As quantum computing headlines continue to circulate, Bitcoin developers and security researchers are pushing back on claims that quantum machines are close to breaking Bitcoin’s cryptography.
Their core argument is that today’s quantum hardware remains dominated by error-correction and stability constraints, and that recent “breakthrough” narratives often mischaracterize what was actually demonstrated.
Current Risk
The near-term concern most often cited is that a sufficiently capable quantum computer could eventually use Shor’s algorithm to undermine the elliptic-curve cryptography behind common digital signature schemes, potentially enabling the theft of funds from exposed public keys.
But multiple Bitcoin-adjacent researchers and developers emphasize that this is not a “flip the switch” moment and that the practical barrier is not theory, it is engineering.
In one widely shared technical breakdown, Bob McElrath argued that recent claims suggesting small-bit ECC had been “broken” by quantum computation do not demonstrate a real cryptographic break.
5/6-bit ECC has NOT been broken by a quantum computer.
1. The answer was provided to the compiler to build the circuit
2. The circuit was too deep to run on real hardware
3. The results are indistinguishable from random noise
Cc: @lopp @brian_trollz @nic_carter @stevetipp
🧵— Bob McElrath (@BobMcElrath) December 21, 2025
In his view, the “attack” depended on classical pre-processing and effectively hard-coded the private key into the circuit, while the circuit depth was far beyond what real hardware could execute within qubit coherence limits.
He further stated that the reported output fidelity looked like random noise and that the claimed success rate performed worse than random guessing, making the result indistinguishable from coincidence rather than proof of a scalable method.
Blockstream CEO Adam Back echoed a similar reality check in multiple posts addressing “quantum FUD,” arguing that much of the public discussion conflates different cryptographic primitives and overstates timelines.
“Be prepared, not scared” –@cryptoquick on bitcoin quantum topic.✅
— Adam Back (@adam3us) December 22, 2025
Back’s posts emphasize that Bitcoin is secured by digital signatures, not encryption as quantum headlines often imply.
He also states that cryptographically relevant quantum computers (machines capable of reliably running deep, fault-tolerant circuits) are likely decades away, if they are feasible at all.
A key reason cited by both Back and McElrath is that current quantum research remains focused on error correction.
Much of the work involves keeping fragile qubits coherent long enough to perform basic operations, rather than executing the sustained, fault-tolerant computations required to threaten real-world cryptography.
Mitigation Factors and Network Preparedness
While rejecting short-term panic, researchers still treat quantum as a legitimate long-horizon threat model and describe a pathway that reduces risk without rushing immature cryptography into Bitcoin consensus.
Coinjoined Chris framed the core issue as asymmetric risk: cryptographic mistakes are hard to reverse in a consensus system with near-irreversible state.
People kept asking “what’s the solution?” as if the only two options are ignore the problem or panic-commit bad cryptography into consensus forever.
That framing is wrong.
Bitcoin’s problem is not that quantum risk exists. It’s that cryptographic mistakes are asymmetric: you…
— Coinjoined Chris ⚡ (@coinjoined) December 21, 2025
From that perspective, the job is not to “pick a forever post-quantum signature today,” but to (1) reduce exposure immediately using existing best practices, and (2) build an upgrade path that can be activated if external signals materially change.
The mitigation steps highlighted include avoiding address reuse, minimizing public key exposure until spend, auditing legacy outputs that are unnecessarily exposed, and giving the ecosystem time to coordinate (wallets, exchanges, miners, hardware devices, and users) before any consensus-locked change is required.
Developer Hunter Beast’s thread similarly argues for a staged approach and points to work underway on post-quantum options that lean on hash-based assumptions rather than lattice assumptions.
Okay, so here’s the deal with quantum.@Snowden leaked in 2013 the existence of a program called Penetrating Hard Targets. The NSA was working with defense contractors and the University of Maryland to build a quantum computer for the purposes of breaking public key cryptography.… https://t.co/uYLh0Ekps2
— Hunter Beast 🕯️ (@cryptoquick) December 22, 2025
He cites SLH-DSA (SPHINCS+) as a conservative candidate and discusses using it alongside existing schemes, rather than abruptly replacing current signature types, so Bitcoin can become “quantum ready” while maintaining hardware acceleration, compatibility, and practical fee economics.
Beast also highlights that post-quantum signatures are substantially larger than Schnorr signatures and acknowledges that throughput and scaling tradeoffs are real constraints that must be designed around rather than waved away.
Back’s posts align with that strategy in principle: introduce a “quantum-ready” option that can be used as an insurance policy without forcing everyone to pay the cost of large post-quantum signatures prematurely.
“Be prepared, not scared” –@cryptoquick on bitcoin quantum topic.✅
— Adam Back (@adam3us) December 22, 2025
The thrust of the approach, as described in his posts, is to give the network years (potentially a decade or more) to migrate to “quantum-ready” address patterns while continuing to spend normally in the meantime.
Deprecating older signature paths would only be considered if credible, cryptographically relevant quantum capabilities emerge.
Alongside the technical debate, some Bitcoiners have responded to quantum marketing narratives with satire.
JAN3 CEO Samson Mow posted a parody “temporal computer” announcement, claiming “timbits,” time travel to buy cheap Bitcoin, and “error correction,” culminating in the punchline that “Bitcoin must adapt to temporal computing in 2026 or it’s all over.”
I’ve invented a temporal computer that allows you to go back in time to buy Bitcoin for cheap.
While classical computers use bits, temporal computers use timbits.
With 6 stable timbits created for $500B per timbit, TCs current can go back in time…
— Samson Mow (@Excellion) December 22, 2025
This satire mirrors what developers say frustrates them most: breathless claims that skip over the hard parts (fault tolerance, error correction, deep circuits, coherent runtime) and jump straight to dramatic conclusions about Bitcoin collapsing on an arbitrary near-term deadline.
In the more sober framing offered across these threads, the practical story is less dramatic: quantum risk does not arrive as a jump scare.
Current efforts are focused on incremental exposure reduction, conservative cryptographic research, and designing upgrade paths that can be activated deliberately if needed.
Developers have emphasized avoiding the premature inclusion of unproven cryptographic schemes into Bitcoin’s consensus rules.
Share this article
