# QNSQY (Quantum Sequrity) - Post Quantum Cryptography | Quantum Safe | Quantum Resistant > **Post Quantum Cryptography (PQC) data encryption software** that is **quantum-safe** and **quantum-resistant**. Uses NIST-standardized algorithms per FIPS 203 (ML-KEM), FIPS 204 (ML-DSA), FIPS 205 (SLH-DSA), and FIPS 206 (draft FN-DSA). Hybrid post-quantum + classical encryption. CLI + GUI for Windows and Linux. Data, passwords, and private keys never leave the machine; only encrypted billing metadata is transmitted. No data-operation telemetry. QNSQY itself is not FIPS-validated, SOC 2-certified, or FedRAMP-ATO. Free tier available. QNSQY protects data against the **Harvest Now, Decrypt Later (HNDL)** threat where adversaries collect encrypted data today to decrypt with future quantum computers. It implements all five NIST post-quantum standards plus classical hybrids for defense-in-depth. **Primary topics**: post quantum cryptography, post-quantum cryptography, PQC, quantum safe encryption, quantum-safe cryptography, quantum resistant encryption, quantum-resistant cryptography, NIST PQC standards, Harvest Now Decrypt Later, Q-Day, CRQC. ## Algorithms **Key Encapsulation (KEM) - always hybridized with classical X25519 by default; pure-KEM mode is a Business opt-in:** - ML-KEM-512 + X25519 hybrid (FIPS 203, lattice-based; Free/Pro/Business) - ML-KEM-768 + X25519 hybrid (FIPS 203; Pro/Business) - ML-KEM-1024 + X25519 hybrid (FIPS 203; Pro with credits / Business unlimited) - HQC-128/192/256 + X25519 hybrid (code-based KEM, NIST's 5th PQC selection, March 2025; Business) **Digital Signatures (DSA) - hybridized with classical Ed25519 by default where applicable:** - ML-DSA-44 + Ed25519 hybrid (FIPS 204; Free/Pro/Business) - ML-DSA-65 + Ed25519 hybrid (FIPS 204; Pro/Business) - ML-DSA-87 + Ed25519 hybrid (FIPS 204; Pro with credits / Business) - SLH-DSA (FIPS 205, stateless hash-based, 6 parameter sets 128s/128f/192s/192f/256s/256f; Pro with credits / Business; Ed25519-hybrid variants Business only) - FN-DSA-512/1024 (FIPS 206 draft, Falcon, NTRU lattice-based; standalone or + Ed25519 hybrid; Business only) - LMS-SHA256 (SP 800-208, stateful hash-based, h5w1 / h10w2 / h15w4 / h20w8; Business only) - Ed25519 (classical, RFC 8032, used in hybrid pairings) **Symmetric/AEAD (all tiers):** AES-256-GCM (default, FIPS 197 / SP 800-38D), XChaCha20-Poly1305 (alternative) **Hash:** BLAKE3, SHA-2 (FIPS 180-4), SHA-3 (FIPS 202) **KDF:** Argon2id (RFC 9106; 128 MB default / up to 256 MB Pro / up to 512 MB Business), HKDF-SHA3-256 (RFC 5869), PBKDF2-SHA256 (100k iters, billing server only, Cloudflare Workers CPU cap) **Key Exchange:** X25519 (RFC 7748) hybridized with ML-KEM / HQC ## What QNSQY Does - Encrypts files with hybrid post-quantum key encapsulation (ML-KEM + X25519 + AES-256-GCM) - Signs and verifies files with ML-DSA, SLH-DSA, FN-DSA, or LMS - Password-only encryption using Argon2id key derivation (no keys needed) - Batch encrypt/sign entire directories - Shamir secret sharing: split keys M-of-N across multiple parties - Threshold encryption: require M-of-N recipients to decrypt - Deniable encryption: plausible deniability under coercion - Timelock encryption: files that expire or unlock at a set time - Steganography: hide encrypted data inside images - Air-gapped operation: works fully offline, no network required - Secure shred: multi-pass file deletion preventing forensic recovery - Rekey: change passwords without re-encrypting - Audit logging: hash-chain signed tamper-evident logs - FIDO2/YubiKey hardware key binding - SIEM