Your master password will be relatively and practically safe because derivation uses secure hashing, no public-key cryptography. While quantum computing will weaken secure hash pre-image resistance (Granger) , it does so quadratically against an exponential solution, so SHA256, what is used to derive your keys from your account/role/password combination will remain remain safe for for the meaning of safe most normal people use. Basicly it will take the complete compute power of our planet somewhere around the order of magnitude of ONLY ten or so times the age of the universe to reverse the hash. Maybe I'm one order of magnitude wrong here, it could be 1 or 100 times the age of the universe.
In contrast, attacks against ECDSA (adjusted Shor) once quantum computers are big enough, deriving a private key from a public key, are expected to take just hours up to weeks.
While all or HIVE is vulnerable versus part of bitcoin, Bitcoin is a much bigger target and in this series of posts I hope to show exactly how much of bitcoin is vulnerable.
As for the bot, the bot I want to write isn't doing attacks, it's monitoring bitcoin transaction and creating reports about the types of transactions that might indicate a quantum computing attack on long dormant exposed adresses.
I hope to make a bot that will create either daily or weekly HIVE posts reporting stats on these types of transactions, stats on transactions that might eventualy act like the kanarie in the mine.
It's all a learning process for me right now. It might turn out that the amount of noice on the chain tis too big for usefull reports, but I guess I will find out soon.
It's all fascinating if hard going to make sense of!