XQBTS Whitepaper

[IMPLEMENTATION-GROUNDED OPERATIONAL FRAMEWORK]

TerminalContactMarch 9, 2026
Operational Quantum-Threat Intelligence FrameworkCurrent terminal implementationPublic read-only output model
XQBTS Terminal: a Firestore-backed operational framework for curated frontier tracking, Q-Day readiness estimation, and HNDL pressure monitoring
This document describes the behavior currently implemented in the XQBTS platform. All formulas, thresholds, schedules, collection names, and control surfaces below are drawn from the application code, Firestore rules, and terminal data contracts currently used by the product.

CORE SOURCES

Metriq benchmark feeds for frontier data, Finnhub for market snapshots and profiles, and GNews for the watchlist feed.

CORE PUBLIC OUTPUTS

global/benchmark_frontier, global/readiness_projection, and global/threat_signals.

DESIGN POSITION

An operational intelligence framework with explicit methodology and evidence controls, not a claim of exact cryptanalytic prediction.

01 / ABSTRACT

Abstract
The platform combines a curated benchmark frontier, a versioned methodology layer, public read-only publication paths, and a separate watchlist layer for market and news monitoring.

XQBTS Terminal is implemented as a Next.js application backed by Firebase Firestore and Cloud Functions. Its core model ingests benchmark-family feeds and a platform index, filters those results through an explicit curation policy, normalizes admitted production signals onto a 0-100 scale, and publishes two derived global outputs: a Q-Day readiness document and a global HNDL pressure document.

The system also operates a watchlist layer. That layer maintains a registry of tracked quantum-relevant companies, refreshes market snapshots from Finnhub, matches company news from GNews, and exposes those public feeds to the terminal UI. The watchlist layer is not used by the core Q-Day or HNDL computations. The core model functions are built from curated frontier signals and methodology documents only.

WHAT THE PLATFORM DOES

  • Publishes a curated frontier document with admitted, diagnostic, and excluded signals.
  • Publishes a Q-Day readiness model driven by AQ and curated fault-tolerance bridge metrics.
  • Publishes an HNDL pressure model driven by weighted frontier axes and exposure assumptions.
  • Maintains public read-only history collections for outputs and methodologies.

WHAT THE PLATFORM DOES NOT CLAIM

  • It does not publish a direct production-safe cryptanalytic benchmark in the core risk model.
  • It does not ingest enterprise traffic telemetry or direct PQ deployment telemetry.
  • It does not use watchlist news or market moves as inputs to the core frontier model.
  • It does not present company-level heuristic scores as part of the core methodology.

02 / SYSTEM ARCHITECTURE

System Architecture
The implementation is organized as a registry and ingestion plane, a methodology plane, a publication plane, and a presentation plane.

REGISTRY AND SOURCE PLANE

The company registry is seeded from an XML file. Source integrations use Metriq benchmark feeds and platform index data, Finnhub for market quotes and company profiles, and GNews for batched article search. Source access is controlled by Firebase secrets.

METHODOLOGY PLANE

The benchmark-native methodology is published to global/benchmark_methodology. Admin update endpoints validate input, persist the next methodology, and append methodology history records with changedBy and reason.

PUBLICATION PLANE

After each benchmark sync, the platform publishes the current frontier document and, if derivation succeeds, publishes the current Q-Day and HNDL documents. Each publication also writes a history document containing previous and next values.

PRESENTATION PLANE

The terminal subscribes to active companies, market snapshots, the latest news feed, and the three global core documents. The home page renders the intelligence core and the watchlist as separate surfaces.

1. ingest benchmark.latest.json + platforms index
2. filter source records through methodology rules
3. select one best candidate per required production signal
4. normalize admitted production signals
5. derive readiness and threat outputs
6. publish current docs and append history
7. render public documents in the terminal

03 / INGESTION CADENCE

Operational Cadence and Control Surfaces
The platform mixes scheduled background jobs with admin-triggered manual endpoints.
JobCadencePurposePrimary writes
syncMetriqMetricsEvery 6 hoursFetch benchmark.latest.json and platforms index, build the benchmark frontier, and publish readiness/risk outputs.`global/benchmark_frontier`, `global/readiness_projection`, `global/threat_signals` (+ legacy compatibility docs and history collections)
syncFinnhubQuotesEvery 5 minutesRefresh watchlist quote data for active companies.`market_snapshots` and `companies.isSupportedByFinnhub`
syncFinnhubProfilesEvery 24 hoursRefresh profile metadata for supported watchlist companies.`market_snapshots` and `companies.isSupportedByFinnhub`
syncGnewsFeedEvery 6 hoursFetch batched company news and score article-to-company relevance.`news_feed`
cleanupOldNewsFeedEvery 24 hoursDelete news records older than 30 days.`news_feed` deletions and internal ingestion run stats

