QANplatform has introduced the world’s first testnet for a quantum-resistant blockchain that is compatible with the Ethereum Virtual Machine (EVM). This development allows for the creation of smart contracts that are immune to quantum attacks. According to QANplatform, developers can now write smart contracts using any programming language. Johann Polecsak, co-founder and CTO of QANplatform, emphasized the significance of this achievement, stating that quantum security has become a major concern since the launch of the IBM Condor quantum processor in December 2023. He explained that existing blockchain networks like Bitcoin, Ethereum, and Solana are unable to adopt quantum-resistant security measures without compromising their decentralization. However, the QANplatform testnet provides a solution by allowing EVM-compatible protocols to test their migration process to a quantum-resistant alternative without risking user funds on the mainnet. This announcement comes after a European country adopted QANplatform’s quantum-resistant technology in March to protect its government-owned cybersecurity infrastructure. The increasing focus on quantum security is evident as governments and companies worldwide prepare for a post-quantum era. The European Commission launched the Quantum Flagship research initiative in 2018, allocating a budget of at least 1 billion euros ($1.078 billion) over a 10-year period. QANplatform’s Polecsak highlighted the urgency of this issue, stating that quantum computing already poses a significant security threat to everyday internet users. He mentioned that large companies like Apple are also taking measures to future-proof their systems with post-quantum cryptography. Apple recently released an update for iMessages that incorporates such encryption, making it one of the first providers to achieve “level 3” encryption. While the development of quantum computers may take some time, Polecsak stressed the importance of staying ahead in terms of post-quantum security, as future quantum computers could potentially break today’s cybersecurity algorithms.