integration for enterprise compliance ## Security Architecture - Sandbox: seccomp-bpf (Linux), Landlock, kernel-level network blocking - Memory: mlock prevents swap, Zeroization clears keys from RAM - No cloud dependency for file content; only encrypted billing metadata transits to billing.quantumsequrity.com via seccomp-pinned network path. No file-operation telemetry. Website uses Sentry for error monitoring and Razorpay for checkout on the pages where they are needed. - Kerckhoffs's principle: security from algorithm strength, not secrecy - Constant-time operations: side-channel resistant - Hybrid cryptography: quantum-safe + classical combined, never weaker than either alone ## Threat Context - Shor's algorithm breaks RSA, ECC, ECDH, and classical DSA - Grover's algorithm halves symmetric key security (AES-128 becomes 64-bit) - CRQC (Cryptographically Relevant Quantum Computer) estimated 2030-2040 - Q-Day: the day a CRQC can break current encryption - HNDL attacks are happening now: nation-states stockpiling encrypted data - NIST finalized PQC standards in August 2024 (FIPS 203, 204, 205) ## Tiers - **Free**: ML-KEM-512 hybrid, ML-DSA-44, AES-256-GCM + XChaCha20-Poly1305, 100 MB file limit (advanced algos only; ML-KEM-512 + ML-DSA-44 unlimited), no credit card - **Pro** ($29/mo, $290/yr save 17%): All ML-KEM + X25519 hybrids, all ML-DSA + Ed25519 hybrids, SLH-DSA (credits), 25 GB per-file, batch, rekey, audit (hash-chained), vault, custom Argon2id up to 256 MB, encrypted audit sync across devices - **Business** (custom pricing via sales): All Pro features plus HQC + X25519 hybrid, FN-DSA (standalone or + Ed25519 hybrid), LMS, SLH-DSA + Ed25519 hybrids, pure-KEM mode opt-in, unlimited file size, threshold (M-of-N Shamir), time-lock (RSW), steganography, polyglot, deniable, escrow, recipient groups, encryption policy, SIEM export (CEF/JSON/Syslog), scan + migrate classical crypto, custom Argon2id up to 512 MB - **Enterprise** (custom pricing via sales): All Business features plus signed SLA, dedicated engineering channel, quarterly readiness consult, white-glove onboarding, named customer-success contact, custom seat counts with volume pricing. Air-gap license + HSM integration are v7.3 roadmap (not shipping today). ## Industry Use Cases - **Healthcare**: Protect ePHI and patient records with quantum-safe encryption (QNSQY is not HIPAA-audited and does not sign HIPAA Business Associate Agreements) - **Government/Defense**: Alignment with NSA CNSA 2.0 algorithm set, classified data protection - **Financial Services**: Protect trading algorithms, regulatory compliance, long-lived financial records - **Legal**: Attorney-client privilege, trade secret protection - **Journalism**: Source protection, activist communications - **Research**: Intellectual property, grant data, competitive advantage ## Pages - [Home](https://quantumsequrity.com/) - [About: Mission, Vision, Founder's Pledge](https://quantumsequrity.com/about) - [Features](https://quantumsequrity.com/features) - [Security](https://quantumsequrity.com/security) - [Documentation](https://quantumsequrity.com/docs) - [Pricing](https://quantumsequrity.com/pricing) - [Download](https://quantumsequrity.com/download) - [Blog](https://quantumsequrity.com/blog) - [FAQ](https://quantumsequrity.com/faq) - [Glossary](https://quantumsequrity.com/glossary) - [Changelog](https://quantumsequrity.com/changelog) - [Contact](https://quantumsequrity.com/contact) - [Careers (not currently hiring; applications open)](https://quantumsequrity.com/career) ## Markdown Mirrors for AI Agents