Frequently Asked Questions

General

Is QuantumSafe quantum-proof?

No. QuantumSafe is quantum-ready, not quantum-proof. No cryptographic system can guarantee absolute security. QuantumSafe uses NIST-standardized post-quantum algorithms (ML-DSA, SLH-DSA) that are believed to be resistant to quantum attacks based on current research. However, cryptanalysis is ongoing, and new attacks may be discovered.
QuantumSafe is built on current NIST-standardized algorithms and does not guarantee absolute security. This is a quantum-readiness tool, not a quantum-proof solution.

When will quantum computers break ECDSA?

The timeline is uncertain. Estimates range from 2030-2040 for a cryptographically relevant quantum computer (CRQC) capable of running Shor’s algorithm at scale. However, the Harvest Now, Decrypt Later threat means data exposed today is already at future risk.

Which blockchain chains are supported?

Currently: Ethereum, Bitcoin, Solana, Polygon, and Avalanche. More chains will be added based on demand.

Do I need to change how I interact with the blockchain?

No. QuantumSafe adds a parallel PQC attestation layer alongside your existing blockchain workflow. You continue signing transactions with ECDSA as usual. QuantumSafe adds a quantum-ready signature on top.

Security

Do you store my private keys?

Never. In BYOK mode (the only mode in v1.0), key generation happens entirely on your device. Only the public key is registered with QuantumSafe. The private key never touches our servers.

What happens if QuantumSafe goes down?

Your private keys are stored locally and remain fully functional. You can still sign with your ECDSA keys as before. QuantumSafe’s service is needed only for:
  • Registering new PQC public keys
  • Creating hybrid attestations
  • Verifying attestations
  • Scanning wallets

How are attestations stored?

Attestations are stored in QuantumSafe’s database with cryptographic integrity guarantees. Each attestation is immutable once created. We plan to anchor attestation roots to public blockchains in a future release.

What if the PQC algorithms are broken?

NIST algorithms went through years of public cryptanalysis. If a vulnerability is discovered:
  1. NIST will issue guidance
  2. QuantumSafe will add support for replacement algorithms
  3. You can generate new keys with the updated algorithm
  4. Existing attestations remain valid records of what was signed

Open Source

Is QuantumSafe open source?

The SDKs are open source under the MIT license: The API server and infrastructure are proprietary.

Can I audit the cryptographic implementation?

Yes. The SDK source code is fully available. Key generation and local signing use well-audited libraries:
  • TypeScript: Web Crypto API (browser/Node.js native)
  • Python: pqcrypto (C bindings to reference NIST implementations)

Pricing & Plans

Is there a free tier?

Yes. The Free tier includes:
  • 10 wallet scans per minute
  • 5 key generations per minute
  • 5 hybrid attestations per minute
  • 20 verifications per minute
See Rate Limits for full details.

What are the paid plans?

PlanPriceBest For
Free$0/moEvaluation and development
Builder$49/moSmall production deployments
Pro$199/moHigh-volume production use
EnterpriseCustomCustom limits, SLA, dedicated support

Technical

Why are PQC keys so much larger than ECDSA keys?

This is a fundamental trade-off of lattice-based cryptography. ML-DSA-65 public keys are ~1.9 KB vs 33 bytes for ECDSA. However, QuantumSafe’s off-chain attestation model means these larger keys do not impact on-chain storage or gas costs.

Can I use QuantumSafe with MetaMask / Phantom / other wallets?

QuantumSafe works alongside any wallet. You sign with your existing wallet as usual, then create a PQC attestation through the SDK. No wallet plugin required.

What is the difference between ML-DSA and SLH-DSA?

ML-DSA is lattice-based (faster, smaller signatures, compatible with all custody modes). SLH-DSA is hash-based (more conservative assumptions, but cannot be upgraded to Managed custody). See Algorithms for a full comparison.