SOURCE ACCESS

External integrations are protected by Firebase secrets named FINNHUB_API_KEY, GNEWS_API_KEY, and ADMIN_TRIGGER_KEY.

MANUAL OPERATIONS

Manual sync and methodology update endpoints require HTTP POST and validate the admin key from the request header, query string, or body before proceeding.

04 / BENCHMARK CURATION

Benchmark Frontier Curation Policy
The core frontier is not a raw benchmark dump. It is a filtered, benchmark-family selection layer governed by explicit methodology defaults.

DEFAULT METRICS METHODOLOGY

  • rsa_2048_required_lq = 1400
  • annual_growth_factor_low = 1.5, central = 1.8, high = 2.0
  • q_day_target_runtime_hours = 24
  • include_only_curated_records = true
  • reject_theoretical_records = true
  • methodology_version = metriq-curated-v1

DEFAULT PLATFORM ALLOWLIST

The default allowed platforms are ibm, google, quantinuum, microsoft, ionq, rigetti, intel, fujitsu, d-wave, and dwave.

Allowed benchmark families default to configured family gates per production signal. If a family is not allowed for a signal, the selection function returns no candidate.

SELECTION RULES

  • Metric values must parse as finite numbers.
  • Metric names must match accepted signal mappings or relaxed benchmark metric aliases.
  • Results must resolve to a source label.
  • Signals that require platform attribution reject unattributed records.
  • Curated mode enforces the platform allowlist against extracted platform metadata.
  • Theoretical markers are rejected when the methodology enables theoretical rejection: theoretical, simulated, simulation, idealized, modeled, model, projected, hypothetical, estimated.
  • For `max` signals the highest metric wins, with recency as a tie-breaker.
  • For `min` signals the lowest metric wins, with recency as a tie-breaker.

PRODUCTION SIGNAL SET

These signals are eligible to feed the published core model. Each selected signal is stored with task metadata, normalized score, raw snapshot, source label, attribution status, and evaluated timestamp.

KeySignal IDLabelSelectNormalizeParametersRole
`aq`128Algorithmic Qubits`max``log-upper`Reference 256Required anchor for `global/readiness_projection`; also feeds utility frontier in `global/threat_signals`.
`physicalQubits`159Number of physical qubits`max``log-upper`Reference 100000Feeds hardware-scale axis.
`twoQubitFidelity`532-qubit Clifford gate fidelity`max``linear`Lower 98, upper 99.99Feeds gate-quality axis.
`logicalErrorRate`60Error correction and mitigation`min``inverse-log`Worst 1e-1, best 1e-6Feeds the fault-tolerance bridge and fault-tolerance axis.
`surfaceCode`189Surface code`max``linear`Lower 3, upper 31Feeds the fault-tolerance bridge and fault-tolerance axis.
`readoutFidelity`198Single-qubit measurement fidelity`max``linear`Lower 90, upper 99.99Feeds gate-quality axis.
`coherenceT2`50Coherence time (T2)`max``log-upper`Reference 1000 microsecondsFeeds gate-quality axis.
`quantumVolume`34Quantum volume`max``log-upper`Reference 1048576Feeds utility frontier in both core models.
`faultTolerantQecLogicalErrorRate`141Fault-tolerant quantum error correction (QEC)`min``inverse-log`Worst 1e-1, best 1e-6Feeds the fault-tolerance bridge and fault-tolerance axis.
`singleQubitGateSpeed`223Single-qubit gate speed`min``inverse-log`Worst 1e-3, best 1e-6Feeds runtime-practicality axis.
`twoQubitGateSpeed`2242-qubit gate speed`min``inverse-log`Worst 1e-2, best 1e-6Feeds runtime-practicality axis.

DIAGNOSTIC SIGNAL SET

Diagnostic signals are fetched and stored for visibility, but they are not admitted to the published production-safe global metrics or global risk formulas.

