What is the quantum threat?
A sufficiently powerful quantum computer (called a Cryptographically Relevant Quantum Computer – CRQC) will have the ability to break the current methods of encryption. For example, those used in TLS – the most widely used cryptographic protocol on the internet.
NIST
What is NIST doing?
IETF
What is IETF doing?
Cloudflare
What is Cloudflare doing?
Others
What are others doing?
And ... how do we help you?
Our forward and reverse proxies offer the quantum-resistant cipher suites used by the other providers and standardized by NIST. We also intend to offer quantum-resistant signatures and certificates.