I don't really understand the attack-vector by having unhashed public keys, I thought the public key is fine to be shared and distributed? I know I'm missing something here T_T.

Reply to this note

Please Login to reply.

Discussion

i think the additional round of hashing on top of the public key makes it (possibly exponentially) more difficult, from a brute force perspective.