KeySignal IDLabelSelectNormalizeAccepted metrics
`qecDecoding`192QEC decoding`min``none`Accepted metrics: `Latency (s)`, `Time per round (s)`
`shorOrderFinding`175Shor's order-finding`max``none`Accepted metric: `Fidelity`
`integerFactoring`4Integer factoring`max``none`Accepted metric: `Factorized integer`

05 / NORMALIZATION

Normalization Framework
Admitted production signals are normalized to comparable 0-100 scores before they enter the global models.

The platform uses four normalization modes for production signals and one passthrough mode for diagnostics. Every normalization result is clamped to the 0-100 range. Weighted averages ignore missing inputs and renormalize by the total weight of the remaining usable inputs.

log-upper(value, reference)
= clampPercent(log10(1 + value) / log10(1 + reference) * 100)

inverse-log(value, worst, best)
= clampPercent((log10(worst) - log10(value)) / (log10(worst) - log10(best)) * 100)

linear(value, lower, upper)
= clampPercent((value - lower) / (upper - lower) * 100)

inverse-linear(value, worst, best)
= clampPercent((worst - value) / (worst - best) * 100)

weightedAverage(values)
= sum(score * weight) / sum(weight) over usable entries only

REFERENCE CONSTANTS

  • METRIQ_QV_REFERENCE = 1048576
  • METRIQ_PHYSICAL_QUBITS_REFERENCE = 100000
  • METRIQ_SURFACE_CODE_REFERENCE = 31
  • METRIQ_COHERENCE_REFERENCE_US = 1000

STATUS OF MISSING DATA

Missing signals do not force a zero-weighted axis if other inputs remain. That design means axis values can still be computed with partial coverage, while the axis status is downgraded from direct to modelled when the minimum direct evidence count is not satisfied.

06 / Q-DAY MODEL

Q-Day Readiness Model
The Q-Day document is derived from AQ, utility normalization, and a curated fault-tolerance bridge. It is published to `global/readiness_projection`.

The Q-Day model requires an AQ signal; when direct AQ is missing, the ingestion layer may synthesize an AQ proxy from benchmark coverage before publishing. Utility frontier and fault-tolerance bridge are each computed from normalized scores, then combined with the raw AQ metric value to produce current_sota_lq. The code describes that field as an effective logical-qubit proxy derived from AQ frontier and curated fault-tolerance bridge metrics.

utility_frontier_percent
= weightedAverage([
  aq.normalizedScore * 0.7,
  quantumVolume.normalizedScore * 0.3,
])

fault_tolerance_bridge_percent
= weightedAverage([
  logicalErrorRate.normalizedScore * 0.35,
  surfaceCode.normalizedScore * 0.30,
  faultTolerantQecLogicalErrorRate.normalizedScore * 0.35,
])

current_sota_lq
= round(
    aq.metricValue
  * (0.5 + 1.5 * (fault_tolerance_bridge_percent / 100))
  * (0.8 + 0.2 * (utility_frontier_percent / 100))
)

years_to_qday(current_sota_lq, required_lq, growth_factor)
= 0, if current_sota_lq >= required_lq
= ln(required_lq / current_sota_lq) / ln(growth_factor), otherwise

DEFAULT ASSUMPTIONS

  • Required threshold: rsa_2048_required_lq = 1400
  • Growth factors: 1.5, 1.8, 2.0 per year
  • Target runtime: 24 hours
  • Composite readiness: 50% utility frontier and 50% fault-tolerance bridge

PUBLISHED OUTPUT FIELDS

  • current_sota_lq, rsa_2048_delta, rsa_2048_status_percent
  • years_to_qday_low, central, high
  • q_day_year_low, central, high
  • frontier_signals and selected_record provenance

07 / HNDL MODEL

Global HNDL Pressure Model
The global risk document is a weighted frontier-axis model with explicit exposure assumptions and no direct admitted cryptanalytic benchmark.

The HNDL model consumes the same admitted production frontier signals and a separate risk methodology document. It builds five usable frontier axes plus one explicitly unavailable axis for cryptanalytic relevance. The model then computes a frontier readiness core and scales it by the assumed share of encrypted traffic that is not yet post-quantum protected.

