04-12-2026Price:

The Frontier

Your signal. Your price.

BITCOIN

Google shrinks Bitcoin's quantum threat window to under five years

Sunday, April 12, 2026 · from 5 podcasts, 6 episodes
  • New Google research cuts by 20x the quantum bits needed to break Bitcoin's cryptography, forcing a 2029 deadline.
  • A fast quantum computer could steal funds mid-transaction, erasing on-chain ownership in under ten minutes.
  • Developers debate trade-offs between massive signatures and slow verification, but Bitcoin lacks a governance path to upgrade.

Recent quantum computing breakthroughs have moved a catastrophic threat from distant theory to near-term engineering. Alex Pruden, on What Bitcoin Did, estimates a 50% chance a cryptographically relevant quantum computer arrives by 2033, with 2029 as a plausible early target. Google's Willow paper demonstrated below-threshold error correction, proving scalability, while separate research from Google and Caltech slashed the required qubits for an attack by an order of magnitude.

"The resource estimates for breaking elliptic curve cryptography are plummeting."

- Alex Pruden, What Bitcoin Did

The core vulnerability isn't mining but ownership. A quantum computer solves the discrete logarithm problem to derive private keys from public keys. Approximately 6 million BTC in addresses with exposed keys are immediate targets. The existential threat is a 'fast-clock' machine that can compute a key in under ten minutes, enabling an attacker to front-run any transaction from the mempool.

On Bitcoin And, host David Bennett discussed Ava Hu Levy's 'Quantum Safe Bitcoin' proposal, which uses hash puzzles within existing script rules as a stopgap, albeit with prohibitively high fees. Developer Jonas Nick, detailed in Bitcoin Optech, is pitching 'Shrimps,' a stateful signature scheme that keeps signatures small unless a user loses their signing state. The alternative is isogeny-based cryptography, which preserves key-tweaking features but verifies 50 times slower than current signatures.

The debate over technical trade-offs obscures a deeper crisis: Bitcoin's governance. Nic Carter, on Bankless, warns the protocol's resistance to change, a peacetime strength, is now a lethal liability. There is no mechanism to coordinate the 'total mobilization' required for a post-quantum migration.

"If the Bitcoin community cannot coordinate a post-quantum migration, major institutions will do it for them."

- Nic Carter, Bankless

Carter predicts top custodians like BlackRock and Coinbase could force a fork to burn vulnerable Satoshi-era coins, sacrificing absolute property rights for market stability. The window for a smooth, community-led upgrade is narrowing faster than the code is being written.

Source Intelligence

What each podcast actually said

CIA AI, Bitcoin Quantum Defense, and Tether AI Toolkit | Bitcoin NewsApr 10

  • Starkware developer Ava Levy proposed Quantum Safe Bitcoin, a scheme making transactions quantum-resistant without soft forks by replacing ECDSA reliance with hash functions.
  • The QSB scheme requires using services like Slipstream for direct miner transmission because transactions exceed standard network relay limits, posing a practical barrier for average users.
  • X402 protocol transaction volume peaked at 13.7 million in a week in November but plunged to just 112,700 weekly transactions by the last week of March.
  • Tether CEO Paolo Ardoino argues centralized AI is a dead end due to speed-of-light latency and single points of failure, positioning QVAC as a building block for a decentralized 'stable intelligence era'.
  • The Royal Government of Bhutan has sold over 70% of its Bitcoin holdings this year, moving out $233 million worth and reducing its stash from a peak of nearly 13,000 BTC to around 3,770 BTC.
  • Bitcoin network hashrate held at 952 exahashes per second with 33,000 unconfirmed transactions and an average fee of 0.02 BTC per block at the time of reporting.