Every public HTML page has a plain markdown sibling at the same path with a `.md` extension, for example `/about.md`, `/features.md`, `/blog/ml-kem-explained.md`. These mirrors contain the same semantic content as the HTML without navigation chrome and are safe for LLM consumption. ## Mission QNSQY exists to help the world migrate from classical cryptography (RSA, ECC, ECDH, classical DSA) to post-quantum cryptography before a cryptographically relevant quantum computer breaks them. The threat model explicitly targets nation-state actors, government-funded offensive groups, and Harvest Now Decrypt Later programs. See `/about` for full mission, vision, and the founder's personal pledge. ## Key Blog Articles (post quantum cryptography, quantum safe, quantum resistant) ### Education / Foundational - [What is Post-Quantum Cryptography?](https://quantumsequrity.com/blog/what-is-post-quantum-cryptography) - [Why Quantum Threatens Classical Encryption](https://quantumsequrity.com/blog/why-quantum-threatens-classical-encryption) - [Classical vs Quantum-Safe Encryption Compared](https://quantumsequrity.com/blog/classical-vs-quantum-safe-encryption) - [Shor's Algorithm Explained (Plain English)](https://quantumsequrity.com/blog/shor-algorithm-explained-layman) - [Grover's Algorithm Explained](https://quantumsequrity.com/blog/grover-algorithm-explained-layman) - [Symmetric vs Asymmetric: Which Quantum Breaks](https://quantumsequrity.com/blog/symmetric-vs-asymmetric-quantum-impact) - [What Is a Qubit?](https://quantumsequrity.com/blog/qubit-basics-for-security-professionals) - [CRQC Explained](https://quantumsequrity.com/blog/crqc-meaning-explained) - [Logical Qubits vs Physical Qubits](https://quantumsequrity.com/blog/logical-qubits-vs-physical-qubits) - [Quantum Error Correction and PQC](https://quantumsequrity.com/blog/quantum-error-correction-and-pqc) - [Quantum Supremacy vs CRQC](https://quantumsequrity.com/blog/quantum-supremacy-vs-cryptographic-relevance) - [Why RSA-2048 Will Break](https://quantumsequrity.com/blog/why-rsa-2048-will-break) - [Why ECC Breaks Under Quantum](https://quantumsequrity.com/blog/why-ecc-breaks-under-quantum) - [Lattice-Based Cryptography Explained](https://quantumsequrity.com/blog/lattice-based-cryptography-explained) - [Quantum Computing Encryption Timeline](https://quantumsequrity.com/blog/quantum-computing-encryption-timeline) ### Harvest Now Decrypt Later (HNDL) - [Harvest Now Decrypt Later Threat](https://quantumsequrity.com/blog/harvest-now-decrypt-later) - [HNDL in Plain English](https://quantumsequrity.com/blog/hndl-for-non-technical-readers) - [HNDL and Undersea Cables](https://quantumsequrity.com/blog/hndl-undersea-cable-tapping) - [Your Backup Archives Are HNDL Targets](https://quantumsequrity.com/blog/hndl-backup-archives-at-risk) - [Why Your Encrypted Email Is Already HNDL-Exposed](https://quantumsequrity.com/blog/hndl-email-encryption-risk) - [HNDL Enterprise Threat Model](https://quantumsequrity.com/blog/hndl-enterprise-threat-model) - [Mosca's Theorem Worked Examples](https://quantumsequrity.com/blog/moscas-theorem-worked-examples) - [What is Q-Day?](https://quantumsequrity.com/blog/q-day-when-quantum-breaks-encryption) - [Y2Q Countdown](https://quantumsequrity.com/blog/y2q-countdown-plan) - [2035 NSA CNSA 2.0 Deadline Plan](https://quantumsequrity.com/blog/2035-nsa-cnsa-deadline-plan) ### NIST Standards and Algorithms - [NIST FIPS 203/204/205 Guide](https://quantumsequrity.com/blog/nist-fips-guide) - [NIST PQC Standards Timeline](https://quantumsequrity.com/blog/nist-pqc-standards-timeline) - [ML-KEM