<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Quantum Computing Threatens Blockchain — But the Real Problem Goes Beyond Stolen Keys]]></title><description><![CDATA[<p dir="auto"><img src="/forum/assets/uploads/files/1778136292487-aa38a637-969a-49c4-ba7d-67f7f32a6daa-image.png" alt="aa38a637-969a-49c4-ba7d-67f7f32a6daa-image.png" class=" img-fluid img-markdown" /></p>
<p dir="auto">Most of the conversation around quantum computing and blockchain security has focused on one question: how do you stop a quantum computer from breaking cryptographic private keys in the first place? But NEAR Protocol's chief technology officer Anton Astafiev is raising a concern that has received far less attention — what happens after a quantum attack has already occurred? If a sufficiently powerful quantum computer were used to derive a private key and drain a wallet, blockchain protocols would have no reliable way to distinguish whether the transaction was made by the rightful owner or by a thief who reconstructed the key. "We won't be able to tell if someone running a transaction is the rightful owner of the asset or not," Astafiev said, framing the post-attack verification problem as one of the most difficult challenges the industry has yet to seriously address.The stakes of getting this wrong are significant.</p>
<p dir="auto">Astafiev warns that in such a scenario, protocols would face a stark binary choice: freeze all potentially compromised wallets — locking out legitimate owners along with attackers — or do nothing and allow the blockchain to descend into what he called a "wild west" of unverifiable ownership. His proposed solution is zero-knowledge proof technology, which could theoretically allow the rightful owner to prove they know the original seed phrase behind a wallet without exposing any sensitive information in the process. This approach would create a cryptographic ownership verification system that remains secure even in a post-quantum environment, giving protocols a mechanism to distinguish legitimate recovery attempts from theft without requiring users to reveal the very credentials that are under threat.</p>
]]></description><link>https://undeads.com/forum/topic/19614/quantum-computing-threatens-blockchain-but-the-real-problem-goes-beyond-stolen-keys</link><generator>RSS for Node</generator><lastBuildDate>Thu, 07 May 2026 20:41:12 GMT</lastBuildDate><atom:link href="https://undeads.com/forum/topic/19614.rss" rel="self" type="application/rss+xml"/><pubDate>Thu, 07 May 2026 06:44:53 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Reply to Quantum Computing Threatens Blockchain — But the Real Problem Goes Beyond Stolen Keys on Thu, 07 May 2026 08:25:16 GMT]]></title><description><![CDATA[<p dir="auto">Everyone asked how to prevent quantum attacks, NEAR's CTO asked what happens after one succeeds, the question was overdue</p>
]]></description><link>https://undeads.com/forum/post/54434</link><guid isPermaLink="true">https://undeads.com/forum/post/54434</guid><dc:creator><![CDATA[encrypted]]></dc:creator><pubDate>Thu, 07 May 2026 08:25:16 GMT</pubDate></item></channel></rss>