large"><meta name="content-type" value="article"><meta name="parsely-post-id" value="5924f12d9d80dc1acda75fce"><meta name="parsely-metadata" value="{&quot;description&quot;:&quot;Alex Hutchinson reports on a workshop in Toronto that explored how information-security experts will prepare for the advent of quantum computing.&quot;,&quot;image-16-9&quot;:&quot;https://media.newyorker.com/photos/59097a5e8b51cf59fc4239f5/16:9/w_1000,c_limit/Hutchinson-Quantum-Computing.jpg&quot;,&quot;image-1-1&quot;:&quot;https://media.newyorker.com/photos/59097a5e8b51cf59fc4239f5/1:1/w_1000,c_limit/Hutchinson-Quantum-Computing.jpg&quot;}"><meta value="In a decade, events like the recent data breach at Yahoo could become much more common, driven by a new kind of machine." name="og:description"><meta value="https://media.newyorker.com/photos/59097a5e8b51cf59fc4239f5/16:9/w_1280,c_limit/Hutchinson-Quantum-Computing.jpg" name="og:image"><meta value="The New Yorker" name="og:site_name"><meta value="Schr&#xF6;dinger&#x2019;s Hack" name="og:title"><meta value="article" name="og:type"><meta value="https://www.newyorker.com/tech/annals-of-technology/hacking-cryptography-and-the-countdown-to-quantum-computing" name="og:url"><meta value="metered" name="article:content_tier"><meta value="false" name="article:opinion"><meta http-equiv="content-language" value="en-us"><meta value="summary_large_image" name="twitter:card"><meta value="@NewYorker" name="twitter:creator"><meta value="In a decade, events like the recent data breach at Yahoo could become much more common, driven by a new kind of machine." name="twitter:description"><meta value="https://www.newyorker.com" name="twitter:domain"><meta value="https://media.newyorker.com/photos/59097a5e8b51cf59fc4239f5/16:9/w_1280,c_limit/Hutchinson-Quantum-Computing.jpg?mbid=social_retweet" name="twitter:image:src"><meta value="@NewYorker" name="twitter:site"><meta value="Schr&#xF6;dinger&#x2019;s Hack" name="twitter:title"><meta value="1147169538698836" name="fb:app_id"><meta value="9258148868" name="fb:pages"><link rel="canonical" href="https://www.newyorker.com/tech/annals-of-technology/hacking-cryptography-and-the-countdown-to-quantum-computing"><link rel="stylesheet" href="https://www.newyorker.com/verso/static/the-new-yorker/styles.min.css"><link rel="shortcut icon" href="https://www.newyorker.com/verso/static/the-new-yorker/assets/favicon.ico" type="image/x-icon"><link rel="amphtml" href="https://www.newyorker.com/tech/annals-of-technology/hacking-cryptography-and-the-countdown-to-quantum-computing/amp"><link rel="preload" href="https://cdn.cookielaw.org/scripttemplates/otSDKStub.js" as="script"><link rel="preload" href="https://cdn.cookielaw.org/opt-out/otCCPAiab.js" as="script">
<link rel="preconnect" href="https://securepubads.g.doubleclick.net/">
<link rel="preconnect" href="https://mb.moatads.com/" crossorigin="">
<link rel="preload" href="https://z.moatads.com/condenastprebidheader987326845656/moatheader.js" as="script">
<link rel="dns-prefetch" href="https://aax.amazon-adsystem.com/"><link rel="preconnect" href="https://aax.amazon-adsystem.com/" crossorigin=""><meta name="monetization" value="$spsp.coil.com/donate/condenast"><meta id="google-signin-meta" name="google-signin-client_id" value="275906274807-b4eqbdqr511u9msdpj8mh0pf77fcciv7.apps.googleusercontent.com"></head><body class="stackednavigation-site-navigation fixed-header-large-logo-nav-variation"><noscript><iframe title="Google Tag Manager" src="https://www.googletagmanager.com/ns.html?id=GTM-NX5LSK3" height="0" width="0" style="display:none;visibility:hidden"></iframe></noscript><div id="app-root"><div class="page page-theme-standard page--article"><div class="navigation-background-filler"></div><div class="ad ad--out-of-page"><div class="ad__slot ad__slot--out-of-page"></div></div><a href="https://www.newyorker.com/tech/annals-of-technology/hacking-cryptography-and-the-countdown-to-quantum-computing#main-content" class="page__skip-link">Skip to main content</a><div class="sc-jSFkmK jGLdVH"><aside class="paywall-modal paywall-modal--paywall"><div class="paywall-modal__consumer-marketing-unit consumer-marketing-unit consumer-marketing-unit--paywall-modal-full-barrier consumer-marketing-unit--no-failsafe" role="presentation" aria-hidden="true" aria-label="You&apos;ve read your last article." aria-live="assertive"><div class="consumer-marketing-unit__slot consumer-marketing-unit__slot--paywall-modal-full-barrier"></div><div class="journey-unit"></div></div></aside><div role="none"><aside class="paywall-modal paywall-modal--incognito"><div class="paywall-modal__consumer-marketing-unit consumer-marketing-unit consumer-marketing-unit--paywall-modal-call-to-action consumer-marketing-unit--no-failsafe" role="presentation" aria-hidden="true" aria-label="You&apos;ve read your last article." aria-live="assertive"><div class="consumer-marketing-unit__slot consumer-marketing-unit__slot--paywall-modal-call-to-action"></div><div class="journey-unit"></div></div></aside></div></div><div class="sc-giAqnE oPqrM persistent-top" data-testid="PersistentTop"><header class="stacked-navigation stacked-navigation--theme-standard stacked-navigation--fixed-header-layout stacked-navigation--primary-navigation-size-large site-navigation"><div class="consumer-marketing-unit consumer-marketing-unit--cm-banner consumer-marketing-unit--no-failsafe" role="presentation" aria-hidden="true"><div class="consumer-marketing-unit__slot consumer-marketing-unit__slot--cm-banner"></div><div class="journey-unit"></div></div><div class="grid grid-items-0 stacked-navigation__grid"><div class="grid--item stacked-navigation__top"><div class="stacked-navigation__section--cm-unit-nav-left"><div class="consumer-marketing-unit consumer-marketing-unit--nav-left consumer-marketing-unit--no-failsafe" role="presentation" aria-hidden="true"><div class="consumer-marketing-unit__slot consumer-marketing-unit__slot--nav-left"></div><div class="journey-unit"></div></div></div><div class="stacked-navigation__section--large-logo"><a class="stacked-navigation__logo-link" href="https://www.newyorker.com/" data-testid="Logo"><picture class="stacked-navigation__logo-image--large responsive-image"><img alt="The New Yorker" class="responsive-image__image" src="https://www.newyorker.com/verso/static/the-new-yorker/assets/logo.svg" srcset="" sizes="100vw"></picture></a></div><div class="stacked-navigation__section--utility-links"><nav aria-label="Utility" class="navigation navigation--horizontal navigation--justify-left stacked-navigation__navigation stacked-navigation__navigation--utility-links"><ul class="navigation__list"><li class="navigation__list-item"><a class="navigation__link" href="https://www.newyorker.com/newsletters">Newsletter</a></li></ul></nav><div class="standard-navigation-account stacked-navigation__section--utility-links-login"><div class="sc-iCoHVE sc-bCwgka inZljn bljZzb standard-navigation-account__bookmark-alert" role="tooltip"><div aria-hidden="true" role="presentation" class="sc-hHEjAm bNTnHc"></div><div aria-hidden="true" role="presentation" class="sc-dlMBXb daNRtU"><svg class="icon icon-bookmark icon-bookmark--activated" width="24" height="24" viewbox="0 0 24 24" fill="none" xmlns="http://www.w3.org/2000/svg"><title>Story Saved</title><path class="icon-bookmark-fill icon-bookmark--activated-outline" d="M20 24L12.5 19.7804L5 24V3H20V24ZM12.5 18.6028L19 22.2336V3.98131H6V22.2336L12.5 18.6028Z" fill="black"/><path class="icon-bookmark-fill icon-bookmark--activated-checkmark" d="M11.5541 13.7033L9 11.2033L9.66216 10.5552L11.5541 12.407L15.3378 8.70331L16 9.35146L11.5541 13.7033Z" fill="black"/></svg></div><div class="sc-iCoHVE sc-fujyUd sc-fKgIGh jChTxA iyFXyq gnaruc"><p>To revisit this article, select My&#x2060;&#xA0;&#x2060;Account, then <a href="https://www.newyorker.com/account/saved">View saved stories</a>.</p></div><button class="sc-bdnylx sc-gtssRu ezYEXu gjliHr button button--utility close-alert-button" data-event-click="{&quot;element&quot;:&quot;Button&quot;}" data-testid="Button" role="button" type="button"><span class="sc-dlnjPT drGLIg button__label">Close Alert</span><div class="sc-hKFyIo jwVEpR button__icon-container"><svg class="icon icon-close" focusable="false" viewbox="0 0 32 32" width="32" height="32" xmlns="http://www.w3.org/2000/svg"><title>Close</title><path d="M16 14.586l6.364-6.364 1.414 1.414L17.414 16l6.364 6.364-1.414 1.414L16 17.414l-6.364 6.364-1.414-1.414L14.586 16 8.222 9.636l1.414-1.414z" fill-rule="nonzero"/></svg></div></button></div><a href="https://www.newyorker.com/account/sign-in?redirectURL=https%3A%2F%2Fwww.newyorker.com%2Ftech%2Fannals-of-technology%2Fhacking-cryptography-and-the-countdown-to-quantum-computing" class="standard-navigation-account__label" rel="nofollow">Sign In</a></div><div class="consumer-marketing-unit consumer-marketing-unit--nav-dialog consumer-marketing-unit--no-failsafe" role="presentation" aria-hidden="true"><div class="consumer-marketing-unit__slot consumer-marketing-unit__slot--nav-dialog"></div><div class="journey-unit"></div></div><div class="consumer-marketing-unit consumer-marketing-unit--nav-cta consumer-marketing-unit--no-failsafe" role="presentation" aria-hidden="true"><div class="consumer-marketing-unit__slot consumer-marketing-unit__slot--nav-cta"></div><div class="journey-unit"></div></div><div class="consumer-marketing-unit consumer-marketing-unit--nav-rollover consumer-marketing-unit--no-failsafe" role="presentation" aria-hidden="true"><div class="consumer-marketing-unit__slot consumer-marketing-unit__slot--nav-rollover"></div><div class="journey-unit"></div></div><a href="https://www.newyorker.com/search" class="sc-bdnylx sc-gtssRu ezYEXu imXKH button button--utility stacked-navigation__search" data-event-click="{&quot;element&quot;:&quot;Button&quot;,&quot;outgoingURL&quot;:&quot;/search&quot;}" data-testid="Button" type=""><span