AxisInputs and weightsDirect thresholdBehavior
Utility Frontier`aq` x 0.7, `quantumVolume` x 0.32 signalsStatus is `direct` only when both utility signals are present.
Hardware Scale`physicalQubits` x 1.01 signalSingle-signal axis can still be `direct`.
Gate Quality`twoQubitFidelity` x 0.5, `readoutFidelity` x 0.2, `coherenceT2` x 0.32 signalsIf only one signal is available, the axis is `modelled`.
Runtime Practicality`singleQubitGateSpeed` x 0.35, `twoQubitGateSpeed` x 0.652 signalsIf only one speed metric is available, the axis is `modelled`.
Fault Tolerance`logicalErrorRate` x 0.35, `surfaceCode` x 0.3, `faultTolerantQecLogicalErrorRate` x 0.352 signalsIf fewer than two usable signals exist, the axis is `modelled` or `unavailable`.
Cryptanalytic RelevanceNo production input0 signalsHard-coded to `unavailable` with the note that no direct production-safe cryptanalytic benchmark is currently admitted.
harvestableShare
= encryptedTrafficShare * (1 - pqProtectedShare)

cryptanalyticReadinessCore
= weightedAverage([
  utilityFrontier.value * 0.1,
  hardwareScale.value * 0.1,
  gateQuality.value * 0.15,
  runtimePracticality.value * 0.2,
  faultTolerance.value * 0.45,
])

hndlPressure
= clampPercent(harvestableShare * cryptanalyticReadinessCore)

hndlStatus
= CRITICAL if hndlPressure >= 60
= HIGH if hndlPressure >= 35
= MEDIUM if hndlPressure >= 15
= LOW otherwise

DEFAULT RISK ASSUMPTIONS

  • encryptedTrafficShare = 0.95
  • pqProtectedShare = 0.13
  • methodologyVersion = global-risk-signals-v1
  • Fault tolerance receives the highest HNDL weight at 0.45.

EXPLICIT CORE LIMIT

The platform hard-codes the cryptanalyticRelevance axis to unavailable with the statement that no direct production-safe cryptanalytic benchmark is currently admitted. The published HNDL score is therefore a frontier readiness and exposure-pressure proxy, not a direct cryptanalytic measurement.

08 / WATCHLIST LAYER

Watchlist Registry, Market Snapshot, and News Feed
The watchlist layer is operationally useful, but it is separate from the core frontier methodology.

FINNHUB MARKET SNAPSHOTS

Quotes are refreshed every 5 minutes and profiles every 24 hours. The platform stores prices, daily move fields, profile metadata, support status, fetch timestamps, and last known good profile or quote timestamps. Unsupported or forbidden symbols are marked as unsupported rather than treated as valid live market data.

GNEWS MATCHING

News search runs in batches of 2 companies. The pipeline uses a primary query and, when needed, a fallback query. Articles are normalized, matched against the current batch, and then written into news_feed with matched symbols, query strategy, match strength, and match score metadata.

article_score
= +5 exact company name match
+ +3 simplified company name match
+ +4 ticker regex match
+ +3 searchTerm match
+ +1 for each token match

accepted_article if article_score >= 3
matchStrength = "fallback" if queryStrategy == "fallback" or topMatchScore < 6

SEPARATION FROM THE CORE MODEL

The functions that build global/readiness_projection and global/threat_signals consume curated frontier production signals and methodology documents only. Finnhub and GNews are therefore watchlist inputs, not scientific inputs to the core frontier, Q-Day, or HNDL calculations.

09 / PUBLICATION AND ACCESS

Publication Paths, History, Staleness, and Access Controls
The platform publishes public read-only current-state docs and historical snapshots, while keeping ingestion run logs and legacy admin references private.
Collection or groupAccessRole
`global/readiness_projection`Public read-onlyPublished Q-Day readiness output, frontier-derived readiness percentages, and selected AQ provenance.
`global/benchmark_methodology`Public read-onlyCurrent benchmark curation, readiness, and threat methodology assumptions.
`global/benchmark_frontier`Public read-onlySelected production signals, diagnostic signals, exclusions, sync status, and benchmark provenance.
`global/threat_signals`Public read-onlyPublished threat-matrix axes, HNDL pressure, and HNDL status.
`companies`, `market_snapshots`, `news_feed`Public read-onlyWatchlist registry, market data, and matched news feed consumed by the terminal.
`benchmark_frontier_history`, `readiness_projection_history`, `threat_signals_history`, `benchmark_methodology_history`Public read-onlyHistorical snapshots for published benchmark-native data and methodology changes.
`risk_reference`, `crypto_reference`, `crypto_reference_history`, `ingestion_runs`Not publicLegacy or internal-only admin and operational records.