Also from this episode:

AI & Tech (3)
  • The Central Intelligence Agency plans to embed AI coworkers into its analytic platforms within a couple of years to assist with drafting reports, testing conclusions, and identifying intelligence trends.
  • CIA Deputy Director Michael Ellis stated the agency's AI adoption is partly to counter China's narrowed technological innovation gap with the U.S., which he said was significant five to ten years ago.
  • The CIA reviewed 300 different AI projects last year for tasks like processing large datasets and language translation, and created its first intelligence report using AI.
AI Infrastructure (2)
  • Coinbase upgraded its X402 protocol to enable usage-based pricing for AI compute, replacing a flat fee model, and transferred protocol ownership to the nonprofit Linux Foundation.
  • Tether launched QVAC SDK, an open-source toolkit for building local, offline AI apps that runs on iOS, Android, Windows, Mac, and Linux without cloud servers.
Markets (1)
  • World Liberty Financial, co-founded by the Trump family, used nearly 2 billion of its own WLFI tokens as collateral on Dolomite, borrowing $31.4 million in stablecoins and creating concentrated risk for other depositors.

Quantum Salvage | Bitcoin NewsApr 9

  • David Bennett reports the Morgan Stanley Bitcoin Trust (MSBT) raised $33.9 million on its first trading day, trading over 1.6 million shares.
  • Bernstein analysts led by Gautam Chughani estimate Bitcoin has a three to five year window to implement post-quantum security, framing it as a scheduled evolution rather than a crisis.
  • Google research estimates a future quantum machine could break Bitcoin's elliptic curve cryptography with under 500,000 physical qubits, a 20x reduction from prior estimates.
  • Bernstein notes scaling quantum computers to attack levels would require breakthroughs in hardware and error correction, potentially costing tens to hundreds of billions of dollars.
  • Bernstein identifies approximately 1.7 million BTC in Satoshi-era wallets with permanently visible public keys as the highest exposure segment to a quantum attack.
  • Nick Carter's fiction piece 'Trillion Dollar Salvage' explores a scenario where a quantum attack on exposed Bitcoin leads the US government to seize coins under maritime salvage law, testing Bitcoin's social consensus.
  • Roast Beef of Lightning Labs developed a prototype tool allowing wallet recovery via proof-of-ownership during a quantum emergency upgrade, generating a proof in 55 seconds and verifying it in under 2 seconds on a MacBook.
  • Developer Robert Graham argues Adam Back and Satoshi Nakamoto's C++ coding styles are completely different, with Back's resembling academic Unix code and Satoshi's that of a professional Windows programmer, contradicting the New York Times' linguistic analysis.
  • BitMEX co-founder Ben Delo donated $5.4 million to Nigel Farage's Reform UK party, a move Bennett suggests may fuel UK political efforts to ban crypto donations.
  • Arthur Hayes is skeptical of reports Iran is collecting Bitcoin tolls from oil tankers, demanding on-chain proof and calling it IRGC theater until verified.
  • Nunchuk released open-source tools for AI agents to interact with Bitcoin wallets using a bounded authority model, where agents operate within user-set spending caps and approval policies.

Also from this episode:

AI & Tech (1)
  • Visa unveiled 'Intelligent Commerce Connect', a platform for AI-driven autonomous shopping that supports tokenized payments and is compatible with major AI agent protocols.
What Bitcoin Did
What Bitcoin Did

Peter McCormack

Is the Quantum Threat to Bitcoin Actually Real? | Alex PrudenApr 9

  • Alex Pruden estimates a 50% chance a cryptographically relevant quantum computer capable of breaking Bitcoin will exist by 2033, potentially as early as 2029.
  • A quantum computer breaks Bitcoin by solving the discrete logarithm problem to derive private keys from public keys. A slow machine threatens only exposed public keys, while a fast one could front-run transactions from the mempool.
  • Roughly 6 million Bitcoin currently reside in UTXOs with exposed public keys, making them immediately vulnerable to a slow-clock quantum attack.
  • Recent quantum computing papers from Google and Oratomic lowered the resource estimates for breaking elliptic curve cryptography by orders of magnitude, moving the goalposts closer.
  • Pruden argues Bitcoin should start implementing and testing post-quantum cryptography now to avoid a rushed, forced migration later. He views a multi-year consensus and deployment process as inevitable.
  • BIP 360 is a first step toward quantum resistance but is insufficient. Pruden advocates for deploying multiple candidate algorithms on testnets now to understand real-world trade-offs like signature size and speed.
  • A quantum attack may not be detectable; stolen coins could look like a routine hack. Pruden argues Bitcoin is a uniquely attractive target due to its irreversible settlement and potential for immediate profit.
  • Migrating all Bitcoin UTXOs to post-quantum addresses would take 75-100 days if the network were dedicated solely to migration, or about a year with a more practical allocation of block space.
  • The community is split on whether to burn 'lost' coins like Satoshi's during a migration. Pruden leans toward burning for economic health but acknowledges the profound property rights dilemma.
  • Standardized post-quantum algorithms are based on hash functions or lattice problems, with no guarantee they will remain unbroken. This underscores the need for long-term cryptographic agility.

