<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Encryption on Ben's Info Tech Blog</title><link>https://infotechwithben.com/tags/encryption/</link><description>Recent content in Encryption on Ben's Info Tech Blog</description><generator>Hugo</generator><language>en</language><lastBuildDate>Mon, 06 Apr 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://infotechwithben.com/tags/encryption/index.xml" rel="self" type="application/rss+xml"/><item><title>Post-Quantum Cryptography: The Race Before Q-Day</title><link>https://infotechwithben.com/posts/post-quantum-cryptography-the-race-before-q-day/</link><pubDate>Mon, 06 Apr 2026 00:00:00 +0000</pubDate><guid>https://infotechwithben.com/posts/post-quantum-cryptography-the-race-before-q-day/</guid><description>Post-Quantum Cryptography: The Race Before Q-Day The threat that keeps cryptographers awake isn&amp;rsquo;t a breach happening today. It&amp;rsquo;s the data that was stolen last year — sitting in an adversary&amp;rsquo;s archive, waiting for a quantum computer that doesn&amp;rsquo;t exist yet. By the time that computer arrives, the window to do anything about it will have already closed.
Why This Problem Is Different Most security threats are reactive — an attacker exploits a vulnerability, a defender patches it.</description></item></channel></rss>