0 sats \ 0 replies \ @BlueSlime OP 23 Dec 2023 \ parent \ on: So what are we doing about the quantum elephant in the room? bitcoin
For Shor's algorithm, you would need the public key as a starting point.
This is why addresses that use a pubkey (without any hashing) are immediately vulnerable.
Someone else in the thread also mentioned lightning nodes, which reveal their public key often.