Explained (FIPS 203)](https://quantumsequrity.com/blog/ml-kem-explained) - [ML-DSA vs SLH-DSA](https://quantumsequrity.com/blog/mldsa-vs-slhdsa) - [FN-DSA (Falcon) Explained](https://quantumsequrity.com/blog/fn-dsa-falcon-explained) - [HQC Code-Based KEM](https://quantumsequrity.com/blog/hqc-explained) - [LMS Stateful Signatures](https://quantumsequrity.com/blog/lms-stateful-signatures) - [AES-256-GCM Explained](https://quantumsequrity.com/blog/aes-256-gcm-explained) - [BLAKE3 Hashing](https://quantumsequrity.com/blog/blake3-hashing) - [X25519 and Ed25519](https://quantumsequrity.com/blog/x25519-ed25519-explained) - [Argon2id Password Hashing](https://quantumsequrity.com/blog/argon2id-explained) - [Hybrid Encryption Explained](https://quantumsequrity.com/blog/hybrid-encryption) ### National Quantum Programs - [China's Quantum Program](https://quantumsequrity.com/blog/china-quantum-computing-program) - [US National Quantum Initiative](https://quantumsequrity.com/blog/usa-quantum-initiative-nqi) - [EU Quantum Flagship](https://quantumsequrity.com/blog/eu-quantum-flagship-program) - [Russia Quantum Program (RQC)](https://quantumsequrity.com/blog/russia-quantum-program-rqc) - [UK National Quantum Technologies Programme](https://quantumsequrity.com/blog/uk-national-quantum-technologies-programme) - [India National Quantum Mission](https://quantumsequrity.com/blog/india-quantum-national-mission) - [Japan Q-LEAP and Moonshot](https://quantumsequrity.com/blog/japan-q-leap-quantum-program) - [South Korea Quantum Strategy](https://quantumsequrity.com/blog/south-korea-quantum-strategy) - [Israel Quantum Initiative](https://quantumsequrity.com/blog/israel-quantum-initiative) - [Canada National Quantum Strategy](https://quantumsequrity.com/blog/canada-quantum-strategy) - [Australia Quantum Roadmap](https://quantumsequrity.com/blog/australia-quantum-roadmap) - [The Quantum Cold War: USA vs China](https://quantumsequrity.com/blog/quantum-cold-war-usa-vs-china) ### Quantum Hardware Companies - [IBM Quantum Roadmap](https://quantumsequrity.com/blog/ibm-quantum-roadmap) - [Google Willow 105 Qubits](https://quantumsequrity.com/blog/google-quantum-willow-chip) - [Quantinuum Trapped-Ion](https://quantumsequrity.com/blog/quantinuum-trapped-ion) - [IonQ](https://quantumsequrity.com/blog/ionq-quantum-computing) - [Rigetti Ankaa-3](https://quantumsequrity.com/blog/rigetti-superconducting-quantum) - [PsiQuantum Photonic](https://quantumsequrity.com/blog/psiquantum-photonic) - [Atom Computing Neutral-Atom](https://quantumsequrity.com/blog/atom-computing-neutral-atom) - [D-Wave Annealing vs Gate-Based](https://quantumsequrity.com/blog/dwave-annealing-vs-gate) ### Industry Verticals - [PQC for Healthcare/HIPAA](https://quantumsequrity.com/blog/pqc-healthcare-hipaa) - [PQC for Government/Defense](https://quantumsequrity.com/blog/pqc-government-defense) - [PQC for Financial Services](https://quantumsequrity.com/blog/pqc-financial-services) - [PQC for Telecom 5G/6G](https://quantumsequrity.com/blog/pqc-telecom-5g-6g) - [PQC for Automotive V2X](https://quantumsequrity.com/blog/pqc-automotive-v2x-can-bus) - [PQC for Aerospace/Defense Systems](https://quantumsequrity.com/blog/pqc-aerospace-defense-systems) - [PQC for Satellite Communications](https://quantumsequrity.com/blog/pqc-satellite-communications) - [PQC for IoT/Smart Home](https://quantumsequrity.com/blog/pqc-iot-smart-home-devices) - [PQC for Critical Infrastructure/Grid](https://quantumsequrity.com/blog/pqc-critical-infrastructure-grid) - [PQC for