Satoshi Nakamoto's 1.1 million Bitcoin—a digital hoard currently valued somewhere between $67 billion and $124 billion, depending on the market's mood—is more than just a legend. It's a ticking time bomb. Cryptographers and physicists are increasingly concerned that the rise of quantum computing poses a serious threat to the security of these early Bitcoin addresses, and the wider network. The core issue? Old-school pay-to-public-key (P2PK) addresses.
Most modern Bitcoin wallets use pay-to-public-key-hash (P2PKH) addresses or newer SegWit addresses. These methods only reveal the public key when a transaction occurs, adding a layer of security. Think of it like this: P2PKH is a masked address; P2PK is shouting your address from the rooftops. Satoshi's early wallets, however, use P2PK addresses, permanently exposing the public key on the blockchain.
For classical computers, this isn’t a problem. It's computationally infeasible to reverse-engineer a public key to find the corresponding private key. But a quantum computer, armed with Shor's algorithm, changes the game entirely. Shor's algorithm, developed in 1994, can theoretically reverse this process, turning Bitcoin's security model (ECDSA) on its head. Instead of brute-forcing every possible key (an impossible task for classical computers), a quantum computer would calculate the private key from the exposed public key in hours or days.
The implications are staggering. An attacker could simply harvest these exposed P2PK public keys, feed them into a quantum machine, and wait for the private keys to be returned. Then, they could sign a transaction and move Satoshi's coins.
The race to build a cryptographically relevant quantum computer (CRQC) is heating up. "Q-Day," the hypothetical moment when a quantum computer can break current encryption, is no longer a distant "10-20-year" problem. Firms like Rigetti and Quantinuum, along with tech giants like Google and IBM, are aggressively pursuing quantum roadmaps. Rigetti, for example, aims to have a 1,000-plus qubit system by 2027. (That's just around the corner, in tech years.)
But here's the rub: building a CRQC isn’t just about having more qubits. It's about having stable qubits. Current qubits are incredibly fragile, prone to errors from even slight environmental changes. Quantum error correction is essential, requiring potentially millions of physical qubits to create just a few thousand stable, logical qubits. Experts estimate that breaking Bitcoin's encryption would require a machine with about 2,330 stable logical qubits.
And this is the part of the report that I find genuinely puzzling. While companies are making public claims about qubit counts, the real bottleneck is stability and error correction. It's like boasting about the number of car parts you have without mentioning that you haven't figured out how to assemble them into a working engine.
A 2025 Human Rights Foundation report estimates that 6.51 million BTC is vulnerable to long-range quantum attacks. This includes 1.72 million BTC in dormant or potentially lost addresses, including Satoshi's stash. An additional 4.49 million BTC is vulnerable due to address reuse—a common practice in the early days of Bitcoin where users unknowingly exposed their public keys by receiving new funds to previously spent addresses.

If a hostile actor were the first to reach Q-Day, moving Satoshi's coins would be the ultimate flex. It would instantly prove that Bitcoin's fundamental security had been compromised, potentially triggering market-wide panic and an existential crisis for the entire crypto ecosystem. Some malicious actors are already employing a "harvest now, decrypt later" strategy, recording encrypted data (like blockchain public keys) with the intention of decrypting it once they have a quantum computer.
The solution? Post-quantum cryptography (PQC). The cryptographic community is developing new encryption algorithms built on mathematical problems believed to be secure against both classical and quantum computers. The US National Institute of Standards and Technology (NIST) finalized the first PQC standards in August 2024, with ML-DSA (Module-Lattice-based Digital Signature Algorithm) as a key component.
Bitcoin could potentially switch to quantum-safe protection through a network-wide software update, likely implemented as a soft fork. This would introduce new quantum-resistant address types, such as proposed "P2PQC" addresses. Users could voluntarily move their funds from older, vulnerable addresses to these new secure ones.
The quantum threat to Bitcoin is real, but it's not the only vulnerability worth considering. The Satoshi Nakamoto identity mystery continues to swirl. In November 2025, speculation arose linking Daira-Emma Hopwood, a Zcash cryptographer, to Satoshi. While there's no cryptographic proof or direct forensic link, the arguments are circumstantial, based on nationality, expertise, and ideology. Satoshi Mystery Reignites: Is Zcash Engineer Daira-Emma Hopwood the Hidden Architect of Bitcoin?
Here's my take: focusing solely on quantum computing overlooks a more immediate risk: human error and negligence. Yes, quantum computers could break Bitcoin's encryption, but sloppy key management, phishing attacks, and plain old bad luck are far more likely to result in lost or stolen Bitcoin in the near term.
The "quantum apocalypse" narrative surrounding Bitcoin is, in my opinion, overhyped. While the theoretical risk is undeniable, the practical challenges of building a cryptographically relevant quantum computer, combined with the potential for Bitcoin to adapt and implement post-quantum cryptography, suggest a more nuanced reality. We're not facing an imminent doomsday scenario, but a complex technological race with uncertain outcomes.
The focus on quantum computing is a distraction. The more pressing threat to Bitcoin isn't some futuristic supercomputer, but the age-old problem of human error. Overconfidence, laziness, and a general lack of security awareness are far more likely to lead to Bitcoin losses than any quantum apocalypse.