Quantum threats are a threat to dormant Bitcoin addresses
Common narratives surrounding quantum computing and Bitcoin focus on the doomsday scenarios in which all of the network’s nodes collapse at the same time. This perspective, however, overlooks an important distinction regarding how risk is distributed.
Bitcoin’s Quantum Vulnerability is not an all-encompassing threat. The vulnerability is confined to dormant public keys and addresses. It includes some of the oldest coinage from history. “Satoshi era” Lost wallets
Bitcoins (BTCThese legacy assets could be the main targets for the first generation powerful quantum machines. The wallets offer attackers timeThis combination makes them the most likely starting point for any future quantum-driven disruption. They are the best starting points for any future disruption driven by quantum technology.
This does not indicate a sudden failure of the entire network. This suggests an asymmetrical risk model, where one segment is exposed more than others.
It is also about which parts of Bitcoin are already structurally exposed and those that can still adapt in time. This is not just about the power of computers, but also which Bitcoin parts are structurally vulnerable and which still have time to adapt.
Did You Know? Dormant Bitcoin Wallets might contain coins protected using older cryptographic techniques, making them possible targets in the event quantum computers break encryption standards.
Bitcoin: What quantum computer attacks could be made?
Bitcoin is based on two cryptographic components. hash functions (SHA-256) Public-key encryption (ECDSA/Schnorr), block and mining security, and transaction signatures.
Quantum computers have a different effect on these components.
Hash functions have a high level of resilience. Grover’s algorithm would theoretically be able to weaken these functions, but it wouldn’t render them unusable. This would only lower their security.
The story is different with public-key cryptography. A powerful quantum computer can derive the secret code using Shor’s algorithms. private key From a public key that is known. For Bitcoin, this means any coin that has a publicly exposed key can be spent by the attacker.
It is important to distinguish between attacks that occur at rest and those that are on-spend.
It is essential to understand the difference between two types when it comes to dormant wallets. quantum attacks:
The On-Spend Attack
-
When a user broadcasts an action, they occur.
-
During the transaction, you will be able to see your public key.
-
An attacker has a limited time to derive the key, about one block or 10 minutes.
At-rest attacks
-
These attacks target coins with public keys that are already visible on the chain.
-
It could take the attacker days, even weeks, or more to calculate the private key.
-
A transaction is not required to be triggered immediately.
It is important to note the timing differences. The speed of an attack on-spend is limited, while the computational power for attacks at rest is not.
Dormant wallets are more vulnerable than active wallets
Three characteristics make Dormant Wallets vulnerable: they have no defense, long-exposure windows and high value concentration.
-
No defensive action: Active wallets have the ability to transfer funds, upgrade to quantum-resistant formats or adopt new practices. Dormant wallets can’t. The coins are permanently exposed if the owner is not active or has no access.
-
The long exposure window Attackers can operate offline in the absence of time constraints if a wallet’s public key has already been made visible. The short confirmation period for transactions is removed, which was one of Bitcoin’s most natural defences.
-
High-value concentration: These wallets were created by early Bitcoiners who mined and accumulated bitcoins when the value of them was very low. Today, these wallets can hold BTC valued at tens or thousands of dollar. The target is a profile of high-value and low-resistance.
Did You Know? Inactive Bitcoin wallets can’t upgrade security. This means that quantum-resistant solutions may only protect active users and not early Bitcoin holdings.
What Bitcoin wallets have the most exposure?
All Bitcoin addresses do not have the same level of vulnerability. The following categories have the highest exposure:
Old Pay-to-Public Key (P2PK) outputs
-
In the early days of Bitcoin, they were quite common.
-
On the chain, you can see public keys.
-
No additional protection is provided.
Address Reuse
-
It happens when an individual continues to use the same address after spending money from it.
-
After the first transaction, you will see your public key.
-
The remaining money is vulnerable.
Certain modern script types
-
Some formats (such as Taproot) include the public key directly.
-
Even though they are designed to be efficient and private, they can still cause problems. “at-rest” exposure under quantum assumptions.
Users who reuse addresses can undermine the benefits of even relatively safe formats.
Dormant coins are the biggest risk.
Quantum risk does not exist in a purely theoretical sense. Quantum risk is also quantifiable in terms of the exposure.
The following is a rough estimate:
-
Addresses with public key exposed still contain Bitcoin worth hundreds of millions.
-
These holdings are largely derived from the mining boom of early times.
-
These coins are mostly inactive for over a decade.
The majority of the holdings is made up of block rewards of 50 BTC from Bitcoin’s early years, usually associated with no-longer-active miners.
The result is a structural unbalance:
The largest Bitcoin holders are the ones who have the highest quantum target.
Did You Know? Some of Bitcoin’s largest holdings, including the top 100 Bitcoins in circulation today, haven’t moved for more than a year. This creates an asset pool that is vulnerable to future quantum-based attacks.
Dormant wallets & Network Governance: A greater challenge
Dormant wallets present more than simply a technical issue. Dormant wallets also pose governance and policy issues.
Bitcoin could be faced with difficult decisions if attackers start targeting this coin.
-
If the conditions for cryptography are met, should such coins be claimed?
-
What should protocol changes do to try and protect funds that have been dormant for a long time?
-
How should the network handle assets that will likely be lost but technically still spendable?
The issue of digital salvaging, property rights and immutability are also raised. Dormant wallets, on the other hand, cannot be upgraded or migrated, making them an unusual edge case.
Bitcoin has not broken?
Bitcoins structural risks are long-term and should be distinguished from any threats that may arise immediately.
It is not generally accepted that there are quantum computers today capable of cracking Bitcoin’s cryptography. It is not yet clear when such systems will be developed. expected It could take many years and even decades to make any engineering improvements.
Moreover:
-
Risk is likely to increase gradually.
-
Ecosystems have time to develop mitigation strategies and research.
-
Active users are more likely to adapt than wallets that have been dormant.
It is possible that the effects of quantum technology, should they ever arrive, will be more selective than general.
In the interim, what can you do?
You can follow a couple of steps to reduce your wallet’s vulnerability.
-
Minimizing public-key exposure: Reduced address reuse, and the limitation of when public keys can be revealed are fundamental practices.
-
Prepare for migration: It will be crucial to develop pathways that allow users to transfer funds onto future formats resistant against quantum.
-
The Protocol Research: The ongoing work explores how Bitcoin can integrate quantum resistant cryptography without compromising the core properties.
The primary beneficiaries of these measures are active participants. This reinforces the difference between immovable and movable coins.
“This article is not financial advice.”
“Always do your own research before making any type of investment.”
“ItsDailyCrypto is not responsible for any activities you perform outside ItsDailyCrypto.”
Source: cointelegraph.com

