Post quantum security of Concordium

I would like to know more about the post-quantum security of Concordium. From a cursory examination, it appears that quantum insecure primitives are used in several Concordium protocols (example: CL encryption in the identity scheme - and possibly the ZK-SNARK implementations used).

Much appreciated if the team could explain a bit about how Concordium is thinking about post-quantum security, and whether I am correct that the current system is quantum insecure (and if I am correct, whether the system is agile enough to be made plausibly quantum safe without a huge effort).

I have a follow-up question: What are the potential risks if someone gains the ability to utilize quantum technology before the changes are implemented? What actions could they potentially undertake, such as accessing all data or assuming control over identities? Additionally, if someone creates a backup before the changes are implemented, could that backup be utilized to gain access after the changes have been made?

Thanks for the update. Interesting topic.