## Rich Text Example 1

stestest

### Video Example

## Example Text 1

Rich text

dsds.

dsdsdsds

## TEST NEW

ttest

## test this

oooo

## Test Feature

The quantum threat is coming...

### As the pace of development of quantum computers is accelerating, the implications for companies around the world are huge

Within this decade quantum computers will likely be able to break PKI. Core business systems and networks must move away from using PKI – so we must do it once and do it right.

So called post quantum algorithms are not mature enough to be relied upon and will introduce new complications, before being compromised themselves by either classical or quantum attack. No public key algorithm can ever be described as “Quantum Safe”.

Symmetric encryption keys, and the AES256 Symmetric Algorithm which uses them are known to be secure against quantum attack. Arqit has found a secure way to use them at scale.

The quantum threat is coming...

### As the pace of development of quantum computers is accelerating, the implications for companies around the world are huge

Within this decade quantum computers will likely be able to break PKI. Core business systems and networks must move away from using PKI – so we must do it once and do it right.

So called post quantum algorithms are not mature enough to be relied upon and will introduce new complications, before being compromised themselves by either classical or quantum attack. No public key algorithm can ever be described as “Quantum Safe”.

Symmetric encryption keys, and the AES256 Symmetric Algorithm which uses them are known to be secure against quantum attack. Arqit has found a secure way to use them at scale.