A Nobel Prize-winning physicist whose work laid the foundation for modern quantum computing has raised fresh concerns about Bitcoin’s long-term security, warning that the window for quantum machines to threaten cryptocurrency is closer than many expect. With roughly 4.5 million BTC potentially exposed and upgrade timelines stretching years, the gap between threat and readiness is narrowing fast.
Why the Nobel Prize winner says Bitcoin’s quantum risk is getting closer
John Clarke, Michel H. Devoret, and John M. Martinis received the 2025 Nobel Prize in Physics on October 7, 2025, for their “discovery of macroscopic quantum mechanical tunnelling and energy quantisation in an electric circuit.” Their work created the superconducting qubits that power today’s quantum computers.
Clarke himself acknowledged the direct line between their research and quantum computing, stating: “The basis of quantum computing relies to quite an extent on our discovery.” That statement, from someone whose foundational work made quantum hardware possible, carries weight that typical analyst warnings do not.
It is worth clarifying what the warning is and what it is not. The Nobel laureates did not single out Bitcoin by name. The connection is indirect but material: the technology their research enabled is the same technology that could eventually break the elliptic curve cryptography protecting Bitcoin wallets and transactions.
Why this warning is resurfacing now
The Nobel announcement coincided with a rapid compression of quantum threat timelines. Three papers published in three months through early 2026 showed that the quantum resources needed to break encryption dropped from 20 million qubits to fewer than 1 million since May 2025. That is a 95% reduction in the estimated hardware barrier.
Bitcoin was trading at $68,390 with the Fear and Greed Index sitting at 11, deep in “Extreme Fear” territory. Quantum concerns are not the sole driver of that sentiment, but they are compounding existing market anxiety.
How quantum computing could actually threaten Bitcoin
Bitcoin’s security rests on two cryptographic pillars: the SHA-256 hash function used in mining and the Elliptic Curve Digital Signature Algorithm (ECDSA) used to sign transactions. These two components face very different levels of quantum risk.
Mining is relatively safe. As Alphractal quantum researcher Arch Physicist noted: “Quantum brute force offers only a quadratic speed-up, so mining stays resistant. After a decade of progress, we have only about two functional logical qubits.” The real vulnerability is in ECDSA signatures.
When a Bitcoin holder sends a transaction, the public key is exposed on the blockchain. A sufficiently powerful quantum computer running Shor’s algorithm could derive the private key from that public key, allowing an attacker to spend the coins. Google researchers have estimated that such a machine could break Bitcoin’s cryptography in under 9 minutes, with the threat potentially emerging by 2029.
Which parts of Bitcoin security are most exposed first
Not all Bitcoin holders face equal risk. The exposure depends on address type and usage history. There are three distinct vulnerability categories worth understanding.
The highest-risk group is Bitcoin stored in Pay-to-Public-Key (P2PK) format, which includes Satoshi Nakamoto’s estimated 1 million BTC. These addresses have their public keys permanently visible on-chain. Next are reused addresses where public keys have been exposed through prior transactions. Modern addresses using Pay-to-Public-Key-Hash (P2PKH) only expose the public key at the moment of spending.
According to Deloitte research, approximately 4.5 million BTC, roughly 25% of the total supply, remain vulnerable under current address and signature conditions. At current prices, that represents over $300 billion in exposed value.
Why exposed public keys matter
The distinction is critical for current holders. If you have only received Bitcoin to a modern address and never spent from it, your public key has not been broadcast. Your coins remain behind a hash function barrier that quantum computers cannot efficiently bypass.
However, any address that has sent a transaction has already exposed its public key. A quantum attacker would not need to crack the hash; they would target the exposed ECDSA key directly. This makes transaction hygiene, specifically never reusing addresses, an immediate practical defense even before protocol-level upgrades arrive.
How close is the threat window for Bitcoin holders and the network
Charles Edwards, founder of Capriole Investments, has been among the most vocal analysts on the timeline. He warned: “I used to think future Bitcoin bear markets would have lower drawdowns. But if we don’t solve on Quantum next year, we probably get the biggest bear market ever.”
“If we are one minute too late on quantum, Bitcoin goes to zero.”
