04-06-2026Price:

The Frontier

Your signal. Your price.

BITCOIN

Bitcoin developers accelerate post-quantum research amid overblown threats

Monday, April 6, 2026 · from 4 podcasts
  • Google warns ECDSA could be broken by 500,000-qubit machines, setting a 2029 migration deadline.
  • Engineers counter that hardware scaling remains a multi-decade challenge, far from lab theory.
  • Bitcoin is upgrading stealthily via splicing and new cryptography, avoiding panic-driven changes.

Quantum computing is forcing a security upgrade, but the timeline is a matter of fierce debate. On Bankless, Justin Drake called Google's 20x algorithmic improvement a 'momentous day,' moving a theoretical 'Q-Day' deadline for cracking Bitcoin's signatures up to 2029. Google's research suggests a machine with 500,000 physical qubits - down from tens of millions - could extract keys in minutes.

Ryan, Bankless:

- Like how powerful is this computer?

- Exactly.

- And so if we have a reduction in qubits

it means the computer is simply not as powerful but can do more powerful things.

The immediate threat, according to that view, is political. Roughly 15% of the Bitcoin supply, including Satoshi's presumed stash, sits in legacy addresses whose owners cannot move them to quantum-resistant wallets. The community faces a future choice: hard-fork to burn those coins or watch a quantum-equipped state seize them.

On TFTC, Brandon Black argues the threat is wildly overblown. The engineering chasm is six to nine orders of magnitude wide, and scaling subatomic manipulation is a fight against entropy we've been losing for forty years. 'They totally deny the realities of the difficulty in building physical things,' Black said of quantum alarmists. Rushing to adopt unvetted post-quantum algorithms - some recently broken by laptops - creates more risk than it solves, potentially breaking the Lightning Network and years of infrastructure.

The work is happening without the panic. Bitcoin Optech documented the merger of Bolt 1160, finalizing the Lightning splicing specification. This allows channels to be resized on the fly, a foundational upgrade for long-term liquidity management that improves network resilience. Simultaneously, research into 'shrimps' and isogeny-based cryptography offers paths to quantum resistance without disruptive data bloat.

Consensus is forming around steady, evidence-based evolution. The network will move when the hardware threat becomes tangible, not when a paper publishes. The current dynamic accelerates preparedness while exposing the gap between mathematical possibility and physical reality.

By the Numbers

  • 11%less in electricity (SATs)metric
  • 8%less in fuel (SATs)metric
  • 5%less in milk (SATs)metric
  • $500 billioninvestment for data centermetric
  • 9.2 GWpower generation capacitymetric
  • 3,000+simulated Bitcoin nodesmetric

Entities Mentioned

0xchatProduct
Adaptor signaturesProtocol
BasecampProduct
Bitcoin CoreProduct
Core LightningTool
Drift ProtocolProduct
EclairTool
EltooConcept
FROSTProtocol
Google AntigravityProduct
Lightning Dev KitTool
LNDTool
New York TimesCompany
OpenAItrending
PhoenixProduct
PolymarketCompany
SegWitProtocol
ShrimpsProduct
SpaceXCompany
Stacker NewsProduct
TaprootConcept
TBPNCompany

Source Intelligence

What each podcast actually said

SNL #218: Where you sitting...Good FridayApr 6

  • Siru's Bitcoin data project investigated Foundry's 7-consecutive-block streak, which occurred alongside a two-block reorg. The analysis, using data from the BOK project and Wumbo's node archives, suggests consecutive blocks happen more frequently than expected due to block latency, where co-located miners receive block headers faster.
  • Bitprojects.io demonstrated that Bitcoin node count can be easily 'sybillable' by simulating over 3,000 nodes using minimal hardware. The project aimed to show that node count is an unreliable metric for social consensus or soft fork signaling, with its shutdown causing a 'huge uptick' in incoming connections for other nodes.

