In Part 1, we covered how Shor's algorithm breaks ECDSA. Every wallet with an exposed public key is quantum vulnerable. "Harvest now, decrypt later" means the attack surface exists today. Part 1 โ
x.com/pranshurastogii/status/2...โฆ
In Part 2, we walked through the ZK criticality. KZG commitments, Groth16, and BLS validator signatures all rest on pairings that Shor's algorithm breaks. STARKs + recursive aggregation can be a solution.
x.com/pranshurastogii/status/2...โฆ
twitter.com/pranshurastogii/st...