{"id":99989,"date":"2024-03-29T11:48:31","date_gmt":"2024-03-29T11:48:31","guid":{"rendered":"https:\/\/brilliantreddev.co.uk\/SmartSolutions\/?p=99989"},"modified":"2025-07-14T10:47:32","modified_gmt":"2025-07-14T10:47:32","slug":"cutting-through-the-hype-post-quantum-cryptography-vs-quantum-key-distribution","status":"publish","type":"post","link":"https:\/\/brilliantreddev.co.uk\/SmartSolutions\/cutting-through-the-hype-post-quantum-cryptography-vs-quantum-key-distribution\/","title":{"rendered":"Cutting through the hype \u2013 Post-Quantum Cryptography vs Quantum Key Distribution"},"content":{"rendered":"<p>Chris Erven, CEO at KETS, cuts through the hype surrounding post-quantum cryptography and quantum security technologies.<\/p>\n<p>There is a lot of hype around quantum computing and quantum technologies, and I can only imagine the difficulties facing a CISO or CTO trying to cut through this. To help with this, I\u2019ve had in my minds\u2019 eye an apples-to-apples table comparing key quantum-safe information security technologies for a while.<\/p>\n<p>Now I\u2019m from a quantum security technologies company \u2013 so you might argue I\u2019m biased, but I also used to be an academic \u2013 so I have a very hard time not being precise in what I say and write<a href=\"https:\/\/kets-quantum.com\/2021\/10\/29\/cutting-through-the-hype-post-quantum-cryptography-vs-quantum-key-distribution\/#_ftn1\" name=\"_ftnref1\"><sup>[1]<\/sup><\/a>. Moreover, if you disagree with anything in this article \u2013 get in touch!<\/p>\n<p>My goal is to establish clear information about quantum-safe technologies that industries and enterprises can use to make key decisions because it\u2019s not just about looking ahead to what\u2019s next but also what\u2019s after that and then what\u2019s after that. In addition, I also want you as individuals to have clear information about secure technologies for a post-quantum world to enable you to make informed decisions about the companies you use to store and transmit your personal data.<\/p>\n<p>To start with, let\u2019s establish definitions of a few key terms that can get butchered in the marketing:<\/p>\n<ul>\n<li><strong>quantum-safe<\/strong>\u00a0means cryptographic primitives and protocols that cannot efficiently be broken using either a conventional or a quantum computer;<\/li>\n<li>a\u00a0<strong>post-quantum world\u00a0<\/strong>means a world in which quantum computers exist;<\/li>\n<li><strong>post-quantum cryptography (PQC) algorithms\u00a0<\/strong>mean (in terms of the NIST competition) quantum resistant public-key cryptographic primitives of digital signatures and key encapsulation mechanisms<a href=\"https:\/\/kets-quantum.com\/2021\/10\/29\/cutting-through-the-hype-post-quantum-cryptography-vs-quantum-key-distribution\/#_ftn2\" name=\"_ftnref2\"><sup>[2]<\/sup><\/a>;<\/li>\n<li><strong>quantum key distribution (QKD)\u00a0<\/strong>means a secure symmetric key distribution protocol which uses quantum systems (qubits) to distribute the key;<\/li>\n<\/ul>\n<p>There has been a heated debate raging for years in academics of who \u201csolves\u201d cryptography, it has been a complete waste of time. The answer is clearly both. They are both key tools (along with many others) in our crypto toolbox to build next generation quantum-safe applications. Each has different trade-offs, and we\u2019ll deploy the best ones for the job because there really is a lot of nuance that is use-case and application specific.<\/p>\n<table class=\" aligncenter\" width=\"730\">\n<tbody>\n<tr>\n<td width=\"120\"><strong>Feature<\/strong><\/td>\n<td width=\"180\"><strong>PQC<\/strong><\/td>\n<td width=\"180\"><strong>QKD<\/strong><\/td>\n<td width=\"250\"><strong>Summary<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"120\"><strong>Security<\/strong><\/td>\n<td width=\"180\">Conjectured security<\/td>\n<td width=\"180\">Proven theoretical security<br \/>\nFuture proof<\/td>\n<td width=\"250\">QKD is the\u00a0<em>only<\/em>\u00a0cryptographic primitive that has been proven secure in theory assuming nothing more than the laws of quantum mechanics are correct.