Jeff’s Note: While everyone has been focused on AI, many quantum computing stocks are delivering mind-blowing gains.
Just over the past year or so, you could have turned $5,000 into $42,650 in IONQ… $144,900 in D-Wave… and $207,200 in Rigetti Computing. If you’ve been watching this quantum computer boom from the sidelines…
I want to make sure you have the details on my top three quantum stocks that I shared at my briefing last week.
Because I believe it’s NOT too late.
But soon, it could be. Today is the last day to watch the replay of my briefing before it goes offline.

Yesterday, we explored the quantum threat that’s building as quantum technology grows more advanced…
The incredible developments of the last year in quantum computing – specifically the breakthroughs in quantum error correction – are signaling a once-in-a-generation shift in information technology (IT) infrastructure.
The reality is daunting.
The entire internet will need to be upgraded to post-quantum encryption technologies. Every piece of IT infrastructure will require post-quantum encryption software and hardware (semiconductors) to protect against quantum computers.
This includes necessary upgrades for all communications systems and the current gold standard encryption technology. None of it will protect against the threat of quantum computing technology.
Any stored file will also need to be re-encrypted using post-quantum encryption standards. Otherwise, files can be easily decrypted using quantum computers.
Today, those knowledgeable in the industry about the latest advancements in quantum computing technology are already beginning this process of upgrading their IT systems. It’s still early, but those companies and government entities that are most sensitive to the threat of quantum computing systems are taking action now.
The rest of the industry, and ultimately the rest of the world, will follow quickly. Put simply, this is the largest upgrade of the internet – global IT communications infrastructure – that will take place in our lifetimes.
Nearly 10 years ago, a division of the U.S. Department of Commerce called the “NIST” solicited ideas from the industry for post-quantum cryptography.
NIST is an acronym for the National Institute of Standards and Technology. At the time, its call for post-quantum ideas seemed unnecessary. After all, quantum computers were in such a nascent stage 10 years ago.
The existing cryptographic standard used for encrypting and securing digital communications is known as RSA. The three letters represent the last names of the three cryptographers who invented the algorithm decades ago.
RSA was developed in the 1970s, but it wasn’t implemented on a wider public scale until the early 1990s.
The RSA encryption scheme was elegant in its simplicity. The only way to decrypt an encrypted message was to calculate the prime factors of a very large number. It is a task that is beyond the capabilities of the world’s most powerful supercomputers. That meant that without the correct key, the digital communications couldn’t be decrypted.
The RSA standard employed an extremely complex mathematical problem as a way of defending against cryptographic attacks.
As a result, the RSA standards have about 50% of the world’s market share for hardware encryption and are used for most email communications.
But quantum computing changes everything.
That pesky problem of calculating the prime factors of a large number becomes easy work for anyone in control of a fault-tolerant quantum computer. Such an esoteric mathematical problem becomes easy to solve.
This has been a well-known fact among nation-states and bad actors who, for years, have engaged in cyberattacks to steal encrypted data. They have been “harvesting” highly sensitive and/or valuable files with the intent to decrypt them with quantum computers once available.
And that’s why NIST’s work on post-quantum standards is so important. The industry could not develop a comprehensive solution until the new standards were reached.
Fortunately, NIST recently released the next generation of data encryption standards. These standards are necessary to make technology that is resistant to the power of quantum computers.
The three finalized standards that were announced are:
In addition, NIST will soon finalize the fourth and final post-quantum standard known as FIPS 206. It will also relate to digital signatures necessary for secure digital communication in the post-quantum world.
Since these standards came out, the industry has been racing to incorporate them into its hardware and software solutions so that the world can upgrade its encryption standards ahead of the coming quantum threat.
The most urgent task right now is to accelerate the adoption of post-quantum cryptography – the next generation of encryption protocols designed to withstand quantum attacks.
With the National Institute of Standards and Technology (NIST) finalizing its standards as we discussed yesterday, the framework for this transformation is now in place. These new algorithms are based on mathematical problems that even quantum systems cannot easily solve, such as lattice-based and hash-based encryption methods.
Over the next few years, every layer of global digital infrastructure – from cloud platforms and data centers to network routers and even semiconductors – will need to transition to quantum-safe encryption. This migration will be one of the largest technological undertakings since the birth of the internet itself, and it has already begun.
Yet the rollout of quantum-resistant encryption alone will not be enough.
As cryptographic research continues to evolve, no single algorithm can be guaranteed to remain unbreakable indefinitely. That’s why the next great cybersecurity priority is what’s called “crypto-agility.” It refers to the ability for systems to rapidly upgrade or replace encryption modules as new threats emerge.
To become crypto-agile, organizations must map their cryptographic dependencies and design modular frameworks that allow for quick algorithm replacement. This agility will be the defining trait of secure systems in the quantum era, and it’s critical to ensure that an organization’s defenses can evolve as fast as the attacks against it.
At the same time, entirely new forms of physical defense are emerging in the form of quantum key distribution (QKD).
QKD transmits encryption keys as quantum particles, or photons, which cannot be intercepted or measured without changing their state, making eavesdropping physically impossible.
Early QKD networks have already been demonstrated, and they have proven that the technology can operate securely over long distances. Over time, we will likely see hybrid systems that combine traditional post-quantum encryption with QKD for critical data transmissions such as government communications, financial systems, and defense infrastructure.
Another urgent challenge is what cybersecurity experts call the “harvest now, decrypt later” threat.
Cyber criminals have been stealing and storing encrypted data for years now, in anticipation of a future when quantum computers can easily break existing encryption. This means that even if quantum decryption capabilities are still years away, the data at risk includes items of long-term value—financial records, medical files, national security intelligence, military technology, and proprietary research.
To counter this, organizations must begin re-encrypting their archives using quantum-safe algorithms now. Cloud providers, banks, and government agencies must deploy hybrid encryption strategies and quantum-resilient key management systems immediately to ensure that data remains secure decades into the future.
Ultimately, this is not a problem that any one company or government can solve independently. Instead, they are all dependent on highly specialized companies at the forefront of quantum-proof cryptographic solutions.
For investors, the rise of quantum-secure technology represents one of the greatest opportunities of the coming decade. The companies that successfully develop NIST-certified quantum-safe encryption, scalable crypto-agility frameworks, or quantum key distribution networks will become the backbone of digital trust in the quantum age.
Every major organization – from banks and defense contractors to cloud providers – will need to purchase, license, and deploy these solutions in the years ahead. The demand will be near-universal.
Suffice to say, the dawn of the quantum era marks the birth of a brand-new branch of the cybersecurity industry. We are now entering the quantum security age, where cryptography, physics, and software engineering must converge to rebuild the world’s digital foundations.
The race is already underway, and the companies that develop the quantum-proof solutions that the entire world must adopt will become tomorrow’s household names in investment circles.
That’s why my Quantum Flashpoint event was so urgent. In it, we talked extensively about the ongoing transition into the quantum age, the incredible breakthroughs it will bring, and the under-the-radar investment opportunities that self-direct investors can capitalize on today.
Among those opportunities, we zeroed in on a small company that’s at the forefront of NIST-certified quantum-proof solutions today. This is a company that serious tech investors should know and understand well.
For those who missed my Quantum Flashpoint strategy session, the replay is still available, but it’s coming down at midnight tonight. I encourage all subscribers to give it a look before then. You can find it right here.
Jeff
The Bleeding Edge is the only free newsletter that delivers daily insights and information from the high-tech world as well as topics and trends relevant to investments.
The Bleeding Edge is the only free newsletter that delivers daily insights and information from the high-tech world as well as topics and trends relevant to investments.