Skip to content

Commit 8fec46a

Browse files
full product name in image caption
1 parent a5b9d66 commit 8fec46a

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

content/blog/2025-07-24-post-quantum-roadmap.en.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ First, let's take a look at the ciphers involved in Cryptomator:
3232

3333
<figure class="text-center">
3434
<img class="inline-block rounded-sm" src="/img/blog/traditional-cipher-breakdown.svg" alt="Plot showing the growth of 2^n compared to n^2" />
35-
<figcaption>Cryptographic Breakdown of Cryptomator & Hub</figcaption>
35+
<figcaption>Cryptographic Breakdown of Cryptomator & Cryptomator Hub</figcaption>
3636
</figure>
3737

3838
As you can see, we mostly rely on AES- and EC-based algorithms. These are traditional algorithms whose security assumptions apply in a world of classical (non-quantum) computers. The general idea is that computations are efficient if you know the right key but practically impossible without. When I say "practically impossible" I mean on traditional computers, as the computations are just "too complex".

0 commit comments

Comments
 (0)