top of page

25% of Bitcoin Could Be Exposed to Quantum Computers

  • Oct 28
  • 7 min read

Why millions of Bitcoin may face risk as quantum computing advances faster than expected


Image Credit: Author via Canva
Image Credit: Author via Canva


Around four million Bitcoins, nearly 25 percent of all supply, remain at risk if quantum computers reach practical strength. These coins sit in older address formats that already reveal their public keys, giving future machines the data they would need to compute the private ones. Blockchain analysts continue to confirm this estimate, making it one of the clearest technical risks ever quantified in Bitcoin’s history.


Quantum computing is no longer experimental. IBM, Google, and several research labs have crossed the 1,000-qubit mark this year, pushing hardware closer to the threshold where Bitcoin’s elliptic curve encryption could eventually be solved. The pace is faster than earlier forecasts from 2020 and 2021, when experts expected such capability to be decades away.


Each affected address represents dormant value. Some belong to early miners who never moved their holdings. Others are corporate reserves or lost wallets sealed since 2010. Together they account for hundreds of billions of dollars frozen under cryptography that may not hold indefinitely.


The question facing developers and institutions is not whether quantum computing will arrive, but how soon the Bitcoin network can transition to post-quantum security before it does. The timeline is narrowing, and preparation has become the only rational path forward.








How 25% Became Exposed


The 25% figure traces back to Bitcoin’s early design. The first addresses used a format called Pay-to-Public-Key (P2PK). In these, the public key appears directly on the blockchain, visible to anyone analyzing transactions. During the early years, that structure seemed harmless because the network was small and hardware limits made key reversal impossible. Those early addresses now hold close to two million BTC that remain permanently visible.


The next phase introduced Pay-to-Public-Key-Hash (P2PKH). It improved privacy by hiding the key behind a hash, but each time coins were spent, the public key became visible. Many wallets reused the same addresses for simplicity or automation, leaving a trail of exposed keys over time. Another two million BTC fall into this category, bringing the total near 25% of the entire Bitcoin supply.


Blockchain research firms such as Chainalysis and Coin Metrics have verified these figures using on-chain correlation and address-structure analysis. The findings are consistent across independent studies: roughly four million BTC are now tied to public keys recorded on-chain that cannot be changed or erased. These are the coins quantum computers could eventually decode if their processing power reaches the level predicted by leading research labs.


Modern address formats like SegWit and Taproot reduce that risk. They reveal the public key only at the point of transaction and automate new address generation to prevent reuse. Adoption of these formats continues to rise, covering roughly 62% of daily transactions according to October 2025 data from Glassnode. The rest remain untouched, including older wallets linked to early miners, dormant accounts, and inaccessible holdings.


That combination creates a structural divide within Bitcoin’s supply. Active coins benefit from upgraded address standards, while legacy coins stay bound to earlier cryptographic exposure. The 25% at risk is not an estimate—it is the measurable outcome of historic design decisions now colliding with accelerating advances in quantum computing.



Chart showing legacy Bitcoin addresses holding roughly one-quarter of total supply.
Bitcoin distribution showing legacy addresses holding about 25 % of total supply. Source: bitinfocharts.com.



Quantum Computing Meets Bitcoin Encryption


Bitcoin’s encryption depends on the elliptic curve digital signature algorithm, known as ECDSA. It allows a private key to generate a public key that verifies ownership without revealing the original secret. On traditional machines, reversing that process would take longer than the universe has existed. Quantum computing changes that assumption.


Recent research from leading labs has shown that the quantum resources needed to break encryption comparable to Bitcoin’s are far lower than previously calculated. Improvements in qubit stability and error correction have accelerated progress, reducing the estimated computational scale required to reverse a public key.


Google’s newest quantum processor has already demonstrated a performance leap that completes certain tasks thousands of times faster than classical supercomputers. While the experiments do not target Bitcoin directly, they illustrate how fast the technology is advancing toward practical capability.


NVIDIA’s latest quantum-GPU link design now allows hybrid computing between quantum chips and high-performance processors. This approach reduces error rates and improves efficiency, addressing one of the major technical barriers to running algorithms that could impact cryptography.


Together, these developments paint a clear picture. The technology once assumed to be decades away is approaching functional scale. Bitcoin’s encryption remains intact today, yet the security margin continues to narrow with every hardware and algorithmic breakthrough.


The focus now shifts to timing and readiness. Developers, institutions, and wallet providers are beginning to evaluate migration paths toward post-quantum cryptographic standards. What once sounded speculative has become a countdown that depends on coordination, testing, and awareness across the network.



Chart showing reduction in qubit requirements for breaking encryption as hardware advances.
Quantum resource costs for encryption factoring continue to fall. Source: Google Security Blog.


