Discussion
meling: Call me when they have broken ECC with a real quantum computer.
nh23423fefe: Why is your use case interesting?
jryio: Here's an interesting discussion from Section 8 - Dormant Wallets:If a nation state develops a sufficiently powerful quantum computer. Seizure of the Satoshi-era bitcoin wallets without post quantum protections would fund either rogue actors or nation states.> Indeed, some governments will have the option of using CRQCs (or paying a bounty to companies) to acquire these assets (possibly to burn them by sending them to the unspendable OP RETURN address [321]) as a national security matter. As before, blockchain’s loss of the ability to reliably identify asset owners combined with the laches doctrine [319] enables governments to argue that the original owners, through years of inaction, have failed to assert their property rights
PowerElectronix: As soon as activity is detected and reasonably atributable to sha256 being broken, bitcoin goes to zero.
int32_64: Is there any field with as big of gap between theory and experiment than QC? You read papers like this and think they will be harvesting all Satoshi's coins in a couple years and then you remember that nobody has even factored 21 yet on a real quantum computer.
Retr0id: Fusion power comes to mind.
nostrademons: It's interesting, solar panels were in this category in the 1980s and self-driving cars were in the 2010s, and both have had the gap between theory and practice significantly narrowed since.
jditu: Somewhat ironic that they used ZK proofs to demonstrate they can break Bitcoin's security — while keeping the actual method secret.
xhkkffbf: And it's worse than that. In order to "factor" 15=3x5, they designed the circuit knowing that the factors were three and five. In other words, they just validated it. And that's something you can do with a regular CPU.