1. 3
  1.  

  2. 2

    There’s a few odd statements in there.

    Examples:

    Our implementation of AES 256-GCM, which we use to comprise the cryptographic barrier for Vault’s data at rest, is resistant against most known quantum attacks. But we respect that this may change in the decades to come as quantum computing enters more into the mainstream.

    No, it’s resistant against all known quantum attacks. And while things can obviously change, it seems highly unlikely that this is gonna change. (Also there’s from a quantum resistance no difference between Chacha20 and AES.)

    Even today’s limited qubit quantum computers generate extremely random sets of entropy in normal operation. This entropy is extremely valuable in cryptography as operations such as key generation for symmetric key crypto like AES or generating ephemeral session keys for SSH/TLS require robust entropy sources for random number generation.

    How so? There isn’t really a problem with “entropy” in cryptography, that’s largely a myth.