Февраль28
📌- In a social media post, Buterin outlined specific elements of the network at risk due to the development of quantum computing. These include consensus-level BLS signatures, data availability systems using KZG commitments and proofs, ECDSA-based signatures of accounts belonging to external users, and zero-disclosure proofs at the application level, such as KZG or Groth16.