FWIW if you want to tinker on the topic I recommend OQS https://github.com/open-quantum-safe/ including Chromium, Apache, nginx, curl, etc. It's quite fun to play with.
The pivot to MTC is a big change in the infrastructure of https. I wish other browsers were at least mentioned in this blog post. I'm curious about the future of letsencrypt as well.
Discussed few weeks ago on https://community.letsencrypt.org/t/post-quantum-crypto-road... specifically "The path we're more interested in is Merkle Tree Certificates, currently in design at the PLANTS working group at IETF. Chrome has indicated that they anticipate this to be their preferred approach to PQC. We're following that very closely, and are likely to deploy MTCs if it looks like that design is going to be supported widely." according to Matthew McPherrin, Let's Encrypt staff
The article apparently is about the CA/certs for authenticating the server, a part of HTTPS
The mozilla SSL Config Generator doesn't yet support PQ; it has Old, Intermediate, and Modern: https://ssl-config.mozilla.org/
mozilla/ssl-config-generator: https://github.com/mozilla/ssl-config-generator
"Chrome switching to NIST-approved ML-KEM quantum encryption" (2024) https://news.ycombinator.com/item?id=42265927
"ML-KEM Mythbusting" (2025) https://news.ycombinator.com/item?id=46074381 re: AuthKEM
What is the difference between a Merkle Tree Certificate and a Merkle Ladder?
Is this correct?:
Without Merkle Tree Certificates, the per keypress overhead for e.g. jupyter_server would be something like 3.3 KB due to the PQ signatures.