{"type":"rich","version":"1.0","title":"Karl-Johan Alm [ARCHIVE] wrote","author_name":"Karl-Johan Alm [ARCHIVE] (npub17c…qmtzy)","author_url":"https://yabu.me/npub17cwk7hm623dm5npjzu8cvv994h43k2keanegs8w78xyvlez8hqqsqqmtzy","provider_name":"njump","provider_url":"https://yabu.me","html":"📅 Original date posted:2021-03-15\n📝 Original message:On Tue, 16 Mar 2021 at 07:48, Matt Corallo via bitcoin-dev\n\u003cbitcoin-dev at lists.linuxfoundation.org\u003e wrote:\n\u003e\n\u003e Overall, the tradeoffs here seem ludicrous, given that any QC issues in Bitcoin need to be solved in another way, and\n\u003e can't practically be solved by just relying on the existing hash indirection.\n\nThe important distinction here is that, with hashes, an attacker has\nto race against the spending transaction confirming, whereas with\nnaked pubkeys, the attacker doesn't have to wait for a spend to occur,\ndrastically increasing the available time to attack.\n\nIt may initially take months to break a single key. In such a\nscenario, anyone with a hashed pubkey would be completely safe* (even\nat spend time), until that speeds up significantly, while Super Secure\nExchange X with an ultra-cold 38-of-38 multisig setup using Taproot\nwould have a timer ticking, since the attacker need only find a single\nprivkey like with any old P2PK output.\n\n(* assuming no address reuse)"}
