{
  "chain_slug": "internet-computer",
  "name": "Internet Computer",
  "scorecard_profile": "L1",
  "evaluated_at": "2026-04-18",
  "evaluator": "layerqu-v2-scoring-agent-3",
  "v1_reference": "chainscreen-v1-archive",
  "dimensions": {
    "1_cryptographic_exposure": {
      "weight": 0.15,
      "score": 30,
      "sub_scores": {
        "1a_primitive_inventory": {
          "score": 12,
          "primitives_named": [
            "BLS12-381 threshold signatures (Chain Key)",
            "Ed25519 (user wallets)",
            "ECDSA secp256k1 (threshold for Bitcoin integration)",
            "Schnorr (Taproot integration)",
            "SHA-256",
            "SHA-3"
          ],
          "evidence": [
            "https://internetcomputer.org/how-it-works/threshold-ecdsa-signing",
            "https://internetcomputer.org/docs/current/references/ic-interface-spec"
          ],
          "note": "Rich cryptographic stack with threshold crypto (Chain Key)."
        },
        "1b_shor_grover_pq_tag": {
          "score": 12,
          "tags": {
            "BLS12-381": "Shor-break (pairing-based)",
            "Ed25519": "Shor-break",
            "ECDSA secp256k1": "Shor-break",
            "Schnorr": "Shor-break",
            "SHA-256": "Grover-weaken-128bit",
            "SHA-3": "Grover-weaken-128bit"
          },
          "evidence": []
        },
        "1c_algorithm_family_diversity": {
          "score": 0,
          "families_represented": 0,
          "families": [],
          "note": "Multiple ECC families but no PQC family."
        },
        "1d_nist_security_category": {
          "score": 0,
          "mappings": {},
          "note": "No NIST PQC primitives deployed"
        },
        "1e_implementation_quality": {
          "score": 6,
          "formal_verification": "DFINITY-internal audits",
          "constant_time": "standard libraries",
          "libraries": [
            "DFINITY IC-ref implementation",
            "Rust-based replica"
          ],
          "evidence": []
        }
      },
      "total_artifacts": 2
    },
    "2_hndl_exposure": {
      "weight": 0.1,
      "score": 18,
      "sub_scores": {
        "2a_active_key": {
          "score": 4,
          "note": "Chain Key threshold derives user keys — pubkey exposure depends on derivation path. Threshold BLS12-381 keys are quantum-exposed for subnet signatures."
        },
        "2b_cold_key": {
          "score": 4,
          "note": "Active since May 2021. 4+ years of cold keys + threshold ECDSA for Bitcoin."
        },
        "2c_sig_long_term": {
          "score": 5,
          "note": "Threshold signatures signed over long-term subnet assets."
        },
        "2d_encryption_conf": {
          "score": 5,
          "note": "TLS + vetKeys for some confidential computing. No PQC KEM."
        }
      },
      "total_artifacts": 1
    },
    "3_metadata_privacy_exposure": {
      "weight": 0.1,
      "score": 30,
      "sub_scores": {
        "3a_graph_visibility": {
          "score": 7,
          "note": "Internet Identity pseudonymous; canister calls have some privacy via threshold derivation."
        },
        "3b_rpc_concentration": {
          "score": 7,
          "note": "Subnet node providers run most boundary nodes. Growing diversity."
        },
        "3c_bridge_correlation": {
          "score": 8,
          "note": "Chain Key Bitcoin/Ethereum integration correlates cross-chain activity."
        },
        "3d_retroactive_deanon": {
          "score": 8,
          "note": "Chain Key threshold shares vulnerable to Shor would reveal all subnet signing operations."
        }
      },
      "total_artifacts": 1
    },
    "4_migration_architecture": {
      "weight": 0.12,
      "score": 40,
      "sub_scores": {
        "4a_crypto_agility": {
          "score": 14,
          "note": "IC NNS-controlled protocol upgrades. Threshold crypto scheme pluggable. Strong governance-level agility.",
          "evidence": [
            "https://internetcomputer.org/nns"
          ]
        },
        "4b_aa_key_rotation": {
          "score": 10,
          "note": "Canisters can manage custom authentication. Internet Identity supports multi-key rotation."
        },
        "4c_hard_fork_track_record": {
          "score": 10,
          "note": "Frequent NNS-initiated subnet upgrades. ~4 years of continuous protocol evolution."
        },
        "4d_hybrid_deployment_readiness": {
          "score": 6,
          "note": "No hybrid PQC envelope deployed. DFINITY has published PQC research discussions."
        }
      },
      "total_artifacts": 2
    },
    "5_deployment_execution": {
      "weight": 0.2,
      "score": 8,
      "sub_scores": {
        "5a_mainnet_pqc_pct": {
          "score": 0,
          "mainnet_pqc_pct": 0,
          "evidence": [],
          "note": "no public artifact found — no NIST PQC in production"
        },
        "5b_pqc_code_in_consensus": {
          "score": 0,
          "loc_or_bytes": 0,
          "note": "no public artifact found"
        },
        "5c_validator_pqc_keys": {
          "score": 0,
          "pct": 0,
          "note": "no public artifact found"
        },
        "5d_published_milestones": {
          "score": 4,
          "count": 1,
          "milestones": [
            "DFINITY research blog posts on PQC and threshold crypto transitions"
          ],
          "note": "DFINITY has discussed PQC publicly but no dated milestone roadmap found."