class="sc-dlnjPT drGLIg button__label">Search</span><div class="sc-hKFyIo jwVEpR button__icon-container"><svg class="icon icon-search" focusable="false" viewbox="0 0 32 32" width="32" height="32" xmlns="http://www.w3.org/2000/svg"><title>Search</title><path d="M14.5 10a4.5 4.5 0 1 0 0 9 4.5 4.5 0 0 0 0-9zm5.249 8.335l4.458 4.458-1.414 1.414-4.458-4.458a6.5 6.5 0 1 1 1.414-1.414z" fill-rule="nonzero"/></svg></div></a></div></div><div class="grid--item stacked-navigation__section--primary-links"><nav aria-label="Primary" class="navigation navigation--horizontal navigation--justify-left stacked-navigation__navigation stacked-navigation__navigation--primary-links"><ul class="navigation__list"><li class="navigation__list-item"><a class="navigation__link" href="https://www.newyorker.com/news">News</a></li><li class="navigation__list-item"><a class="navigation__link" href="https://www.newyorker.com/culture">Books &amp; Culture</a></li><li class="navigation__list-item"><a class="navigation__link" href="https://www.newyorker.com/fiction-and-poetry">Fiction &amp; Poetry</a></li><li class="navigation__list-item"><a class="navigation__link" href="https://www.newyorker.com/humor">Humor &amp; Cartoons</a></li><li class="navigation__list-item"><a class="navigation__link" href="https://www.newyorker.com/magazine">Magazine</a></li><li class="navigation__list-item"><a class="navigation__link" href="https://www.newyorker.com/crossword-puzzles-and-games">Crossword</a></li><li class="navigation__list-item"><a class="navigation__link" href="https://video.newyorker.com/">Video</a></li><li class="navigation__list-item"><a class="navigation__link" href="https://www.newyorker.com/podcast">Podcasts</a></li><li class="navigation__list-item"><a class="navigation__link" href="https://www.newyorker.com/archive">Archive</a></li><li class="navigation__list-item"><a class="navigation__link" href="https://www.newyorker.com/goings-on-about-town">Goings On</a></li></ul></nav></div><div class="grid grid-items-0 grid--item stacked-navigation__bottom"><div class="grid--item stacked-navigation__drawer"><button class="sc-bdnylx sc-gtssRu ezYEXu gjliHr button button--utility stacked-navigation__drawer-toggle" data-event-click="{&quot;element&quot;:&quot;Button&quot;}" data-testid="Button" role="button" type="button"><span class="sc-dlnjPT drGLIg button__label">Open Navigation Menu</span><div class="sc-hKFyIo jwVEpR button__icon-container"><svg class="icon icon-menu" focusable="false" viewbox="0 0 32 32" width="32" height="32" xmlns="http://www.w3.org/2000/svg"><title>Menu</title><path d="M8 10h16v2H8v-2zm0 5h16v2H8v-2zm0 5h16v2H8v-2z" fill-rule="evenodd"/></svg></div></button><div class="sc-iCoHVE sc-bCwgka inZljn bljZzb" role="tooltip"><div aria-hidden="true" role="presentation" class="sc-hHEjAm bNTnHc"></div><div aria-hidden="true" role="presentation" class="sc-dlMBXb daNRtU"><svg class="icon icon-bookmark icon-bookmark--activated" width="24" height="24" viewbox="0 0 24 24" fill="none" xmlns="http://www.w3.org/2000/svg"><title>Story Saved</title><path class="icon-bookmark-fill icon-bookmark--activated-outline" d="M20 24L12.5 19.7804L5 24V3H20V24ZM12.5 18.6028L19 22.2336V3.98131H6V22.2336L12.5 18.6028Z" fill="black"/><path class="icon-bookmark-fill icon-bookmark--activated-checkmark" d="M11.5541 13.7033L9 11.2033L9.66216 10.5552L11.5541 12.407L15.3378 8.70331L16 9.35146L11.5541 13.7033Z" fill="black"/></svg></div><div class="sc-iCoHVE sc-fujyUd sc-fKgIGh jChTxA iyFXyq gnaruc"><p>To revisit this article, visit My Profile, then <a href="https://www.newyorker.com/account/saved">View saved stories</a>.</p></div><button class="sc-bdnylx sc-gtssRu ezYEXu gjliHr button button--utility close-alert-button" data-event-click="{&quot;element&quot;:&quot;Button&quot;}" data-testid="Button" role="button" type="button"><span class="sc-dlnjPT drGLIg button__label">Close Alert</span><div class="sc-hKFyIo jwVEpR button__icon-container"><svg class="icon icon-close" focusable="false" viewbox="0 0 32 32" width="32" height="32" xmlns="http://www.w3.org/2000/svg"><title>Close</title><path d="M16 14.586l6.364-6.364 1.414 1.414L17.414 16l6.364 6.364-1.414 1.414L16 17.414l-6.364 6.364-1.414-1.414L14.586 16 8.222 9.636l1.414-1.414z" fill-rule="nonzero"/></svg></div></button></div></div><div class="grid--item stacked-navigation__section--logo"><a class="stacked-navigation__logo-link" href="https://www.newyorker.com/"><picture class="stacked-navigation__logo-image--collapsed responsive-image"><img alt="The New Yorker" class="responsive-image__image" src="https://www.newyorker.com/verso/static/the-new-yorker/assets/logo-header.svg" srcset="" sizes="100vw"></picture></a></div><div class="grid--item stacked-navigation__section--mobile-option"><div class="consumer-marketing-unit consumer-marketing-unit--mob-nav-cta consumer-marketing-unit--no-failsafe" role="presentation" aria-hidden="true"><div class="consumer-marketing-unit__slot consumer-marketing-unit__slot--mob-nav-cta"></div><div class="journey-unit"></div></div></div></div></div></header></div><div class="sc-gKAblj boPkKw persistent-bottom"><aside class="paywall-bar paywall-bar--visible"><div class="paywall-bar__consumer-marketing-unit consumer-marketing-unit consumer-marketing-unit--paywall-bar-call-to-action consumer-marketing-unit--no-failsafe" role="presentation" aria-hidden="true" aria-live="polite"><div class="consumer-marketing-unit__slot consumer-marketing-unit__slot--paywall-bar-call-to-action"></div><div class="journey-unit"></div></div></aside></div><div class="ad-stickyhero"><div class="ad ad--hero"><div class="ad__slot ad__slot--hero"></div></div><div class="consumer-marketing-unit consumer-marketing-unit--display-hero consumer-marketing-unit--no-failsafe" role="presentation" aria-hidden="true"><div class="consumer-marketing-unit__slot consumer-marketing-unit__slot--display-hero"></div><div class="journey-unit"></div></div></div><main id="main-content" tabindex="-1" class="page__main-content"><article class="article main-content"><div class="lede-background"><header class="content-header content-header--align-left content-header--media-smallrule content-header--position-above content-header__nav-spacing--padding-top-xs article__content-header content-header__caption-style--default content-header--publish-date-bottom"><div class="content-header__container content-header__container-theme-standard"><div class="content-header__row content-header__title-block"><div class="content-header__rubric-block" data-testid="ContentHeaderRubric"><div class="content-header__rubric-date-block"><div class="sc-gIvpCV fHEinq rubric content-header__rubric content-header__rubric--with-no-padding"><a class="sc-dFRpvv eTInXE rubric__link" href="https://www.newyorker.com/tech/annals-of-technology"><span class="sc-csTaMs dugqNO">Annals of Technology</span></a></div></div></div><h1 class="content-header__row content-header__hed" data-testid="ContentHeaderHed">Hacking, Cryptography, and the Countdown to Quantum Computing</h1></div><div class="content-header__row content-header__accreditation content-header__accreditation-without-dek content-header__accreditation--without-lede content-header__row--with-bottom-border"><div class="content-header__row content-header__byline"><div class="content-header__byline__content"><div data-testid="BylinesWrapper" class="sc-iCoHVE sc-Gvgqn inZljn fvMmpR bylines content-header__bylines content-header__bylines--with-publish-date"><p class="sc-dsXyEt kKGUrs byline bylines__byline byline--author" data-testid="BylineWrapper" itemprop="author" itemtype="http://schema.org/Person"><span class="sc-iCoHVE sc-fujyUd sc-jQAyEw inZljn hErgeG cBUwUx byline__preamble">By </span><span itemprop="name" class="sc-fcmNTy eXNXqu"><span class="sc-daBvwG jOzHBa byline__name"><a class="sc-iCoHVE sc-fujyUd sc-pNWxx sc-jUfxsr inZljn YjvgJ hJIyPe iwBsUM byline__name-link" href="https://www.newyorker.com/contributors/alex-hutchinson">Alex Hutchinso<span class="sc-fuIRbl hXwWQH link__last-letter-spacing">n</span></a></span></span></p></div><time class="content-header__publish-date content-header__publish-date--with-float-left" data-testid="ContentHeaderPublishDate">September 26, 2016</time></div></div><div class="social-icons social-icons--standard content-header__row content-header__social-share social-links-left-layout social-share-hide-on-desktop"><ul class="social-icons__list"><li class="social-icons__list-item social-icons__list-item--facebook social-icons__list-item--standard thinner"><a aria-label="Share on Facebook" class="external-link social-icons__link social-icons__link--facebook social-icons__external-link" data-event-click="{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https://www.facebook.com/dialog/feed?&amp;display=popup&amp;caption=Schr%C3%B6dinger%E2%80%99s%20Hack&amp;app_id=1147169538698836&amp;link=https%3A%2F%2Fwww.newyorker.com%2Ftech%2Fannals-of-technology%2Fhacking-cryptography-and-the-countdown-to-quantum-computing%3Futm_source%3Dfacebook%26utm_medium%3Dsocial%26utm_campaign%3Donsite-share%26utm_brand%3Dthe-new-yorker%26utm_social-type%3Dearned&quot;}" href="https://www.facebook.com/dialog/feed?