<\/td>\n<\/tr>\n<tr>\n<td width=\"120\"><strong>Distance<\/strong><\/td>\n<td width=\"180\">Unlimited distance<\/td>\n<td width=\"180\">Currently requires Trusted Nodes for unlimited distance<\/td>\n<td width=\"250\">PQC algorithms have an unlimited distance because they operate at the software layer. A single QKD link is currently limited to a few 100 km\u2019s with a sweet spot in the 20 \u2013 50 km range. Work on quantum repeaters and satellite-QKD is on-going to extend the range.<\/td>\n<\/tr>\n<tr>\n<td width=\"120\"><strong>Cost<\/strong><\/td>\n<td width=\"180\">$$<br \/>\n(full lifecycle costs not yet known)<\/td>\n<td width=\"180\">$$$<br \/>\n(full lifecycle costs not yet known)<\/td>\n<td width=\"250\">Currently, PQC algorithms do have the advantage of cost, but with a chip-based approach to quantum security technologies their costs are rapidly coming down.<\/td>\n<\/tr>\n<tr>\n<td width=\"120\"><strong>Authentication<\/strong><\/td>\n<td width=\"180\">Authentication methods included in PQC<\/td>\n<td width=\"180\">Initial shared secret or use of PQC authentication methods<br \/>\nSecure key growth forever after<\/td>\n<td width=\"250\">Use an initial shared secret for QKD if you want to 100% verify you\u2019re talking to who you think you are. Otherwise, use PQC for a first connection.<br \/>\nQKD efficiently generates key such that after the first session you can always save a small amount of key to authenticate the next session.<\/td>\n<\/tr>\n<tr>\n<td width=\"120\"><strong>Certification<\/strong><\/td>\n<td width=\"180\">Draft standards \u2013 NIST PQC Competition<\/td>\n<td width=\"180\">Draft standards \u2013 ETSI, ITU-T, ISO, \u2026<\/td>\n<td width=\"250\">Neither PQC algorithms nor QKD have established standards \u2013 both are currently in draft form.<\/td>\n<\/tr>\n<tr>\n<td width=\"120\"><strong>Integration<\/strong><\/td>\n<td width=\"180\">Software<br \/>\n(increased memory and\/or time requirements and cost)<\/td>\n<td width=\"180\">Hardware<br \/>\n(increased hardware integration costs)<\/td>\n<td width=\"250\">New PQC algorithms generally have increased time or memory requirements and costs, while QKD systems require integration at the hardware level and an optical channel to distribute keys.<\/td>\n<\/tr>\n<tr>\n<td width=\"120\"><strong>Implementation Security<\/strong><\/td>\n<td width=\"180\">Requires a security-by-design approach<\/td>\n<td width=\"180\">Requires a security-by-design approach<\/td>\n<td width=\"250\">Both PQC algorithms and QKD require a security-by-design approach and fail-safe mechanisms to ensure a secure implementation.<\/td>\n<\/tr>\n<tr>\n<td width=\"120\"><strong>Security Assurance<\/strong><\/td>\n<td width=\"180\">Requires real-world vulnerability and security assessment<\/td>\n<td width=\"180\">Requires real-world vulnerability and security assessment<\/td>\n<td width=\"250\">Both require real-world vulnerability and security assessment. A key on-going need is the development of robust methods for these.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p>The arrival of quantum computing has raised the awareness of how costly it is to upgrade our cryptosystems and how prohibitively costly it is to retrofit them. Cryptographic agility is a must in the future. Hopefully the above has been helpful to dispel some of the hype around quantum security technologies so that you can start to make key decisions about your own quantum-safe roadmap.<\/p>\n<p>But remember it\u2019s not just your next immediate step you should consider, soon securing our classical data in quantum-safe ways will be a given and you\u2019ll need to start thinking about when you\u2019ll be sending encrypted quantum information (qubits) into the cloud or when you\u2019ll be playing with early incarnations of the quantum internet. If you want to not only make your company quantum-safe in a post-quantum world, but also want to set your company up to capitalise on the coming quantum revolution, now is the time to get involved testing all of the new quantum-safe tools.