{"version":"1.0","provider_name":"EADTrust","provider_url":"https:\/\/www.eadtrust.eu\/en\/","author_name":"Ignacio Romeo","author_url":"https:\/\/www.eadtrust.eu\/en\/blog\/author\/iromeo\/","title":"Cryptography Usage Audit: The First Step Toward Avoiding a Crypto-Apocalypse - EADTrust","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"r8pQmfqAKT\"><a href=\"https:\/\/www.eadtrust.eu\/en\/blog\/audit-of-cryptography-use\/\">Cryptography Usage Audit: The First Step Toward Avoiding a Crypto-Apocalypse<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.eadtrust.eu\/en\/blog\/audit-of-cryptography-use\/embed\/#?secret=r8pQmfqAKT\" width=\"600\" height=\"338\" title=\"&#8220;Cryptography Usage Audit: The First Step Toward Avoiding a Crypto-Apocalypse&#8221; &#8212; EADTrust\" data-secret=\"r8pQmfqAKT\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.eadtrust.eu\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/www.eadtrust.eu\/wp-content\/uploads\/2026\/03\/auditoria-uso-criptografia-1024x804.png","thumbnail_width":1024,"thumbnail_height":804,"description":"The \u201cQ-Day,\u201d or as we call it at EADTrust: the \u201cCryptocalypse\u201d (the moment when quantum computers will be able to derive private keys from public keys of conventional asymmetric cryptography systems within relatively short periods of time), is approaching inexorably. Faced with this horizon, many companies ask themselves: \u201cCould this affect us? How do we [&hellip;]"}