The potential execution of Shor's algorithm at scale poses a significant threat to RSA and Elliptical Curve Cryptography-based systems, rendering them vulnerable to attack. However, migrating to new cryptographic systems is a complex process that cannot be completed overnight, leaving a window of risk in legacy environments. Researchers have been working to compress RSA resource estimates, with the "Pinnacle Architecture" analysis being a key development in this area1. This analysis has significant implications for the logistics of retiring RSA in legacy environments, as it helps to better understand the real-world execution risk. The use of QLDPC codes is also being explored as a means of improving the efficiency of quantum computers, which could further exacerbate the risk to RSA-based systems. Ultimately, understanding the true extent of this risk is crucial for practitioners and organizations looking to mitigate the potential impact of Shor's algorithm on their cryptographic systems.