Also from this episode:

Adoption (3)
  • Stacker News, a Bitcoin front page platform, features `txrush.com` and `truckyard.live` which visualize Bitcoin mempool transactions as highway traffic or spacecraft, pulling data from the mempool. Carl suggested these could be useful as phone widgets.
  • The Unboiled family, who live nomadically and attempt to transact predominantly in Bitcoin, tracks 'SATs inflation' based on their spending on essentials in South Africa. They reported a period of 'SATs deflation' where costs were lower by 11% for electricity, 8% for fuel, and 5% for milk.
  • Supratic outlined several privacy attacks on Lightning, emphasizing that blinded paths improve privacy but are not a 'magic shield' against tracing. These attacks include CLTV correlation, graph analysis on small nodes, payment probing, introduction, and node visibility.
AI & Tech (4)
  • The New York Times is blocking the Internet Archive from archiving its articles, citing protection against AI scraping. Keon argues this strategy, while aiming for short-term subscriber growth, will harm the NYT's long-term relevance by excluding its content from AI training data and future search results.
  • OpenAI acquired the popular podcast network TBPN, with CEO Sam Altman stating it was due to liking the show and not for promotional purposes. Keon speculates the acquisition might instead aim to subtly shape tech narratives favorable to OpenAI, similar to the Bezos-Washington Post acquisition.
  • Japanese and US companies formed the Portsmouth Consortium under a strategic trade agreement to develop AI infrastructure and power generation in Piketon, Ohio. The project plans to invest $500 billion to build a data center with a 9.2 GW capacity, leading Blockchain Boo to predict potential government bailouts given the scale of the AI race.
  • Carl and Keon debate the implications of free and abundant intelligence, with Keon suggesting it will only shift humanity's bottlenecks rather than solving all problems. Carl argues that with intelligence addressed, humanity's focus would shift to virtues, love, and internal well-being, aspects that artificial intelligence cannot fulfill.
Science (1)
  • Recent quantum computing breakthroughs, including Caltech's advancements in quantum operations and Google's implementation of Shor's algorithm with an order of magnitude fewer qubits, do not fundamentally alter the timeline for breaking elliptic curve cryptography. Scott Aaronson, an independent expert, suggests they might slightly shorten the indeterminate timeline, which could still be 5-10 years or longer.

#733: The Truth About The Quantum Threat with Brandon BlackApr 4

  • Brandon Black predicts quantum computers are 50 to 100 years or more from breaking a meaningful cryptographic system.
  • Black says scaling up quantum computers involves immense physical difficulty that is dramatically underplayed by proponents.
  • He states quantum research has seen new difficulty emerge every time they try to scale for the last four decades.
  • Black says we need to see a single quantum architecture successfully double its logical qubits multiple times before taking the scaling threat seriously.
  • Pro-quantum advocates derive confidence from impressive theoretical wins by brilliant researchers, not from physical scaling evidence.
  • A recent Google paper presented a mathematical improvement that reduces the logical qubits needed for Shor's algorithm.
  • Black says the Google result still leaves quantum computing six to nine orders of magnitude away from a cryptographically relevant device.
  • He notes hype around tiny physical improvements in quantum papers indicates the field is still far from a breakthrough.
  • Rushing a quantum-resistant upgrade for Bitcoin risks disrupting existing infrastructure like Lightning and multisig.
  • Black argues elliptic curve cryptography will likely fail someday, so Bitcoin should develop a suitable replacement at a measured pace.
  • Black says the Bitcoin developer community is actively researching post-quantum cryptography, contrary to claims of inaction.
  • He states Bitcoin's decentralized nature makes cryptographic changes far riskier and costlier than for centralized systems.
  • Black says Jonas Nick's Shrimps advance makes Shrinks Plus more compatible with Bitcoin's wallet recovery model.
  • He is hesitant to put current post-quantum systems into Bitcoin due to large signature sizes and incompatibility with wallet infrastructure.
  • Hash-based signatures are the current near-term consensus for post-quantum Bitcoin because they rely on trusted assumptions.
  • Lattice-based cryptography offers benefits but relies on newer, less battle-tested mathematical assumptions.
  • During NIST standardization, two of 69 post-quantum candidate algorithms were broken by classical computers.
  • Isogeny-based cryptography is a promising post-quantum avenue as it is elliptic curve based and only doubles on-chain size.
  • Black argues quantum fear distracts from and could stall development of useful Bitcoin innovations like Silent Payments and Musig.

