Saturday, November 22, 2025
DIGESTWIRE
Contribute
CONTACT US
  • Home
  • World
  • UK
  • US
  • Breaking News
  • Technology
  • Entertainment
  • Health Care
  • Business
  • Sports
    • Sports
    • Cricket
    • Football
  • Defense
  • Crypto
    • Crypto News
    • Crypto Calculator
    • Coins Marketcap
    • Top Gainers and Loser of the day
    • Crypto Exchanges
  • Politics
  • Opinion
  • Blog
  • Founders
No Result
View All Result
  • Home
  • World
  • UK
  • US
  • Breaking News
  • Technology
  • Entertainment
  • Health Care
  • Business
  • Sports
    • Sports
    • Cricket
    • Football
  • Defense
  • Crypto
    • Crypto News
    • Crypto Calculator
    • Coins Marketcap
    • Top Gainers and Loser of the day
    • Crypto Exchanges
  • Politics
  • Opinion
  • Blog
  • Founders
No Result
View All Result
DIGESTWIRE
No Result
View All Result
Home Blockchain

Bitcoin will be hacked in 2 years… and other quantum resistant marketing lies

by DigestWire member
November 5, 2025
in Blockchain, Crypto Market, Cryptocurrency
0
Bitcoin will be hacked in 2 years… and other quantum resistant marketing lies
74
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter

A new quantum countdown website projects a two– to three-year window for quantum computers to break widely used public key cryptography, placing Bitcoin within its scope.

Sites like The Quantum Doom Clock, operated by Postquant Labs and Hadamard Gate Inc., package aggressive assumptions about qubit scaling and error rates into a timeline that spans the late 2020s to early 2030s for a cryptographically relevant quantum computer.

This framing doubles as product marketing for post-quantum tooling, but you need to read the fine print to notice that disclosure.

According to the Quantum Doom Clock, recent resource estimates that compress logical-qubit counts, combined with optimistic hardware error trends, suggest that the required physical-qubit class for breaking ECC falls into the few-million range under favorable models.

The clock’s presets rely on exponential hardware growth and improving fidelity with scale, while runtime and error-correction overheads are treated as surmountable on a short fuse.

Government standards bodies are not treating a 2027 to 2031 break as a base case.

The U.S. National Security Agency’s CNSA 2.0 guidance recommends that National Security Systems should complete their transition to post-quantum algorithms by 2035, with staged milestones before then, a cadence echoed by the UK National Cyber Security Centre.

This requires identifying quantum-sensitive services by 2028, prioritizing high-priority migrations by 2031, and completing them by 2035.

The policy horizon serves as a practical risk compass for institutions that must plan capital budgets, vendor dependencies, and compliance programs, implying a multi-year migration arc rather than a two-year cliff.

Laboratory progress is real and relevant, yet it does not exhibit the combination of scale, coherence, logical gate quality, and T-gate factory throughput that Shor’s algorithm would require at Bitcoin-breaking parameters.

According to Caltech, a neutral-atom array with 6,100 qubits has reached 12.6-second coherence with high-fidelity transport, an engineering step toward fault tolerance rather than a demonstration of low-error logical gates at proper code distances.

Google’s Willow chip work highlights algorithmic and hardware advances on 105 qubits, claiming exponential error suppression with scale on specific tasks. Meanwhile, IBM has demonstrated a real-time error-correction control loop running on commodity AMD hardware, which is a step toward systems plumbing fault tolerance.

None of these set pieces removes the dominant overheads that prior resource studies identified for classical targets like RSA and ECC under surface code assumptions.

A widely cited 2021 analysis by Gidney and Ekerå estimated that factoring RSA-2048 in about eight hours would need roughly 20 million noisy physical qubits at around 10⁻³ physical error rates, underscoring how distillation factories and code distance drive totals more than raw device counts.

For Bitcoin, the earliest material vector is key exposure on-chain rather than harvest-now-decrypt-later attacks against SHA-256. According to Bitcoin Optech, outputs that already reveal public keys, such as legacy P2PK, reused P2PKH after spend, and some Taproot paths, would become targets once a cryptographically relevant machine exists.

