This article explains the concept of Q-Day – the potential moment when quantum computers become powerful enough to threaten Bitcoin’s digital signatures. It covers how quantum attacks might work, which wallets are most vulnerable, and what post-quantum solutions are being explored to secure Bitcoin for the long term.
What Is Q-Day? The Quantum Threat to Bitcoin Explained
Experts warn that, in the future, sufficiently advanced quantum computers could forge Bitcoin’s digital signatures and authorize transactions without the owner’s consent. While today’s machines are far from capable of doing this, rapid progress in quantum research has made Q-Day an important strategic risk for long-term Bitcoin holders, institutions, and protocol developers.
In Brief
- Today’s quantum computers are far too small and unstable to threaten real-world cryptography.
- Old Bitcoin wallets with exposed public keys are the most vulnerable in a future quantum scenario.
- Developers are actively exploring post-quantum signatures and possible migration paths.
- Bitcoin cannot be upgraded overnight; moving to a quantum-safe design will take years and coordination.
How a Quantum Attack on Bitcoin Would Work
A successful quantum attack on Bitcoin would not involve breaking the entire blockchain at once. Instead, it would target specific addresses that have already revealed their public keys. These include early miner outputs, Satoshi-era coins, reused addresses, and many dormant wallets.
The attack flow would look roughly like this:
- Scan the blockchain for addresses where the public key is known.
- Feed those public keys into a sufficiently powerful quantum computer.
- Use Shor’s algorithm to solve the discrete logarithm problem and recover the corresponding private keys.
- Forge valid digital signatures and broadcast transactions to move the coins.
Bitcoin’s current signatures rely on elliptic-curve cryptography (ECDSA). The security of ECDSA depends on the hardness of factoring and discrete logarithms for classical computers. A large, error-corrected quantum computer running Shor’s algorithm can, in theory, solve these problems exponentially faster.
Once a private key is recovered, an attacker can sign a transaction spending the coins from that address. As Justin Thaler, research partner at Andreessen Horowitz and associate professor at Georgetown University, notes, the network itself cannot distinguish a forged quantum signature from a legitimate one.
Why It Would Be Hard to Detect
The worrying part is that a forged quantum signature would look completely valid to the Bitcoin network. Nodes would verify it as usual, miners would include it in a block, and nothing on-chain would mark it as suspicious or fraudulent.
If an attacker targeted a large number of exposed addresses simultaneously, billions of dollars’ worth of BTC could move within minutes. Markets would likely react strongly before anyone could conclusively confirm that a quantum attack had occurred. By then, the funds would already have been transferred, mixed, or bridged elsewhere.
Where Quantum Computing Stands in 2025
As of 2025, quantum computing has moved from theoretical promise to increasingly practical milestones. The systems are not yet powerful enough to attack Bitcoin, but the trajectory is becoming clearer.
- January 2025: Google’s 105-qubit Willow chip demonstrates significant error reduction and performance beyond classical supercomputers on specific benchmarks.
- February 2025: Microsoft’s Majorana 1 platform and collaboration with Atom Computing achieve record logical-qubit entanglement.
- April 2025: NIST extends superconducting qubit coherence times to around 0.6 milliseconds.
- June 2025: IBM announces targets of 200 logical qubits by 2029 and over 1,000 logical qubits in the early 2030s.
- October 2025: IBM entangles 120 qubits at scale, and Google validates a clear quantum speed-up on specialized tasks.
- November 2025: IBM unveils new chips and software aimed at achieving “quantum advantage” in 2026 and working toward fault-tolerant systems by 2029.
These milestones do not imply that Bitcoin can be broken today. However, they highlight why researchers believe the window to prepare is finite, and that waiting until a quantum-capable system appears may be too late.
Why Bitcoin Is Vulnerable in the Long Term
Bitcoin’s core vulnerability stems from the way its current signatures expose public keys:
- Early pay-to-public-key (P2PK) outputs revealed public keys on-chain even before the first spend.
- Later pay-to-public-key-hash (P2PKH) formats hide the key until it is spent – but once used, the key is public forever.
- Reused addresses and long-dormant wallets often have exposed keys and substantial balances.
Because their public keys were never hidden, the oldest coins – including an estimated one million Satoshi-era BTC – are inherently exposed to future quantum attacks. To protect them, the owners would need to actively move their coins into post-quantum-secure wallets once such options are available. Many of those owners are gone, and many keys are lost.
Thaler points out that the biggest concern relates to abandoned or inaccessible coins, estimated at around USD 180 billion, including roughly USD 100 billion believed to belong to Satoshi Nakamoto. These coins cannot be migrated if the keys are lost, but they remain visible targets for a future quantum attacker.
Adding to the risk are coins tied to lost private keys in modern formats. They can never be voluntarily moved to quantum-safe addresses. For those UTXOs, the only options are to leave them exposed or eventually accept that an attacker with a quantum computer may seize them.
The Cost of Post-Quantum Security
Post-quantum digital signature schemes exist but are not plug-and-play replacements. They typically come with significant performance and size trade-offs.
