LeoWandersleb on Nostr: Q-Day rescue for P2TR or otherwise exposed pubkeys from HD-wallets: Attacker has your ...
Q-Day rescue for P2TR or otherwise exposed pubkeys from HD-wallets:
Attacker has your private key (via QC), but they lack the BIP32 lineage. Child keys are derived by hashing a Parent xPub. Proposal: Soft-fork to require revealing that Parent xPub to spend. This proves you generated the key via the seed. QC attacks the curve, not the hash derivation.
Of course, revealing Parent xPub + Broken Child Key mathematically leaks the Parent Private Key. You must sweep the entire account at that point.
Published at
2025-12-06 17:13:11 UTCEvent JSON
{
"id": "9d7c33bed9c695de07c8955ca270c76bccb49b9307676ae46b8c0c329356fb51",
"pubkey": "46fcbe3065eaf1ae7811465924e48923363ff3f526bd6f73d7c184b16bd8ce4d",
"created_at": 1765041191,
"kind": 1,
"tags": [
[
"client",
"noStrudel",
"31990:266815e0c9210dfa324c6cba3573b14bee49da4209a9456f9484e5106cd408a5:1686066542546"
]
],
"content": "Q-Day rescue for P2TR or otherwise exposed pubkeys from HD-wallets:\n\nAttacker has your private key (via QC), but they lack the BIP32 lineage. Child keys are derived by hashing a Parent xPub. Proposal: Soft-fork to require revealing that Parent xPub to spend. This proves you generated the key via the seed. QC attacks the curve, not the hash derivation.\n\nOf course, revealing Parent xPub + Broken Child Key mathematically leaks the Parent Private Key. You must sweep the entire account at that point.",
"sig": "43ffe0e4ba6e1dcb4be30427e41d39e4be556d9f437b30031379a6107008a9fd76651d18a66a6310883d4f95da9980ff3b1ce3c4aa10e501ea5c5dd57dc71685"
}