๐Ÿฆž
PQSafe · Compare

Why PQSafe vs the alternatives.

Scope: cryptographic authorization for AI agent payments. We compare PQSafe AgentPay against five common stacks teams reach for first. Honest about where each one wins and where it falls short for autonomous-agent spend control.

Capability matrix

Capability PQSafe AgentPay Raw JWT (HS/RS256) Raw AP2 (Google) Stripe Issuing OAuth 2.0 scopes Plain ECDSA mandates
Post-quantum signature (FIPS 204 / ML-DSA) โœ“ โœ— โœ— 1 โœ— โœ— โœ—
Policy-bounded spend (amount cap + recipient allowlist) โœ“ โœ— โœ“ โœ“ โ— scope-level โ— per-field
Replay protection (nonce registry) โœ“ on-chain + D1 โ— jti claim โœ“ โœ“ idempotency keys โœ— โ— DIY
Cryptographic revocation โœ“ envelope + key โœ— token blacklist โ— โœ“ via API โ— via auth server โœ—
Audit-grade evidence chain (7yr retention) โœ“ โœ— โ— โœ“ Stripe-native โœ— โ— DIY
Multi-rail (cards + bank + USDC) โœ“ via Airwallex/Wise/Stripe/USDC โœ— โ— rail-agnostic by spec โ— cards only โœ— โœ—
Open-source reference impl โœ“ Apache-2.0 โœ“ many libs โœ“ โœ— proprietary โœ“ RFC 6749 โœ“
Standards body filed โœ“ FIDO Payments TWG 2 โœ“ RFC 7519 โ— vendor spec โœ— โœ“ RFC 6749 โœ—
Runs in browser โœ“ /verify + /generate โœ“ โ— โœ— server-only โœ“ โœ“
Runs in Edge Worker (CF / Vercel) โœ“ live on CF โœ“ โ— โ— via REST โœ“ โœ“
Designed for autonomous agents (vs humans) โœ“ โœ— session-token model โœ“ โ— human-cardholder default โœ— โ— DIY
License Apache-2.0 RFC / various Apache-2.0 Commercial RFC N/A (you write it)
Legend: โœ“ supported ยท โ— partial / requires extension ยท โœ— not supported.
1. Google's AP2 is signature-agnostic by spec; current reference impls ship ECDSA-only. PQSafe's AP2-PQ profile extends AP2 with FIPS 204.
2. Open letter at /fido-pq-letter; Internet-Draft package staged for IETF filing.

Where each one wins

Raw JWT

Wins when you need a stateless session token, you don't care about replay (or you accept a short TTL), and your audit window is measured in days. Universal library support, near-zero learning curve.

Google AP2

Wins when your stack is already aligned with Google's Agent Payments Protocol and you have buy-in on its mandate envelope shape. PQSafe extends AP2 rather than replacing it — AP2-PQ adds the post-quantum profile.

Stripe Issuing

Wins for managed virtual cards with no infra to run. Massive rail coverage, fraud detection, and dispute handling baked in. Trade-off: closed-source, US-anchored, and not designed for autonomous-agent spend control.

OAuth 2.0 scopes

Wins for delegated human access to APIs. Mature ecosystem, every major platform supports it. Trade-off: scopes are coarse permissions, not transaction-bound spend authorizations; replay and audit are out of scope.

Plain ECDSA mandates

Wins when you fully understand cryptographic systems and want zero dependencies. You write the canonicalization, replay registry, revocation, audit trail, and key rotation yourself — equivalent to building PQSafe from scratch.

PQSafe AgentPay

Wins when your agents are signing transactions today that must remain verifiable into the post-quantum era, when your regulator (HKMA, MAS, FCA, FFIEC) requires 7-year audit retention, and when you want a standards-track path instead of a proprietary lock-in.

Where PQSafe wins specifically

  1. Post-quantum from day one. FIPS 204 ML-DSA-65 dual-signed alongside ECDSA P-256. No migration ceremony in 2030 when CRQC becomes plausible — signatures issued today remain verifiable through 2033 and beyond.
  2. Cryptographic spend envelopes for autonomous agents. Mandates carry per-transaction amount caps, recipient allowlists, currency constraints, time windows, and replay nonces — all signed, all verified, all enforceable at any rail. JWT and OAuth model sessions, not bounded spend.
  3. Standards body engagement. First public post-quantum proposal to the FIDO Alliance Payments TWG (chaired by Mastercard and Visa). Open letter at /fido-pq-letter. Vendor-neutral path, not a proprietary moat.

Does post-quantum matter for your use case?

Quantum computers capable of breaking ECDSA / RSA are widely estimated to arrive in the early-to-mid 2030s. That only matters to you if signatures you issue today must remain valid into that window.

What PQSafe is NOT

Migration paths

From Google AP2

PQSafe's AP2-PQ profile extends AP2 with a post-quantum signature option. Existing mandate shape is preserved; you add the FIPS 204 signature alongside (or replacing) ECDSA. See the AP2-PQ RFC.

From Stripe Issuing

Keep Stripe as your card rail. Wrap each charge with a PQSafe-signed envelope verified before the Stripe API call. PQSafe enforces the agent's spend policy; Stripe handles the card mechanics.

From raw JWT

Replace the JWT's payload with a PQSafe SpendEnvelope. Both verify in your existing middleware path. The migration adds policy bounds + replay + audit at the same place you were doing JWT validation.

From plain ECDSA mandates

Hardest migration to do alone, easiest to adopt PQSafe for: your codebase already canonicalizes, signs, and verifies. PQSafe gives you the post-quantum layer, the policy DSL, the replay registry, and the audit chain — without re-inventing each one.