&amp;display=popup&amp;caption=Schr%C3%B6dinger%E2%80%99s%20Hack&amp;app_id=1147169538698836&amp;link=https%3A%2F%2Fwww.newyorker.com%2Ftech%2Fannals-of-technology%2Fhacking-cryptography-and-the-countdown-to-quantum-computing%3Futm_source%3Dfacebook%26utm_medium%3Dsocial%26utm_campaign%3Donsite-share%26utm_brand%3Dthe-new-yorker%26utm_social-type%3Dearned" rel="nofollow noopener" target="_blank"><div class="social-icons__icon-container"><svg class="icon icon-facebook" focusable="false" width="7.2" height="16" viewbox="0 0 7.2 16" xmlns="http://www.w3.org/2000/svg"><title>Facebook</title><path d="M1.548 3.099v2.203H0v2.693h1.548V16h3.179V7.995H6.86s.2-1.291.297-2.703H4.739V3.45c0-.275.346-.646.689-.646H7.16V0H4.805C1.47 0 1.548 2.696 1.548 3.099z"/></svg></div></a></li><li class="social-icons__list-item social-icons__list-item--twitter social-icons__list-item--standard thinner"><a aria-label="Share on Twitter" class="external-link social-icons__link social-icons__link--twitter social-icons__external-link" data-event-click="{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https://twitter.com/intent/tweet/?url=https%3A%2F%2Fwww.newyorker.com%2Ftech%2Fannals-of-technology%2Fhacking-cryptography-and-the-countdown-to-quantum-computing%3Futm_source%3Dtwitter%26utm_medium%3Dsocial%26utm_campaign%3Donsite-share%26utm_brand%3Dthe-new-yorker%26utm_social-type%3Dearned&amp;text=Schr%C3%B6dinger%E2%80%99s%20Hack&amp;via=NewYorker&quot;}" href="https://twitter.com/intent/tweet/?url=https%3A%2F%2Fwww.newyorker.com%2Ftech%2Fannals-of-technology%2Fhacking-cryptography-and-the-countdown-to-quantum-computing%3Futm_source%3Dtwitter%26utm_medium%3Dsocial%26utm_campaign%3Donsite-share%26utm_brand%3Dthe-new-yorker%26utm_social-type%3Dearned&amp;text=Schr%C3%B6dinger%E2%80%99s%20Hack&amp;via=NewYorker" rel="nofollow noopener" target="_blank"><div class="social-icons__icon-container"><svg class="icon icon-twitter" focusable="false" width="15.3" height="13" viewbox="0 0 15.3 13" xmlns="http://www.w3.org/2000/svg"><title>Twitter</title><path d="M15.275 1.539a6.04 6.04 0 0 1-1.8.517A3.268 3.268 0 0 0 14.854.24a6.127 6.127 0 0 1-1.99.797A3.067 3.067 0 0 0 10.575 0c-1.73 0-3.134 1.47-3.134 3.281 0 .257.028.508.081.748C4.918 3.892 2.61 2.585 1.063.6A3.382 3.382 0 0 0 .64 2.25c0 1.14.552 2.144 1.393 2.732a3.001 3.001 0 0 1-1.418-.41v.042c0 1.59 1.08 2.916 2.513 3.218a3.011 3.011 0 0 1-1.415.056c.399 1.304 1.556 2.253 2.926 2.28A6.111 6.111 0 0 1 0 11.525 8.59 8.59 0 0 0 4.805 13c5.764 0 8.916-5 8.916-9.338a8.96 8.96 0 0 0-.01-.425 6.522 6.522 0 0 0 1.564-1.698z"/></svg></div></a></li><li class="social-icons__list-item social-icons__list-item--email social-icons__list-item--standard thinner"><a aria-label="Share via Email" class="external-link social-icons__link social-icons__link--email social-icons__external-link" data-event-click="{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;mailto:?subject=Schr%C3%B6dinger%E2%80%99s%20Hack&amp;body=https%3A%2F%2Fwww.newyorker.com%2Ftech%2Fannals-of-technology%2Fhacking-cryptography-and-the-countdown-to-quantum-computing%3Futm_source%3Donsite-share%26utm_medium%3Demail%26utm_campaign%3Donsite-share%26utm_brand%3Dthe-new-yorker&quot;}" href="mailto:?subject=Schr%C3%B6dinger%E2%80%99s%20Hack&amp;body=https%3A%2F%2Fwww.newyorker.com%2Ftech%2Fannals-of-technology%2Fhacking-cryptography-and-the-countdown-to-quantum-computing%3Futm_source%3Donsite-share%26utm_medium%3Demail%26utm_campaign%3Donsite-share%26utm_brand%3Dthe-new-yorker" rel="nofollow noopener" target="_blank"><div class="social-icons__icon-container"><svg class="icon icon-email" focusable="false" width="17.3" height="13" viewbox="0 0 17.3 13" xmlns="http://www.w3.org/2000/svg"><title>Email</title><path d="M0 .776V13h17.333V.776L8.67 8.931 0 .776z M.756 0L8.67 7.443 16.578 0H.756z"/></svg></div></a></li><li class="social-icons__list-item social-icons__list-item--print social-icons__list-item--standard thinner"><a aria-label="Print" class="external-link social-icons__link social-icons__link--print social-icons__external-link" data-event-click="{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;#&quot;}" href="https://www.newyorker.com/tech/annals-of-technology/hacking-cryptography-and-the-countdown-to-quantum-computing#" rel="nofollow noopener" target="_blank"><div class="social-icons__icon-container"><svg class="icon icon-print" width="17" height="16" viewbox="0 0 17 16" fill="none" xmlns="http://www.w3.org/2000/svg"><title>Print</title><rect class="background" x="4.5" y="0.5" width="8" height="5" fill="black" stroke="white"/><rect y="4" width="17" height="9" fill="white"/><rect class="background" x="4.5" y="10.5" width="8" height="5" fill="black" stroke="white"/></svg></div></a></li><li class="social-icons__list-item social-icons__list-item--bookmark social-icons__list-item--standard thinner bookmark-disabled"><a aria-label="Save story" class="external-link social-icons__link social-icons__link--bookmark social-icons__external-link" data-event-click="{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;#&quot;}" href="https://www.newyorker.com/tech/annals-of-technology/hacking-cryptography-and-the-countdown-to-quantum-computing#" rel="nofollow noopener" target="_blank"><div class="social-icons__icon-container"><svg class="icon icon-bookmark" width="24" height="24" viewbox="0 0 24 24" fill="none" xmlns="http://www.w3.org/2000/svg"><title>Save Story</title><path class="icon-bookmark-fill" d="M20 23.9508L12.5 19.7312L5 23.9508V2.95081H14V3.93211H6V22.1845L12.5 18.5536L19 22.1845V8.83866H20V23.9508Z" fill="black"/><path class="icon-bookmark-stroke" d="M23 3H20V0H19V3H16V4H19V7H20V4H23V3Z" fill="black"/></svg></div></a></li><div class="sc-iCoHVE sc-bCwgka inZljn kumjtI" role="tooltip"><div aria-hidden="true" role="presentation" class="sc-hHEjAm cazKAM"></div><div class="sc-iCoHVE sc-fujyUd sc-fKgIGh jChTxA iyFXyq cAkOVh"><div>Save this story for later.</div></div></div></ul></div></div></div><aside class="sc-jhGSUB fDMHrh persistent-aside persistent-aside--align-left-lead-asset" style="position:absolute;top:auto;height:auto"><div class="sc-eHEFXm cnTHJG sticky-box article__social-share"><div class="sc-hzUJqN lkiIWD sticky-box__primary"><div class="social-icons social-icons--circular social-icons--share social-icons--bg"><ul class="social-icons__list"><li class="social-icons__list-item social-icons__list-item--facebook social-icons__list-item--circular thinner"><a aria-label="Share on Facebook" class="external-link social-icons__link social-icons__link--facebook social-icons__external-link" data-event-click="{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https://www.facebook.com/dialog/feed?&amp;display=popup&amp;caption=Schr%C3%B6dinger%E2%80%99s%20Hack&amp;app_id=1147169538698836&amp;link=https%3A%2F%2Fwww.newyorker.com%2Ftech%2Fannals-of-technology%2Fhacking-cryptography-and-the-countdown-to-quantum-computing%3Futm_source%3Dfacebook%26utm_medium%3Dsocial%26utm_campaign%3Donsite-share%26utm_brand%3Dthe-new-yorker%26utm_social-type%3Dearned&quot;}" href="https://www.facebook.com/dialog/feed?&amp;display=popup&amp;caption=Schr%C3%B6dinger%E2%80%99s%20Hack&amp;app_id=1147169538698836&amp;link=https%3A%2F%2Fwww.newyorker.com%2Ftech%2Fannals-of-technology%2Fhacking-cryptography-and-the-countdown-to-quantum-computing%3Futm_source%3Dfacebook%26utm_medium%3Dsocial%26utm_campaign%3Donsite-share%26utm_brand%3Dthe-new-yorker%26utm_social-type%3Dearned" rel="nofollow noopener" target="_blank"><div class="social-icons__icon-container"><svg class="icon icon-facebook" focusable="false" width="7.2" height="16" viewbox="0 0 7.2 16" xmlns="http://www.w3.org/2000/svg"><title>Facebook</title><path d="M1.548 3.099v2.203H0v2.693h1.548V16h3.179V7.995H6.86s.2-1.291.297-2.703H4.739V3.45c0-.275.346-.646.689-.646H7.16V0H4.805C1.47 0 1.548 2.696 1.548 3.099z"/></svg></div></a></li><li class="social-icons__list-item social-icons__list-item--twitter social-icons__list-item--circular thinner"><a aria-label="Share on Twitter" class="external-link social-icons__link social-icons__link--twitter social-icons__external-link" data-event-click="{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https://twitter.com/intent/tweet/?url=https%3A%2F%2Fwww.newyorker.com%2Ftech%2Fannals-of-technology%2Fhacking-cryptography-and-the-countdown-to-quantum-computing%3Futm_source%3Dtwitter%26utm_medium%3Dsocial%26utm_campaign%3Donsite-share%26utm_brand%3Dthe-new-yorker%26utm_social-type%3Dearned&amp;text=Schr%C3%B6dinger%E2%80%99s%20Hack&amp;via=NewYorker&quot;}" href="https://twitter.com/intent/tweet/?url=https%3A%2F%2Fwww.newyorker.com%2Ftech%2Fannals-of-technology%2Fhacking-cryptography-and-the-countdown-to-quantum-computing%3Futm_source%3Dtwitter%26utm_medium%3Dsocial%26utm_campaign%3Donsite-share%26utm_brand%3Dthe-new-yorker%26utm_social-type%3Dearned&amp;text=Schr%C3%B6dinger%E2%80%99s%20Hack&amp;via=NewYorker" rel="nofollow noopener" target="_blank"><div class="social-icons__icon-container"><svg class="icon icon-twitter" focusable="false" width="15.3" height="13" viewbox="0 0 15.3 13" xmlns="http://www.w3.org/2000/svg"><title>Twitter</title><path d="M15.275 1.539a6.04 6.04 0 0 1-1.8.517A3.268 3.268 0 0 0 14.854.24a6.127 6.127 0 0 1-1.99.797A3.067 3.067 0 0 0 10.575 0c-1.73 0-3.134 1.47-3.134 3.281 0 .257.028.508.081.748C4.918 3.892 2.61 2.585 1.063.6A3.382 3.382 0 0 0 .64 2.25c0 1.14.552 2.144 1.393 2.732a3.001 3.001 0 0 1-1.418-.41v.042c0 1.59 1.08 2.916 2.513 3.218a3.011 3.011 0 0 1-1.415.056c.399 1.304 1.556 2.253 2.926 2.28A6.111 6.111 0 0 1 0 11.525 8.59 8.59 0 0 0 4.805 13c5.764 0 8.916-5 8.916-9.338a8.96 8.96 0 0 0-.01-.425 6.522 6.522 0 0 0 1.564-1.698z"/></svg></div></a></li><li class="social-icons__list-item social-icons__list-item--email social-icons__list-item--circular thinner"><a aria-label="Share via Email" class="external-link social-icons__link social-icons__link--email social-icons__external-link" data-event-click="{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;mailto:?subject=Schr%C3%B6dinger%E2%80%99s%20Hack&amp;body=https%3A%2F%2Fwww.newyorker.com%2Ftech%2Fannals-of-technology%2Fhacking-cryptography-and-the-countdown-to-quantum-computing%3Futm_source%3Donsite-share%26utm_medium%3Demail%26utm_campaign%3Donsite-share%26utm_brand%3Dthe-new-yorker&quot;}" href="mailto:?subject=Schr%C3%B6dinger%E2%80%99s%20Hack&amp;body=https%3A%2F%2Fwww.newyorker.com%2Ftech%2Fannals-of-technology%2Fhacking-cryptography-and-the-countdown-to-quantum-computing%3Futm_source%3Donsite-share%26utm_medium%3Demail%26utm_campaign%3Donsite-share%26utm_brand%3Dthe-new-yorker" rel="nofollow