Heart of his argument is this, with which I absolutely agree:<p>"The moral is the need for cryptographic agility. It’s not enough to implement a single standard; it’s vital that our systems be able to easily swap in new algorithms when required. We’ve learned the hard way how algorithms can get so entrenched in systems that it can take many years to update them: in the transition from DES to AES, and the transition from MD4 and MD5 to SHA, SHA-1, and then SHA-3."<p>Although, personally, I am more supportive of the OpenVPN model (many standards to choose from, including older algos, maybe too much choice) compared to the Wireguard model (one set of well thought of defaults, no choice), one has to ask -- aren't they both wrong? Isn't the correct model high flexibility, while relentlessly deprecating and <i>removing</i> older standards, and, maybe, a clear nudge towards sensible default choices ("X recommends the following algos in 2022...").<p>Obviously crypto is super hard. But the 'problem of agility' seems like a software engineering problem not a hard crypto theoretical or implementation issue.
> Current quantum computers are still toy prototypes, and the engineering advances required to build a functionally useful quantum computer are somewhere between a few years away and impossible.<p>We don't know what quantum computers exist in the hands of powerful adversaries like state actors as they do not openly share this information. Schneier even admits this later on.<p>> This represents the first time a national intelligence organization has published a cryptanalysis result in the open literature.<p>Given how much control the NSA has over the NIST when defining standards. The NSA and NIST's consistent history of intentionally weakening their standards, and the current secrecy around NIST and NSA collaboration especially when it comes to the NIST PQ competition there is very good reason to believe that these cryptographic primitives are all compromised.
> EDITED TO ADD: One of the four public-key encryption algorithms selected for further research, SIKE, was just broken.<p>Yikes. I'm sure these first generation algorithms have pushed things forward but we need another round of evaluation soon, I suspect.