Key Takeaways
- Recent Google research indicates quantum computers could compromise Bitcoin’s encryption in less than 9 minutes
- Approximately 6.5 million BTC remain vulnerable to potential quantum computing attacks
- Multiple solutions are being developed, including BIP 360, SPHINCS+, and commit/reveal protocols
- Investor Chamath Palihapitiya estimates Bitcoin has 5–7 years before the threat becomes real
- While no quantum computer can currently break Bitcoin, experts no longer consider this a distant concern
The emergence of quantum computing technology represents a significant challenge to Bitcoin’s fundamental security architecture. Although current quantum systems lack the capability to compromise the network, cryptocurrency developers are actively designing protective measures as the technology advances rapidly.
Developers are currently working on a Bitcoin Improvement Proposal to strengthen Bitcoin against quantum, with a test net already deployed 👀 👏 pic.twitter.com/bFVgkCDvuS
— Bitcoin Magazine (@BitcoinMagazine) March 31, 2026
New findings released by Google this week indicate that a sufficiently advanced quantum computing system could compromise Bitcoin’s underlying cryptographic protocols in approximately nine minutes—less time than it typically takes to validate a single Bitcoin block. Industry experts project such machines could become operational as early as 2029.
Roughly 6.5 million bitcoin currently reside in wallet addresses that quantum computers could potentially exploit. Approximately 1.7 million of these coins are stored in legacy address types that have already revealed their public keys on the blockchain—this includes holdings associated with Bitcoin’s pseudonymous founder, Satoshi Nakamoto.
In 2010, Satoshi Nakamoto gave his response to a question about Bitcoin and the rise of quantum computing
“we can still transition to something stronger” pic.twitter.com/VKiVaSWUvi
— Binance.US 🇺🇸 (@BinanceUS) March 31, 2026
Bitcoin’s protective framework depends on elliptic curve cryptographic algorithms. Traditional computing systems would require billions of years to defeat this encryption. Quantum computers, however, could accomplish this feat within minutes by reversing the mathematical operations that connect public keys to their corresponding private keys.
Security researchers have identified two primary attack vectors. The first involves a prolonged-exposure attack, focusing on cryptocurrency that has remained dormant in susceptible addresses for extended periods. The second is a rapid-exposure attack, intercepting transactions held in the mempool during the confirmation waiting period.
Technical Solutions Under Development
BIP 360 proposes eliminating the permanent on-chain storage of public keys. This protocol introduces a novel address structure that provides no exploitable information for quantum attackers. However, it only safeguards newly created coins and offers no protection for the 1.7 million BTC with already-exposed public keys.
SPHINCS+, alternatively designated as SLH-DSA, represents a quantum-resistant signature algorithm based on hash functions instead of elliptic curve mathematics. The National Institute of Standards and Technology officially standardized this approach in August 2024. The primary drawback is signature size—approximately 8 kilobytes compared to Bitcoin’s existing 64-byte signatures—which would significantly increase transaction costs.
Tadge Dryja, one of the Lightning Network’s co-creators, has introduced a commit/reveal framework. This approach divides transactions into two distinct stages, preventing quantum attackers from stealing assets by creating fraudulent competing transactions in the mempool. It functions as an interim safeguard while comprehensive long-term solutions undergo development.
A Shrinking Timeline
Developer Hunter Beast’s Hourglass V2 initiative specifically addresses the 1.7 million BTC with exposed public keys. The proposal would restrict withdrawals from these addresses to one bitcoin per block, slowing any potential mass liquidation resulting from a quantum breach. Segments of the Bitcoin community have voiced opposition, contending it undermines the fundamental principle that users maintain complete control over their holdings.
On the All-In podcast, venture capitalist Chamath Palihapitiya noted that the projected timeline for a functional quantum threat has contracted from 25 years to approximately seven. He cautioned that non-governmental entities would likely target Bitcoin initially, extract maximum value, and subsequently trigger a market collapse.
None of these protective measures have been implemented yet. Bitcoin’s distributed governance structure necessitates broad consensus among developers, mining operations, and node administrators before any protocol modification can be activated.