Today’s ECDSA-based Bitcoin signatures are around 64 bytes in size. Post-quantum signatures can be 10 to 100 times larger, depending on the scheme. In a blockchain environment, where every signature must be stored and verified by every node, that size increase is not a minor detail – it affects block space, transaction fees, and node storage requirements permanently.
Designing a Bitcoin-compatible post-quantum system therefore means balancing:
- Security against quantum attacks
- Signature and key size
- Verification speed
- Storage and fee overhead across the entire network
Proposed Paths to Protect Bitcoin
Developers and researchers have proposed multiple ideas for making Bitcoin more quantum-resilient. These range from light, optional protections to aggressive, mandatory migrations.
BIP-360 (P2QRH): Hybrid Quantum-Resistant Addresses
BIP-360 suggests new address types (e.g., “bc1r…”) that combine today’s elliptic-curve signatures with a post-quantum scheme such as ML-DSA or SLH-DSA. This provides hybrid security – an attacker must break both schemes to steal funds.
Advantages:
- No hard fork required.
- Users can opt in gradually.
Trade-off: much larger signatures, leading to higher fees.
Quantum-Safe Taproot
Under this idea, Taproot outputs would include a hidden post-quantum branch. Under normal conditions, users continue using efficient elliptic-curve paths. If a real quantum threat emerges, miners could soft-fork the network to require the post-quantum branch, turning the hidden backup into the primary path.
Quantum-Resistant Address Migration Protocol (QRAMP)
QRAMP-style approaches propose a mandatory migration of vulnerable UTXOs to quantum-safe addresses, likely requiring a hard fork. This is the most aggressive option and raises complex questions about:
- How to treat inactive or abandoned wallets
- What to do with Satoshi-era and lost coins
Pay to Taproot Hash (P2TRH)
P2TRH suggests replacing visible Taproot keys with double-hashed versions, limiting the time window during which a public key is exposed. It does not introduce new cryptography and is relatively lightweight, but it is only a partial mitigation.
NTC via STARKs and Other Approaches
Further proposals look at using STARK-based zero-knowledge proofs to compress many large post-quantum signatures into a single proof per block (Non-Interactive Transaction Compression). Other concepts include commit-reveal schemes, helper UTXOs, and “poison pill” recovery paths that only activate if a quantum threat becomes real.
Together, these ideas outline a phased roadmap: implement low-impact mitigations early, then move toward heavier post-quantum upgrades as the quantum threat becomes more concrete.
Governance and the Problem of Abandoned Coins
Two major structural issues complicate any move to a post-quantum Bitcoin:
1. Slow, Conservative Upgrade Process
Bitcoin’s decentralization is its greatest strength but also makes major upgrades slow, contentious, and uncertain. Introducing new signature schemes requires broad agreement among core developers, miners, businesses, and users. Historically, even relatively simple changes have taken years to adopt.
2. Abandoned and Inaccessible Coins
Any active migration plan requires private key holders to move their funds into new quantum-safe formats. But the owners of Satoshi-era coins and many lost wallets are gone. The community would eventually need to decide whether to:
- Leave these coins exposed to quantum theft, or
- Remove them from circulation via a contentious protocol change.
Doing nothing effectively allows future quantum-equipped attackers to seize those coins. That outcome could be legally and ethically grey, but those performing the attack may not be concerned with such nuances.
What Should Ordinary Bitcoin Holders Do Today?
For most users, Q-Day is not an immediate threat. Today’s quantum systems cannot break Bitcoin, and credible estimates for a serious threat range from the late 2020s to 2030s or beyond.
However, a few habits significantly improve long-term resilience:
- Avoid address reuse: Do not send funds repeatedly from the same address. This keeps your public key hidden until you spend.
- Use modern wallet formats: Prefer SegWit and Taproot-enabled wallets rather than very old P2PK formats.
- Monitor protocol developments: Over the coming years, watch for BIPs and wallet upgrades that support post-quantum or hybrid signatures.
Institutional holders and high-net-worth investors with large Bitcoin positions may wish to include quantum risk in their long-term governance and custody frameworks, especially if their holdings trace back to early-era outputs.
Conclusion: Q-Day Is Not Here Yet, But Preparation Must Start Early
Q-Day is not a date on the calendar, but a threshold in technological capability. Bitcoin is not under immediate quantum threat, yet the time required to design, agree on, and implement a safe migration path is measured in years, not months.
For the Bitcoin ecosystem, the key questions are strategic rather than panic-driven:
- How early should the community adopt quantum-aware upgrades?
- Which combination of hybrid, optional, and mandatory mechanisms is acceptable?
- How should abandoned and Satoshi-era coins be treated in a quantum world?
Bitcoin has survived forks, bugs, regulatory shocks, and market crashes. Q-Day – whenever it arrives – will likely be its most complex test yet. Starting the technical and governance discussions now is the best way to ensure that the world’s leading cryptocurrency remains secure in a post-quantum future.