This guide explains how to configure SSH to use post-quantum cryptography and suppress related warnings.
When connecting via SSH, you might see:
** WARNING: connection is not using a post-quantum key exchange algorithm.
** This session may be vulnerable to "store now, decrypt later" attacks.
