It would be exposed public keys, to start. So any transactions that have revealed a public key holding a balance.
That’s first cab off the rank, then it’ll be server side compromises through SSL certificates that use CA’s (a trusted network of certificate authorities, aka, the dudes that give the green pad lock when you visit a website).
When you see the green padlock, on a website, that is your machine (not you) saying to the bouncer “can I come in?” He says let me see your semiprime and verify it. If it’s verified (key signature verification) you get let in.
The problem with this is revealing a signature reveals the semiprime, so unless key rotation is happening in real time, computationally inelegant for our expeditious dopamine now, it wouldn’t work out.
Basically, Epstein files, aliens, warheads, all open to the guy who has an answer.
Hashing algo’s are not really that hard either, everything is too mechanical (by design) not fuzzy. This is a blessing but a silver bullet one shot head shot if the algo breaks.
This show from last year (likely a foreshadowing) is a great tl;dr
https://youtu.be/_HdOGSOu1kQ?si=-nAg6jUNBVHWDDGv