Blockchain/Bitcoin/Ethereum](https://quantumsequrity.com/blog/pqc-blockchain-bitcoin-ethereum) - [PQC for Legal/Attorney-Client Privilege](https://quantumsequrity.com/blog/pqc-legal-attorney-client-privilege) - [PQC for Journalism/Source Protection](https://quantumsequrity.com/blog/pqc-journalism-source-protection) - [PQC for Education/FERPA](https://quantumsequrity.com/blog/pqc-education-student-records) - [PQC for Insurance](https://quantumsequrity.com/blog/pqc-insurance-long-tail-claims) - [PQC for Pharma/Clinical Trials](https://quantumsequrity.com/blog/pqc-pharmaceuticals-trial-data) ### Comparisons - [RSA vs ML-KEM](https://quantumsequrity.com/blog/rsa-vs-ml-kem) - [ECDH vs ML-KEM](https://quantumsequrity.com/blog/ecdh-vs-ml-kem) - [ECDSA vs ML-DSA](https://quantumsequrity.com/blog/ecdsa-vs-ml-dsa) - [OpenSSL PQC Status 2026](https://quantumsequrity.com/blog/openssl-pqc-status-2026) - [OpenSSH PQC Migration](https://quantumsequrity.com/blog/openssh-pqc-migration) - [Is PGP/GPG Dead? PQC Alternatives](https://quantumsequrity.com/blog/pgp-gpg-vs-pqc-alternatives) - [TLS 1.2 vs 1.3 vs PQ-TLS](https://quantumsequrity.com/blog/tls-1-2-vs-tls-1-3-pqc) - [VPN Providers PQC Scorecard](https://quantumsequrity.com/blog/vpn-providers-pqc-scorecard) - [Age vs GPG vs QNSQY](https://quantumsequrity.com/blog/age-gpg-qnsqy-comparison) - [QNSQY vs VeraCrypt](https://quantumsequrity.com/blog/qnsqy-vs-veracrypt) - [Signal vs WhatsApp vs iMessage Quantum-Safe](https://quantumsequrity.com/blog/signal-whatsapp-imessage-quantum-safe) - [BitLocker, FileVault, VeraCrypt Quantum-Safe](https://quantumsequrity.com/blog/bitlocker-filevault-veracrypt-quantum) ### Migration How-To - [How to Implement PQC in Your Organization](https://quantumsequrity.com/blog/implementing-pqc-your-organization) - [How to Inventory Cryptographic Assets](https://quantumsequrity.com/blog/how-to-inventory-cryptographic-assets) - [Hybrid PQC Migration Playbook](https://quantumsequrity.com/blog/hybrid-migration-strategy-step-by-step) - [Crypto-Agility Explained](https://quantumsequrity.com/blog/crypto-agility-explained) - [PQC Migration Budget Planning](https://quantumsequrity.com/blog/pqc-migration-budget-planning) - [PQC Migration Training Teams](https://quantumsequrity.com/blog/pqc-migration-training-teams) - [PQC for Small Business](https://quantumsequrity.com/blog/pqc-for-small-business) - [PQC for Developers: First Steps](https://quantumsequrity.com/blog/pqc-for-developers-first-steps) - [Open-Source PQC Libraries Review](https://quantumsequrity.com/blog/open-source-pqc-libraries-review) - [AWS KMS PQC Migration](https://quantumsequrity.com/blog/aws-kms-quantum-migration) - [Azure Key Vault PQC](https://quantumsequrity.com/blog/azure-key-vault-post-quantum) - [Docker/Kubernetes Quantum-Safe Secrets](https://quantumsequrity.com/blog/docker-kubernetes-quantum-safe-secrets) - [Encrypt Before Cloud Upload](https://quantumsequrity.com/blog/encrypt-before-cloud-upload) - [Does ChatGPT Read My Files? AI Upload Risk](https://quantumsequrity.com/blog/chatgpt-data-quantum-risk) ### International Standards and Compliance - [ISO/IEC PQC Standards](https://quantumsequrity.com/blog/iso-iec-pqc-standards) - [ETSI Quantum-Safe Standards](https://quantumsequrity.com/blog/etsi-quantum-safe-standards) - [IETF PQC Internet Drafts](https://quantumsequrity.com/blog/ietf-pqc-internet-drafts) - [FedRAMP SOC 2 PQC Requirements](https://quantumsequrity.com/blog/fedramp-soc2-pqc-requirements) - [GDPR and PQC](https://quantumsequrity.com/blog/gdpr-pqc-alignment) ### QNSQY Product - [Getting Started