HISTORY MODEL

Every publication transaction writes the current document and an accompanying history record containing previous and next states plus a publication reason. Methodology update transactions also write history documents with changedBy and reason.

STALENESS HANDLING

On partial failures the platform does not delete published documents. Instead it marks the affected global docs as stale, updates the last attempted sync timestamp, and keeps the prior document available to clients. Metrics, frontier, and risk signals all use a 36-hour staleness window in the current implementation.

Firestore rules explicitly allow public reads on the current global documents, histories, companies, market snapshots, and news feed. All writes are denied from the client side. A catch-all deny rule blocks any document path not explicitly opened for public reads.

10 / LIMITATIONS

Limitations and Non-Claims
The current implementation is explicit about what it measures, what it proxies, and what it does not yet admit.

BOUNDARY CONDITIONS

  • current_sota_lq is a frontier proxy derived from AQ plus normalized utility and fault-tolerance adjustments. It is not a direct universal logical qubit census across all platforms.
  • The HNDL model has no admitted direct cryptanalytic benchmark. Its cryptanalytic relevance axis is intentionally unavailable in the current code.
  • Uncertainty treatment is limited to three growth factors in the Q-Day model and explicit share assumptions in the HNDL model. No broader uncertainty interval or backtesting layer is implemented in the current code.
  • The platform does not apply modality-specific correction factors beyond task selection, normalization, and curation. Cross-modality comparability is therefore constrained by the current task design.
  • The watchlist layer is operational and public, but it is not part of the core global frontier methodology and should not be read as a scientific proof layer.
  • Legacy admin collections exist, but the public terminal contract is centered on the current global documents and watchlist collections that are exposed in Firestore rules.

Within those boundaries, the platform is technically coherent as an operational framework: it exposes its inputs, encodes a curation policy, versions its methodology, records exclusions, publishes history, marks stale states, and cleanly separates the core frontier model from its watchlist surfaces.

Document Basis
Quick implementation facts for this paper.

FRAMEWORK TYPE

Operational intelligence platform with public read-only outputs.

CORE VERSIONS

metriq-curated-v1 and global-risk-signals-v1

UI DATA SUBSCRIPTIONS

Active companies, market snapshots, latest 30 news items, and the three core global docs.

Section Index
Anchor links for the whitepaper sections.
AbstractSystem ArchitectureIngestion CadenceBenchmark Curation PolicyNormalization FrameworkQ-Day Readiness ModelHNDL Pressure ModelWatchlist LayerPublication and AccessLimitations and Non-Claims
Core Outputs
Current public publication targets.
global/benchmark_frontier
global/readiness_projection
global/threat_signals
XQBTS WHITEPAPER // VIEW ONLYXQBTS WHITEPAPER // VIEW ONLYXQBTS WHITEPAPER // VIEW ONLYXQBTS WHITEPAPER // VIEW ONLY
XQBTS WHITEPAPER // VIEW ONLYXQBTS WHITEPAPER // VIEW ONLYXQBTS WHITEPAPER // VIEW ONLYXQBTS WHITEPAPER // VIEW ONLY
XQBTS WHITEPAPER // VIEW ONLYXQBTS WHITEPAPER // VIEW ONLYXQBTS WHITEPAPER // VIEW ONLYXQBTS WHITEPAPER // VIEW ONLY
XQBTS WHITEPAPER // VIEW ONLYXQBTS WHITEPAPER // VIEW ONLYXQBTS WHITEPAPER // VIEW ONLYXQBTS WHITEPAPER // VIEW ONLY
XQBTS WHITEPAPER // VIEW ONLYXQBTS WHITEPAPER // VIEW ONLYXQBTS WHITEPAPER // VIEW ONLYXQBTS WHITEPAPER // VIEW ONLY
XQBTS WHITEPAPER // VIEW ONLYXQBTS WHITEPAPER // VIEW ONLYXQBTS WHITEPAPER // VIEW ONLYXQBTS WHITEPAPER // VIEW ONLY
Protected view