Timeline and the Global Response


Quantum computing is no longer theoretical. Researchers estimate that the processing power needed to compromise Bitcoin’s encryption could emerge within the next decade as qubit counts and stability continue to rise. The latest hardware now connects thousands of qubits with longer coherence times, marking a clear transition from laboratory experiments to scalable prototypes.


Governments and standards bodies are preparing for that shift. The National Institute of Standards and Technology is finalizing new post-quantum algorithms designed to withstand both classical and quantum attacks. Several countries have launched security audits across financial and defense networks that still depend on legacy encryption.


The blockchain sector is moving in parallel. Developers are testing quantum-resistant schemes such as lattice-based and hash-based signatures. A few smaller networks have already added these mechanisms, while Bitcoin developers study how to introduce them without breaking compatibility with existing wallets. The challenge is balancing forward security with the immovable nature of older coins.


Coordination between security researchers, hardware firms, and blockchain foundations has intensified. The pace of progress suggests that preparation, not reaction, will define how smoothly the Bitcoin network transitions once large-scale quantum systems become practical.



Post Quantum Solutions and What Comes Next


Developers and researchers across the blockchain ecosystem are working to future-proof Bitcoin’s encryption before quantum hardware reaches the point of compromise. Several approaches are already under active review, led by teams specializing in advanced cryptography and network security.


The most promising candidates include lattice-based and hash-based cryptographic systems. These methods replace the elliptic curve structure with complex mathematical frameworks that even a quantum computer cannot solve efficiently. NIST is finalizing its selection of post-quantum algorithms, with schemes like CRYSTALS-Dilithium and SPHINCS+ emerging as leading options. Once standardized, these can serve as blueprints for wallet software and blockchain protocols.


For Bitcoin, any transition must maintain network consensus while preserving existing balances. A full migration could involve introducing new address types that accept post-quantum signatures, allowing users to move their coins voluntarily. This process would require broad coordination among developers, miners, exchanges, and hardware wallet providers to ensure a smooth rollout.


Some networks have begun early testing. Projects in the wider Web3 space have integrated hybrid cryptographic models combining quantum-resistant and traditional algorithms. These experiments demonstrate that migration can be done without disrupting transaction flow, provided compatibility is maintained across nodes and clients.


Industry coordination continues to expand. Security groups, research institutions, and blockchain organizations are now aligning on open frameworks to evaluate performance, transaction efficiency, and integration with existing consensus rules. The goal is to create solutions that strengthen Bitcoin’s resilience while keeping it accessible to every holder.


Progress remains steady, and urgency has become shared across the ecosystem. Each technical milestone brings the network closer to long-term durability against quantum threats. What happens next will depend on how quickly collaboration translates research into practical deployment.








The Road Ahead


Quantum computing has turned Bitcoin’s security timeline into a visible clock. Around 25 percent of all coins remain exposed through public keys that advanced machines could one day solve. Each leap in processor design shortens that window and raises the need for joint action across the network. Developers, miners, and wallet providers now share the task of preparing Bitcoin for its next phase of encryption.


The future of Bitcoin’s resilience depends on foresight and coordination. Moving old funds, testing quantum-safe algorithms, and updating standards will decide how the network endures the coming decade of computing progress. Bitcoin has always survived through collective effort. That strength will once again define how it stands against the next generation of technology.




🎥 Watch the Video


For a quick video version of this post, watch my YouTube video: 25% of Bitcoin at Risk? The Numbers Behind the Quantum Threat



🗣️ Join the Conversation


Blockchain and Web3 Insights LLC is committed to delivering fact-based, practical education on Bitcoin, blockchain, and decentralized technologies. If this article was useful, please share it with your network and connect with us through the channels below to continue the conversation.



🔗 Stay Connected:


Follow Blockchain & Web3 Insights across platforms for weekly updates, insights, and resources:




📩 Subscribe to the Newsletter:


Stay current with Blockchain & Web3 Weekly Bytes, published every Saturday. Each edition includes:


  • Clear insights on Bitcoin, blockchain, and digital assets

  • A weekly trivia feature

  • Practical updates designed for learners, teams, and professionals




📚 Educational Resources:


Blockchain and Web3 Insights curates and creates resources to support learning and practical application. Explore:






⛔️ Disclaimer ⛔️


This article is for educational purposes only and is not financial advice. Do your own research and consult a professional before making any investment decisions. Some links may be affiliate links that support Blockchain and Web3 Insights LLC at no extra cost to you.


Comments


Blockchain and Web3 Insights
  • Youtube
  • X
  • Medium
  • Instagram
Copyright © 2023-2025 Blockchain and Web3 Insights LLC
Disclaimer & Affiliate Disclosure: Content on this site is for educational and informational purposes only and does not constitute financial, tax, or legal advice. Always conduct your own research or consult a qualified professional before making financial decisions. Blockchain and Web3 Insights LLC may earn commissions from affiliate links on this site, at no additional cost to you. Only products and services that are trusted and considered genuinely valuable to readers are recommended.
bottom of page