IBM widened public access to its quantum research stack making the 156-qubit Heron r2 available through its Open Plan and increasing runtime allocations for researchers. The update pushes more powerful quantum hardware closer to everyday research use, a development that carries direct relevance for the cryptographic assumptions behind Bitcoin and similar networks.
The significance is not that Bitcoin’s encryption has suddenly been broken, but that the path from theory to practical experimentation has become shorter. By expanding access to hardware capable of supporting more advanced quantum work, IBM has intensified attention on long-term risks to elliptic curve cryptography, the security layer that protects private keys derived from public addresses.
Why IBM’s Expansion Matters for Crypto Security
IBM’s update gives researchers broader access to machines that can accelerate work on quantum algorithms, including Shor’s Algorithm, which is widely regarded as the clearest long-term threat to elliptic curve cryptography. If hardware eventually reaches sufficient scale and fidelity, Shor’s Algorithm could extract private keys from exposed public keys and weaken address security across both UTXO-based and account-based systems.
That possibility is no longer being treated as a fringe concern. Institutional and industry actors have already begun to incorporate quantum risk into public disclosures and strategic planning, including BlackRock in its Bitcoin ETF filings and market figures such as Michael Saylor, who has described the issue as a broader infrastructure risk rather than a crypto-only problem.
The response is already taking shape across multiple layers of the market. IBM and Bain are offering post-quantum cryptography assessment services, while blockchain developers are exploring post-quantum signature schemes, address designs that reduce public-key exposure, and protocol-level migration paths.
The readiness of those efforts remains uneven. Bitcoin is still at the proposal stage with BIP-360, where supporters estimate a three-to-five-year path for meaningful review and phased implementation; Ethereum remains in the research phase; Cardano is studying lattice-based approaches; Algorand has partial post-quantum support; and Quantum Resistant Ledger was built from the outset around quantum-safe algorithms.
The Immediate Risk Is Exposure, Not Panic
One of the most closely watched figures in this discussion is the estimate that roughly 35% of Bitcoin, or about 1.7 million BTC, sits in addresses that are theoretically more exposed because their public keys have already been revealed on-chain. That estimate has helped turn quantum risk from a distant technical debate into a concrete custody and disclosure issue for institutions and service providers.
The most immediate steps are to inventory key exposure, prioritize migration away from addresses that reveal public keys, and commission post-quantum readiness assessments that identify which assets, workflows, and vendors are most vulnerable. IBM Consulting’s Andy Baldwin described that process as a move toward “quantum ready security,” meaning a transition from identifying weak points to planning actual remediation.
Quantum-risk planning now belongs in risk registers, scenario testing, custody reviews, vendor due diligence, and the governance frameworks that will eventually be needed to approve large-scale protocol or wallet migrations. As access to advanced quantum systems broadens, firms will increasingly be judged not on whether they can predict the exact timing of a breakthrough, but on whether they have prepared for the transition before the threat becomes urgent.