<\/p>\n<p>The timing is perfect with a number of quantum-safe testbeds that seek to include all of these new quantum-safe tools in the toolbox including our\u00a0<a href=\"https:\/\/kets-quantum.com\/2020\/11\/06\/canada-uk-qt\/\">Canada-UK Quantum Technologies project<\/a>\u00a0building quantum-safe testbeds in the UK and Canada, our\u00a0<a href=\"https:\/\/kets-quantum.com\/2020\/12\/17\/kets-takes-flight-literally-and-looking-ahead-to-2-exciting-projects-in-the-new-year-satellite-qkd-visatqt-qrng-assurance-aqrng\/\">ViSatQT and AQRNG projects<\/a>\u00a0focused on satellite-QKD and the assurance of quantum random number generators, the\u00a0<a href=\"https:\/\/kets-quantum.com\/2021\/01\/21\/kets-opens-its-first-international-office-in-paris\/\">ParisQCI<\/a>\u00a0project where we are a key quantum security technology partner helping to build a quantum-safe core backbone network in Paris, or the wider\u00a0<a href=\"https:\/\/digital-strategy.ec.europa.eu\/en\/policies\/european-quantum-communication-infrastructure-euroqci\">EuroQCI<\/a>\u00a0project building a secure quantum communication network across the EU. Get in touch if you want to find out the latest about these and other projects and how our technology can help future-proof your cybersecurity.<\/p>\n<p>And like I said from the outset, we\u2019re interested to hear your thoughts, if you want to challenge any of the claims in the table, please get in touch. We will continue to update the \u00a0so that you always have a comprehensive source of clear information to come back to about quantum-safe technologies.<\/p>\n<p><a href=\"https:\/\/kets-quantum.com\/2021\/10\/29\/cutting-through-the-hype-post-quantum-cryptography-vs-quantum-key-distribution\/#_ftnref1\" name=\"_ftn1\">[1]<\/a>\u00a0The temptation for many footnotes in this article was almost overwhelming!<\/p>\n<p><a href=\"https:\/\/kets-quantum.com\/2021\/10\/29\/cutting-through-the-hype-post-quantum-cryptography-vs-quantum-key-distribution\/#_ftnref2\" name=\"_ftn2\">[2]<\/a>\u00a0Since most symmetric cryptographic primitives (e.g. AES) are thought to be relatively easy to modify in a way that makes them quantum-resistant, efforts have focused on the public-key cryptography primitives named.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Chris Erven, CEO at KETS, cuts through the hype surrounding post-quantum cryptography and quantum security technologies. There is a lot of hype around quantum computing and quantum technologies, and I can only imagine the difficulties facing a CISO or CTO trying to cut through this. To help with this, I\u2019ve had in my minds\u2019 eye [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":99990,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[8],"tags":[],"class_list":["post-99989","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-thought-leadership"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cutting through the hype \u2013 Post-Quantum Cryptography vs Quantum Key Distribution - KETS Quantum<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/brilliantreddev.co.uk\/SmartSolutions\/cutting-through-the-hype-post-quantum-cryptography-vs-quantum-key-distribution\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cutting through the hype \u2013 Post-Quantum Cryptography vs Quantum Key Distribution - KETS Quantum\" \/>\n<meta property=\"og:description\" content=\"Chris Erven, CEO at KETS, cuts through the hype surrounding post-quantum cryptography and quantum security technologies. There is a lot of hype around quantum computing and quantum technologies, and I can only imagine the difficulties facing a CISO or CTO trying to cut through this. To help with this, I\u2019ve had in my minds\u2019 eye [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/brilliantreddev.co.uk\/SmartSolutions\/cutting-through-the-hype-post-quantum-cryptography-vs-quantum-key-distribution\/\" \/>\n<meta property=\"og:site_name\" content=\"KETS Quantum\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-29T11:48:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-14T10:47:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/brilliantreddev.co.uk\/SmartSolutions\/wp-content\/uploads\/2025\/06\/KETS-Lab-shoot-June-18-2021-0649-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/brilliantreddev.co.uk\/SmartSolutions\/cutting-through-the-hype-post-quantum-cryptography-vs-quantum-key-distribution\/\",\"url\":\"https:\/\/brilliantreddev.co.uk\/SmartSolutions\/cutting-through-the-hype-post-quantum-cryptography-vs-quantum-key-distribution\/\",\"name\":\"Cutting through the hype \u2013 Post-Quantum Cryptography vs Quantum Key Distribution - KETS