x92vbb on Nostr: pubkeys are derived from privkeys by ECC, which can be vulnerable to Shor's algorithm ...
pubkeys are derived from privkeys by ECC, which can be vulnerable to Shor's algorithm by simply calculating your privkey out of your pubkey. As long as your pubkey is not revealed, there can be no long range attack. P2WSH/P2WPKH only reveal a UTXO address specific pubkey when you spend them (so you have about 10 min for a short range attack).
Published at
2025-04-09 00:37:13Event JSON
{
"id": "ac1974c505e0c95f8f831e8be57dfd3373a60dfa67bc6a3e857f76832de2dff1",
"pubkey": "faafb1f49a72d9bbe60e7539ce9d643fa76fb8e63cd279ad4128a067a28fc51a",
"created_at": 1744159033,
"kind": 1,
"tags": [
[
"e",
"4f8aa9150b2d52194e4f2cce1bf172e912d366769d456beacad47df8baa33b42",
"",
"root"
],
[
"e",
"5baa1cdad85118589cdc27fdbd43cbf844b69cbfd498e1416c23f04d04c8eaeb"
],
[
"e",
"3162f16e566aacf678fceec811d7d7176705aedfb04fb2c65f0357ab07cde29d",
"",
"reply"
],
[
"p",
"faafb1f49a72d9bbe60e7539ce9d643fa76fb8e63cd279ad4128a067a28fc51a"
],
[
"p",
"7776c32d4b1d1e8bf2a96babeb43ad9ade157bd363d89b87fb63e6f145558888"
],
[
"p",
"faafb1f49a72d9bbe60e7539ce9d643fa76fb8e63cd279ad4128a067a28fc51a"
],
[
"p",
"faafb1f49a72d9bbe60e7539ce9d643fa76fb8e63cd279ad4128a067a28fc51a"
]
],
"content": "pubkeys are derived from privkeys by ECC, which can be vulnerable to Shor's algorithm by simply calculating your privkey out of your pubkey. As long as your pubkey is not revealed, there can be no long range attack. P2WSH/P2WPKH only reveal a UTXO address specific pubkey when you spend them (so you have about 10 min for a short range attack).",
"sig": "d7e28b7ae10ba0d4d7242145aec40fc0a420c4f9a538caf5b042a3bd95fd913d131949ac094da802a6c8fc5b240387545405870f5ebd163cd36f8ac705ad2498"
}