noopener" target="_blank"><div class="social-icons__icon-container"><svg class="icon icon-email" focusable="false" width="17.3" height="13" viewbox="0 0 17.3 13" xmlns="http://www.w3.org/2000/svg"><title>Email</title><path d="M0 .776V13h17.333V.776L8.67 8.931 0 .776z M.756 0L8.67 7.443 16.578 0H.756z"/></svg></div></a></li><li class="social-icons__list-item social-icons__list-item--print social-icons__list-item--circular thinner"><a aria-label="Print" class="external-link social-icons__link social-icons__link--print social-icons__external-link" data-event-click="{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;#&quot;}" href="https://www.newyorker.com/tech/annals-of-technology/hacking-cryptography-and-the-countdown-to-quantum-computing#" rel="nofollow noopener" target="_blank"><div class="social-icons__icon-container"><svg class="icon icon-print" width="17" height="16" viewbox="0 0 17 16" fill="none" xmlns="http://www.w3.org/2000/svg"><title>Print</title><rect class="background" x="4.5" y="0.5" width="8" height="5" fill="black" stroke="white"/><rect y="4" width="17" height="9" fill="white"/><rect class="background" x="4.5" y="10.5" width="8" height="5" fill="black" stroke="white"/></svg></div></a></li><li class="social-icons__list-item social-icons__list-item--bookmark social-icons__list-item--circular thinner bookmark-disabled"><a aria-label="Save story" class="external-link social-icons__link social-icons__link--bookmark social-icons__external-link" data-event-click="{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;#&quot;}" href="https://www.newyorker.com/tech/annals-of-technology/hacking-cryptography-and-the-countdown-to-quantum-computing#" rel="nofollow noopener" target="_blank"><div class="social-icons__icon-container"><svg class="icon icon-bookmark" width="24" height="24" viewbox="0 0 24 24" fill="none" xmlns="http://www.w3.org/2000/svg"><title>Save Story</title><path class="icon-bookmark-fill" d="M20 23.9508L12.5 19.7312L5 23.9508V2.95081H14V3.93211H6V22.1845L12.5 18.5536L19 22.1845V8.83866H20V23.9508Z" fill="black"/><path class="icon-bookmark-stroke" d="M23 3H20V0H19V3H16V4H19V7H20V4H23V3Z" fill="black"/></svg></div></a></li><div class="sc-iCoHVE sc-bCwgka inZljn kumjtI" role="tooltip"><div aria-hidden="true" role="presentation" class="sc-hHEjAm cazKAM"></div><div class="sc-iCoHVE sc-fujyUd sc-fKgIGh jChTxA iyFXyq cAkOVh"><div>Save this story for later.</div></div></div></ul></div></div><div class="sc-kYQaHc gQtfxQ"></div></div></aside></header></div><div class="content-background content-padding-top-large" data-attribute-verso-pattern="article-body"><div class=""><div class="article__chunks article__chunks--without-top-spacing-content-well article__chunks--hr-style-thin"><div class="grid grid-margins grid-items-2 grid-layout--adrail narrow wide-adrail"><div class="grid--item body body__container article__body grid-layout__content"><inline-embed name="dropcap" attrs="[object Object]" childtypes=""><p class="has-dropcap has-dropcap__lead-standard-heading">Given the recent ubiquity of cyber-scandals&#x2014;Colin Powell&#x2019;s stolen e-mails, Simone Biles&#x2019;s leaked medical records, half a billion <a href="http://www.newyorker.com/business/currency/a-hack-to-yahoos-shrunken-reputation">plundered Yahoo accounts</a>&#x2014;you might get the impression that hackers can already break into just about any computer they want. But the situation could be a lot worse. The encryption methods that protect everything from online shopping to diplomatic communications remain effectively impregnable when properly implemented, even if, in practice, there are frequent breaches&#x2014;<a href="http://www.newyorker.com/news/john-cassidy/its-time-to-let-edward-snowden-come-home">whistle-blowers</a>, careless clicks, and so on. This relatively happy state of affairs will not, however, endure. Scientists around the world are inching toward the development of a fully functioning quantum computer, a new type of machine that would, on its first day of operation, be capable of cracking the Internet&#x2019;s most widely used codes. Precisely when that day will arrive is unclear, but it could be in as little as ten years. Experts call the countdown Y2Q: &#x201C;years to quantum.&#x201D;</p></inline-embed><div class="callout callout--inset-right callout--has-top-border callout--content-type--asset-embed callout--content-type--image inset-embedded-lede"><figure class="asset-embed"><div class="asset-embed__asset-container"><span class="responsive-asset asset-embed__responsive-asset responsive-asset--invisible"><picture class="asset-embed__responsive-asset responsive-image"><noscript><img alt="In a laboratory in Shanghai researchers work on developing a quantum computera new kind of machine that could make..." class="responsive-image__image" src="https://media.newyorker.com/photos/59097a5e8b51cf59fc4239f5/master/w_2560%2Cc_limit/Hutchinson-Quantum-Computing.jpg%202560w,%20https://media.newyorker.com/photos/59097a5e8b51cf59fc4239f5/master/w_1280%2Cc_limit/Hutchinson-Quantum-Computing.jpg%201280w,%20https://media.newyorker.com/photos/59097a5e8b51cf59fc4239f5/master/w_1280%2Cc_limit/Hutchinson-Quantum-Computing.jpg%201280w,%20https://media.newyorker.com/photos/59097a5e8b51cf59fc4239f5/master/w_1024%2Cc_limit/Hutchinson-Quantum-Computing.jpg%201024w,%20https://media.newyorker.com/photos/59097a5e8b51cf59fc4239f5/master/w_360%2Cc_limit/Hutchinson-Quantum-Computing.jpg%20360w" srcset="https://media.newyorker.com/photos/59097a5e8b51cf59fc4239f5/master/w_2560%2Cc_limit/Hutchinson-Quantum-Computing.jpg 2560w, https://media.newyorker.com/photos/59097a5e8b51cf59fc4239f5/master/w_1280%2Cc_limit/Hutchinson-Quantum-Computing.jpg 1280w, https://media.newyorker.com/photos/59097a5e8b51cf59fc4239f5/master/w_1024%2Cc_limit/Hutchinson-Quantum-Computing.jpg 1024w, https://media.newyorker.com/photos/59097a5e8b51cf59fc4239f5/master/w_360%2Cc_limit/Hutchinson-Quantum-Computing.jpg 360w" sizes="100vw"></noscript></picture></span></div><figcaption class="sc-iCoHVE sc-bkbjAj inZljn iROmkh caption asset-embed__caption"><span class="sc-iCoHVE sc-fujyUd sc-iemXMA inZljn hIIqRy gILDrK caption__text">In a laboratory in Shanghai, researchers work on developing a quantum computer&#x2014;a new kind of machine that could make hacking much more common.</span><span class="sc-iCoHVE sc-fujyUd sc-dIvqjp inZljn gCqeRK kbWtWO caption__credit">Zhejiang Daily / AP</span></figcaption></figure></div><p>This looming but uncertain deadline hovered in the air at the Hilton Toronto last&#xA0;week, where government officials, cyber-security researchers, and representatives from companies like Amazon, Microsoft, and Intel gathered for <a class="external-link" data-event-click="{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;http://www.etsi.org/news-events/events/1072-ws-on-quantumsafe-2016&quot;}" href="http://www.etsi.org/news-events/events/1072-ws-on-quantumsafe-2016" rel="nofollow noopener" target="_blank">an international workshop</a> on &#x201C;quantum-safe cryptography.&#x201D; Michele Mosca, a professor at the University of Waterloo&#x2019;s Institute for Quantum Computing and the co-host of the workshop, pegged the odds of reaching Y2Q by 2026 at one in seven, rising to one in two by 2031. But the exact date doesn&#x2019;t really matter, because the time needed to invent, battle-test, standardize, and roll out new security algorithms Internet-wide might be just as long. Brian LaMacchia, the head of security and cryptography at Microsoft Research, has a working estimate of 2030. &#x201C;The people who try to build quantum computers, who sit on the floor upstairs from me, said fifteen years last year,&#x201D; he told me. &#x201C;So I said, O.K., let&#x2019;s work backwards from that. And I&#x2019;m out of time.&#x201D;</p><p>Classical computers encode information as a series of bits, which can be either 0 or 1, and then manipulate those bits according to simple rules. A quantum computer isn&#x2019;t just a faster or better classical computer; it&#x2019;s fundamentally different. Instead of bits, it stores information as qubits, which can be 0, 1, or both at once. That&#x2019;s a consequence of the quantum-mechanical property of <a class="external-link" data-event-click="{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;http://www.physics.org/article-questions.asp?id=124&quot;}" href="http://www.physics.org/article-questions.asp?id=124" rel="nofollow noopener" target="_blank">superposition</a>, which allows physical objects to exist in multiple states, or even be in different places, at one time. Thus, two qubits can represent four states simultaneously (00, 01, 10, 11), and a hundred qubits can represent 1.3 quadrillion quadrillion. This quantum peculiarity allows the computer to find patterns in huge data sets very quickly&#x2014;to get detailed information about a forest without looking at all the trees, as Mosca put it. The main mathematical challenge in breaking current codes is factoring very large numbers, which for classical computers is the equivalent of trying combination after combination to see if it opens a lock. As the keys get longer, the locks get tougher. It took about two years on hundreds of computers to unlock a single instance of the RSA-768 algorithm, which, as its name suggests, requires a key that is seven hundred and sixty-eight bits long. Doing the same for its more secure cousin, RSA-1024, would take about a thousand times longer, and RSA-4096 is effectively out of reach. A quantum computer, on the other hand, would tackle such problems effortlessly.