Quantum\",\"isPartOf\":{\"@id\":\"https:\/\/brilliantreddev.co.uk\/SmartSolutions\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/brilliantreddev.co.uk\/SmartSolutions\/cutting-through-the-hype-post-quantum-cryptography-vs-quantum-key-distribution\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/brilliantreddev.co.uk\/SmartSolutions\/cutting-through-the-hype-post-quantum-cryptography-vs-quantum-key-distribution\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/brilliantreddev.co.uk\/SmartSolutions\/wp-content\/uploads\/2025\/06\/KETS-Lab-shoot-June-18-2021-0649-scaled.jpg\",\"datePublished\":\"2024-03-29T11:48:31+00:00\",\"dateModified\":\"2025-07-14T10:47:32+00:00\",\"author\":{\"@id\":\"https:\/\/brilliantreddev.co.uk\/SmartSolutions\/#\/schema\/person\/d035b72367b44ef0d731dc380759841c\"},\"breadcrumb\":{\"@id\":\"https:\/\/brilliantreddev.co.uk\/SmartSolutions\/cutting-through-the-hype-post-quantum-cryptography-vs-quantum-key-distribution\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/brilliantreddev.co.uk\/SmartSolutions\/cutting-through-the-hype-post-quantum-cryptography-vs-quantum-key-distribution\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/brilliantreddev.co.uk\/SmartSolutions\/cutting-through-the-hype-post-quantum-cryptography-vs-quantum-key-distribution\/#primaryimage\",\"url\":\"https:\/\/brilliantreddev.co.uk\/SmartSolutions\/wp-content\/uploads\/2025\/06\/KETS-Lab-shoot-June-18-2021-0649-scaled.jpg\",\"contentUrl\":\"https:\/\/brilliantreddev.co.uk\/SmartSolutions\/wp-content\/uploads\/2025\/06\/KETS-Lab-shoot-June-18-2021-0649-scaled.jpg\",\"width\":2560,\"height\":1707},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/brilliantreddev.co.uk\/SmartSolutions\/cutting-through-the-hype-post-quantum-cryptography-vs-quantum-key-distribution\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/brilliantreddev.co.uk\/SmartSolutions\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cutting through the hype \u2013 Post-Quantum Cryptography vs Quantum Key Distribution\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/brilliantreddev.co.uk\/SmartSolutions\/#website\",\"url\":\"https:\/\/brilliantreddev.co.uk\/SmartSolutions\/\",\"name\":\"KETS Quantum\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/brilliantreddev.co.uk\/SmartSolutions\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/brilliantreddev.co.uk\/SmartSolutions\/#\/schema\/person\/d035b72367b44ef0d731dc380759841c\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/brilliantreddev.co.uk\/SmartSolutions\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c56bfaf14184d55b83511a073900299fb8b85b2abb7b87181bed458614f63b51?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c56bfaf14184d55b83511a073900299fb8b85b2abb7b87181bed458614f63b51?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\/\/brilliantreddev.co.uk\/SmartSolutions\"],\"url\":\"https:\/\/brilliantreddev.co.uk\/SmartSolutions\/author\/admin_smartsolutions\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cutting through the hype \u2013 Post-Quantum Cryptography vs Quantum Key Distribution - KETS Quantum","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/brilliantreddev.co.uk\/SmartSolutions\/cutting-through-the-hype-post-quantum-cryptography-vs-quantum-key-distribution\/","og_locale":"en_US","og_type":"article","og_title":"Cutting through the hype \u2013 Post-Quantum Cryptography vs Quantum Key Distribution - KETS Quantum","og_description":"Chris Erven, CEO at KETS, cuts through the hype surrounding post-quantum cryptography and quantum security technologies. There is a lot of hype around quantum computing and quantum technologies, and I can only imagine the difficulties facing a CISO or CTO trying to cut through this. To help with this, I\u2019ve had in my minds\u2019 eye [&hellip;]","og_url":"https:\/\/brilliantreddev.co.uk\/SmartSolutions\/cutting-through-the-hype-post-quantum-cryptography-vs-quantum-key-distribution\/","og_site_name":"KETS Quantum","article_published_time":"2024-03-29T11:48:31+00:00","article_modified_time":"2025-07-14T10:47:32+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/brilliantreddev.co.uk\/SmartSolutions\/wp-content\/uploads\/2025\/06\/KETS-Lab-shoot-June-18-2021-0649-scaled.