so a qt-wallet/multibit, has 3 sets of codes to crack to get through if unspent (1 being ECDSA)?
is this correct?
what do you mean by "sets of codes" ?
IF i dont leak my MPK and they crack ECDSA then can this be used against unspent addresses?
not to my knowledge.
both the master public key and a leaked private key are needed.
what I mean is
[
DO NOT POST SESC LINKS ]
DO NOT POST SESC LINKS [/url]
"Quote from: anti-scam on September 05, 2013, 09:48:25 PM
The NSA created Bitcoin and used ECDSA in it because they already had it broken.
This risk is already mitigated for any bitcoin address that has not been used for spending (i.e. its public key is not yet known).
Even if ECDSA is broken wide open, it doesn't really matter with respect to bitcoins that have been received at addresses that have never been used for spending, because the corresponding ECDSA public key is not known and cannot be determined without also breaking both RIPEMD160 and SHA256 simultaneously."
So it Appears that RIPEMD 160 and SHA 256 Need to be cracked simultaneously if the address has not been spent from.