In Part 1, we covered how Shor's algorithm breaks ECDSA. Every wallet with an exposed public key is quantum vulnerable. "Harvest now, decrypt later" means the attack surface exists today. Part 1 → x.com/pranshurastogii/status/2...… In Part 2, we walked through the ZK criticality. KZG commitments, Groth16, and BLS validator signatures all rest on pairings that Shor's algorithm breaks. STARKs + recursive aggregation can be a solution. x.com/pranshurastogii/status/2...… twitter.com/pranshurastogii/st...
From Twitter
Disclaimer: The content above is only the author's opinion which does not represent any position of Followin, and is not intended as, and shall not be understood or construed as, investment advice from Followin.
Like
Add to Favorites
Comments
Share
Relevant content



