Why Nostr? What is Njump?
2023-04-30 17:16:30
in reply to

Space Hodler on Nostr: If you're talking about cracking the computation of private keys from public keys, ...

If you're talking about cracking the computation of private keys from public keys, you'd still have to add entropy to your private key and move your coins to a new address.
But I think the OP meant cracking mining, which is what uses sha256. The private key to public key function uses elliptic curves and sha256 (twice).
Author Public Key
npub1pq6kp64faq8h75mzhw5ncaeelppjgc2u9l8yzx6fr8fektxg2a7qax4ynz