The post The quantum computing threat Bitcoin can’t ignore appeared on BitcoinEthereumNews.com. Quantum computing is no longer just science fiction or the stuff of cypherpunk paranoia; it’s officially a front-page threat for the world’s first stateless money. If you ever thought Satoshi’s creation was immune to existential risk, think again. The latest round of Bitcoiners and cryptographers in the Human Rights Foundation (HRF)’s latest report would like a word. Quantum computing is the ‘biggest risk’ to Bitcoin The HRF’s detailed breakdown discusses how Bitcoin represents far more than a speculative plaything. It’s a lifeline for activists, journalists, and dissidents facing financial repression in authoritarian regimes. Bitcoin’s decentralization, privacy, and permissionless access are what keep donation flows alive and savings out of reach from government seizures. But all that magic depends on solid cryptography. And quantum computing is the only technological leap with the power to shatter those invisible shields.​ Quantum computing puts nearly $700 billion in Bitcoin at risk. Another 4.49 million are only safe if their owners act fast and migrate to quantum-resistant addresses. While researchers rush to roll out quantum-secure upgrades, nothing is quick in Bitcoin land. That means fierce debates about whether to “burn” unmovable coins (and stick a fork in Bitcoin’s neutrality), or risk quantum thieves looting them. To top it off, quantum-proof transactions would bloat the blockchain, taking Bitcoin’s scaling problem from a mild headache to a crushing migraine. It’s not just a technical puzzle either; it’s a test of the network’s willingness to evolve without breaking what made Bitcoin special in the first place. Coin Metrics cofounder and Bitcoin advocate Nic Carter put it bluntly in his own recent writing: “Quantum computing is, in my opinion, the biggest risk to Bitcoin. It’s a big looming problem for a lot of financial systems, and for various other blockchains too, but it’s kind of a uniquely big and… The post The quantum computing threat Bitcoin can’t ignore appeared on BitcoinEthereumNews.com. Quantum computing is no longer just science fiction or the stuff of cypherpunk paranoia; it’s officially a front-page threat for the world’s first stateless money. If you ever thought Satoshi’s creation was immune to existential risk, think again. The latest round of Bitcoiners and cryptographers in the Human Rights Foundation (HRF)’s latest report would like a word. Quantum computing is the ‘biggest risk’ to Bitcoin The HRF’s detailed breakdown discusses how Bitcoin represents far more than a speculative plaything. It’s a lifeline for activists, journalists, and dissidents facing financial repression in authoritarian regimes. Bitcoin’s decentralization, privacy, and permissionless access are what keep donation flows alive and savings out of reach from government seizures. But all that magic depends on solid cryptography. And quantum computing is the only technological leap with the power to shatter those invisible shields.​ Quantum computing puts nearly $700 billion in Bitcoin at risk. Another 4.49 million are only safe if their owners act fast and migrate to quantum-resistant addresses. While researchers rush to roll out quantum-secure upgrades, nothing is quick in Bitcoin land. That means fierce debates about whether to “burn” unmovable coins (and stick a fork in Bitcoin’s neutrality), or risk quantum thieves looting them. To top it off, quantum-proof transactions would bloat the blockchain, taking Bitcoin’s scaling problem from a mild headache to a crushing migraine. It’s not just a technical puzzle either; it’s a test of the network’s willingness to evolve without breaking what made Bitcoin special in the first place. Coin Metrics cofounder and Bitcoin advocate Nic Carter put it bluntly in his own recent writing: “Quantum computing is, in my opinion, the biggest risk to Bitcoin. It’s a big looming problem for a lot of financial systems, and for various other blockchains too, but it’s kind of a uniquely big and…

The quantum computing threat Bitcoin can’t ignore

2025/11/03 06:01

Quantum computing is no longer just science fiction or the stuff of cypherpunk paranoia; it’s officially a front-page threat for the world’s first stateless money. If you ever thought Satoshi’s creation was immune to existential risk, think again. The latest round of Bitcoiners and cryptographers in the Human Rights Foundation (HRF)’s latest report would like a word.

