Wikipedia: secp256k1 - " It's constants were selected in a predictable way, which significantly reduces the possibility that the curve's creator inserted any sort of backdoor into the curve."
So my question is what is the doomsday scenario? Wallets are set to hashes of Q (public key derived from P) so this should prevent anyone from having the Q of the ECDH to be able to back into the private key P? Is this accurate?
The attacker wouldn't even need a 1/hack (Q) -> P just need to be able to sign on behalf of P.