At the same time, typical P2PKH remains protected by hashing until it is spent. Core contributors and researchers track multiple containment and upgrade paths, including Lamport or Winternitz one-time signatures, P2QRH address formats, and proposals to quarantine or force rotation of insecure UTXOs.

Proponents behind BIP-360 claim that more than 6 million BTC are held in quantum-exposed outputs across P2PK, reused SegWit, and Taproot, which is best understood as an upper bound from advocates rather than a consensus metric.

The economics of migration matter as much as the physics.

With NIST now finalizing FIPS-203 for key encapsulation and FIPS-204 for signatures, wallets and exchanges can implement the chosen family today.

According to NIST FIPS-204, ML-DSA-44 has a 1,312-byte public key and a 2,420-byte signature, which are orders of magnitude larger than those of secp256k1.

Under current block constraints, replacing a typical P2WPKH input witness with a post-quantum signature and public key would increase the per-input size from tens of virtual bytes to multiple kilobytes. This would compress throughput and push fees higher unless paired with aggregation, batch-verification-friendly constructs, or commit-reveal patterns that move bulk data off hot paths.

Institutions with many exposed-pubkey UTXOs have an economic incentive to de-expose and rotate methodically before a scramble concentrates demand into a single fee spike window.

The divergences between a marketing-aggressive clock and institutional roadmaps can be summarized as a set of input assumptions.

Recent papers that reduce logical-qubit counts for factoring and discrete log problems can make a few-million physical qubit target appear closer, but only under assumed physical error rates and code distances that remain beyond what labs demonstrate at scale.

The mainstream lab view reflects stepwise device scaling where adding qubits can erode quality, with a path toward 10⁻⁴ to 10⁻⁵ error rates as code distance grows.

A conservative read places material limits, control complexity, and T-factory throughput as rate limiters that extend timelines into the 2040s and beyond, absent breakthroughs.

The policy drumbeat to complete migrations by 2035 aligns more with the stepwise and conservative cases than with exponential hardware trajectories.

Case Hardware and error path Physical qubits for ECC-256* Earliest window Primary sources
Marketing-aggressive Exponential qubit growth, ≤10⁻³ errors improving with scale Few million Late-2020s to early-2030s Quantum Doom Clock
Mainstream lab Stepwise scaling, error reduction with code distance Many millions Mid-2030s to 2040s CNSA 2.0, UK NCSC
Conservative Logistic growth, slower fidelity gains, factory bottlenecks Tens of millions+ 2040s to 2050s+ Quantum Doom Clock

*Totals depend on surface code distance, logical gate error targets, and T-gate distillation throughput. See Gidney and Ekerå (2021).

Forward-looking markers to watch are concrete.

  1. Peer-reviewed demonstrations of long-lived logical gates, not only memory, at code distance around 25 with sub-10⁻⁶ logical error rates.
  2. Practical T-gate distillation factories that deliver throughput for algorithms with 10⁶-plus logical qubits.
  3. Bitcoin Improvement Proposals that advance post-quantum signature pathways from prototype to deployable standard, including formats that keep bulk artifacts off the hot path.
  4. Public commitments by major exchanges and custodians to rotate exposed outputs, which would distribute fee pressure across time.

The Doom Clock’s utility is narrative, compressing uncertainty into urgency that funnels to a vendor solution.

The risk compass that matters for engineering and capital planning is anchored by NIST standards now finalized, government migration deadlines around 2035, and the lab milestones that would mark real inflection points for fault tolerance.

According to NIST’s FIPS-203 and FIPS-204, the tooling path is available today, which means wallets and services can start de-exposing keys and testing larger signatures without accepting a two-year doomsday premise.

Bitcoin’s hash-then-reveal design choices already delay exposure until spending time on common paths, and the network’s playbook includes multiple rotation and containment options when credible signals, not vendor clocks, indicate it’s time to proceed.

It is, however, worth remembering that when quantum computers make Bitcoin’s cryptography vulnerable, other legacy systems are also exposed. Banks, social media, finance apps, and much more will have backdoors left wide open.

Societal collapse is a bigger risk than losing some crypto if legacy systems are not updated.

For those who argue that Bitcoin upgrades will be slower than those of banks, etc., remember this, some ATMs and other banking infrastructure around the world still run on Windows XP.