Quantum computing is the ‘biggest risk’ to Bitcoin

The HRF’s detailed breakdown discusses how Bitcoin represents far more than a speculative plaything. It’s a lifeline for activists, journalists, and dissidents facing financial repression in authoritarian regimes. Bitcoin’s decentralization, privacy, and permissionless access are what keep donation flows alive and savings out of reach from government seizures.

But all that magic depends on solid cryptography. And quantum computing is the only technological leap with the power to shatter those invisible shields.​ Quantum computing puts nearly $700 billion in Bitcoin at risk. Another 4.49 million are only safe if their owners act fast and migrate to quantum-resistant addresses.

While researchers rush to roll out quantum-secure upgrades, nothing is quick in Bitcoin land. That means fierce debates about whether to “burn” unmovable coins (and stick a fork in Bitcoin’s neutrality), or risk quantum thieves looting them.

To top it off, quantum-proof transactions would bloat the blockchain, taking Bitcoin’s scaling problem from a mild headache to a crushing migraine. It’s not just a technical puzzle either; it’s a test of the network’s willingness to evolve without breaking what made Bitcoin special in the first place. Coin Metrics cofounder and Bitcoin advocate Nic Carter put it bluntly in his own recent writing:

How much Bitcoin is at risk?

HRF’s report revealed that roughly 6.5 million Bitcoin (almost one-third of all BTC) are currently vulnerable to “long-range” quantum attacks. Those attacks target old or reused address types. Of these, owners could, in theory, secure 4.49 million coins by migrating their balances to quantum-resistant addresses.

The catch? That leaves 1.7 million BTC, including Satoshi’s legendary 1.1 million, frozen in time and wide open for quantum bandits when the day comes.​ The quantum threat boils down to two main attack vectors: “long-range attacks” and “short-range attacks.”

Long-range attacks target dormant and reused addresses, exploiting exposed public keys. Short-range attacks exploit the transaction window, swiping funds before confirmation if attackers can calculate private keys in real time.

“Burn” or be burned: protocol politics

Bitcoin’s decentralized upgrade process is its greatest asset and its biggest weakness here. Unlike Apple’s latest OS update, Bitcoin doesn’t get automatic security fixes. Consensus means drama, often measured in years, not weeks.

The “burn or steal” debate is heating up: Should developers try to burn quantum-vulnerable coins, freeze them, or let quantum thieves drain lost wallets? Nobody agrees, which isn’t surprising for a project obsessed with property rights, censorship resistance, and anti-governance. As the report concludes:

Brave new algorithms, larger blocks, and new headaches

Moving to quantum-proof algorithms isn’t just a technical sidebar. HRF highlights two classes of solutions: lattice-based and hash-based signature schemes, each with different trade-offs. Larger keys mean bulkier transactions, fewer transactions per block, heavier full nodes, and likely an entire new chapter in Bitcoin’s scaling wars.​

For reference, lattice-based signatures are about ten times larger than current signatures, while the most compact hash-based alternatives are 38 times bigger. Every technical fix will require wallet redesigns, updated hardware, node operator re-training, and user education on a global scale.

The community must coordinate across coders, wallet builders, advocacy groups, and millions of skeptical holders (many of whom don’t even know their coins are vulnerable). History shows even friendly upgrades can take years to pass, and with quantum computing timelines still unclear, the window for action may slam shut faster than expected.​

What’s next: resilience or ruin?

Any durable fix will require grassroots buy-in, not just GitHub commits. The fate of forgotten Bitcoins (and perhaps the ecosystem’s legitimacy) hangs on how the network navigates these political, technical, and social battles in the coming decade.

