Arthur Miller, founder and CEO of FiQIS, made a decision that few fintech founders prioritize: integrating post-quantum encryption into the platform before launch. This choice reflects Miller’s background in defense research and development at DISA, where he learned that security architecture must account for future threats, not just current ones. With FiQIS now moving toward market, Miller’s forward-looking security approach positions the platform as one of few lending infrastructures ready for the quantum era.
The quantum computing threat to current encryption standards is not theoretical speculation. It is an approaching reality that financial institutions must address now, not when quantum computers become commercially available. The principle of “harvest now, decrypt later” means that adversaries are already collecting encrypted data with the intention of decrypting it once quantum computing capabilities mature.
Miller recognized early in FiQIS development that financial infrastructure built today must remain secure for decades. Current encryption standards that protect financial transactions, customer data, and institutional communications will become vulnerable to quantum attacks within the next decade, potentially sooner. Organizations, including NIST, have already published post-quantum cryptographic standards precisely because the technical community recognizes the urgency of this transition.
The “harvest now, decrypt later” attack vector is particularly concerning for financial services. An adversary who captures encrypted transaction data, customer communications, or proprietary business information today can store that data indefinitely. When quantum computers become capable of breaking current encryption standards, the previously collected data becomes readable. For financial institutions handling sensitive personal information and high-value transactions, this represents an unacceptable risk.
FiQIS integrates post-quantum encryption as a core security feature rather than a future addition. This architectural decision distinguishes the platform from competitors who treat quantum readiness as a problem for later consideration. Miller’s experience with high-security environments at both DISA and Zelle informs this proactive approach. By the time quantum computers pose an obvious, immediate threat, it will be too late to protect data that adversaries have already collected.
The transition to post-quantum encryption is not a simple software update. It requires a comprehensive review of cryptographic implementations across entire technology stacks, testing to ensure new algorithms do not introduce performance issues or compatibility problems, and coordination with partners and vendors who must also upgrade their systems. Miller built FiQIS with post-quantum cryptography from the beginning, avoiding the costly and risky retrofitting process that other platforms will face.
Financial regulators are beginning to incorporate quantum readiness into their oversight frameworks. Institutions that cannot demonstrate progress toward post-quantum encryption may face regulatory scrutiny as the quantum timeline becomes clearer. Forward-looking institutions recognize that quantum readiness will become a competitive differentiator, particularly for customers and partners who understand the threat landscape. FiQIS provides institutions with this differentiator from day one.
The investment in post-quantum encryption delivers value beyond future-proofing against quantum attacks. It demonstrates to customers, partners, and regulators that an institution takes security seriously and plans for long-term data protection. Miller emphasizes that FiQIS is designed for institutions that want to lead on security rather than follow reactively when threats become undeniable.
Some institutions may question the urgency of post-quantum encryption given uncertainty about exactly when quantum computers will achieve the capabilities necessary to break current standards. Miller’s response is unequivocal: this perspective misunderstands both the “harvest now, decrypt later” threat and the timeline required for comprehensive cryptographic transitions. FiQIS solves this problem before institutions using the platform need to think about it.
The technical community is clear about the timeline and the stakes. NIST has published standards. Security researchers have demonstrated the viability of post-quantum algorithms. The question is not whether financial institutions will need to transition to post-quantum encryption but whether they will complete that transition before quantum computers render their current security measures obsolete.
FiQIS is backed by investors who recognize that security infrastructure represents a fundamental value proposition for financial technology platforms. Post-quantum encryption is not an exotic feature for future consideration. It is a present-day requirement for platforms that will protect sensitive financial data for decades. Miller’s decision to prioritize quantum-resistant security from the beginning reflects his belief that infrastructure companies have an obligation to anticipate threats, not just respond to them.
The institutions that adopt FiQIS will avoid the costly and potentially catastrophic scramble that will face institutions who delay quantum readiness. Financial services handle some of the most sensitive data in existence. Customer financial records, transaction histories, and personal information deserve protection that accounts for known future threats, not just current ones. Miller built FiQIS with this understanding, and the platform’s quantum-resistant architecture will serve institutions well into the future.














