Bitcoin and quantum computing
Likelihood and Timeline of Cryptographically Relevant Quantum Computers (CRQC)
- Posters treat probabilities as “psychological,” not objective; estimates for CRQC by 2030–2045 vary widely.
- Some argue CRQC is inevitable and timelines recently moved earlier due to new results and multiple hardware approaches.
- Others stress remaining physical and engineering hurdles and say practical impossibility is still plausible.
- Unclear consensus: risk is non‑zero, timing highly uncertain.
Core Threat Model to Bitcoin
- CRQC breaking ECDSA would allow recovery of private keys from public keys and signatures.
- Biggest concern: large, old, and “dead” wallets whose public keys have been exposed; they can’t be migrated automatically.
- Potential attacks: mass theft, burning large wallets to tank confidence, or quiet selective theft/mining to avoid detection.
- Several argue catastrophe for those coins is effectively guaranteed if no pre‑emptive migration happens.
Mitigation and Upgrade Proposals
- General agreement: mitigation must happen before “Q‑day”; after signatures are broken, you can’t prove ownership.
- Proposed tools: post‑quantum signatures (e.g. SHRINCS/SHRIMPS), quantum‑resilient commitments (Taproot work), ZK proofs of key/seed knowledge, and commit‑reveal schemes.
- Ideas for legacy outputs: burning vulnerable coins, capping their spend rate (e.g. “Hourglass” style throttling), or long, messy recovery processes using off‑chain identity proofs and some form of committee/court.
- All approaches struggle with scale (TPS limits), user coordination, and philosophical resistance to centralization.
Forks, Governance, and “Immutability”
- Debate whether a rollback to pre‑attack state plus crypto change would still be “Bitcoin” or would destroy its immutability narrative.
- Others note Bitcoin has already undergone contentious upgrades; longest‑chain consensus defines “Bitcoin” in practice.
- Concerns that recovery mechanisms could introduce plutocracy, centralized “ownership courts,” or de‑facto KYC.
- ETFs and custodians might coordinate a “new Bitcoin” based on their internal ledgers, sidelining self‑custody users.
Legal and Ethical Questions
- Disagreement whether key‑cracking is “just math” or theft.
- Counterpoints cite tax treatment, asset seizures, and real cases where using published seed phrases led to criminal charges.
- Many assume courts will extend existing theft/fraud doctrines to cryptocurrency, but exact treatment of pure key‑guessing remains unclear.
Economic and Broader Context
- Opinions split on whether burning or stealing large amounts would crash price or reduce supply and potentially support it.
- Some note Bitcoin is mainly used as a speculative asset, not a payment rail, and is a small slice of global digital value.
- Comparisons: centralized systems (banks, HTTPS, messaging) are expected to migrate to post‑quantum schemes more quickly than Bitcoin.