Replies (24)

You have to reveal your pubkey to spend. In theory, someone with a quantum computer can then double spend your transaction before it gets mined. Not that I believe the quantum FUD tho.
banjo's avatar
banjo 1 year ago
I'm not too worried about encryption...if not 128 bit, just increase the complexity to 256 or 512 or 1024 or whatever is necessary to stay ahead...
Is it true old coins like satoshis coins That used p2pk addresses will eventually move due to public key being revealed through the address?
Except if you use taproot, the output type bitcoin devs are pushing everyone to.
Well if they could crack them fast enough with enough volume they could create quite a mess / disruption. And attack wise the fake money still buys stuff so what do you attack banking or bitcoin, probably banking.
.'s avatar
. 1 year ago
13th word tho
Quantum computers have the potential to crack Bitcoin private keys using advanced techniques like Shor’s algorithm. This algorithm can (at least in theory) calculate a private key based on a public key (pubkey). But here’s the key point: For a quantum computer to do this, it needs access to your public key. As long as your pubkey remains hidden, even a quantum computer has no way in. When you receive funds in a Bitcoin transaction, only your address is visible on the blockchain. This address is a hash of your public keyβ€”a process that makes it extremely difficult to reverse-engineer the pubkey, even for quantum computers. However, when you spend funds from an address, your public key is revealed on the blockchain to prove that you own the funds. If you then reuse the same address, any new incoming funds will be tied to a public key that has already been exposed. This creates a potential vulnerability. The solution to protect yourself from both current and future risks is simple: Use a new address every time you receive funds. Modern wallets often generate new addresses automatically, both for incoming transactions and for "change addresses".
Even if you could check a trillion keys per second, it would still take more than the current age of the universe to find the correct key. This time span makes the idea of brute-forcing a private key essentially impossible.
↑