Post-Quantum Cryptography: the Good, the Bad, and the Powerful