In a current social media submit, Blockstream CEO Adam Again has dismissed quantum FUD (worry, uncertainty, doubt) round Bitcoin, exposing that some fearmongering stems from the lack of know-how of how the community really works.
Author Josh Otten has argued {that a} quantum laptop might use Shor’s algorithm to interrupt “the encryption guarding Bitcoin’s earliest wallets.”
“This is able to expose the non-public keys to Satoshi Nakamoto’s fortune, probably crashing the market and destroying belief in the entire system,” he predicted.
In keeping with Otten, that is the likeliest situation that might push the value of Bitcoin to just about zero in nearly no time.
This suggests that the non-public keys to early Bitcoin addresses may very well be uncovered.
Nonetheless, Bitcoin wallets depend on elliptic curve cryptography (ECC) for signing transactions, particularly the secp256k1 curve.
Non-public keys are used to signal transactions whereas public keys and addresses permit verification. This isn’t the identical as encrypting knowledge. Encryption implies that knowledge is hidden and may be decrypted. Bitcoin’s safety mannequin relies on signatures that show possession with out exposing the non-public key.
Quantum computer systems threaten the signing algorithm, not encryption per se.
A sufficiently highly effective quantum laptop might theoretically use Shor’s algorithm to derive non-public keys from public keys. Nonetheless, addresses don’t reveal public keys till you spend from them. Early Bitcoin wallets which have by no means spent their cash haven’t revealed their public keys.
Assessing quantum menace
Ethereum co-founder Vitalik Buterin has warned that the quantum menace is actual and measurable.
Solana’s Anatoly Yakovenko has estimated that there’s a 50/50 probability that sufficient quantum energy might exist to threaten Bitcoin’s cryptography inside the subsequent 5 years.
Nonetheless, Again has explicitly acknowledged that Bitcoin is unlikely to face a significant quantum computing menace for 20–40 years (if ever).
Even probably the most superior techniques at present have excessive qubit counts however lack the error‑corrected logical qubits wanted to run algorithms like Shor’s at scale. Furthermore, post-quantum cryptography already exists.

