Bip 32 uses HMAC-SHA512 as the algorithm. I think that it would be much easier for a quantum computer to attempt to crack an individual private key than to attempt to crack the BIP32 seed. Quite frankly, I think we are quite far off from quantum computers becoming powerful enough to make password/private key hacking trivial due to
quantum decoherence.What about Ledger hardware wallet addresses that use BIP49?
For example, these 4 addresses were derived from the same seed on a Ledger:
(1) 38yp4KEzHXuQzPqXosDrqR6k7m82vtTWN4 -> sent a transaction and exposed public key
(2) 3HdkVwrSuDcVhpcHRBfpxdyEWDgFhEo3T9
(3) 3GPmyepu9DpGYKMUgF4XV2kNhnWjZEEbJb
(4) 3D6Ka9zE1Ku2nu43h5YSET8M1tewm7AUGH
Could a QC use the exposed public key from (1) to compromise addresses (2), (3), and (4) ?
Assuming a QC is invented in the future that can break ECDSA.