The post How Real Is the Threat? appeared on BitcoinEthereumNews.com. Concerns that quantum computing could one day break Bitcoin’s cryptography have resurfacedThe post How Real Is the Threat? appeared on BitcoinEthereumNews.com. Concerns that quantum computing could one day break Bitcoin’s cryptography have resurfaced

How Real Is the Threat?

Concerns that quantum computing could one day break Bitcoin’s cryptography have resurfaced. Yet, a new report by CoinShares argues that the quantum risks remain distant, with only a fraction of Bitcoin’s supply potentially vulnerable.

The report frames quantum computing as a long-term engineering challenge. It argues that Bitcoin has ample time to adapt well before quantum machines reach a cryptographically relevant scale.

Sponsored

The Quantum Threat Assessment For Bitcoin

In the report titled “Quantum Vulnerability in Bitcoin: A Manageable Risk,” CoinShares’ Bitcoin Research Lead Christopher Bendiksen explained that Bitcoin relies on elliptic-curve cryptography to secure transactions. 

In theory, a sufficiently powerful quantum computer could use Shor’s algorithm to derive private keys from public keys. This could enable unauthorized spending.

However, Bendiksen noted that such an attack would require quantum machines with millions of stable, error-corrected qubits. This is far beyond today’s capabilities.

The report also examined the scope of Bitcoin’s real exposure. According to Bendiksen, only about 1.6 million BTC, roughly 8% of the total supply, resides in legacy Pay-to-Public-Key (P2PK) addresses where public keys are already exposed. However, the true practical risk is significantly smaller.

Of that amount, the report estimated that only around 10,200 BTC could plausibly be targeted in a way that would have an impact. This represents less than 0.1% of Bitcoin’s total supply.

Sponsored

The remaining vulnerable coins are dispersed across tens of thousands of addresses. This distribution would make large-scale exploitation slow and operationally impractical even for advanced quantum systems, according to the analysis.

This limited exposure exists because of modern address types. Pay-to-Public-Key-Hash (P2PKH) and Pay-to-Script-Hash (P2SH) do not reveal public keys until coins are spent, sharply reducing the attack surface.

While post-quantum cryptographic proposals exist, Bendiksen cautioned against premature or forced changes. He warned they could introduce new risks, weaken decentralization, or rely on cryptographic schemes that have not yet been sufficiently tested in adversarial environments.

Sponsored

Meanwhile, this outlook aligns with views previously expressed by other industry figures, including Casa co-founder Jameson Lopp and Cardano founder Charles Hoskinson. Both of whom have argued that quantum computing poses no near-term threat to Bitcoin’s cryptography.

Quantum Risk No Longer Ignored as Investors and Developers Prepare

That said, not all market participants share this view. Some institutional investors are increasingly factoring quantum computing risk into their Bitcoin exposure rather than dismissing it as a distant concern. 

BeInCrypto reported that strategist Christopher Wood reduced a 10% Bitcoin allocation from Jefferies’ model portfolio, reallocating capital toward gold and mining equities. This move came amid concerns that future advances in quantum computing could threaten Bitcoin’s security.

Sponsored

At the same time, several blockchain projects are already taking proactive steps. Coinbase, Ethereum, and Optimism have publicly outlined efforts to prepare for a post-quantum future.

Charles Edwards of Capriole Investments has also suggested that Bitcoin’s price may need to decline further before the network attracts sufficient attention to the issue of quantum security. He framed market pressure as a potential catalyst for broader technical discussion.

Edwards added that substantial work still lies ahead, warning that Bitcoin’s quantum preparedness efforts would need to accelerate in 2026.

Source: https://beincrypto.com/bitcoin-quantum-computing-risk-manageable-coinshares/

Market Opportunity
QUANTUM Logo
QUANTUM Price(QUANTUM)
$0.003401
$0.003401$0.003401
-1.59%
USD
QUANTUM (QUANTUM) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Crypto whale loses $6M to sneaky phishing scheme targeting staked Ethereum

Crypto whale loses $6M to sneaky phishing scheme targeting staked Ethereum

The post Crypto whale loses $6M to sneaky phishing scheme targeting staked Ethereum appeared on BitcoinEthereumNews.com. A crypto whale lost more than $6 million in staked Ethereum (stETH) and Aave-wrapped Bitcoin (aEthWBTC) after approving malicious signatures in a phishing scheme on Sept. 18, according to blockchain security firm Scam Sniffer. According to the firm, the attackers disguised their move as a routine wallet confirmation through “Permit” signatures, which tricked the victim into authorizing fund transfers without triggering obvious red flags. Yu Xian, founder of blockchain security company SlowMist, noted that the victim did not recognize the danger because the transaction required no gas fees. He wrote: “From the victim’s perspective, he just clicked a few times to confirm the wallet’s pop-up signature requests, didn’t spend a single penny of gas, and $6.28 million was gone.” How Permit exploits work Permit approvals were originally designed to simplify token transfers. Instead of submitting an on-chain approval and paying fees, a user can sign an off-chain message authorizing a spender. That efficiency, however, has created a new attack surface for malicious players. Once a user signs such a permit, attackers can combine two functions—Permit and TransferFrom—to drain assets directly. Because the authorization takes place off-chain, wallet dashboards show no unusual activity until the funds move. As a result, the assets are gone when the approval executes on-chain, and tokens are redirected to the attacker’s wallet. This loophole has made permit exploits increasingly attractive for malicious actors, who can siphon millions without needing complex hacks or high-cost gas wars. Phishing losses The latest theft highlights a wider trend of escalating phishing campaigns. Scam Sniffer reported that in August alone, attackers stole $12.17 million from more than 15,200 victims. That figure represented a 72% jump in losses compared with July. According to the firm, the most significant share of August’s damages came from three large accounts that accounted for nearly half…
Share
BitcoinEthereumNews2025/09/19 02:31
Why is the Trump-backed WLFI Token Price Up Today?

Why is the Trump-backed WLFI Token Price Up Today?

The post Why is the Trump-backed WLFI Token Price Up Today? appeared first on Coinpedia Fintech News World Liberty Financial’s native token WLFI, backed by the
Share
CoinPedia2026/02/09 18:54
Unlock 24/7 Crypto Blackjack Customer Support Now

Unlock 24/7 Crypto Blackjack Customer Support Now

Cryptsy - Latest Cryptocurrency News and Predictions Cryptsy - Latest Cryptocurrency News and Predictions - Experts in Crypto Casinos Did you know BC.Game supports
Share
Cryptsy2026/02/09 19:33