— Charles Edwards, Capriole Investments founder (via CCN)
Edwards has called for a solution to be agreed upon by 2026 at the latest. That timeline may sound aggressive, but it reflects a preparedness argument rather than a prediction that quantum attacks will arrive next year.
What “approaching window” likely means in practical terms
There is an important difference between research milestones and deployable attack capability. Current quantum computers have roughly two functional logical qubits. Breaking ECDSA would require thousands of error-corrected logical qubits, a capability no lab has demonstrated.
However, the trajectory matters more than the current state. The drop from 20 million to under 1 million required qubits happened in under a year. If that pace of algorithmic improvement continues, the theoretical threshold could be reached sooner than hardware roadmaps suggest.
The threat is not a sudden overnight collapse. It is a narrowing preparation window. The concern from researchers is that Bitcoin’s upgrade timeline, estimated at 5 to 10 years for a full transition, may overlap with the period when quantum attacks become feasible. If the upgrade is not well underway before that crossover, holders of exposed coins face real risk.
Can Bitcoin adapt before quantum computing becomes a real attack vector
Bitcoin has a history of contentious upgrades, from the block size wars to SegWit to Taproot. A quantum-resistance migration would be among the most complex changes the network has ever attempted, touching every wallet, exchange, and custodian in the ecosystem.
The most concrete proposal so far is BIP-360, which introduces a Pay-to-Merkle-Root (P2MR) output type designed to be quantum-resistant. The proposal has been merged into Bitcoin’s core development repository, a significant step but still far from network-wide deployment.
The challenge extends beyond code. Every Bitcoin holder would eventually need to move their coins to new quantum-resistant address formats. Dormant wallets, including Satoshi’s estimated holdings, cannot be migrated by anyone other than the key holder. This creates a policy dilemma: should the network freeze unmigrated coins, or accept the risk that quantum attackers could claim them?
What a Bitcoin quantum-resistance roadmap could involve
A realistic upgrade path would likely proceed in stages. First, new quantum-resistant signature schemes would be added as an option alongside existing ECDSA. Then a transition period would allow holders to voluntarily migrate. Finally, a deadline or soft fork could enforce new standards.
The SEC’s Crypto Assets Task Force is also developing a Post-Quantum Financial Infrastructure Framework with a target implementation by 2028. This regulatory signal suggests governments view quantum computing as a systemic risk, not merely a theoretical exercise. For investors navigating these risks, the broader institutional response, including moves like Binance’s recent $171 million USDT net inflow, suggests large players are still positioning in crypto despite the uncertainty.
The coordination challenge is similar to other large-scale infrastructure transitions. Projects exploring interoperability across Web3 ecosystems face analogous governance hurdles when trying to align multiple stakeholders on protocol changes. The quantum migration will test Bitcoin’s governance model more than any previous upgrade.
FAQ: What Bitcoin investors should know about the quantum computing risk
Could quantum computing crack Bitcoin today?
No. Current quantum computers have approximately two functional logical qubits. Breaking Bitcoin’s ECDSA signatures would require thousands of error-corrected qubits, a capability that does not exist yet. The concern is about the trajectory: algorithmic improvements have dramatically reduced the estimated hardware requirements in a short period.
Are old wallet addresses more vulnerable than new ones?
Yes. Addresses that have sent transactions (exposing their public keys) and early P2PK addresses are most vulnerable. Modern addresses that have only received Bitcoin and never spent from them remain protected behind hash functions that quantum computers cannot efficiently break. Using a fresh address for each transaction is a practical defensive step.
Would Bitcoin need a hard fork or a broader upgrade path?
BIP-360 is designed as a soft fork, meaning it would add quantum-resistant address types without breaking backward compatibility. However, the full transition, including migrating all existing coins to new address formats, would take 5 to 10 years. The governance challenge of setting deadlines for migration may prove harder than the technical implementation. Newer blockchain ecosystems, including those exploring real-world asset infrastructure, may have an easier path to quantum resistance simply because they have fewer legacy addresses to migrate.
Disclaimer: This article is for informational purposes only and does not constitute financial or investment advice. Cryptocurrency and digital asset markets carry significant risk. Always do your own research before making decisions.