ROLLUP: Google’s Quantum Warning | Trump’s Iran Speech | Ethereum Economic Zones | Drift HackApr 3

  • With 500,000 physical qubits, a quantum computer could attack Bitcoin or Ethereum and extract keys in approximately nine minutes, enabling 'on-spend attacks' that intercept transactions.
  • Google recommends that all cryptocurrency communities migrate to post-quantum cryptography by 2029, a deadline they have adopted internally.
  • Bitcoin faces a significant challenge as 6.9 million BTC (one-third of total supply) is vulnerable to quantum attack, including 2.3 million BTC (10-15%) from Satoshi and lost keys.
  • Google's paper outlines four options for dormant Bitcoin: do nothing, burn them, implement an 'hourglass approach' to limit spend rates, or use a 'bad side chain' for ownership proofs.
  • Ethereum has a broader quantum attack surface than Bitcoin, encompassing data availability, KZG ceremony vulnerability, and quantum-exposed admin keys controlling $200 billion in stablecoins and RWAs.
  • Despite a larger attack surface, Ethereum's quantum challenge is 'compensated by stronger community leadership' and an existing roadmap, according to Google's assessment.
  • The Ethereum Economic Zone (EEZ) is a proposal by Nosis and Jordi Belina aiming for synchronous composability between Layer 2s and Layer 1, enabling shared liquidity and atomic transactions.
  • Aave v4 is live, transforming Aave into a 'single liquidity hub' with specialized 'spokes,' allowing anyone to launch a spoke with DAO approval, governed by Aave as the main risk manager.

Also from this episode:

AI & Tech (3)
  • Google released a 'quantum warning' specifically for the crypto industry, indicating an algorithmic breakthrough that could accelerate the cracking of ECDSA signatures underlying Bitcoin and Ethereum.
  • Google's research indicates a 20x improvement to Shor's algorithm, potentially reducing the physical qubits needed to crack ECDSA from tens of millions to 500,000.
  • OpenAI recently closed a $122 billion funding round, valuing the company at nearly $900 billion, driven by rapid growth including $2 billion in monthly revenue.
Politics (2)
  • David argues that Trump's 19-minute speech on Operation Epic Fury, the Iran War, primarily served to inform markets that the conflict would continue for another 'two to three weeks.'
  • Polymarket suggests a 60% probability of U.S. forces entering Iran by April 30th and a 47% chance of a U.S.-Iran ceasefire by May 31st.
Business (9)
  • After Trump's speech, oil markets (Brent Crude, WTI futures) surged by 10-12%, while NASDAQ and S&P 500 futures initially dropped 0.5%, though the S&P later returned to pre-speech levels.
  • Fed Chair Jerome Powell stated that the U.S. national debt is growing 'substantially faster than our economy' and is on an 'unsustainable' path.
  • Polymarket indicates the possibility of a U.S. recession has risen from 20% to 36%, potentially influenced by rising energy costs impacting inflation.
  • Drift Protocol, a Solana perp Dex, suffered a $285 million exploit on April 1st, after an attacker social-engineered two of five multi-sig signers.
  • The Drift attacker minted and wash-traded a fake token for days to create perceived legitimacy, then used admin control to add it as collateral and withdraw other assets.
  • Hayden Adams (Uniswap) criticized Drift's admin setup, arguing that protocols with central keys capable of draining funds should not be called 'DeFi,' as it blurs the definition.
  • The Aave v4 model charges a higher risk premium for less secure collateral and uses credit lines set by the hub to constrain potential damage from individual spokes, mimicking a central banking structure.
  • Benji Taylor, a crypto wallet builder previously at Aave and Base, has joined X, signaling the company's intention to develop a crypto wallet within its 'money super app.'
  • SpaceX is targeting a June IPO with a projected valuation of $1.75 trillion, illustrating a trend where most company growth and upside are captured privately before public listing.
Adoption (1)
  • Phantom wallet now allows U.S. users to fund with bank transfers or Apple Pay, send/receive wires, and offers a debit card, moving towards a 'money super app' model for self-custodial wallets.

Bitcoin Optech: Newsletter #398 RecapMar 31

  • Dusty Damon, a long-time contributor, confirmed that BOLT 1160, which merges the splicing protocol into the Lightning spec, has been ratified.
  • A Lightning spec is merged only after a feature is implemented and tested across multiple implementations, analogous to HTML features working on multiple browsers.
  • Splicing was merged into the Lightning spec after successful implementation and testing across three different Lightning implementations.
  • Splicing allows users to change the size of a Lightning channel, which facilitates features like making on-chain payments directly from Lightning funds.
  • Dusty Damon is now working on ancillary features enabled by splicing, such as merging multiple transactions (splices, channel opens, on-chain payments) into a single transaction.
  • Z-Man suggested that focusing on swapping over splicing would have been more efficient due to swapping's smaller block space usage.
  • A multi-channel splice involves more than one Lightning channel, encompassing actions like cross-channel splices or directing funds to cold storage.
  • `spliceout` will soon allow sending funds to any Bitcoin address, extending its current functionality of moving funds to an on-chain wallet or another channel.
  • Bitcoin relies on digital signatures (ECDSA and Schnorr) to authorize spends without revealing private keys, using cryptographic math distinct from encryption.
  • Pay-to-Script-Hash (P2SH) further extended commit-reveal by hashing spending conditions in the output and revealing the full script only at spend time.
  • `OP_CHECKSIGFROMSTACK` allows cross-UTXO signature reuse by signing an arbitrary message instead of binding to a specific transaction input.
  • This feature is foundational for rebindable transactions and advanced Layer 2 designs like LN-Symmetry, which could update channel states without old states becoming punishment vectors.

