How Post-Quantum Protection Works
What is already live
The production app already combines ML-KEM-oriented envelope custody with browser-local ML-DSA key generation and signing, so users can keep PQ signing keys in their own browser while the backend preserves the evidence trail.
What users can verify
Each file is tied to hashes, custody events, signer metadata, share activity, session-aware actor history, version lineage, evidence bundle data, and optional external anchoring so the record stays portable and tamper-evident over time.
What is still maturing
Full browser-side PQ encryption for document contents is not the default web path yet, and organization-managed PQ key custody, recovery, and crypto-agility are still ahead. Today the strongest shipped PQ user path is local ML-DSA signing plus the backend custody and evidence model.
ML-KEM Envelope Model
Protect storage with PQ-oriented envelope handling.
Active application storage stays practical, while document custody uses a post-quantum envelope model so the file is handled as protected evidence instead of a trusted plain blob in storage.
ML-DSA Signatures
Support a maintained PQ signature path.
Human wallet flows still support EVM and Solana, and the web app now also supports browser-local ML-DSA key generation, backup, import, and signing for users who want a stronger post-quantum signature path.
Evidence And Anchoring
Keep the proof portable.
Evidence bundles, event-chain metadata, bundle signatures, hashes, and optional Arweave anchoring make the record verifiable beyond the immediate app session or any single storage provider.