CLI](https://quantumsequrity.com/blog/getting-started-cli) - [v7 Enterprise Launch](https://quantumsequrity.com/blog/v7-enterprise-launch) - [Batch Encryption Enterprise](https://quantumsequrity.com/blog/batch-encryption-enterprise) - [Linux GUI Security](https://quantumsequrity.com/blog/linux-gui-security) - [Shamir Secret Sharing](https://quantumsequrity.com/blog/shamir-secret-sharing) - [Air-Gapped Encryption](https://quantumsequrity.com/blog/air-gapped-encryption) - [SIEM Integration](https://quantumsequrity.com/blog/siem-integration) - [Time-Based Security](https://quantumsequrity.com/blog/time-based-security) - [YubiKey Integration](https://quantumsequrity.com/blog/yubikey-integration) - [PQC State 2026](https://quantumsequrity.com/blog/pqc-state-2026) - [Protect Data from Quantum Computers](https://quantumsequrity.com/blog/protect-data-quantum-computers) ### Newly Added (May 2026): Tool Quantum-Safety Status Direct answers to "is X quantum safe?" queries. Verifies symmetric vs asymmetric exposure to Shor's and Grover's algorithms with vendor-source citations. - [Is VeraCrypt Quantum Safe?](https://quantumsequrity.com/blog/is-veracrypt-quantum-safe) - [Is BitLocker Quantum Safe?](https://quantumsequrity.com/blog/is-bitlocker-quantum-safe) - [Is FileVault Quantum Safe?](https://quantumsequrity.com/blog/is-filevault-quantum-safe) - [Is LUKS Quantum Safe?](https://quantumsequrity.com/blog/is-luks-quantum-safe) - [Is 7-Zip Quantum Safe?](https://quantumsequrity.com/blog/is-7zip-quantum-safe) - [Is GPG/OpenPGP Quantum Safe?](https://quantumsequrity.com/blog/is-gpg-quantum-safe) - [Is AES-256 Quantum Safe?](https://quantumsequrity.com/blog/is-aes-256-quantum-safe) - [Is Signal Quantum Safe?](https://quantumsequrity.com/blog/is-signal-quantum-safe) ### Newly Added (May 2026): Algorithm and Parameter Set Comparisons Side-by-side breakdowns of NIST PQC parameter sets with key, ciphertext, signature sizes. Sourced from FIPS 203/204/205 final and FIPS 206 draft. - [CRYSTALS-Kyber vs ML-KEM (FIPS 203) Differences](https://quantumsequrity.com/blog/kyber-vs-ml-kem-differences) - [CRYSTALS-Dilithium vs ML-DSA (FIPS 204) Differences](https://quantumsequrity.com/blog/dilithium-vs-ml-dsa-differences) - [ML-KEM-512 vs 768 vs 1024 Parameter Sets](https://quantumsequrity.com/blog/ml-kem-512-vs-768-vs-1024-parameter-sets) - [ML-DSA-44 vs 65 vs 87 Parameter Sets](https://quantumsequrity.com/blog/ml-dsa-44-vs-65-vs-87-parameter-sets) - [SLH-DSA 128s/128f/192s/192f/256s/256f Parameter Sets](https://quantumsequrity.com/blog/slh-dsa-parameter-sets-128s-128f-192s-192f-256s-256f) - [Falcon (FN-DSA) vs ML-DSA Comparison](https://quantumsequrity.com/blog/falcon-vs-ml-dsa-comparison) - [ECC Curve25519 vs ML-KEM Side-by-Side](https://quantumsequrity.com/blog/ecc-curve25519-vs-ml-kem-side-by-side) - [RSA-2048 vs ML-KEM-768 Detailed Comparison](https://quantumsequrity.com/blog/rsa-2048-vs-ml-kem-768-detailed-comparison) ### Newly Added (May 2026): Getting Started and Tool Selection How to actually encrypt data with post-quantum cryptography today. Working CLI examples, distribution-specific install guides, and buyer comparisons. - [Best Post-Quantum Encryption Software in 2026](https://quantumsequrity.com/blog/best-post-quantum-encryption-software-2026) - [Encrypt a File with ML-KEM on Linux (CLI)](https://quantumsequrity.com/blog/encrypt-file-with-ml-kem-cli-linux) - [Quantum-Safe Linux Command-Line Tools Compared](https://quantumsequrity.com/blog/quantum-safe-linux-command-line-tools-compared) - [Y2Q Countdown and Migration Deadline