</p><div class="ad ad--in-content"><div class="ad__slot ad__slot--in-content"></div></div><p>When quantum computing was first proposed, in the nineteen-eighties, it was mostly a theoretical curiosity. That changed in 1994, when Peter Shor, then at A.T. &amp; T.&#x2019;s Bell Labs, demonstrated how it could apply to cryptography. Once the significance of Shor&#x2019;s work became clear, the race to actually build a quantum computer became one of the hottest tickets in physics. Among the biggest players was the U.S. government, which by 2007 was spending about <a class="external-link" data-event-click="{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;http://walrusmagazine.com/articles/2007.09--quantum-computing/&quot;}" href="http://walrusmagazine.com/articles/2007.09--quantum-computing/" rel="nofollow noopener" target="_blank">sixty million dollars a year</a> on quantum-computing research. It didn&#x2019;t just want to build one; it also needed to know whether anyone else was getting close. After all, top-secret messages sent today could still be embarrassing or dangerous if they were intercepted and stored, then decrypted by a device built a decade from now.</p><div class="cne-interlude-embed"></div><p>So far, the best quantum computers have just a handful of qubits&#x2014;<a class="external-link" data-event-click="{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https://www-03.ibm.com/press/us/en/pressrelease/49661.wss&quot;}" href="https://www-03.ibm.com/press/us/en/pressrelease/49661.wss" rel="nofollow noopener" target="_blank">five</a>, for example, in a system that I.B.M. announced earlier this year. The company expects to scale up to between fifty and a hundred qubits within the next decade, which would be powerful but still short of the thousand or so that LaMacchia estimates would represent a serious cryptographic threat. (D-Wave Systems, a Canadian company that caused a stir when it <a class="external-link" data-event-click="{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;http://www.dwavesys.com/press-releases/d-wave-systems-announces-general-availability-1000-qubit-d-wave-2x-quantum-computer&quot;}" href="http://www.dwavesys.com/press-releases/d-wave-systems-announces-general-availability-1000-qubit-d-wave-2x-quantum-computer" rel="nofollow noopener" target="_blank">announced</a> a thousand-qubit computer last year, uses an alternative approach to quantum computing that isn&#x2019;t suitable for code-breaking.) This may sound like painfully modest progress after two decades, but it has been steady enough in the past few years to shift the underlying question from if to when.</p><div class="consumer-marketing-unit consumer-marketing-unit--article-mid-content consumer-marketing-unit--no-failsafe" role="presentation" aria-hidden="true"><div class="consumer-marketing-unit__slot consumer-marketing-unit__slot--article-mid-content consumer-marketing-unit__slot--in-content"></div><div class="journey-unit"></div></div><p>The &#x201C;Y2Q&#x201D; handle makes explicit the parallels between the quantum threat and the <a href="http://archives.newyorker.com/?i=1999-12-13#folio=086">Y2K bug</a>, which, at the turn of the millennium, was supposed to make the world&#x2019;s computers think it was 1900 again, bringing civilization to a grinding halt. In the popular imagination, Y2K has become a punch line, a prophecy of doom unfulfilled, like the Maya calendar turned out to be in 2012. But for many of the people at the cryptography workshop&#x2014;those responsible for establishing international standards for safe computing or signing off on data-security protocols for hundred-billion-dollar companies&#x2014;Y2K was a relatively minor event only because the hysteria that preceded it mobilized <a class="external-link" data-event-click="{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;http://www.slate.com/articles/technology/technology/features/2009/apocalypse_then/was_y2k_a_waste.html&quot;}" href="http://www.slate.com/articles/technology/technology/features/2009/apocalypse_then/was_y2k_a_waste.html" rel="nofollow noopener" target="_blank">an estimated three hundred to five hundred billion dollars</a> in preventive action by governments and corporations. So far, Y2Q has failed to generate quite that level of interest.</p><p>One big difference is that it was clear, if inconvenient, what needed to be done to avoid Y2K. The best way to ward off a quantum attack, on the other hand, is still very much up for debate. The simplest approach is basically mathematical: come up with new encryption algorithms that quantum computers can&#x2019;t break. That doesn&#x2019;t require big changes in technology, but it&#x2019;s very hard to know for sure which algorithms will be resistant, until they fail. The other approach is to directly harness the weirdness of quantum mechanics; since the mere act of observing a quantum system freezes it in one state, you can construct sophisticated communications links where it&#x2019;s impossible, even in theory, to eavesdrop on the message without destroying it or betraying your presence. This approach sounds great, but is far harder (and more expensive) to implement.</p><p>Both approaches have been making progress in the real world over the past few months. China, for instance, has <a class="external-link" data-event-click="{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;http://usa.chinadaily.com.cn/epaper/2016-08/26/content_26628045.htm&quot;}" href="http://usa.chinadaily.com.cn/epaper/2016-08/26/content_26628045.htm" rel="nofollow noopener" target="_blank">nearly completed</a> a twelve-hundred-mile fibre-optic &#x201C;quantum backbone&#x201D; that will link Shanghai and Beijing, allowing signals to travel from one end to the other without losing their quantum properties. And the world&#x2019;s first quantum satellite, <a class="external-link" data-event-click="{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;http://www.wsj.com/articles/chinas-latest-leap-forward-isnt-just-greatits-quantum-1471269555&quot;}" href="http://www.wsj.com/articles/chinas-latest-leap-forward-isnt-just-greatits-quantum-1471269555" rel="nofollow noopener" target="_blank">launched from the Gobi Desert</a> in August, will allow the country to send fully quantum-encrypted messages over much longer distances. For most of the companies and other governments represented at the workshop, though, quantum-resistant algorithms remain the focus. In July, Google <a class="external-link" data-event-click="{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https://security.googleblog.com/2016/07/experimenting-with-post-quantum.html&quot;}" href="https://security.googleblog.com/2016/07/experimenting-with-post-quantum.html" rel="nofollow noopener" target="_blank">announced</a> that it would test a candidate algorithm dubbed New Hope in a small fraction of Chrome browsers. Soon afterward, the National Institute of Standards and Technology <a class="external-link" data-event-click="{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;http://csrc.nist.gov/groups/ST/post-quantum-crypto/&quot;}" href="http://csrc.nist.gov/groups/ST/post-quantum-crypto/" rel="nofollow noopener" target="_blank">put out a public call</a> for input on how it should evaluate such algorithms in the future. The organization may be ready to issue standards in draft form, a <em class="small">NIST</em> cryptographer at the workshop estimated, by 2022 or 2023. Some members of the crowd reacted with audible consternation.</p><p>In a sense, then, the fundamental question isn&#x2019;t whether we should do something to prepare for Y2Q. It&#x2019;s how we balance the seeming necessity of doing something right now with the inconvenient fact that we don&#x2019;t yet know what to do. The most persuasive answer to this dilemma came from Vadim Makarov, an exuberantly bearded, Hagrid-like figure who heads the University of Waterloo&#x2019;s Quantum Hacking Lab. He and his colleagues work with companies to test their quantum-cryptography systems before they go public, and have demonstrated that even &#x201C;theoretically perfect&#x201D; setups can be hacked when they&#x2019;re actually implemented&#x2014;for example, by <a class="external-link" data-event-click="{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;http://www.nature.com/news/2010/100829/full/news.2010.436.html&quot;}" href="http://www.nature.com/news/2010/100829/full/news.2010.436.html" rel="nofollow noopener" target="_blank">blinding</a> the receiving device with a bright laser that makes it unable to distinguish between quantum and classical signals. Such vulnerabilities may suggest that quantum-safe systems aren&#x2019;t yet ready for prime time, but Makarov, during a panel discussion, drew the opposite conclusion. &#x201C;It&#x2019;s a bit of chicken-and-an-egg problem,&#x201D; he said in a thick Russian accent. It will be impossible to know which systems can resist attacks until they&#x2019;re out there, in the real world, inviting attacks. Waiting for a perfect solution just brings the arrival of a quantum computer closer and closer, at which point it will be too late to fix things. &#x201C;So, folks, please deploy more,&#x201D; Makarov said. &#x201C;We want real hackers, not the toy ones like me and my students.&#x201D; He smiled, not quite reassuringly.