Hello my friend.
continue to ask us for information my friends despite MPC hitting the ground, we are patient it may take several years or months we will see. don't listen to negative opinions even if we don't talk much, follow your publications!
Vitalik say "I think people will be surprised by how quickly "cross-L2 interoperability problems" stop being problems and we get a smooth user experience across the entire ethereum-verse (incl L1, rollups, validiums, even sidechains). I'm seeing lots of energy and will to make this happen."
What do you think about my friend !?
Theres been many new developments in past week alone for MPC...im not going to make a post about these things....but here is my way to answer your question on what VB said....
Google
data in transit blockchainScroll down you will see many big names talk about it...Google,IBM,WEF and the only coin..Partisia.
Partisia Blockchain allows users to compute all kinds of data while maintaining complete data privacy at rest, in transit, and in use.The importance of this is missed by many..take some time out to learn about this.
https://www2.deloitte.com/nl/nl/pages/risk/articles/quantum-risk-to-the-ethereum-blockchain.htmlStorage attack
In this attack, a malicious actor will search for funds that are stored in quantum-exposed addresses. They will then use a quantum computer to derive the private key associated with the vulnerable address, which will allow them to transfer the funds to a new address that is not vulnerable to a quantum attack.
Finding quantum-exposed funds is particularly easy in the Ethereum blockchain. Each node in the network keeps a balance sheet, called the world state, with all addresses that have ever been used and a counter that shows how many times they were used to transfer funds from. An attacker can simply look for all addresses in the world state where the counter is larger than 0. From the resulting list, the attacker picks a target address with plenty of funds. Next, they scan the blockchain for a transaction sent by this specific address and use it to obtain the corresponding public key. As explained before, after having obtained the public key, the attacker can now use a quantum computer to derive the private key and steal the funds from the targeted address.
We performed an analysis on the Ethereum blockchain to find out how many coins would be vulnerable to this type of attack. For the purpose of this analysis, we are focusing solely on Ethereum’s native token, Ether, and ignore other third party tokens implemented on Ethereum. Despite being ignored in this analysis, tokens implemented using the ERC20 standard that are stored in quantum-exposed addresses, would also be vulnerable to the storage attack.Transit attack
As discussed above, users performing a cryptocurrency transaction need to publish the public key associated with the sender’s address. The transaction is broadcast to the network to be incorporated into a new block. The time between broadcasting the transaction (revealing the public key) and the transaction being incorporated in a block opens a window of opportunity for an attack. A malicious actor could listen to broadcasted transaction, quickly derive the private key and send a competing transaction of the same funds to the attacker’s address.
For the Ethereum blockchain the average time it takes to create a new block is about 10 to 20 seconds. This is much shorter than the time expected for quantum computers to derive private keys. However, attackers could use various additional attack methods to prevent transactions from being processed quickly, buying the time to perform their quantum attack. Furthermore, during the peak activity period of the Ethereum the network can get congested and transactions can take hours or sometimes even days to process. This potentially gives attackers plenty of time to perform such an attack and get their transaction processed faster by offering a higher fee to the processing nodes than the original transaction.
To gauge the opinion of quantum experts, the Risk Institute together with Professor Michele Mosca from the University of Waterloo in Canada, have conducted a recurring research5. The results show that the majority of experts believe that within 15 years the probability of quantum computers attacking public key cryptography is high.
Confidential computing is the area where MPC Blockchain is ONE of a kind...learn more about this and how stored data and transit data on MPC is safer and quantum resistant today.
This is the area i think ETH l2 will fail and maybe even ETH itself is at risk just like deloitte say unless huge ETH changes are made...
MPC has no concerns...its the future of Blockchain tech.
Knowing all this and more about MPC...makes me super confident on Partisia as a top L1 blockchain in the near future and no trolling from anyone can make me think otherwise.