        },
        "5e_pqc_washing_delta": {
          "score": 4,
          "ratio": 1.3,
          "note": "Some 'post-quantum ready' phrasing from ecosystem without concrete deployment."
        }
      },
      "total_artifacts": 2
    },
    "6_supply_chain_vendor_readiness": {
      "weight": 0.2,
      "score": 10,
      "sub_scores": {
        "6a_wallet": {
          "score": 3,
          "top3": [
            "Internet Identity",
            "Plug Wallet",
            "NFID"
          ],
          "pqc_roadmap_count": 0
        },
        "6b_bridge": {
          "score": 3,
          "top3": [
            "Chain Key Bitcoin",
            "Chain Key Ethereum",
            "ckUSDC"
          ],
          "pqc_roadmap_count": 0
        },
        "6c_custodian": {
          "score": 2,
          "top3": [
            "Coinbase Custody",
            "Fireblocks (research only)",
            "BitGo"
          ],
          "pqc_roadmap_count": 0
        },
        "6d_rpc_hsm": {
          "score": 2,
          "top3": [
            "DFINITY boundary nodes",
            "Node providers (globally distributed)",
            "ICP gateway"
          ],
          "pqc_roadmap_count": 0
        }
      },
      "total_artifacts": 1
    },
    "7_governance_coordination": {
      "weight": 0.13,
      "score": 45,
      "sub_scores": {
        "7a_validator_stake_distribution": {
          "score": 10,
          "note": "~1,400 subnet nodes across ~130 independent node providers. DFINITY retains significant influence via NNS."
        },
        "7b_upgrade_cadence_under_pressure": {
          "score": 15,
          "note": "Weekly NNS proposals for subnet upgrades. Strong coordination via protocol-level governance."
        },
        "7c_named_coordination_lead": {
          "score": 12,
          "note": "DFINITY Foundation (Dominic Williams). Research team active on cryptography. No named PQC lead."
        },
        "7d_adversarial_coordination_precedent": {
          "score": 8,
          "note": "NNS governance attacks have been handled (e.g., proposal voting integrity)."
        }
      },
      "total_artifacts": 2
    }
  },
  "gates": {
    "hybrid_deployment": "FAIL",
    "evidence_reconstruction": "PASS",
    "primitive_naming": "PASS"
  },
  "caps_applied": [
    "Mosca (5a<20% → QRI max 60)",
    "Sutor (5d count=1 — Migration Stage max 2)",
    "Casado (3+ vendor tiles pqc=0 → migration_stage max 3)",
    "Hybrid gate FAIL → QRI cap 60"
  ],
  "qri": {
    "raw": 23,
    "after_caps": 23,
    "ci_plus_minus": 10,
    "band": 2,
    "band_name": "Acknowledged"
  },
  "migration_stage": 1,
  "mosca_inequality": {
    "X_signature_shelf_life_years": "7-15 (4+ years threshold keys, long-lived subnet sigs)",
    "Y_migration_time_years_range": "8-12 (strong NNS governance could accelerate)",
    "Z_10pct_year": 2036,
    "Z_50pct_year": 2041,
    "danger_zone_at_50pct": true
  },
  "four_scenario_grid": {
    "quantum_never": {
      "value_preserved_pct": 100,
      "privacy_preserved_pct": 100
    },
    "arrives_suddenly_pre_migration": {
      "value_preserved_pct": 5,
      "privacy_preserved_pct": 10
    },
    "arrives_slowly_post_migration": {
      "value_preserved_pct": 85,
      "privacy_preserved_pct": 70
    },
    "arrives_slowly_mid_migration": {
      "value_preserved_pct": 45,
      "privacy_preserved_pct": 35
    }
  },
  "burn_vs_rescue_policy": "undeclared",
  "pqc_washing_ratio": 1.3,
  "vendor_tile_summary": {
    "wallet": {
      "top3": [
        "Internet Identity",
        "Plug Wallet",
        "NFID"
      ],
      "pqc_roadmap_count": 0
    },
    "bridge": {
      "top3": [
        "Chain Key Bitcoin",
        "Chain Key Ethereum",
        "ckUSDC"
      ],
      "pqc_roadmap_count": 0
    },
    "custodian": {
      "top3": [
        "Coinbase Custody",
        "Fireblocks",
        "BitGo"
      ],
      "pqc_roadmap_count": 0
    },
    "rpc_hsm": {
      "top3": [
        "DFINITY boundary nodes",
        "Node providers",
        "ICP gateway"
      ],
      "pqc_roadmap_count": 0
    }
  },
  "narrative_summary": "Internet Computer has the richest crypto stack in this batch (BLS12-381 threshold + ECDSA + Schnorr via Chain Key) but every primitive is Shor-exposed. Strong NNS governance provides above-average migration architecture. DFINITY has discussed PQC publicly but no production deployment or dated roadmap. Threshold crypto makes subnet-key compromise particularly severe post-Shor. Band 2 Acknowledged.",
  "evaluator_notes": "Threshold crypto amplifies HNDL risk: compromising one BLS12-381 subnet key grants signing authority over entire subnet. Strong governance (NNS) is the standout positive. DFINITY's research culture suggests faster-than-average migration feasibility if prioritized.",
  "narrative_voiced": "Internet Computer has the most interesting crypto stack in the batch, with BLS12-381 threshold signatures, Ed25519, ECDSA, and Schnorr stitched together by Chain Key. Shor breaks all four. One compromised BLS12-381 subnet key forges every signature that subnet ever issued."
}