"first[..]need to find the public key[..]wallet address is based on the public key,it’s hashed by algorithms that currently are not vulnerable to quantum computing attacks[..]during a transaction[..]public key is exposed[..]hierarchical deterministic wallet[..]have many wallet addresses[..]once the private key is used for a transaction,all the coins move,and that key is no longer valid[..]coins could only be intercepted during the confirmation stage"
https://www.amarchenkova.com/posts/quantum-computer-bitcoin
Embed Notice
HTML Code
Corresponding Notice
- Embed this notice
mk (mk@mastodon.satoshishop.de)'s status on Thursday, 15-Aug-2024 04:15:46 JSTmk