A Post-Quantum VPN
The Ultimate VPN Solution to Access Network Resources Securely
Advanced Post Quantum Cryptography
Two Factor Authentication Support with Google Authenticator
Integration with Active Directory (or Linux Equivalent)
Support for Window / MacOS / Linux Clients
Data Risk from Quantum Computers
Traditional key exchange algorithms - including Diffie-Hellman, RSA and Elliptic Curve Cryptography - are known to be vulnerable to attack by a sufficiently advanced quantum computer.
This quantum computer does not exist yet, but experts believe one will be created in the next 10-15 years. QST-VPN will protect your data once this happens and beyond.
The risk to data does not start in 10 years. Someone could intercept your data today, and store it for future decryption. How long does your data need to be secure for?
If the answer is more than five years, the time to switch to QST-VPN might be today.
What technology does QST-VPN use?
QST-VPN uses Post Quantum secure algorithms to secure your data. Learn more about Post Quantum cryptography.
The core functionality of QST-VPN is provided by OpenVPN. OpenVPN is an open source VPN library trusted by thousands of organisations around the world to protect their data.
The easiest way to try out QST-VPN is to use a pre-configured cloud instance.
Pre-configured cloud instance is available at the following public cloud supplier:
Download Client Software
Our client software is available for
Windows, MacOS, and Linux.
|Download for Windows|
|Windows before Windows 10|
|Windows 10 and after|
|Download for MacOS|
|MacOS after 10|
|Download for Linux|