For Researchers

Trace

Chain of Thought

Dynamic reasoning that can revise, branch, and evolve. Perfect for exploring complex problems step-by-step.

The Transformation

Before scenario
(Coming soon)

After transformation
(Coming soon)

See It In Action

Scenario: Understanding quantum computing implications for cryptography

1

Step 1

Reasoningthinking...

Quantum computers use qubits that can exist in superposition, allowing them to process multiple states simultaneously. This exponentially increases computational power for certain problems.

2

Step 2

Reasoningthinking...

Current encryption (RSA, ECC) relies on the difficulty of factoring large numbers or solving discrete logarithms. Classical computers would need billions of years to break 2048-bit RSA.

3

Step 3

Reasoningthinking...

Shor's algorithm on a sufficiently powerful quantum computer could break RSA in hours. But wait - I should revise my estimate of 'sufficiently powerful'...

Revision

Revises Thought #3thinking...

Revision: Breaking 2048-bit RSA requires ~4,000 logical qubits. Current quantum computers have ~1,000 physical qubits with high error rates. We need error correction, requiring millions of physical qubits. Timeline: 10-15 years, not imminent.

4

Step 4

Reasoningthinking...

This creates a "harvest now, decrypt later" threat. Adversaries may be storing encrypted data today to decrypt once quantum computers mature. Sensitive data with 15+ year relevance is already at risk.

Branch A

Defense Paththinking...

Branch A - Defense: Post-quantum cryptography (NIST standards like CRYSTALS-Kyber) uses lattice problems that are hard for both classical and quantum computers. Migration should start now.

Branched from thought #4

Branch B

Offense Paththinking...

Branch B - Offense: Quantum key distribution (QKD) uses quantum mechanics itself for provably secure key exchange. Laws of physics prevent eavesdropping without detection.

Branched from thought #4

Synthesis

ConclusionComplete

Synthesis: Organizations should (1) inventory cryptographic assets, (2) prioritize long-lived sensitive data, (3) begin hybrid classical/post-quantum implementations, (4) monitor NIST standards. The threat is real but manageable with proactive migration.

5 thoughts1 revision2 branches
Chain complete

When to Use Trace

  • 1
    Breaking down complex multi-step problems
  • 2
    Exploring ideas that might need revision
  • 3
    Building understanding through progressive reasoning
  • 4
    When you need to show your work
  • 5
    Problems where the path forward isn't clear

Works Well With

Pro tip: Chain Trace with HypothesisMap for comprehensive analysis.

Ready to use Trace?

Add Think to your AI assistant in one command

npx @anthropic-ai/claude-code mcp add think-mcp