</p></div><div class="grid--item split-ad-rail grid-layout__aside"><aside class="sc-jhGSUB bMSaMd persistent-aside" style="position:absolute;top:auto;height:auto"><div class="sc-eHEFXm cLceKM sticky-box"><div class="sc-hzUJqN lkiIWD sticky-box__primary"><div class="split-ad-rail-content"><div class="split-ad-rail-top"><div class="sc-eHEFXm cLceKM sticky-box"><div class="sc-hzUJqN lkiIWD sticky-box__primary"><div class="ad ad--rail"><div class="ad__slot ad__slot--rail"></div></div><div class="consumer-marketing-unit consumer-marketing-unit--display-rail consumer-marketing-unit--no-failsafe" role="presentation" aria-hidden="true"><div class="consumer-marketing-unit__slot consumer-marketing-unit__slot--display-rail"></div><div class="journey-unit"></div></div></div><div class="sc-kYQaHc gQtfxQ"></div></div></div><div class="split-ad-rail-middle"></div><div class="split-ad-rail-bottom"><div class="sc-eHEFXm cLceKM sticky-box"><div class="sc-hzUJqN lkiIWD sticky-box__primary"><div class="ad ad--rail"><div class="ad__slot ad__slot--rail"></div></div><div class="consumer-marketing-unit consumer-marketing-unit--display-rail consumer-marketing-unit--no-failsafe" role="presentation" aria-hidden="true"><div class="consumer-marketing-unit__slot consumer-marketing-unit__slot--display-rail"></div><div class="journey-unit"></div></div></div><div class="sc-kYQaHc gQtfxQ"></div></div></div></div></div><div class="sc-kYQaHc gQtfxQ"></div></div></aside></div></div></div><div class="grid grid-margins grid-items-2 grid-layout--adrail narrow wide-adrail"><div class="grid--item body body__inline-barrier article__body grid-layout__content"><div class="container container--body"><div class="container--body-inner"><aside class="paywall-inline-barrier"><div class="paywall-inline-barrier__consumer-marketing-unit consumer-marketing-unit consumer-marketing-unit--paywall-inline-barrier consumer-marketing-unit--no-failsafe" role="presentation" aria-hidden="true" aria-live="polite"><div class="consumer-marketing-unit__slot consumer-marketing-unit__slot--paywall-inline-barrier"></div><div class="journey-unit"></div></div></aside></div></div></div></div></div></div></article><div class="content-footer"><div class="sc-iCoHVE sc-hOPghE inZljn cyuNhN row"><div class="grid grid-margins grid-items-2 grid-layout--adrail narrow wide-adrail"><div class="contributors contributors--no-bottom-line grid--item grid-layout__content"><div class="sc-hmbsMR dvmBKd"><div class="sc-eKYRpg hCEyrj"><div class="sc-amjdv yzPWv"><a href="https://www.newyorker.com/contributors/alex-hutchinson">Alex Hutchinson</a> is the author of &#x201C;<a href="https://www.amazon.com/gp/product/0062499866/">Endure: Mind, Body, and the Curiously Elastic Limits of Human Performance</a>.&#x201D;</div><div class="sc-jOFreG fmnITy"></div></div></div></div></div></div><div class="sc-iCoHVE sc-hOPghE inZljn cyuNhN row"><div class="grid grid-margins grid-items-2 grid-layout--adrail narrow wide-adrail"><div data-testid="TagCloudWrapper" class="sc-iCoHVE sc-iwaifL inZljn jZmuZE grid--item content-footer__tag-cloud grid-layout__content"><span class="sc-iCoHVE sc-fujyUd sc-cxNIbT inZljn dJAkTc caQbbb">More:</span><a href="https://www.newyorker.com/tag/cryptography" class="sc-iCoHVE sc-fujyUd sc-pNWxx sc-iJCRLp inZljn YjvgJ kTqwqB hhpQab"><span class="sc-iCoHVE sc-fujyUd sc-lmgQde inZljn dJAkTc hEekTv">Cryptography</span></a><a href="https://www.newyorker.com/tag/quantum-computing" class="sc-iCoHVE sc-fujyUd sc-pNWxx sc-iJCRLp inZljn YjvgJ kTqwqB hhpQab"><span class="sc-iCoHVE sc-fujyUd sc-lmgQde inZljn dJAkTc hEekTv">Quantum Computing</span></a><a href="https://www.newyorker.com/tag/yahoo" class="sc-iCoHVE sc-fujyUd sc-pNWxx sc-iJCRLp inZljn YjvgJ kTqwqB hhpQab"><span class="sc-iCoHVE sc-fujyUd sc-lmgQde inZljn dJAkTc hEekTv">Yahoo</span></a><a href="https://www.newyorker.com/tag/security" class="sc-iCoHVE sc-fujyUd sc-pNWxx sc-iJCRLp inZljn YjvgJ kTqwqB hhpQab"><span class="sc-iCoHVE sc-fujyUd sc-lmgQde inZljn dJAkTc hEekTv">Security</span></a></div></div></div><div class="content-footer__bottom"><div class="grid grid-margins grid-items-2 grid-layout--adrail narrow wide-adrail"><div class="newsletter-subscribe-form newsletter-subscribe-form--standard grid--item content-footer__newsletter grid-layout__content"><h3 class="newsletter-subscribe-form__hed newsletter-subscribe-form__hed--text-align-center grid--item content-footer__newsletter grid-layout__content">The Daily</h3><div class="newsletter-subscribe-form__dek">Sign up for our daily newsletter and get the best of <i>The New Yorker</i> in your in-box.</div></div></div><div class="content-bottom-anchor"></div><div class="consumer-marketing-unit consumer-marketing-unit--article-footer consumer-marketing-unit--no-failsafe" role="presentation" aria-hidden="true"><div class="consumer-marketing-unit__slot consumer-marketing-unit__slot--article-footer"></div><div class="journey-unit"></div></div><div data-attr-viewport-monitor="" class="recirc-list-wrapper hide-read-more-ad viewport-monitor-anchor"><div class="sc-iCoHVE sc-hOPghE inZljn cyuNhN row recirc-list-observer-target content-footer__related"><div class="grid grid-margins grid-items-0 summary-collection-grid recirc-list__items recirc-list--four-up summary-collection-grid--four-columns summary-collection-grid--TextBelowLeft"><div class="grid--item summary-collection-grid__content"><div class="section-title section-title--center summary-collection-grid__title section-title--line-above section-title--line-below"><div class="section-title__hed">Read More</div></div><div class="summary-collection-grid__items hide-read-more-ad"><div tabindex="0" class="summary-item summary-item--article summary-item--no-icon summary-item--text-align-left summary-item--layout-placement-text-below summary-item--layout-position-image-left summary-item--layout-proportions-50-50 summary-item--side-by-side-align-center summary-collection-grid__item" role="button"><div class="summary-item__asset-container"><a class="summary-item__image-link summary-item-tracking__image-link" href="https://www.newyorker.com/magazine/2011/05/02/dream-machine" aria-hidden="true" tabindex="-1" data-component-type="recirc-river" data-recirc-id="item-image-1" data-recirc-pattern="summary-item"><span class="responsive-asset summary-item__image responsive-asset--invisible"><div data-test="aspect-ratio-container" class="sc-fFSRdu hNHMTi"><div class="aspect-ratio--overlay-container"><picture class="summary-item__image responsive-image"><noscript><source media="(max-width: 767px)" srcset="https://media.newyorker.com/photos/590968acebe912338a375e68/16:9/w_720%2Cc_limit/110502_r20327.jpg 720w" sizes="100vw"><source media="(min-width: 768px)" srcset="https://media.newyorker.com/photos/590968acebe912338a375e68/4:3/w_480%2Cc_limit/110502_r20327.jpg 480w" sizes="100vw"><img alt="David Deutsch believes that quantum computers will give evidence for the existence of parallel universes." class="responsive-image__image" src="https://media.newyorker.com/photos/590968acebe912338a375e68/4:3/w_480%2Cc_limit/110502_r20327.jpg"></noscript></picture></div></div></span></a></div><div class="summary-item__content"><div class="sc-gIvpCV ixgGWl rubric rubric--discovery summary-item__rubric"><span class="sc-csTaMs dugqNO">Annals of Science</span></div><a class="summary-item-tracking__hed-link summary-item__hed-link" href="https://www.newyorker.com/magazine/2011/05/02/dream-machine" data-component-type="recirc-river" data-recirc-id="item-hed-1" data-recirc-pattern="summary-item"><div class="summary-item__hed" data-testid="SummaryItemHed">Dream Machine</div></a><p class="summary-item__dek">The mind-expanding world of quantum computing.</p><div class="summary-item__byline-date-icon"><div class="summary-item__byline"><div class="summary-item__byline__content"><div data-testid="BylinesWrapper" class="sc-iCoHVE sc-Gvgqn inZljn fvMmpR bylines"><p class="sc-dsXyEt kKGUrs byline bylines__byline byline--author" data-testid="BylineWrapper" itemprop="author" itemtype="http://schema.org/Person"><span class="sc-iCoHVE sc-fujyUd sc-jQAyEw inZljn hErgeG cBUwUx byline__preamble">By </span><span itemprop="name" class="sc-fcmNTy eXNXqu"><span class="sc-daBvwG jOzHBa byline__name"><a class="sc-iCoHVE sc-fujyUd sc-pNWxx sc-jUfxsr inZljn YjvgJ hJIyPe iwBsUM byline__name-link" href="https://www.newyorker.com/contributors/rivka-galchen">Rivka Galche<span class="sc-fuIRbl hXwWQH link__last-letter-spacing">n</span></a></span></span></p></div></div></div></div></div></div><div tabindex="0" class="summary-item summary-item--article summary-item--no-icon summary-item--text-align-left summary-item--layout-placement-text-below summary-item--layout-position-image-left summary-item--layout-proportions-50-50 summary-item--side-by-side-align-center summary-collection-grid__item" role="button"><div class="summary-item__asset-container"><a class="summary-item__image-link summary-item-tracking__image-link" href="https://www.newyorker.com/tech/annals-of-technology/catching-dust-osiris-rex-nasa-mission-asteroid" aria-hidden="true" tabindex="-1" data-component-type="recirc-river" data-recirc-id="item-image-2" data-recirc-pattern="summary-item"><span class="responsive-asset summary-item__image responsive-asset--invisible"><div data-test="aspect-ratio-container" class="sc-fFSRdu hNHMTi"><div class="aspect-ratio--overlay-container"><picture class="summary-item__image responsive-image"><noscript><source media="(max-width: 767px)" srcset="https://media.newyorker.com/photos/59097a5c019dfc3494ea34b7/16:9/w_720%2Cc_limit/Lydgate-NASA.jpg 720w" sizes="100vw"><source media="(min-width: 768px)" srcset="https://media.newyorker.com/photos/59097a5c019dfc3494ea34b7/4:3/w_480%2Cc_limit/Lydgate-NASA.jpg 480w" sizes="100vw"><img alt="The sevenyear OSIRISREx mission will collect four tablespoons of material from the surface of an asteroid called Bennu." class="responsive-image__image" src="https://media.newyorker.com/photos/59097a5c019dfc3494ea34b7/4:3/w_480%2Cc_limit/Lydgate-NASA.jpg"></noscript></picture></div></div></span></a></div><div class="summary-item__content"><div class="sc-gIvpCV ixgGWl rubric rubric--discovery summary-item__rubric"><span class="sc-csTaMs dugqNO">Annals of Technology</span></div><a class="summary-item-tracking__hed-link summary-item__hed-link" href="https://www.newyorker.com/tech/annals-of-technology/catching-dust-osiris-rex-nasa-mission-asteroid" data-component-type="recirc-river" data-recirc-id="item-hed-2" data-recirc-pattern="summary-item"><div