Linux/Unix
Product Overview
Traditional key exchange algorithms - including Diffie-Hellman, RSA and Elliptic Curve Cryptography - are known to be vulnerable to attack by a sufficiently advanced quantum computer. This quantum computer does not exist yet, but experts believe one will be created in the next 10-15 years. QST-VPN will protect your data once this happens and beyond. The risk to data does not start in 10 years. Someone could intercept your data today, and store it for future decryption. How long does your data need to be secure for? If the answer is more than five years, the time to switch to QST-VPN might be today.
QST-VPN uses Post Quantum secure algorithms and the trusted open source VPN library OpenVPN to secure your data.