So far, so good – but we also need to talk about secrets.
It is widely accepted that current forms of encryption – the way in which we store both personal data and official secrets – will one day be busted by quantum technology being able to churn through every single possible combination in record time, until the data becomes unscrambled.
Nations are known to be already stealing encrypted data from each other with a view to being able to decode it one day.
"It's called harvest now, decrypt later," says Prof Alan Woodward, a cybersecurity expert from Surrey University.
"The theory of how to break current forms of public key encryption await a truly operational quantum computer," he adds.
"The threat is so high that it's assumed everyone needs to introduce quantum-resistant encryption now."
The moment a such a computer exists is sometimes referred to as Q-day. Estimates of when it might arrive vary, but Brian Hopkins at Forrester says it could be soon - around the year 2030.
Companies like Apple and the secure messaging platform Signal have already rolled out what they believe to be post-quantum encryption keys, but they cannot be applied retrospectively to current data encrypted in the traditional way.
And that's already a problem. In October, Daniel Shiu, the former head of cryptographic design at GCHQ, the UK's intelligence, security and cyber agency, told the Sunday Times it was "credible that almost all UK citizens will have had data compromised" in state-sponsored cyber attacks carried out by China – with that data stockpiled for a time when it can be decrypted and studied.