For Bitcoin’s rebels, cypherpunks, and involuntary exiles, the message is clear. Keep educating, keep upgrading, and don’t assume Satoshi’s armor is permanently bulletproof. As Bitcoin security expert, core dev, and Casa cofounder, Jameson Lopp, warned, even more than quantum computing, the biggest threat to Bitcoin is apathy:

Mentioned in this article

Source: https://cryptoslate.com/the-quantum-computing-threat-bitcoin-cant-ignore/

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.
Share Insights

You May Also Like

Preliminary analysis of the Balancer V2 attack, which resulted in a loss of $120 million.

Preliminary analysis of the Balancer V2 attack, which resulted in a loss of $120 million.

On November 3, the Balancer V2 protocol and its fork projects were attacked on multiple chains, resulting in a serious loss of more than $120 million. BlockSec issued an early warning at the first opportunity [1] and gave a preliminary analysis conclusion [2]. This was a highly complex attack. Our preliminary analysis showed that the root cause was that the attacker manipulated the invariant, thereby distorting the calculation of the price of BPT (Balancer Pool Token) -- that is, the LP token of Balancer Pool -- so that it could profit in a stable pool through a batchSwap operation. Background Information 1. Scaling and Rounding To standardize the decimal places of different tokens, the Balancer contract will: upscale: Upscales the balance and amount to a uniform internal precision before performing the calculation; downscale: Reduces the result to its original precision and performs directional rounding (e.g., inputs are usually rounded up to ensure the pool is not under-filled; output paths are often truncated downwards). Conclusion: Within the same transaction, the asymmetrical rounding direction used in different stages can lead to a systematic slight deviation when executed repeatedly in very small steps. 2. Prices of D and BPT The Balancer V2 protocol’s Composable Stable Pool[3] and the fork protocol were affected by this attack. Stable Pool is used for assets that are expected to maintain a close 1:1 exchange ratio (or be exchanged at a known exchange rate), allowing large exchanges without causing significant price shocks, thereby greatly improving the efficiency of capital utilization between similar or related assets. The pool uses the Stable Math (a Curve-based StableSwap model), where the invariant D represents the pool's "virtual total value". The approximate price of BPT (Pool's LP Token) is: The formula above shows that if D is made smaller on paper (even if no funds are actually withdrawn), the price of BPT will be cheaper. BTP represents the pool share and is used to calculate how many pool reserves can be obtained when withdrawing liquidity. Therefore, if an attacker can obtain more BPT, they can profit when withdrawing liquidity. Attack Analysis Taking an attack transaction on Arbitrum as an example, the batchSwap operation can be divided into three stages: Phase 1: The attacker redeems BPT for the underlying asset to precisely adjust the balance of one of the tokens (cbETH) to a critical point (amount = 9) for rounding. This step sets the stage for the precision loss in the next phase. Phase Two: The attacker uses a carefully crafted quantity (= 8) to swap between another underlying asset (wstETH) and cbETH. Due to rounding down when scaling the token quantity, the calculated Δx is slightly smaller (from 8.918 to 8), causing Δy to be underestimated and the invariant D (derived from Curve's StableSwap model) to be smaller. Since BPT price = D / totalSupply, the BPT price is artificially suppressed. Phase 3: The attackers reverse-swap the underlying assets back to BPT, restoring the balance within the pool while profiting from the depressed price of BPT—acquiring more BPT tokens. Finally, the attacker used another profitable transaction to withdraw liquidity, thereby using the extra BPT to acquire other underlying assets (cbETH and wstETH) in the Pool and thus profit. Attacking the transaction: https://app.blocksec.com/explorer/tx/arbitrum/0x7da32ebc615d0f29a24cacf9d18254bea3a2c730084c690ee40238b1d8b55773 Profitable trades: https://app.blocksec.com/explorer/tx/arbitrum/0x4e5be713d986bcf4afb2ba7362525622acf9c95310bd77cd5911e7ef12d871a9 Reference: [1]https://x.com/Phalcon_xyz/status/1985262010347696312 [2]https://x.com/Phalcon_xyz/status/1985302779263643915 [3]https://docs-v2.balancer.fi/concepts/pools/composable-stable.html
Share
PANews2025/11/04 14:00