class="summary-item__hed" data-testid="SummaryItemHed">Catching Dust</div></a><p class="summary-item__dek">A changing NASA visits an asteroid, seeking the key to life&#x2019;s beginning</p><div class="summary-item__byline-date-icon"><div class="summary-item__byline"><div class="summary-item__byline__content"><div data-testid="BylinesWrapper" class="sc-iCoHVE sc-Gvgqn inZljn fvMmpR bylines"><p class="sc-dsXyEt kKGUrs byline bylines__byline byline--author" data-testid="BylineWrapper" itemprop="author" itemtype="http://schema.org/Person"><span class="sc-iCoHVE sc-fujyUd sc-jQAyEw inZljn hErgeG cBUwUx byline__preamble">By </span><span itemprop="name" class="sc-fcmNTy eXNXqu"><span class="sc-daBvwG jOzHBa byline__name"><a class="sc-iCoHVE sc-fujyUd sc-pNWxx sc-jUfxsr inZljn YjvgJ hJIyPe iwBsUM byline__name-link" href="https://www.newyorker.com/contributors/anthony-lydgate">Anthony Lydgat<span class="sc-fuIRbl hXwWQH link__last-letter-spacing">e</span></a></span></span></p></div></div></div></div></div></div></div></div></div></div></div><div class="sc-iCoHVE sc-hOPghE inZljn cyuNhN row"><div class="ad ad--footer"><div class="ad__slot ad__slot--footer"></div></div></div></div></div></main><div class="page__main-footer-filler"></div><div class="row"><div class="consumer-marketing-unit consumer-marketing-unit--cm-footer consumer-marketing-unit--no-failsafe" role="presentation" aria-hidden="true"><div class="consumer-marketing-unit__slot consumer-marketing-unit__slot--cm-footer"></div><div class="journey-unit"></div></div></div><div class="row page__site-footer"><div class="grid grid-margins grid-items-0"><footer class="site-footer site-footer--link-dense site-footer--with-store grid--item"><div class="grid grid-items-0 site-footer__container"><div class="grid--item site-footer__brand-info"><div class="site-footer__logo"><a href="https://www.newyorker.com/" class="site-footer__logo-link"><span class="responsive-asset site-footer__responsive-image"><picture class="site-footer__responsive-image responsive-image"><img alt="The New Yorker" class="responsive-image__image" src="https://www.newyorker.com/verso/static/the-new-yorker/assets/logo-reverse.svg" srcset="" sizes="100vw"></picture></span></a></div></div><nav aria-label="Sections" class="navigation navigation--vertical navigation--justify-left grid--item site-footer__navigation navigation--collapsible navigation--closed"><p class="navigation__heading"><button class="navigation__heading-button" type="button" aria-expanded="false">Sections<span class="navigation__arrow"></span></button></p><ul class="navigation__list"><li class="navigation__list-item"><a class="navigation__link" href="https://www.newyorker.com/news">News</a></li><li class="navigation__list-item"><a class="navigation__link" href="https://www.newyorker.com/culture">Books &amp; Culture</a></li><li class="navigation__list-item"><a class="navigation__link" href="https://www.newyorker.com/fiction-and-poetry">Fiction &amp; Poetry</a></li><li class="navigation__list-item"><a class="navigation__link" href="https://www.newyorker.com/humor">Humor &amp; Cartoons</a></li><li class="navigation__list-item"><a class="navigation__link" href="https://www.newyorker.com/magazine">Magazine</a></li><li class="navigation__list-item"><a class="navigation__link" href="https://www.newyorker.com/crossword-puzzles-and-games">Crossword</a></li><li class="navigation__list-item"><a class="navigation__link" href="https://video.newyorker.com/">Video</a></li><li class="navigation__list-item"><a class="navigation__link" href="https://www.newyorker.com/podcast">Podcasts</a></li><li class="navigation__list-item"><a class="navigation__link" href="https://www.newyorker.com/archive">Archive</a></li><li class="navigation__list-item"><a class="navigation__link" href="https://www.newyorker.com/goings-on-about-town">Goings On</a></li></ul></nav><nav aria-label="More" class="navigation navigation--vertical navigation--justify-left grid--item site-footer__navigation-contact navigation--collapsible navigation--closed"><p class="navigation__heading"><button class="navigation__heading-button" type="button" aria-expanded="false">More<span class="navigation__arrow"></span></button></p><ul class="navigation__list"><li class="navigation__list-item"><a class="external-link navigation__link" data-event-click="{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;http://w1.buysub.com/servlet/CSGateway?cds_mag_code=NYR&quot;}" href="http://w1.buysub.com/servlet/CSGateway?cds_mag_code=NYR" rel="nofollow noopener" target="_blank">Customer Care</a></li><li class="navigation__list-item"><a class="external-link navigation__link" data-event-click="{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https://store.newyorker.com&quot;}" href="https://store.newyorker.com/" rel="nofollow noopener" target="_blank">Shop The New Yorker</a></li><li class="navigation__list-item"><a class="external-link navigation__link" data-event-click="{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https://condenaststore.com/art/new+yorker+covers&quot;}" href="https://condenaststore.com/art/new+yorker+covers" rel="nofollow noopener" target="_blank">Buy Covers and Cartoons</a></li><li class="navigation__list-item"><a class="external-link navigation__link" data-event-click="{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https://condenaststore.com/conde-nast-brand/thenewyorker&quot;}" href="https://condenaststore.com/conde-nast-brand/thenewyorker" rel="nofollow noopener" target="_blank">Cond&#xE9; Nast Store</a></li><li class="navigation__list-item"><a class="navigation__link" href="https://www.newyorker.com/digital-editions">Digital Access</a></li><li class="navigation__list-item"><a class="navigation__link" href="https://www.newyorker.com/newsletter">Newsletters</a></li><li class="navigation__list-item"><a class="navigation__link" href="https://www.newyorker.com/jigsaw">Jigsaw Puzzle</a></li><li class="navigation__list-item"><a class="navigation__link" href="https://www.newyorker.com/about/feeds">RSS</a></li><li class="navigation__list-item"><a class="navigation__link" href="https://www.newyorker.com/sitemap">Site Map</a></li></ul></nav><div class="grid--item site-footer__notices"><div class="site-footer__notices-container"><nav aria-label="Notices" class="navigation navigation--horizontal navigation--justify-left site-footer__navigation-notices"><ul class="navigation__list"><li class="navigation__list-item"><a class="navigation__link" href="https://www.newyorker.com/about/us">About</a></li><li class="navigation__list-item"><a class="navigation__link" href="https://www.newyorker.com/about/careers">Careers</a></li><li class="navigation__list-item"><a class="navigation__link" href="https://www.newyorker.com/about/contact">Contact</a></li><li class="navigation__list-item"><a class="navigation__link" href="https://www.newyorker.com/about/faq">F.A.Q.</a></li><li class="navigation__list-item"><a class="navigation__link" href="http://www.condenast.com/brands/the-new-yorker">Media Kit</a></li><li class="navigation__list-item"><a class="navigation__link" href="https://www.newyorker.com/about/press">Press</a></li><li class="navigation__list-item"><a rel="nofollow" class="navigation__link" href="https://www.newyorker.com/about/accessibility-help">Accessibility Help</a></li><li class="navigation__list-item"><a class="external-link navigation__link" data-event-click="{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https://www.cnspotlight.com/ &quot;}" href="https://www.cnspotlight.com/" rel="" target="_blank">Cond&#xE9; Nast Spotlight</a></li></ul></nav><p class="site-footer__legalese">&#xA9; 2021 Cond&#xE9; Nast. All rights reserved. Use of this site constitutes acceptance of our <a class="external-link" data-event-click="{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https://www.condenast.com/user-agreement/&quot;}" href="https://www.condenast.com/user-agreement/" rel="nofollow noopener" target="_blank">User Agreement</a> (updated as of 1/1/21) and <a class="external-link" data-event-click="{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;http://www.condenast.com/privacy-policy#privacypolicy&quot;}" href="http://www.condenast.com/privacy-policy#privacypolicy" rel="nofollow noopener" target="_blank">Privacy Policy and Cookie Statement</a> (updated as of 1/1/21) and <a class="external-link" data-event-click="{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;http://www.condenast.com/privacy-policy#privacypolicy-california&quot;}" href="http://www.condenast.com/privacy-policy#privacypolicy-california" rel="nofollow noopener" target="_blank">Your California Privacy Rights.