Of course, this is not all that everyone has seen now. In fact, before conducting this test, our engineering team has already done a lot of preliminary work.
For example, we have obtained and analyzed the public security reports, white papers, and protocols of the three major exchanges and learned about the encryption algorithms they use, key management strategies, authentication mechanisms, and other information.
After obtaining this information, we analyze it through the software we have set up and intelligently formulate quantum attack simulation methods, such as simulating the generation, storage, and use of secret keys...
I need to emphasize this point: although this test was invited by the three major exchanges for our team to conduct, all transactions within the exchange are as usual, and no interfaces were opened for us…"
...
