CoinShares argued that quantum computing is not a near-term, systemic threat to Bitcoin, and framed the topic as a solvable engineering and governance problem rather than an imminent market shock. The core takeaway is that the quantum risk is real in theory but operationally distant, giving the industry time to plan, standardize, and migrate.
CoinShares anchored its view in the scale required for a practical attack on Bitcoin’s ECDSA secp256k1 keys, pointing to fault-tolerant machines with millions of logical qubits as the relevant threshold for breaking keys on useful timelines. With today’s experimental processors still in the low hundreds of qubits and lacking the error correction needed for large-scale cryptanalysis, CoinShares and the engineers it referenced placed meaningful capability on a timeline measured in decades, not months.
Why the attack surface is smaller than it looks
A major part of the analysis is that not all BTC is equally exposed to quantum risk because address types determine whether public keys are visible. CoinShares estimated about 1.6 million BTC sit in legacy Pay-to-Public-Key formats, roughly 8% of supply, but it emphasized that only around 10,200 BTC within that legacy segment is an immediate, realistic target whose compromise could move markets.
The practical reason is simple: most Bitcoin supply is held in hashed address types like P2PKH and P2SH, where the public key is not revealed until a spend happens. That design sharply limits what an attacker can work with in advance, reducing the reachable target set compared with the headline “legacy holdings” number.
CoinShares also leaned on incentive logic, not just cryptography, to explain why a full-scale quantum theft scenario is self-defeating. A visible exploit would likely crater network value and trigger fast defensive coordination across miners, exchanges, and major holders, making the economics of a high-profile attack far less attractive than the raw “stealable balance” might suggest.
How Bitcoin can migrate without breaking the network
CoinShares treated migration as feasible because the standardization path is no longer hypothetical. It highlighted that NIST completed its initial set of post-quantum cryptography standards in 2024, providing candidate algorithms and a concrete technical roadmap for systems that need to transition away from classical assumptions.
On Bitcoin specifically, the analysis described upgrade pathways that can minimize disruption, such as soft forks and hybrid signature approaches that allow phased adoption. The broader point is that Bitcoin does not need to “restart” to modernize its cryptography, but it does need coordinated engineering, careful rollout design, and clear upgrade governance.
Industry voices referenced in the analysis reinforced that “prepare, don’t panic” posture, including Ledger CTO Charles Guillemet emphasizing the gap between today’s machines and the millions of stable qubits implied by meaningful attacks, and cryptographer Dr. Adam Back underscoring that Bitcoin can adopt post-quantum signatures. Taken together, those perspectives support treating quantum as a long-horizon operational risk that should be built into roadmaps, not a headline trigger for emergency moves.
For custodians, exchanges, and corporate treasuries, the immediate work is basic but non-negotiable: understand exactly what you hold and how it is stored. CoinShares’ framing implies firms should map holdings by address type, quantify any P2PK exposure, and fold post-quantum migration planning into security governance, incident playbooks, and longer-term technology planning.
From a compliance and supervisory lens, the near-term requirement is documentation and readiness rather than urgent remediation. Firms under prudential or conduct regimes should be able to demonstrate that quantum risk sits in their risk register, that exposure is measured, and that a credible migration path is being planned as standards implementation and testing mature.