</a> <em>The New Yorker</em> may earn a portion of sales from products that are purchased through our site as part of our Affiliate Partnerships with retailers. The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of Cond&#xE9; Nast. <a class="external-link" data-event-click="{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;http://www.condenast.com/privacy-policy#privacypolicy-optout&quot;}" href="http://www.condenast.com/privacy-policy#privacypolicy-optout" rel="nofollow noopener" target="_blank">Ad Choices</a></p><div class="site-footer__collection-container"></div><div class="social-icons social-icons--footer site-footer__social-icons"><ul class="social-icons__list"><li class="social-icons__list-item social-icons__list-item--facebook social-icons__list-item--footer thinner"><a aria-label="Follow us on Facebook" class="external-link social-icons__link social-icons__link--facebook social-icons__external-link" data-event-click="{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https://www.facebook.com/newyorker/&quot;}" href="https://www.facebook.com/newyorker/" rel="nofollow noopener" target="_blank"><div class="social-icons__icon-container"><svg class="icon icon-facebook" focusable="false" width="7.2" height="16" viewbox="0 0 7.2 16" xmlns="http://www.w3.org/2000/svg"><title>Facebook</title><path d="M1.548 3.099v2.203H0v2.693h1.548V16h3.179V7.995H6.86s.2-1.291.297-2.703H4.739V3.45c0-.275.346-.646.689-.646H7.16V0H4.805C1.47 0 1.548 2.696 1.548 3.099z"/></svg></div></a></li><li class="social-icons__list-item social-icons__list-item--twitter social-icons__list-item--footer thinner"><a aria-label="Follow us on Twitter" class="external-link social-icons__link social-icons__link--twitter social-icons__external-link" data-event-click="{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https://twitter.com/NewYorker/&quot;}" href="https://twitter.com/NewYorker/" rel="nofollow noopener" target="_blank"><div class="social-icons__icon-container"><svg class="icon icon-twitter" focusable="false" width="15.3" height="13" viewbox="0 0 15.3 13" xmlns="http://www.w3.org/2000/svg"><title>Twitter</title><path d="M15.275 1.539a6.04 6.04 0 0 1-1.8.517A3.268 3.268 0 0 0 14.854.24a6.127 6.127 0 0 1-1.99.797A3.067 3.067 0 0 0 10.575 0c-1.73 0-3.134 1.47-3.134 3.281 0 .257.028.508.081.748C4.918 3.892 2.61 2.585 1.063.6A3.382 3.382 0 0 0 .64 2.25c0 1.14.552 2.144 1.393 2.732a3.001 3.001 0 0 1-1.418-.41v.042c0 1.59 1.08 2.916 2.513 3.218a3.011 3.011 0 0 1-1.415.056c.399 1.304 1.556 2.253 2.926 2.28A6.111 6.111 0 0 1 0 11.525 8.59 8.59 0 0 0 4.805 13c5.764 0 8.916-5 8.916-9.338a8.96 8.96 0 0 0-.01-.425 6.522 6.522 0 0 0 1.564-1.698z"/></svg></div></a></li><li class="social-icons__list-item social-icons__list-item--snapchat social-icons__list-item--footer"><a aria-label="Follow us on Snapchat" class="external-link social-icons__link social-icons__link--snapchat social-icons__external-link" data-event-click="{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https://www.snapchat.com/add/newyorkermag&quot;}" href="https://www.snapchat.com/add/newyorkermag" rel="nofollow noopener" target="_blank"><div class="social-icons__icon-container"><svg class="icon icon-snapchat" focusable="false" viewbox="0 0 32 32" width="32" height="32" fill="none" xmlns="http://www.w3.org/2000/svg"><title>Snapchat</title><path d="M16.134 9H16.094L15.818 9.003C15.16 9.003 12.928 9.186 11.876 11.546C11.522 12.34 11.606 13.689 11.675 14.772L11.699 15.161C11.6031 15.2095 11.4964 15.2329 11.389 15.229C11.179 15.229 10.932 15.163 10.654 15.032C10.5745 14.9966 10.4881 14.9792 10.401 14.981C10.076 14.981 9.68601 15.195 9.62601 15.514C9.58201 15.744 9.68501 16.079 10.424 16.371C10.491 16.398 10.571 16.423 10.656 16.45C10.961 16.547 11.423 16.693 11.548 16.988C11.613 17.141 11.587 17.338 11.471 17.573L11.464 17.589C11.423 17.684 10.446 19.91 8.27701 20.268C8.19659 20.2814 8.12395 20.324 8.07302 20.3877C8.02209 20.4514 7.99645 20.5316 8.00101 20.613C8.00301 20.663 8.01501 20.713 8.03601 20.761C8.19901 21.141 8.88601 21.421 10.136 21.615C10.177 21.671 10.221 21.871 10.247 21.992C10.274 22.112 10.3 22.236 10.339 22.367C10.377 22.495 10.474 22.649 10.726 22.649C10.828 22.649 10.948 22.625 11.086 22.598C11.295 22.558 11.58 22.501 11.937 22.501C12.135 22.501 12.34 22.519 12.547 22.553C12.95 22.62 13.293 22.863 13.69 23.143C14.259 23.545 14.902 24 15.88 24C15.908 24 15.935 24 15.962 23.997C15.993 23.999 16.034 24 16.078 24C17.058 24 17.701 23.545 18.268 23.143C18.667 22.863 19.009 22.62 19.413 22.553C19.619 22.519 19.824 22.501 20.023 22.501C20.363 22.501 20.633 22.545 20.873 22.591C21.023 22.621 21.145 22.636 21.233 22.636H21.252C21.3361 22.6404 21.419 22.6152 21.4865 22.5648C21.5539 22.5143 21.6015 22.4419 21.621 22.36C21.658 22.232 21.685 22.111 21.712 21.99C21.738 21.868 21.782 21.67 21.823 21.613C23.074 21.419 23.761 21.141 23.923 20.762C23.9437 20.7145 23.9559 20.6637 23.959 20.612C23.9638 20.5304 23.9381 20.4499 23.8869 20.3862C23.8357 20.3225 23.7627 20.28 23.682 20.267C21.512 19.91 20.536 17.683 20.496 17.589C20.4935 17.5836 20.4909 17.5782 20.488 17.573C20.372 17.338 20.347 17.141 20.412 16.988C20.537 16.693 20.998 16.547 21.304 16.45C21.389 16.423 21.469 16.397 21.535 16.371C22.076 16.158 22.348 15.895 22.342 15.591C22.337 15.353 22.152 15.141 21.856 15.035H21.855C21.7492 14.9921 21.6362 14.9701 21.522 14.97C21.4171 14.9687 21.3131 14.9898 21.217 15.032C20.959 15.153 20.728 15.219 20.529 15.227C20.4358 15.2258 20.3441 15.2032 20.261 15.161L20.281 14.819L20.284 14.773C20.353 13.689 20.438 12.339 20.084 11.545C19.03 9.184 16.793 9 16.133 9H16.134Z" fill="black"/></svg></div></a></li><li class="social-icons__list-item social-icons__list-item--youtube social-icons__list-item--footer"><a aria-label="Follow us on YouTube" class="external-link social-icons__link social-icons__link--youtube social-icons__external-link" data-event-click="{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https://www.youtube.com/user/NewYorkerDotCom/&quot;}" href="https://www.youtube.com/user/NewYorkerDotCom/" rel="nofollow noopener" target="_blank"><div class="social-icons__icon-container"><svg class="icon icon-youtube" focusable="false" viewbox="0 0 32 32" width="32" height="32" fill="none" xmlns="http://www.w3.org/2000/svg"><title>YouTube</title><path d="M23.666 11.76C23.5755 11.4196 23.3971 11.109 23.1488 10.8593C22.9005 10.6095 22.5909 10.4294 22.251 10.337C21.003 10 16 10 16 10C16 10 10.997 10 9.749 10.337C9.40915 10.4294 9.09955 10.6095 8.85121 10.8593C8.60287 11.109 8.42451 11.4196 8.334 11.76C8 13.016 8 15.636 8 15.636C8 15.636 8 18.256 8.334 19.512C8.42436 19.8526 8.60265 20.1634 8.851 20.4133C9.09934 20.6632 9.40903 20.8435 9.749 20.936C10.997 21.273 16 21.273 16 21.273C16 21.273 21.003 21.273 22.251 20.936C22.591 20.8435 22.9007 20.6632 23.149 20.4133C23.3974 20.1634 23.5756 19.8526 23.666 19.512C24 18.257 24 15.636 24 15.636C24 15.636 24 13.016 23.666 11.76ZM14.364 18.015V13.257L18.545 15.637L14.364 18.015Z" fill="black"/></svg></div></a></li><li class="social-icons__list-item social-icons__list-item--instagram social-icons__list-item--footer"><a aria-label="Follow us on Instagram" class="external-link social-icons__link social-icons__link--instagram social-icons__external-link" data-event-click="{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https://instagram.com/newyorkermag/&quot;}" href="https://instagram.com/newyorkermag/" rel="nofollow noopener" target="_blank"><div class="social-icons__icon-container"><svg class="icon icon-instagram" focusable="false" viewbox="0 0 32 32" width="32" height="32" fill="none" xmlns="http://www.w3.org/2000/svg"><title>Instagram</title><path d="M16 8C18.173 8 18.445 8.01 19.298 8.048C20.15 8.087 20.731 8.222 21.24 8.42C21.766 8.624 22.213 8.898 22.657 9.343C23.102 9.787 23.376 10.233 23.58 10.76C23.778 11.269 23.913 11.85 23.952 12.702C23.991 13.555 24 13.827 24 16C24 18.173 23.99 18.445 23.952 19.298C23.913 20.15 23.778 20.731 23.58 21.24C23.379 21.7738 23.064 22.2574 22.657 22.657C22.213 23.102 21.767 23.376 21.24 23.58C20.731 23.778 20.15 23.913 19.298 23.952C18.445 23.991 18.173 24 16 24C13.827 24 13.555 23.99 12.702 23.952C11.85 23.913 11.269 23.778 10.76 23.58C10.2262 23.379 9.74259 23.064 9.343 22.657C8.93593 22.2574 8.62093 21.7738 8.42 21.24C8.222 20.731 8.087 20.15 8.048 19.298C8.01 18.445 8 18.173 8 16C8 13.827 8.01 13.555 8.048 12.702C8.087 11.85 8.222 11.269 8.42 10.76C8.624 10.234 8.898 9.787 9.343 9.343C9.787 8.898 10.233 8.624 10.76 8.42C11.269 8.222 11.85 8.087 12.702 8.048C13.555 8.01 13.827 8 16 8ZM16 10C14.046 10 13.814 10.007 13.043 10.043C12.329 10.075 11.942 10.194 11.683 10.295C11.3657 10.4124 11.0787 10.5993 10.843 10.842C10.586 11.098 10.427 11.342 10.295 11.684C10.195 11.942 10.075 12.329 10.043 13.043C10.007 13.814 10 14.046 10 16C10 17.954 10.007 18.186 10.043 18.957C10.075 19.671 10.194 20.058 10.295 20.317C10.427 20.658 10.586 20.902 10.842 21.157C11.098 21.414 11.342 21.573 11.684 21.705C11.942 21.805 12.329 21.925 13.043 21.957C13.814 21.993 14.046 22 16 22C17.954 22 18.186 21.993 18.957 21.957C19.671 21.925 20.058 21.806 20.317 21.705C20.658 21.573 20.902 21.414 21.157 21.158C21.414 20.902 21.573 20.658 21.705 20.316C21.805 20.058 21.925 19.671 21.957 18.957C21.993 18.186 22 17.954 22 16C22 14.046 21.993 13.814 21.957 13.043C21.925 12.329 21.806 11.942 21.705 11.683C21.5876 11.3657 21.4007 11.0787 21.158 10.843C20.9219 10.5997 20.6341 10.4124 20.316 10.295C20.058 10.195 19.671 10.075 18.957 10.043C18.186 10.007 17.954 10 16 10ZM16 11.768C16.5558 11.768 17.1061 11.8775 17.6195 12.0901C18.133 12.3028 18.5995 12.6145 18.9925 13.0075C19.3855 13.4005 19.6972 13.867 19.9099 14.3805C20.1225 14.8939 20.232 15.4442 20.232 16C20.232 16.5558 20.1225 17.1061 19.9099 17.6195C19.6972 18.133 19.3855 18.5995 18.9925 18.9925C18.5995 19.3855 18.133 19.6972 17.6195 19.9099C17.1061 20.1225 16.5558 20.232 16 20.232C14.8776 20.232 13.8012 19.7861 13.0075 18.9925C12.2139 18.1988 11.768 17.1224 11.768 16C11.768 14.8776 12.2139 13.8012 13.0075 13.0075C13.8012 12.2139 14.8776 11.768 16 11.768ZM16 18.368C16.628 18.368 17.2303 18.1185 17.6744 17.6744C18.1185 17.2303 18.368 16.628 18.368 16C18.368 15.372 18.1185 14.7697 17.6744 14.3256C17.2303 13.8815 16.628 13.632 16 13.632C15.372 13.632 14.7697 13.8815 14.3256 14.3256C13.8815 14.7697 13.632 15.372 13.632 16C13.632 16.628 13.8815 17.2303 14.3256 17.6744C14.7697 18.1185 15.372 18.368 16 18.368ZM21.3 11.85C21.3 12.155 21.1788 12.4475 20.9632 12.6632C20.7475 12.8788 20.455 13 20.15 13C19.845 13 19.5525 12.8788 19.3368 12.6632C19.1212 12.4475 19 12.155 19 11.85C19 11.545 19.1212 11.2525 19.3368 11.0368C19.5525 10.8212 19.845 10.7 20.15 10.7C20.455 10.7 20.7475 10.8212 20.9632 11.0368C21.1788 11.2525 21.3 11.545 21.3 11.85Z" fill="black"/></svg></div></a></li></ul></div></div></div></div></footer></div></div></div></div><div id="parsely-root" style="display:none"><div id="parsely-cfg" data-parsely-site="newyorker.com"></div></div></body></html>