The quantum threat to Bitcoin is real, but the timeline is misunderstood. Media coverage of Google’s 20x speedup in breaking elliptic curve cryptography sparked fresh panic. Yet on the Presidio Bitcoin Jam, Steve Lee framed this as an N-1 problem: if a cryptographically relevant quantum computer is ten years away, a 20x speedup might shave off weeks, not years.
The true chasm is engineering. Brandon Black on TFTC argued the hardware needed is six to nine orders of magnitude from viability. Scaling subatomic manipulation consistently has eluded researchers for forty years. The gap between a lab paper and a machine that can run Shor’s algorithm at scale is vast.
Brandon Black, TFTC:
- The quantum field is full of these perspectives that say if this is possible, all we have to do is build it.
- They totally deny the realities of the difficulty in building physical things that manipulate tiny subatomic particles.
The pressure to "do something" creates its own danger. A hasty switch to an unvetted post-quantum signature scheme would break the Lightning Network, invalidate multisig wallets, and cripple years of infrastructure. Black warned that changing Bitcoin based on claims, not evidence, is the most obvious attack vector.
Work on quantum resistance is happening, just without the panic. Researchers are advancing signature schemes like "shrimps" and isogeny-based cryptography, which offer long-term defense without bloating transaction data. These upgrades are pursued for their utility in trusts and cold storage, not because of headlines.
Steve, Presidio Bitcoin Jam:
- I think the best framing that I've heard on it is n-1.
- N is the number of years before we have a cryptographically relevant quantum computer.
Bitcoin’s defense is its conservatism. The network adopts new primitives only after they are battle-tested, as with Schnorr signatures. The consensus is clear: the quantum threat is material, but the response must be measured. Panic is a greater immediate risk than any quantum computer.