The post Bitcoin will be hacked in 2 years… and other quantum resistant marketing lies appeared first on CryptoSlate.

Read Entire Article
Tags: BlockchainCoin SurgesCryptoslate
Share30Tweet19
Next Post
India to Launch ARC Token Stablecoin Backed by Government Securities

India to Launch ARC Token Stablecoin Backed by Government Securities

Nvidia boss defends AI against claims of bubble by ‘Big Short’ investor

Nvidia boss defends AI against claims of bubble by 'Big Short' investor

‘The mess my life became is not unique’: Diary collection wins prestigious non-fiction prize

'The mess my life became is not unique': Diary collection wins prestigious non-fiction prize

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

No Result
View All Result
Coins MarketCap Live Updates Coins MarketCap Live Updates Coins MarketCap Live Updates
ADVERTISEMENT

Highlights

Marjorie Taylor Greene resigns from Congress after clash with Trump

Grooming gang victims being denied compensation over criminal records

Anti-CZ Whale Loses Big: $61M in Profit Wiped Out As Ethereum and XRP Longs Collapse

Only A True Swiftie Can Match These 13 Taylor Lyrics To Their Correct Songs

I’m Absolutely Disgusted By The Fashion Designers Who Refused To Dress These 40 Celebs

Sovereign Bitcoin adoption would be the ultimate upside catalyst: Jeff Park

Trending

How Brendan Fraser Confronted His Loneliness in ‘Rental Family’ and His Warning on AI Acting: ‘It Strikes Me as a Form of Plagiarism’
Entertainment

How Brendan Fraser Confronted His Loneliness in ‘Rental Family’ and His Warning on AI Acting: ‘It Strikes Me as a Form of Plagiarism’

by DigestWire member
November 22, 2025
0

Three years after his triumphant Oscar win for “The Whale,” Brendan Fraser has found his next deeply...

Marjorie Taylor Greene, After Break With Trump, Resigns From Congress

Marjorie Taylor Greene, After Break With Trump, Resigns From Congress

November 22, 2025
Early power play goals lead Boston College hockey to 7-3 win over UMaine

Early power play goals lead Boston College hockey to 7-3 win over UMaine

November 22, 2025
Marjorie Taylor Greene resigns from Congress after clash with Trump

Marjorie Taylor Greene resigns from Congress after clash with Trump

November 22, 2025
Grooming gang victims being denied compensation over criminal records

Grooming gang victims being denied compensation over criminal records

November 22, 2025
DIGEST WIRE

DigestWire is an automated news feed that utilizes AI technology to gather information from sources with varying perspectives. This allows users to gain a comprehensive understanding of different arguments and make informed decisions. DigestWire is dedicated to serving the public interest and upholding democratic values.

Privacy Policy     Terms and Conditions

Recent News

  • How Brendan Fraser Confronted His Loneliness in ‘Rental Family’ and His Warning on AI Acting: ‘It Strikes Me as a Form of Plagiarism’ November 22, 2025
  • Marjorie Taylor Greene, After Break With Trump, Resigns From Congress November 22, 2025
  • Early power play goals lead Boston College hockey to 7-3 win over UMaine November 22, 2025

Categories

  • Blockchain
  • Blog
  • Breaking News
  • Business
  • Cricket
  • Crypto Market
  • Cryptocurrency
  • Defense
  • Entertainment
  • Football
  • Founders
  • Health Care
  • Opinion
  • Politics
  • Sports
  • Strange
  • Technology
  • UK News
  • Uncategorized
  • US News
  • World

© 2020-23 Digest Wire. All rights belong to their respective owners.

No Result
View All Result
  • Home
  • World
  • UK
  • US
  • Breaking News
  • Technology
  • Entertainment
  • Health Care
  • Business
  • Sports
    • Sports
    • Cricket
    • Football
  • Defense
  • Crypto
    • Crypto News
    • Crypto Calculator
    • Blockchain
    • Coins Marketcap
    • Top Gainers and Loser of the day
    • Crypto Exchanges
  • Politics
  • Opinion
  • Strange
  • Blog
  • Founders
  • Contribute!

© 2024 Digest Wire - All right reserved.

Privacy Policy   Terms and Conditions

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.