Workflow
Harvest Now
icon
Search documents
01 Quantum Inc. and Hitachi Solutions Create, Ltd. Announce Availability of "DoMobile Ver.5," a Remote Access System Enhanced with Post-Quantum Cryptography
TMX Newsfile· 2026-01-15 13:00
Core Viewpoint - 01 Quantum Inc. and Hitachi Solutions Create Ltd. have launched DoMobile Ver.5, integrating post-quantum cryptography (PQC) to enhance cybersecurity for remote access communications, addressing the rising threat of quantum-enabled cyberattacks [1][2]. Group 1: Product Launch and Features - DoMobile Ver.5 is now available to customers in Japan as of January 15, 2026, and incorporates PQC to protect against emerging quantum threats [1][2]. - The platform has been in operation since 2002, serving approximately 7,000 companies and 36,000 users, particularly in the financial sector [6]. - Key features of DoMobile Ver.5 include quantum-resistant security, adoption of NIST-standardized technology, no additional cost for PQC, and being the first to market in Japan with PQC functionality [8][10][11][12]. Group 2: Industry Context and Threats - The rise of quantum computing poses a significant risk to traditional encryption methods like RSA and ECC, which may be compromised sooner than expected [4]. - "Harvest Now, Decrypt Later" (HNDL) attacks are a growing concern, where adversaries collect encrypted data today for future decryption using quantum capabilities [4][5]. - There is a global push for the adoption of PQC, with financial regulators urging institutions to transition to safeguard critical information [5].
X @mert | helius.dev
mert | helius.dev· 2025-12-06 09:05
your sensitive data today (photos, money, files etc) can be made public within a decadethis includes state secretsthis a crazy fact about quantum computersthe so called harvest now, decrypt later attacksbasically, in many cases on the internet you can see encrypted versions of your data (passwords etc)today, you are safe because no computer is strong enough to break encryption — only theoretical quantum computers can do this*however* you can store the encrypted version of the data and then decrypt it later ...