Quantum computing has caused alarm in the crypto community, but Shaw, founder of ElizaOS, offers an analysis that challenges this narrative. According to his perspective, the current fears of an immediate quantum threat to Bitcoin lack solid technical foundation.
Quantum algorithms: less powerful than they seem
Grover’s algorithm, considered one of the greatest risks, actually reduces the search space of SHA-256 from 2²⁵⁶ to 2¹²⁸. Although this reduction sounds significant, 2¹²⁸ remains an astronomically large number that maintains the practical security of the protocol. The situation with RSA and ECDSA is different: Shor’s algorithm poses a more severe theoretical threat, but with a crucial nuance that alarmists omit.
The factor of time and execution complexity
What Shaw emphasizes is that implementing an effective quantum attack against Bitcoin is not simply a matter of having a sufficiently powerful computer. It requires extensive preprocessing and, more importantly, rapid execution that exposes all encrypted data simultaneously. This last aspect is the critical bottleneck: currently, achieving such synchronization is completely unfeasible.
Alarmism as an obstacle to technical understanding
ElizaOS’s founder criticizes how speculation about quantum threats has generated a cycle of misinformation-driven panic. Much of the alarmism stems from a fundamental misunderstanding of what quantum computers can and cannot do today. The gap between theory and practical implementation remains huge, and minimizing it is both irresponsible and unnecessary.
The conclusion is clear: while research into post-quantum security is prudent, portraying quantum computing as an immediate existential threat to Bitcoin does not reflect current technical reality.
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
Real threat or unfounded panic? The truth about quantum computing and Bitcoin
Quantum computing has caused alarm in the crypto community, but Shaw, founder of ElizaOS, offers an analysis that challenges this narrative. According to his perspective, the current fears of an immediate quantum threat to Bitcoin lack solid technical foundation.
Quantum algorithms: less powerful than they seem
Grover’s algorithm, considered one of the greatest risks, actually reduces the search space of SHA-256 from 2²⁵⁶ to 2¹²⁸. Although this reduction sounds significant, 2¹²⁸ remains an astronomically large number that maintains the practical security of the protocol. The situation with RSA and ECDSA is different: Shor’s algorithm poses a more severe theoretical threat, but with a crucial nuance that alarmists omit.
The factor of time and execution complexity
What Shaw emphasizes is that implementing an effective quantum attack against Bitcoin is not simply a matter of having a sufficiently powerful computer. It requires extensive preprocessing and, more importantly, rapid execution that exposes all encrypted data simultaneously. This last aspect is the critical bottleneck: currently, achieving such synchronization is completely unfeasible.
Alarmism as an obstacle to technical understanding
ElizaOS’s founder criticizes how speculation about quantum threats has generated a cycle of misinformation-driven panic. Much of the alarmism stems from a fundamental misunderstanding of what quantum computers can and cannot do today. The gap between theory and practical implementation remains huge, and minimizing it is both irresponsible and unnecessary.
The conclusion is clear: while research into post-quantum security is prudent, portraying quantum computing as an immediate existential threat to Bitcoin does not reflect current technical reality.