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/brilliantreddev.co.uk\/SmartSolutions\/cutting-through-the-hype-post-quantum-cryptography-vs-quantum-key-distribution\/","url":"https:\/\/brilliantreddev.co.uk\/SmartSolutions\/cutting-through-the-hype-post-quantum-cryptography-vs-quantum-key-distribution\/","name":"Cutting through the hype \u2013 Post-Quantum Cryptography vs Quantum Key Distribution - KETS Quantum","isPartOf":{"@id":"https:\/\/brilliantreddev.co.uk\/SmartSolutions\/#website"},"primaryImageOfPage":{"@id":"https:\/\/brilliantreddev.co.uk\/SmartSolutions\/cutting-through-the-hype-post-quantum-cryptography-vs-quantum-key-distribution\/#primaryimage"},"image":{"@id":"https:\/\/brilliantreddev.co.uk\/SmartSolutions\/cutting-through-the-hype-post-quantum-cryptography-vs-quantum-key-distribution\/#primaryimage"},"thumbnailUrl":"https:\/\/brilliantreddev.co.uk\/SmartSolutions\/wp-content\/uploads\/2025\/06\/KETS-Lab-shoot-June-18-2021-0649-scaled.jpg","datePublished":"2024-03-29T11:48:31+00:00","dateModified":"2025-07-14T10:47:32+00:00","author":{"@id":"https:\/\/brilliantreddev.co.uk\/SmartSolutions\/#\/schema\/person\/d035b72367b44ef0d731dc380759841c"},"breadcrumb":{"@id":"https:\/\/brilliantreddev.co.uk\/SmartSolutions\/cutting-through-the-hype-post-quantum-cryptography-vs-quantum-key-distribution\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/brilliantreddev.co.uk\/SmartSolutions\/cutting-through-the-hype-post-quantum-cryptography-vs-quantum-key-distribution\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/brilliantreddev.co.uk\/SmartSolutions\/cutting-through-the-hype-post-quantum-cryptography-vs-quantum-key-distribution\/#primaryimage","url":"https:\/\/brilliantreddev.co.uk\/SmartSolutions\/wp-content\/uploads\/2025\/06\/KETS-Lab-shoot-June-18-2021-0649-scaled.jpg","contentUrl":"https:\/\/brilliantreddev.co.uk\/SmartSolutions\/wp-content\/uploads\/2025\/06\/KETS-Lab-shoot-June-18-2021-0649-scaled.jpg","width":2560,"height":1707},{"@type":"BreadcrumbList","@id":"https:\/\/brilliantreddev.co.uk\/SmartSolutions\/cutting-through-the-hype-post-quantum-cryptography-vs-quantum-key-distribution\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/brilliantreddev.co.uk\/SmartSolutions\/"},{"@type":"ListItem","position":2,"name":"Cutting through the hype \u2013 Post-Quantum Cryptography vs Quantum Key Distribution"}]},{"@type":"WebSite","@id":"https:\/\/brilliantreddev.co.uk\/SmartSolutions\/#website","url":"https:\/\/brilliantreddev.co.uk\/SmartSolutions\/","name":"KETS Quantum","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/brilliantreddev.co.uk\/SmartSolutions\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/brilliantreddev.co.uk\/SmartSolutions\/#\/schema\/person\/d035b72367b44ef0d731dc380759841c","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/brilliantreddev.co.uk\/SmartSolutions\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/c56bfaf14184d55b83511a073900299fb8b85b2abb7b87181bed458614f63b51?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c56bfaf14184d55b83511a073900299fb8b85b2abb7b87181bed458614f63b51?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/brilliantreddev.co.uk\/SmartSolutions"],"url":"https:\/\/brilliantreddev.co.uk\/SmartSolutions\/author\/admin_smartsolutions\/"}]}},"_links":{"self":[{"href":"https:\/\/brilliantreddev.co.uk\/SmartSolutions\/wp-json\/wp\/v2\/posts\/99989","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/brilliantreddev.co.uk\/SmartSolutions\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/brilliantreddev.co.uk\/SmartSolutions\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/brilliantreddev.co.uk\/SmartSolutions\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/brilliantreddev.co.uk\/SmartSolutions\/wp-json\/wp\/v2\/comments?post=99989"}],"version-history":[{"count":1,"href":"https:\/\/brilliantreddev.co.uk\/SmartSolutions\/wp-json\/wp\/v2\/posts\/99989\/revisions"}],"predecessor-version":[{"id":99991,"href":"https:\/\/brilliantreddev.co.uk\/SmartSolutions\/wp-json\/wp\/v2\/posts\/99989\/revisions\/99991"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/brilliantreddev.co.uk\/SmartSolutions\/wp-json\/wp\/v2\/media\/99990"}],"wp:attachment":[{"href":"https:\/\/brilliantreddev.co.uk\/SmartSolutions\/wp-json\/wp\/v2\/media?parent=99989"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/brilliantreddev.co.uk\/SmartSolutions\/wp-json\/wp\/v2\/categories?post=99989"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/brilliantreddev.co.uk\/SmartSolutions\/wp-json\/wp\/v2\/tags?post=99989"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}