Quantum Threat Analysis

Why A16Z's Quantum Security Report Should Alarm Healthcare More Than Crypto

December 23, 2025 12 min read Michael Bennett

A Quantum Shield Labs Analysis of Emerging Threats to Healthcare Data

Introduction: The Report Crypto Is Buzzing About

This month, Andreessen Horowitz's crypto division released a report that's reshaping how the blockchain industry thinks about quantum threats: "Quantum Computing and Blockchains: Matching Urgency to Actual Threats" by Justin Thaler.

The report provides a sober, technically-grounded assessment that cuts through the hype. It argues against panic while emphasizing preparation. It distinguishes real threats from theoretical ones. It offers seven concrete recommendations.

But here's what struck me as a healthcare cybersecurity professional: nearly every insight applies MORE urgently to healthcare than to cryptocurrency—and nobody's making that connection.

This analysis bridges that gap.

The Timeline: Neither Panic Nor Complacency

A16Z's timeline assessment provides important calibration. The report argues that fears of Bitcoin's core cryptography being practically breakable in the next five years "aren't backed by what's publicly known today." Even a 10-year window is framed as aggressive.

The bottom line: expect a decade or more before cryptographically relevant quantum computers (CRQCs) arrive.

For cryptocurrency holders, this is reassuring. For healthcare organizations, it should be anything but.

Why Healthcare Can't Celebrate This Timeline

The difference lies in data lifespan and regulatory requirements:

Factor Cryptocurrency Healthcare
Data Sensitivity Variable, often short-term 50+ years (lifetime for genetic data)
Regulatory Requirement None (in most jurisdictions) HIPAA mandates protection regardless of threat timeline
Migration Option Move funds to quantum-safe wallets Cannot "move" patient history to new encryption
Damage if Breached Financial loss (recoverable) Identity exposure, discrimination risk, irreversible harm

A decade is a comfortable runway for migrating Bitcoin. It's a catastrophically short window for protecting data that adversaries are already harvesting with 50-year decryption horizons in mind.

HNDL: The Attack That's Already Happening

The report's most critical insight comes in its discussion of "Harvest Now, Decrypt Later" (HNDL) attacks:

"In a nutshell, this means an attacker can record encrypted data today, stash it, and wait. If a powerful enough quantum computer exists later, they can try to decrypt what they captured years ago... This storing of data is likely happening right now."

A16Z explicitly identifies what kinds of data face the highest HNDL risk: "government communications, medical records, legal docs, corporate secrets, even old identity data."

Medical records made the list. This isn't a theoretical exercise.

The Healthcare HNDL Equation

Consider what adversaries gain by harvesting healthcare data today:

Nation-state actors have demonstrated sustained interest in healthcare data. The 2015 Anthem breach (78.8 million records) and 2020 Universal Health Services attack showed that healthcare is already a high-value target.

Adding quantum decryption capability simply extends the exploitation timeline indefinitely.

The Encryption vs. Signatures Distinction

One of the report's most valuable contributions is clarifying the difference between encryption and digital signatures—and why the threats to each operate differently.

Encryption protects confidentiality. The HNDL attack works because encrypted data can be captured now and decrypted later. The risk is backward-looking.

Signatures prove authenticity. There's no secret message inside a signature that future machines can unlock. The risk is forward-looking: once CRQCs arrive, attackers could forge signatures from that point forward, but old signatures don't become suspicious retroactively.

Why This Matters for Healthcare

Most quantum computing discussions focus on breaking cryptographic signatures—the "quantum will crack Bitcoin" narrative. But for healthcare, confidentiality is the primary concern.

Patient data isn't valuable because of its signature. It's valuable because of its content.

The threat model isn't "adversaries will forge your digital signatures in 2035."

The threat model is "adversaries are recording your encrypted patient data today and will read it when quantum arrives."

This reframes the entire urgency calculation. Signature migration can wait for careful implementation. Confidentiality protection cannot.

Privacy Systems Face Highest Urgency

A16Z makes a crucial distinction: not all systems face equal HNDL risk. The report specifically flags that "privacy tech that really does rely on encryption to keep details hidden" faces the highest urgency.

"If encrypted transaction data ends up stored on chain, someone can copy it now and potentially read it later. That means protocols which claim to protect your private transactions forever need to be hyper aware of developments in this space."

Replace "privacy chains" with "HIPAA-covered entities" and the parallel is exact.

Healthcare organizations are, by definition, privacy-focused systems. HIPAA's entire framework assumes that protected health information (PHI) will remain confidential. The regulatory structure doesn't account for retroactive decryption.

