Q-Day and Bitcoin’s Achilles Heel: The Abandoned Coins Dilemma

Quantum progress is accelerating. Over $711B in exposed Bitcoin could be at risk on Q-Day. The real challenge isn’t math—it’s migrating abandoned coins without breaking Bitcoin’s social contract.

Bitcoin
Cryptocurrency
Regulations
Economy
Because Bitcoin
Because Bitcoin

Because Bitcoin

November 16, 2025

Q-Day—the point when a fault-tolerant quantum computer can forge Bitcoin’s signatures—won’t start with fireworks. It will look like routine UTXO movements. That’s precisely the problem. The math is only half the threat; the governance problem around abandoned coins is the part the market isn’t pricing well.

How a quantum theft actually lands - A quantum attacker scans the chain for any address that has revealed a public key: early pay-to-public-key outputs, reused addresses, miner payouts, and dormant wallets. - Using Shor’s algorithm, a sufficiently large, error-corrected device solves the discrete logarithm underlying Bitcoin’s elliptic-curve signatures and derives the private key. - The thief signs a transaction that nodes and miners accept as valid. If many exposed keys are drained at once, billions could move in minutes, with markets reacting before forensics catch up.

Why this matters now Today’s quantum machines remain too small and noisy to threaten real-world cryptography. Still, 2025 has narrowed the distance in ways that should sharpen Bitcoin’s planning: - Jan: Google’s 105‑qubit Willow chip posted steep error reduction and hit a benchmark beyond classical supercomputers. - Feb: Microsoft debuted its Majorana 1 platform and, with Atom Computing, reported record logical‑qubit entanglement. - Apr: NIST extended superconducting qubit coherence to 0.6 ms. - Jun: IBM set targets of ~200 logical qubits by 2029 and 1,000+ in the early 2030s. - Oct: IBM entangled 120 qubits; Google confirmed a verified quantum speed‑up. - Nov: IBM announced new chips and software aimed at quantum advantage in 2026 and fault tolerance by 2029.

None of this breaks Bitcoin today. It does raise the stakes for a long lead-time upgrade in a system that resists rapid change.

The exposed surface: old keys and forever-revealed public keys Bitcoin hides a public key until first spend for standard pay-to-public-key-hash (and Taproot key‑path) flows. Early pay-to-public-key outputs never had that protection. Roughly 1 million Satoshi‑era coins fall into this permanently exposed camp. More broadly, over $711 billion sits in wallets that could be vulnerable if their public keys appear on-chain and Q-Day arrives before migration. Add coins tied to lost private keys and you get a large, immobile target.

Two hard truths sit at the center: - Post‑quantum signatures work, but they are heavy. Today’s signatures are ~64 bytes; post‑quantum variants like ML‑DSA or SLH‑DSA can be 10–100x larger. On a blockchain, that bloat persists forever across every node, pressuring fees and storage. - Migration requires action. About $180 billion is believed to be abandoned—including roughly $100 billion attributed to Satoshi. Those coins won’t proactively move to post‑quantum addresses.

The real fight is social, not cryptographic Upgrades in Bitcoin take time and wide coordination. The community faces a choice with abandoned UTXOs if a credible quantum threat emerges: - Proactively remove unmigrated, exposed outputs from circulation (a controversial, value‑reallocating intervention), or - Do nothing and let quantum-equipped actors seize them when they can, a scenario that would be legally gray and reputationally damaging.

Neither path is clean. One challenges Bitcoin’s neutral, rule‑of‑code ethos. The other invites a sudden supply shock and headlines that could spook institutions precisely when confidence matters.

What’s on the table technologically Developers have outlined a staged roadmap—from low-friction mitigations to heavier lifts: - P2TRH (Pay to Taproot Hash): Double‑hashes Taproot keys to shorten the exposure window without new crypto or breaking compatibility. - BIP‑360 (P2QRH): “bc1r…” hybrid addresses that pair today’s elliptic‑curve signatures with post‑quantum schemes (e.g., ML‑DSA/SLH‑DSA). No hard fork, higher fees due to bigger signatures. - Quantum‑Safe Taproot: A hidden post‑quantum branch added now, with a future soft‑fork path to require it if risks escalate. - QRAMP (Quantum‑Resistant Address Migration Protocol): Mandatory migration of vulnerable UTXOs—likely needs a hard fork and social consensus. - NTC via STARKs: Compress many large post‑quantum signatures into a single per‑block proof, reducing chain bloat and fees. - Commit‑Reveal toolkits: Helper UTXOs, “poison pill” transactions, and Fawkescoin‑style commitments that activate only when a real quantum computer is demonstrated.

A coherent plan looks incremental: adopt low‑impact defenses like P2TRH early, create optional hybrid tracks (BIP‑360, QS Taproot), and budget for STARK‑based compression to counter signature bloat. The contentious piece—QRAMP or anything mandatory—should be tied to well‑defined triggers rather than open‑ended fear.

My read on priorities - Treat abandoned coins as a governance risk, not a cryptography problem. Establish a transparent, pre‑agreed playbook that avoids ad‑hoc rule changes under fire. - Get ahead of signature bloat. Fund NTC/STARK R&D now; it’s the practical lever that keeps fees and chain growth in check if hybrid or post‑quantum schemes scale. - Incentivize early, voluntary migration. Wallets can default to non‑reused addresses and surface hybrid options without forcing them. Miners can signal readiness for QS Taproot branches to reduce coordination lag. - Communicate realistic timelines. Some researchers see credible risk inside five years; others push it into the 2030s. Investment can pull timelines forward. Markets do better when uncertainty is bounded by milestones.

What individual holders can do - Avoid address reuse so your public key stays hidden until spend. - Use modern wallet formats and plan to migrate when robust hybrid or post‑quantum options are widely available. - Ignore hype; track concrete quantum milestones (logical qubits, error correction, fault-tolerant roadmaps).

Q-Day is a tail risk that compels preparation years ahead. The cryptography will be ready; the real test is whether Bitcoin can coordinate a measured migration—and pre‑decide the fate of coins that cannot move—without betraying the values that made it resilient in the first place.