<div dir="auto"><div><br><br><div class="gmail_quote gmail_quote_container"><div dir="ltr" class="gmail_attr">On Mon, Nov 17, 2025, 4:38 PM Jason Resch <<a href="mailto:jasonresch@gmail.com">jasonresch@gmail.com</a>> wrote:<br></div><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir="auto"><div><br><br><div class="gmail_quote"><div dir="ltr" class="gmail_attr">On Mon, Nov 17, 2025, 4:01 PM John Clark via extropy-chat <<a href="mailto:extropy-chat@lists.extropy.org" target="_blank" rel="noreferrer">extropy-chat@lists.extropy.org</a>> wrote:<br></div><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir="ltr"><div dir="ltr"><div class="gmail_default" style="font-family:arial,helvetica,sans-serif"><br></div></div><div class="gmail_quote"><font size="4" face="tahoma, sans-serif"><b>It occurs to me that if you had a fault-tolerant quantum computer running Shor’s algorithm<span class="gmail_default"> then to wreck bitcoin you'd only need to hack the account of </span>Satoshi Nakamoto because it is<span class="gmail_default"></span>estimated to<span class="gmail_default"> contain</span> 1.1 million bitcoins<span class="gmail_default">.</span> </b></font></div><div class="gmail_quote"><div dir="ltr"><div><div style="font-family:Arial,Helvetica,sans-serif"><font size="4"><br></font></div></div></div><font size="4" face="tahoma, sans-serif"><b><span class="gmail_default" style="font-family:arial,helvetica,sans-serif"> </span>John K Clark</b></font></div></div></blockquote></div></div><div dir="auto"><br></div><div dir="auto">If a wallet hasn't been used it can't be hacked, not even with a quantum computer.</div><div dir="auto"><br></div><div dir="auto">Jason </div></div></blockquote></div></div><div dir="auto"><br></div><div dir="auto"><br></div><div dir="auto">I's like to make a correction: apparently the switch to use hashes of public keys rather than public keys in bitcoin transactions was made in 2012. So Satoshi's early coins are secured by public keys which are exposed and vulnerable to quantum computers.</div><div dir="auto"><br></div><div dir="auto">Jason </div><div dir="auto"><div class="gmail_quote gmail_quote_container"><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
</blockquote></div></div></div>