Back to News
quantum-computing

Michael Saylor: Quantum Computing Won’t Break Bitcoin This Decade — Upgrade Would Come First - CCN.com

Google News – Quantum Computing
Loading...
3 min read
0 likes
⚡ Quantum Brief
Michael Saylor asserts quantum computing won’t threaten Bitcoin’s cryptography this decade, citing slow progress in fault-tolerant quantum machines capable of breaking public-key encryption via Shor’s algorithm. Bitcoin developers are proactively addressing quantum risks through proposals like BIP-360, which introduces Pay-to-Merkle-Root (P2MR) to reduce exposure by hiding public keys until spending, easing future post-quantum upgrades. The primary quantum risk isn’t mining dominance but compromising digital signatures. Post-quantum cryptography (PQC) and "crypto agility" are critical, allowing systems to swap algorithms without full overhauls. Not all Bitcoin outputs are equally vulnerable; reused addresses and legacy patterns face higher risk. Migration to quantum-resistant outputs depends on wallet support, exchanges, and user adoption—a complex, large-scale operational challenge. While Saylor downplays immediate threats, Ethereum’s Vitalik Buterin urges faster action. The debate centers on timing: whether upgrades can outpace quantum advancements before they become a practical attack vector.
Michael Saylor: Quantum Computing Won’t Break Bitcoin This Decade — Upgrade Would Come First - CCN.com

Summarize this article with:

Strategy (formerly MicroStrategy) executive chairman Michael Saylor is pushing back on fresh debate over quantum computing risks. He is arguing the threat won’t materialize this decade — and that Bitcoin would upgrade first. Saylor has made the point before. In a December post, he framed quantum progress as something Bitcoin would adapt to: stronger cryptography, updated standards, and users moving funds to new address types. His comments come as developers formalize early discussions on quantum readiness in Bitcoin’s public proposal process, including the publication of BIP-360 in the Bitcoin Improvement Proposals (BIPs) repository.

On Natalie Brunell’s Coin Stories podcast, Saylor argued that a quantum computer capable of threatening modern cryptography is not an “in this decade” event. He added that even if the risk becomes real, upgrades across global digital infrastructure would follow, including Bitcoin. In other words, Bitcoin is software, and software can change — before an attacker can reliably exploit a breakthrough. Quantum panic is often packaged as “quantum computers will out-mine Bitcoin.” That’s not the main risk. The sharper concern targets public-key cryptography — the digital signatures that prove ownership of coins. If large-scale, fault-tolerant quantum machines reach sufficient capability, Shor’s algorithm could undermine widely used public-key systems. That is why security institutions are preparing for post-quantum cryptography (PQC) and emphasizing “crypto agility,” or the ability to swap cryptographic primitives without rebuilding entire systems. Not every Bitcoin output is equally exposed to a future quantum adversary. Many outputs commit to a hash of a public key and only reveal the public key when the owner spends. That means the attack surface concentrates where public keys are already visible on-chain, such as legacy patterns or address reuse, and during the act of spending, when key data becomes public in the transaction window. This is why mitigation discussions often focus on new output types and spending policies, rather than simply replacing one signature algorithm with another. Bitcoin’s development process is public and proposal-driven, and the BIPs repository includes BIP-360. The Bitcoin proposal introduces Pay-to-Merkle-Root (P2MR) as a new output type via soft fork. The proposal frames P2MR as a way to avoid a Taproot spending path that can reveal a public key, and as groundwork that could make future PQC integration cleaner. But publication is not activation. A BIP can be discussed, revised, and debated for a long time before it becomes a live network change, or it may never be adopted at all. Even if Bitcoin adopts a post-quantum signature scheme, migration would depend on wallet support, exchange infrastructure, custody systems, user behavior, and the large-scale movement of coins to quantum-resistant outputs. That is technically feasible. It is also operationally heavy. This is why some researchers and security engineers argue that Bitcoin should prepare earlier. The warning comes even if the threat is distant, because the hardest part is getting millions of users and institutions to move safely in time. Saylor’s confidence isn’t universal. Vitalik Buterin has repeatedly argued that crypto ecosystems should accelerate post-quantum planning rather than wait for a clear inflection point.

The Ethereum Foundation has also listed “quantum readiness” among its 2026 priorities. The divergence reflects less a disagreement about physics than about timing — whether the industry can safely coordinate upgrades before the threat becomes practical. PhD, researcher and writer exploring AI, blockchain, and the philosophy of tech, with a focus on DeSci, governance, and trust.

Read Original

Tags

post-quantum-cryptography
quantum-computing
quantum-algorithms
quantum-cryptography

Source Information

Source: Google News – Quantum Computing