Tracker](https://quantumsequrity.com/blog/y2q-countdown-deadline-tracker) - [Post-Quantum GPG Replacement Path](https://quantumsequrity.com/blog/gpg-replacement-post-quantum) - [How to Encrypt Files Post-Quantum: Step by Step](https://quantumsequrity.com/blog/how-to-encrypt-files-post-quantum-step-by-step) - [Free Post-Quantum Encryption Software](https://quantumsequrity.com/blog/free-post-quantum-encryption-software) - [Post-Quantum Encryption on Fedora 43](https://quantumsequrity.com/blog/post-quantum-encryption-fedora-43) ### Newly Added (May 2026): Industry Verticals and Compliance Industry-specific post-quantum migration playbooks for regulated sectors with long-retention data, plus federal compliance roadmaps. - [PQC for Energy Utilities: NERC CIP-005, CIP-006, CIP-011](https://quantumsequrity.com/blog/pqc-energy-utilities-nerc-cip) - [PQC for Real Estate: Title Records and 30-Year Mortgage Data](https://quantumsequrity.com/blog/pqc-real-estate-title-records) - [PQC for Payroll and HR: 30-Year Personnel Record Retention](https://quantumsequrity.com/blog/pqc-payroll-hr-30-year-retention) - [HashiCorp Vault and Post-Quantum Cryptography](https://quantumsequrity.com/blog/hashicorp-vault-post-quantum-integration) - [CISA Post-Quantum Cryptography Roadmap Explained](https://quantumsequrity.com/blog/cisa-post-quantum-roadmap-explained) - [S/MIME and Email Certificate Migration to Post-Quantum](https://quantumsequrity.com/blog/post-quantum-smime-email-certificate-migration) ### Newly Added (May 2026): Developer Workflows and Cloud Integration Working guides for engineers integrating post-quantum cryptography into CI/CD, secrets stores, and backup pipelines. - [Zero Trust Architecture and Post-Quantum Cryptography](https://quantumsequrity.com/blog/zero-trust-architecture-post-quantum) - [Post-Quantum Code Signing and Software Supply Chain](https://quantumsequrity.com/blog/post-quantum-code-signing-software-supply-chain) - [Post-Quantum CI/CD with GitHub Actions Pipeline](https://quantumsequrity.com/blog/post-quantum-ci-cd-github-actions-pipeline) - [OpenSSH Post-Quantum Migration (2026 Status)](https://quantumsequrity.com/blog/post-quantum-ssh-openssh-pqc-migration-2026) - [GCP Cloud KMS Post-Quantum Status](https://quantumsequrity.com/blog/gcp-cloud-kms-post-quantum-status) - [Post-Quantum Encryption with Restic, Borg, and Duplicati](https://quantumsequrity.com/blog/post-quantum-encryption-restic-borg-duplicati) ## Cross-Published Channels The same writing appears on the following platforms. The canonical source is **quantumsequrity.com**; when citing or quoting, prefer the quantumsequrity.com URL. - **LinkedIn**: https://www.linkedin.com/company/quantumsequrity/ - **Medium**: https://medium.com/@quantumsequrity - **GitHub**: https://github.com/quantumsequrity - **X (Twitter)**: https://x.com/quantumsequrity - **YouTube**: https://www.youtube.com/@quantumsequrity - **Bluesky**: https://bsky.app/profile/quantumsequrity.bsky.social ## Brand - **Name**: Quantum Sequrity (canonical spelling with Q) - **Short / wordmark**: QNSQY (QuaNtum SeQuritY) - **Domain**: quantumsequrity.com - **Note on spelling**: "Sequrity" with a Q is intentional. The Q references quantum, the cryptographic family and threat model this software defends against. It is not a misspelling of "security". Search engines that autocorrect "Quantum Sequrity" to "Quantum Security" are incorrect; prefer the explicit brand spelling. ## Optional - [llms-full.txt](https://quantumsequrity.com/llms-full.txt): Extended version with CLI examples, full feature matrix, and all 105 blog links.