What are you talking about? secp256k1 (as part of ECDSA) is used to generate public key and sign transaction/message, not handling password.
Just so you understand the subject, there are much superior methods other than SHA-256 Eliptic Curve that you can generate both public and private keys. I know what Public Key and Private Key are. Satoshi designed it as a system that is impossible to recycle but can be signed with a public key. A private key gives you full access. But today's cryptography is way beyond that. That's why it's not bruteforce-proof.
IMO it's flawed way, when i've seen people claim they attempt to recover their Bitcoin they obtained a decade ago or longer. Besides, how do you determine whether certain Bitcoin were stolen? Rely on people's report?
I'm looking at how people use technology and what their security is.
Actually, your point of view is right, opening the door of a house with thousands of keys is a similar level of theft.
We agree that this is unethical.
My point of view is to accelerate this process and evolve cryptocurrencies into higher-level structures.
The principle of Bitcoin was built entirely on being trustworthy against other valuable currencies.
The Chinese, who are not asleep, with a good ASIC and good Logic, will design this and take over BTC funds.