Also from this episode:

Lightning (14)
  • The Phoenix iPhone wallet uses splicing to manage a single channel per user, which resulted in a 50% reduction in fees and improved user experience.
  • Large Lightning routing nodes use splicing to balance channels and manage one-way payment flows, potentially more than doubling throughput capacity.
  • Merging transactions via splicing could enhance privacy, reduce transaction costs, and improve blockchain efficiency.
  • Dusty Damon acknowledged that 'batch splicing' is challenging, citing difficulties in establishing reputation and preventing malicious actors in multi-party transactions.
  • Core Lightning PR 8450 extends its scripting engine to support cross-channel splices, which involve moving funds between different Lightning channels.
  • Dusty Damon's splicing engine in Core Lightning solves dynamic fee calculation, a complex problem where adding inputs for fees increases transaction size, demanding more fees in a recursive loop.
  • The splicing engine aims to be a standalone library, minimizing dependencies on Core Lightning, and can manage complex channel states, ensuring correct fee rates and balances.
  • The engine prevents potential fund loss scenarios ('foot guns') by preventing users from incorrectly interacting with partially signed Bitcoin transactions (PSBTs) via online services.
  • Core Lightning PRs 8856 and 8857 introduce `splicein` and `spliceout` RPC commands, allowing users to add funds to or remove funds from channels directly.
  • Core Lightning 26.04 Release Candidate 1 includes new splicing capabilities and adds an option for 'fronting nodes' in Bolt 12 offers to specify preferred routing peers.
  • Eclair PR 3247 introduces an optional peer scoring system to track forwarding revenue and payment volume, allowing nodes to auto-fund profitable channels or close unproductive ones.
  • LDK PR 4472 fixes a potential fund loss by ensuring transaction signatures are not released until the counterparty's commitment signature is durably persisted, securing channel state.
  • LND PR 10602 adds a `DeleteAttempts` RPC to its `Switch` RPC subsystem, enabling external controllers to manage and remove payment attempt records.
  • LND PR 10481 adds a Bitcoin Core (`bitcoind`) miner backend to LND's integration test framework, allowing tests for Bitcoin Core-specific features like V3 transaction relay.
Adoption (11)
  • Mike explained that Bitcoin transactions are public and do not use encryption, which is specifically about hiding information.
  • Bitcoin Core now includes encrypted transport for communication between nodes, encrypting peer-to-peer traffic that was previously in plain text.
  • Bitcoin script gradually evolved to a commit-reveal structure, starting from Satoshi's raw public key design to Pay-to-Public-Key-Hash (P2PKH).
  • Segwit and Taproot refined the commit-reveal approach, with Taproot being the most private by only revealing the specific script path used for spending.
  • Pay-to-Taproot (P2TR) multisig transactions reveal all public keys when spent via a script path due to the requirements of `OP_CHECKSIG` and `OP_CHECKSIGADD` opcodes.
  • For more private multisignatures, key-path spending in Taproot or emerging threshold signature schemes like FROST are viable alternatives.
  • Bitcoin Core version 28.0.4 is a maintenance release that backports bug fixes related to unnamed legacy wallet migration failures that affected version 30.
  • Luke Dash Jr.'s DNS seed was removed from Bitcoin Core (PR #33723) due to non-compliance with DNS seed requirements.
  • Bitcoin Core PR 33259 adds a 'Background Validation' field to the `getblockchaininfo` RPC response for assumed UTXO nodes, providing visibility into prior block validation progress.
  • Bitcoin Core PR 33414 enables Tor proof-of-work defenses for automatically created Onion services, requiring clients to perform work to connect, mitigating attacks.
  • Bitcoin Core PR 34846 adds new functions to the `libbitcoinkernel` C API to easily retrieve `nLockTime` and `nSequence` fields for checking BIP34 rules without manual deserialization.