If privacy-focused blockchain protocols need to treat quantum as urgent, healthcare needs to treat it as an emergency.

The Seven Recommendations: A Healthcare Translation

A16Z offers seven recommendations for the crypto ecosystem. Each translates directly—and often more urgently—to healthcare:

1. Deploy Hybrid Encryption Immediately

A16Z says: Use current encryption plus post-quantum encryption together, especially where long-term confidentiality matters and cost is tolerable.

Healthcare translation: Every data transmission pathway—TLS connections, VPNs, data-at-rest encryption—needs evaluation for hybrid implementation. Cost tolerance in healthcare is actually higher than crypto, given breach costs averaging $10.93 million.

2. Hybrid Hash-Based Signatures for Software Updates

A16Z says: Secure the update pipeline so you can safely distribute post-quantum fixes when needed.

Healthcare translation: Medical device firmware, EHR system updates, and infrastructure patches represent critical attack vectors. If your update authentication isn't quantum-ready, you may not be able to safely deploy the very solutions designed to protect you.

3. Plan Post-Quantum Migration Now, But Don't Rush Implementation

A16Z says: Post-quantum signatures come with real trade-offs—bigger data, higher costs, harder engineering. Prepare the migration path early.

Healthcare translation: Conduct crypto-agility assessments immediately. Map where your cryptographic dependencies live. Identify which systems will be hardest to migrate. Build the roadmap now even if implementation waits.

4. Privacy Systems Should Treat This as More Urgent

A16Z says: If your promise is that transaction details stay private, stored encrypted data is exactly what attackers can harvest.

Healthcare translation: This is you. HIPAA entities promise patient data stays private. Act accordingly.

5. Prioritize Implementation Security Over Quantum Mitigation

A16Z says: Bugs will wreck you faster than quantum. Complex crypto systems are hunting grounds for edge-case failures.

Healthcare translation: Don't implement post-quantum solutions that create new vulnerabilities. Audit thoroughly. Use formal verification where possible. Layer security so single mistakes don't cause total loss.

6. Fund Quantum Development and Talent

A16Z says: This is a national security issue requiring sustained investment.

Healthcare translation: Start building internal quantum literacy now. Partner with security consultants who specialize in post-quantum readiness. Your team can't implement what they don't understand.

7. Keep Level-Headed When Quantum Milestones Hit the News

A16Z says: The flood of milestone announcements isn't proof the finish line is upon us—it's proof many steps remain.

Healthcare translation: Don't panic at headlines. But don't use "it's 10 years away" as justification for inaction. The harvest window is open now.

What Healthcare Organizations Should Do Next

Based on A16Z's framework and healthcare-specific risk factors, here's a prioritized action plan:

🔴 Immediate (0-6 months)

  • Conduct a cryptographic inventory
  • Assess HNDL exposure
  • Evaluate hybrid encryption options
  • Brief executive leadership

🟡 Near-Term (6-18 months)

  • Develop migration roadmap
  • Implement hybrid solutions
  • Update vendor requirements
  • Build internal capabilities

🟢 Ongoing

  • Monitor NIST standards
  • Track quantum milestones
  • Review and update annually

Conclusion: The Window Is Open Now

A16Z's report provides the cryptocurrency industry with a valuable calibration: quantum threats are real but not imminent, and rushed migration could backfire.

For healthcare, the calculus is different.

The same 10-year timeline that gives crypto breathing room should alarm healthcare organizations. Patient data sensitivity extends 50+ years. Regulatory requirements don't adjust for threat timelines. And the data being transmitted across healthcare networks today is already being harvested by adversaries planning for quantum decryption.

The report's most important sentence deserves repeating:

"If you have data that still matters in 10, 20, or 50 years, you can't treat this as a later problem."

Healthcare data doesn't just "still matter" in 50 years. For patients, it matters for life.

The harvest window is open. The question isn't whether your organization will face quantum threats. The question is whether you're still transmitting data that adversaries are recording right now.

Ready to Assess Your Quantum Risk?

Get the complete implementation roadmap for healthcare post-quantum security.

Sources

  • A16Z Crypto: "Quantum Computing and Blockchains: Matching Urgency to Actual Threats" by Justin Thaler
  • IBM Quantum Development Roadmap
  • Ponemon Institute: Cost of a Data Breach Report 2024
  • HHS Office for Civil Rights: Healthcare Breach Statistics
Back to All Articles