…Thanks to Shor’s algorithm, cryptocurrencies will be exceptionally vulnerable to a future quantum computing attack…

…What makes crypto vulnerable to Shor’s algorithm is elliptic-curve cryptography, which applies to all distributed ledger technology…

…Fortunately, solutions already exist: post-quantum cryptography and quantum computing…

Editor’s Note: Italicized statements are directly quoted from the source. Content may have been edited for style and clarity. Read the full article at the source by clicking on the text or image.