Next scheduled rescrape ... in 5 days
Version 1
Last scraped
Scraped on 28/08/2025, 11:04:45 UTC
So, how do we address quantum computing threats with the ECDSA algorithm that will be used in Bitcoin?
You can read the answer to your question here https://github.com/jlopp/bips/blob/quantum_migration/bip-post-quantum-migration.mediawiki.

This question have been asked in recent of times. You can use the search button to find tooicstopics that you want to post about if it has already been treated here.
Original archived Re: Bitcoin Security
Scraped on 28/08/2025, 10:59:22 UTC
So, how do we address quantum computing threats with the ECDSA algorithm that will be used in Bitcoin?
You can read the answer to your question here https://github.com/jlopp/bips/blob/quantum_migration/bip-post-quantum-migration.mediawiki.

This question have been asked in recent of times. You can use the search button to find tooics that you want to post about if it has already been treated here.