March 31, 2026

Quantum heist or quantum hype?

Securing Elliptic Curve Cryptocurrencies Against Quantum Vulnerabilities [pdf]

Quantum heist alert: coins could vanish in minutes, but commenters say ‘call me when it’s real’

TLDR: A Google–Ethereum–Stanford paper warns that a future fast quantum computer could crack crypto signatures in minutes and urges a shift to post‑quantum defenses. The comments explode: some fear nation‑state heists and dormant wallet raids, others roll their eyes with “call me when it’s real” and quantum‑hype jokes.

A Google-led team with folks from the Ethereum Foundation and Stanford just dropped a whitepaper claiming a future “fast” quantum computer could crack the math behind Bitcoin and Ethereum signatures in minutes—fast enough to hijack transactions as they’re sent. They say half a million high-quality qubits could do it, and urge everyone to move to post-quantum cryptography (PQC), the next‑gen safety math. They even float policy ideas to rescue “dormant” wallets before a bad actor does. Big if true. But the comments? Scorched earth. The top vibe is pure skepticism: “Call me when it’s real,” one commenter shrugs, while another jokes that quantum fans “haven’t even factored 21” on a real machine. The crowd’s split between “sound the alarm” and “stop the hype.” One zinger nails the mood: “‘Code is law’ doesn’t exclude quantum code.” Translation: if quantum wins, that’s still the rules. Meanwhile, others warn that if a nation builds one of these machines first, dusty early‑era wallets (think Satoshi’s stash) could become state slush funds. In between the panic and punchlines, a few folks actually engage: “on‑spend” attacks get explained in simple terms (broadcast a payment, expose your key, get sniped), and some ask for real timelines over sci‑fi. The result is classic crypto drama: urgent warnings vs. quantum‑hype memes, with everyone agreeing on one thing—nobody wants to be the last chain to upgrade to post‑quantum cryptography.

Key Points

  • The paper provides new resource estimates for breaking secp256k1 ECDLP using Shor’s algorithm: ≤1,200 logical qubits with ≤90M Toffoli gates, or ≤1,450 logical qubits with ≤70M Toffoli gates.
  • Authors validate their estimates using a zero-knowledge proof to avoid disclosing attack vectors.
  • On superconducting architectures with 10⁻³ physical error rates and planar connectivity, the circuits could run in minutes using fewer than 500,000 physical qubits.
  • A fast-clock versus slow-clock distinction shows early fast-clock CRQCs could enable on-spend attacks against public mempool transactions in some cryptocurrencies.
  • The study surveys vulnerabilities in Bitcoin, Ethereum, and other blockchains, identifies risks in smart contracts, PoS, and data availability, discusses dormant assets, and urges migration to post-quantum cryptography.

Hottest takes

Call me when they have broken ECC with a real quantum computer. — meling
'Code is law' doesn't exclude quantum code. — gosub100
nobody has even factored 21 yet on a real quantum computer. — int32_64
Made with <3 by @siedrix and @shesho from CDMX. Powered by Forge&Hive.