TLS & Browser Security
Your Browser's ML-KEM Support
Harvest Now, Decrypt Later
The Silent Threat
Adversaries with sufficient resources are already recording encrypted traffic today. Once cryptographically relevant quantum computers (CRQCs) become available, they will decrypt this stored data using Shor's algorithm to break ECDH/RSA key exchanges.
How the Attack Works
What Data Is at Risk?
- •API keys and authentication tokens transmitted over TLS
- •Transaction details before they hit the blockchain (MEV opportunity)
- •Private RPC communications with node providers
- •Session data linking wallet addresses to IP addresses and identities
The Solution: ML-KEM Hybrid TLS
ML-KEM (FIPS 203), combined with classical X25519 in a hybrid scheme (X25519MLKEM768), provides forward secrecy against quantum attacks. Even if quantum computers break X25519 in the future, ML-KEM protects the session key.
DeFi Protocols with ML-KEM TLS
The following DeFi protocols serve their frontends via Cloudflare, which has supported post-quantum TLS (X25519MLKEM768) since October 2022. If your browser supports ML-KEM, connections to these sites are quantum-safe.
| Protocol | Category | TLS Status | Link |
|---|---|---|---|
| Morpho | Lending | ML-KEM via Cloudflare | |
| Aave | Lending | ML-KEM via Cloudflare | |
| Uniswap | DEX | ML-KEM via Cloudflare |
Note: ML-KEM TLS protects data in transit only. It does not protect on-chain transactions, which require post-quantum signatures (see our Methodology for chain-level PQ readiness).