Bitcoin’s Quantum Risk: Real, Distant, and Demanding a Coordinated Bitcoin Response
Ark Invest and Unchained say Bitcoin faces a long-term quantum risk, not an immediate threat. Up to 35% of BTC could be exposed; BIP 360’s P2MR lays groundwork for post-quantum upgrades.

Because Bitcoin
March 13, 2026
Quantum anxiety around crypto is getting louder, but panic is not the trade. A new joint analysis from Ark Invest and Unchained frames quantum computing as a genuine, long-duration risk to Bitcoin’s cryptography, not a near-term breaker. If quantum progress accelerates, the internet’s broader security stack likely buckles before Bitcoin, offering a visible runway to adapt.
Here’s the crux worth focusing on: coordination, not compute, is the harder problem. The math can be upgraded; aligning wallets, exchanges, miners, and users takes time. That lag—paired with address hygiene issues—defines Bitcoin’s real exposure.
- Scope of exposure: roughly 1.7 million BTC sit in early Pay-to-Public-Key (P2PK) outputs believed lost, and about 5.2 million BTC reside in reused or Taproot addresses that could be moved. Together, that’s close to 35% of supply that might be vulnerable if elliptic curve cryptography (ECC) is compromised. - Attack model: future quantum machines running Shor’s algorithm could derive private keys from exposed public keys. “Harvest now, decrypt later” strategies collect data today to exploit once quantum hardware matures.
Technically, we’re nowhere near that point. Today’s machines sit in the noisy intermediate-scale quantum era with devices on the order of ~100 qubits. Breaking Bitcoin’s ECC would require thousands of high-quality, error-corrected qubits and an immense volume of stable operations. Ark and Unchained outline a staged path instead of a sudden “Q‑day”:
1) Quantum becomes practically useful in areas like chemistry. 2) Weaker cryptosystems fall before ECC. 3) ECC attacks begin but take significant time per key. 4) Ultimately, keys could be cracked within Bitcoin’s ~10‑minute block interval, creating real-time threat dynamics.
The report suggests a 10–20 year arc for algorithmic and hardware progress, which—crucially—gives Bitcoin’s developer community time to prepare and optimize defenses across the blockchain, VM interfaces, and tooling ecosystem. Industry leaders like Brian Armstrong, Vitalik Buterin, and Charles Hoskinson have been surfacing these questions for over a year, which helps normalize a planning mindset rather than a crisis mindset.
On the engineering front, early groundwork is in motion. In February, developers merged BIP 360 into Bitcoin’s improvement repository, sketching a post-quantum framework. It proposes a new output type, Pay-to-Merkle-Root (P2MR), that turns off key-path spending to avoid needlessly revealing public keys at spend time. Rolling such protections into production would require consensus rule changes—coordination across a decentralized set of developers, miners, companies, and users.
Ethan Heilman, a BIP 360 co-author, has noted that migration touches everything—software wallets, hardware, custodians, and exchanges—and will not be instant. There are unsettled questions around the best post-quantum algorithms, and he expects the debate and design to take on the order of five to ten years. Bitcoin’s culture deliberately slows major changes to preserve assurances; once a threat feels tangible, development and deployment often compress.
The market temptation is to treat quantum risk as binary—either irrelevant or catastrophic. It’s neither. It’s an execution challenge: clean up public key exposure; plan for post-quantum cryptography; stress test upgrade paths; and communicate timelines so capital and users can migrate deliberately. The timeline looks forgiving today. The coordination window is the scarce resource.
