Cloudflare just moved its post-quantum finish line to 2029. The reason is a paper Google published three weeks ago — and what that paper doesn't say.
In March, Google Quantum AI published a technical result that made cryptographic auditors sit up: an optimized quantum circuit for breaking elliptic-curve cryptography, the math protecting Bitcoin, Ethereum, and most internet public-key infrastructure. The circuit needs fewer than 500,000 physical qubits and a few minutes of runtime to solve the 256-bit Elliptic Curve Discrete Logarithm Problem. According to Google's research blog, previous estimates put the requirement at roughly ten million qubits. Google cut that by twenty.
The paper is a genuine resource estimate, peer-reviewed, and responsibly disclosed. It is not a threat assessment. It is a proof of concept. But proof-of-concept quantum cryptanalysis has a way of compressing everyone's planning timeline.
Cloudflare, which handles about 20 percent of the world's web traffic and has offered post-quantum encryption for all its customers since 2022, read the room. On April 7, the company updated its roadmap: full post-quantum security, including authentication, by 2029. That is two years earlier than its previous target. The trigger was "major algorithmic breakthroughs."
One of those breakthroughs came from a separate paper by researchers at Oratomic and Caltech, also published in March. They showed that Shor's algorithm — the quantum method for breaking public-key cryptography — could be executed with roughly 10,000 reconfigurable neutral atom qubits. The prior consensus had put that number closer to one million. Their approach uses a new error-correcting code, designed partly with LLM assistance, that requires only four physical qubits per logical qubit versus roughly 1,000 for the surface codes dominant in superconducting systems.
Ten thousand qubits sounds manageable next to Google's 500,000. Recent neutral atom experiments have demonstrated trapping arrays with more than 6,000 highly coherent qubits, and 2029 is not a random date. It is the year IBM's Quantum Safe CTO, Michael Osborne, said he could not rule out targeted quantum attacks on high-value systems — what he calls a "moonshot" operation: a nation-state or well-funded actor pointing a specialized quantum computer at a specific target, not because it is commercially viable but because the target is worth it. Osborne presented his phase-framework at RWPQC in Taipei and told the audience he cannot rule out Phase 2 attacks before 2030.
The moonshot scenario is the part that keeps security teams awake, and not because it is likely. Because it is unfalsifiable. You cannot prove a quantum computer capable of the attack does not exist. You can only wait.
This is where the Aaronson problem kicks in.
Scott Aaronson, a computational theorist at the University of Texas at Austin, wrote in December 2025 that researchers doing resource estimates for breaking real-world cryptography will eventually stop publishing them. Not because the work becomes classified — there is no classification regime for this — but because at some point, publishing the estimate tells attackers exactly what they need to know. You are not telling defenders how much time they have left. You are telling attackers what bar they need to clear. His conclusion: for all we know, that point has already passed.
The Aaronson problem is the real story underneath the Cloudflare announcement. Below it, a transparency infrastructure that defenders have relied on for decades is quietly degrading. Every time a paper like Google's appears, it is a data point — but it may also be one of the last ones. The estimates that remain in the public record are the ones that have already become historical footnotes. The ones that matter are increasingly held close.
What does this mean for anyone running internet infrastructure? The standard advice has not changed: migrate to post-quantum algorithms now, because harvest-now/decrypt-later attacks are operational today. Any encrypted traffic collected now can be decrypted once the hardware exists. That is not a future threat. It is a present one, regardless of when fault-tolerant quantum computers arrive.
Cloudflare's 2029 target covers authentication, which is the hard part. Encryption-in-transit has had post-quantum options for years. Authentication — verifying that you are actually talking to your bank and not a man-in-the-middle — is where the migration gets complicated, because it requires changes to both client software and server infrastructure simultaneously. Getting that done in three years is a serious commitment.
Whether it is enough depends on what you are protecting and who you think is coming for it. A quantum computer capable of the Google-level circuit would cost more than any commercial data center and is not being built by any known roadmap. The Oratomic paper's 10,000-qubit figure describes a point design — a machine built for one purpose. The runtime for breaking elliptic-curve cryptography at that qubit count was not published.
The gap between "we now know this is physically possible" and "this is operationally feasible against your systems" is still large. It is also, for the first time, genuinely hard to see across.
Watch the authentication migration closely. That is where the post-quantum transition will either succeed or stall — and where the next public resource estimate, or the sudden absence of one, will tell you something important about where we actually are.