Also from this episode:

AI & Tech (2)
  • Google's Willow paper in 2024 demonstrated below-threshold error correction, proving error rates can decrease as more physical qubits are added. This was a key theoretical breakthrough for scalability.
  • Neutral atom quantum computers have progressed from zero physical qubits to arrays of thousands in five years. The Oratomic paper theorized an architecture needing only 10,000 physical qubits for a slow-clock attack.

Bitcoin Optech: Newsletter #399 RecapApr 7

  • Jonas Nick details Shrimps, a post-quantum hash-based signature scheme where signatures are 350 bytes on a primary stateful device. If that device is lost, imported devices produce 2.5 kilobyte signatures, with a final 8 kilobyte fallback for catastrophic failure.
  • Shrimps and its predecessor Shrinks require wallets to be stateful, tracking an incrementing integer for each public key to count signatures. If this state is lost or corrupted, security breaks and the wallet must use a large fallback signature.
  • Conduition highlights isogeny-based cryptography as a promising post-quantum candidate because its structure allows key re-randomization. This enables BIP32-like hierarchical key derivation and Taproot-like key tweaking, features hash-based and lattice-based schemes struggle to replicate.
  • SkiSign, an isogeny-based signature scheme, has 65-byte public keys and 148-byte signatures. Verification is about 50 times slower than Schnorr or Dilithium, posing a potential bottleneck for full block validation.
  • Conduition notes isogeny cryptography relies on the supersingular isogeny path problem, a newer but well-studied assumption. He cautions that schemes like SkiSign and PRISM have complementary security proofs, making it hard to prove both secure simultaneously.
  • Armin describes how wallet fingerprints - artifacts like signature grinding, SIGHASH flags, and nSequence values - can break PayJoin privacy. Analysts can partition transaction inputs between sender and receiver by spotting inconsistent behaviors between collaborating wallets.
  • Explicitly stating SIGHASH_ALL in Taproot signatures is a wasteful bug that creates a fingerprint. Since Taproot defaults to SIGHASH_ALL, including the byte adds unnecessary transaction weight and identifies non-compliant wallets.
  • BIPs 440 and 441, part of the "script restoration" effort, are now published. BIP 440 proposes a VAR Ops budget for limiting script complexity, while BIP 441 proposes re-enabling disabled opcodes like OP_CAT within a new Tapscript version.
  • Pais proposes BIP 2130, a standard for wallet backup metadata formats. It aims to create an interoperable way to export and import not just descriptors, but full wallet state including labels, transaction history, and coin data.
  • Eclair 3269 adds automatic liquidity reclamation, closing idle redundant channels. It reduces relay fees over time and closes a channel if, after five days at minimum fee, payment volume stays below 5% of capacity and the local balance is over 25%.
  • LDK adds support for zero-channel-reserve channels, primarily for LSP-user relationships. This lets users commit their full on-chain balance to a channel, shifting the trust and risk onto the service provider.
  • LND implements proper MuSig2 nonce handling and RBF support for cooperatively closing simple Taproot channels. The update hardens the protocol against nonce reuse, which could expose private keys.

Bitcoin Has 3 Years to Survive | Nic Carter on Bitcoin’s Quantum VulnerabilityApr 6

