Auspexi

Post‑Quantum Readiness: Standards‑Only Rollout That Won’t Break Production

Auspexi • Updated:
TL;DR: We implemented NIST‑selected PQC the safe way: hybrid KEM (ML‑KEM + X25519) for transport, dual‑signing with ML‑DSA for code and artifacts, and internal PKI cross‑sign—all measured with signed posture metrics. Classical remains on by default; PQC is a controlled toggle.

Why this matters

Standards: ML‑KEM (Kyber), ML‑DSA (Dilithium), FALCON (size‑critical), SPHINCS+ (diversity)
Request a Pilot

What we shipped

Adoption plan (that won’t hurt users)

  1. Stage: PQ‑only, classical‑only, and hybrid clients all succeed in staging.
  2. Canary: 1% → 25% → 100% rollout with rollback switch; monitor negotiated groups and failure reasons.
  3. Dual‑sign everywhere: code signing and image attestation accept both signatures; warn, don’t fail, when PQ verification is unavailable.
  4. Public TLS later: move public endpoints when OS/browsers normalize PQC roots.

Commercial impact

What we did not do

No bespoke cryptography. No security claims tied to research math. PQC is standards‑only.

Get the details

Request a PilotContact Sales