  • Bitcoin's governance is spectacularly unsuited to the quantum threat, which requires total mobilization for core infrastructural change under an uncertain timeline.
  • The Google and Oratomic papers published improved resource estimates for breaking Bitcoin's ECDSA cryptography, indicating the threat is closer than previously thought. The hardware does not yet exist.
  • A short-range 'on-spend' attack could intercept a Bitcoin transaction in as little as nine minutes using the improved algorithms, forcing the entire network to be post-quantum before the computer is built.
  • The authors of the Google paper suggest a fast takeoff model for quantum computing, where significant prior notice before a cryptographically relevant quantum computer exists is unlikely.
  • Google has accelerated its internal post-quantum transition timeline to 2029, while the U.S. government targets 2030-2035 for critical functions.
  • Transitioning Bitcoin to post-quantum cryptography is complex, requiring consensus on a signature scheme, a coordinated migration of all addresses, and a decision on dormant coins.
  • Post-quantum signature schemes are much larger than current ones, requiring a likely uncontroversial block size increase to accommodate the 10x to 1000x increase in transaction data.
  • The Google paper estimates 6.9 million Bitcoin are vulnerable to long-range quantum attacks, with 2.3 million considered permanently unmovable Satoshi or lost coins.
  • Nic Carter predicts Bitcoin's largest custodians and exchanges will eventually demand a fork where the unmovable Satoshi coins are burned, establishing that as the canonical BTC.
  • Ethereum is seen as more proactive on the quantum threat, having a published roadmap and an advantage as it has not hyper-optimized around small signatures like some high-performance chains.

Also from this episode:

Regulation (1)
  • Carter's preferred solution uses salvage law, where a trusted entity recovers vulnerable coins and holds them in trust for their original owners, with a finder's fee, rather than protocol-level burning.

SNL #218: Where you sitting...Good FridayApr 6

  • Stacker News, a Bitcoin front page platform, features `txrush.com` and `truckyard.live` which visualize Bitcoin mempool transactions as highway traffic or spacecraft, pulling data from the mempool. Carl suggested these could be useful as phone widgets.
  • Siru's Bitcoin data project investigated Foundry's 7-consecutive-block streak, which occurred alongside a two-block reorg. The analysis, using data from the BOK project and Wumbo's node archives, suggests consecutive blocks happen more frequently than expected due to block latency, where co-located miners receive block headers faster.
  • Bitprojects.io demonstrated that Bitcoin node count can be easily 'sybillable' by simulating over 3,000 nodes using minimal hardware. The project aimed to show that node count is an unreliable metric for social consensus or soft fork signaling, with its shutdown causing a 'huge uptick' in incoming connections for other nodes.

Also from this episode:

Adoption (2)
  • The Unboiled family, who live nomadically and attempt to transact predominantly in Bitcoin, tracks 'SATs inflation' based on their spending on essentials in South Africa. They reported a period of 'SATs deflation' where costs were lower by 11% for electricity, 8% for fuel, and 5% for milk.
  • Supratic outlined several privacy attacks on Lightning, emphasizing that blinded paths improve privacy but are not a 'magic shield' against tracing. These attacks include CLTV correlation, graph analysis on small nodes, payment probing, introduction, and node visibility.
AI & Tech (4)
  • The New York Times is blocking the Internet Archive from archiving its articles, citing protection against AI scraping. Keon argues this strategy, while aiming for short-term subscriber growth, will harm the NYT's long-term relevance by excluding its content from AI training data and future search results.
  • OpenAI acquired the popular podcast network TBPN, with CEO Sam Altman stating it was due to liking the show and not for promotional purposes. Keon speculates the acquisition might instead aim to subtly shape tech narratives favorable to OpenAI, similar to the Bezos-Washington Post acquisition.
  • Japanese and US companies formed the Portsmouth Consortium under a strategic trade agreement to develop AI infrastructure and power generation in Piketon, Ohio. The project plans to invest $500 billion to build a data center with a 9.2 GW capacity, leading Blockchain Boo to predict potential government bailouts given the scale of the AI race.
  • Carl and Keon debate the implications of free and abundant intelligence, with Keon suggesting it will only shift humanity's bottlenecks rather than solving all problems. Carl argues that with intelligence addressed, humanity's focus would shift to virtues, love, and internal well-being, aspects that artificial intelligence cannot fulfill.
Science (1)
  • Recent quantum computing breakthroughs, including Caltech's advancements in quantum operations and Google's implementation of Shor's algorithm with an order of magnitude fewer qubits, do not fundamentally alter the timeline for breaking elliptic curve cryptography. Scott Aaronson, an independent expert, suggests they might slightly shorten the indeterminate timeline, which could still be 5-10 years or longer.