Skip to main content

183 posts tagged with "Bitcoin"

Content about Bitcoin, the first cryptocurrency

View all tags

The DAT Flywheel Is Spinning Backwards: How 142 Bitcoin Treasury Companies Became Crypto's Hidden Contagion Risk

· 10 min read
Dora Noda
Software Engineer

In April 2026, Michael Saylor's Strategy holds 780,897 bitcoin — roughly 3.7% of the entire 21 million supply, acquired for about $59 billion. That headline number is the part everyone sees. The part almost nobody is pricing correctly is the second-order risk: more than 200 publicly listed companies have copied the playbook, 142 of them are running the exact same "issue equity at a premium, buy bitcoin, repeat" loop, and the loop only works in one direction.

Galaxy Digital was blunt about it in late March: at least five crypto treasury firms will likely face forced asset sales or closure in 2026. Many Digital Asset Treasury companies — DATs, in the new shorthand — are already trading at market-cap-to-net-asset-value (mNAV) ratios below 1.0, meaning the market values the wrapper at less than the bitcoin sitting inside it. When that happens, the flywheel that built the entire category stops turning. And when 142 companies share the same flywheel, they share the same gears when those gears strip.

Google's Quantum AI Whitepaper Maps Five Attack Paths That Put $100B of Ethereum at Risk

· 12 min read
Dora Noda
Software Engineer

One key cracked every nine minutes. The top 1,000 Ethereum wallets emptied in under nine days. A 20-fold collapse in the qubit count needed to break the cryptography that secures more than $100 billion of on-chain value. These are not the projections of a doomsday Twitter thread — they come from a 57-page whitepaper Google Quantum AI published on March 30, 2026, co-authored with Ethereum Foundation researcher Justin Drake and Stanford cryptographer Dan Boneh.

For a decade, "quantum risk" lived in the same intellectual neighborhood as asteroid strikes — real, catastrophic, but distant enough that no one had to act. The Google paper relocated the threat. It mapped five concrete attack paths against Ethereum, named the wallets, named the contracts, and gave engineers a number — fewer than 500,000 physical qubits — that maps directly onto the published roadmaps of IBM, Google, and a half-dozen well-funded startups. Q-Day, in other words, just acquired a calendar invite.

A 57-Page Paper That Changes the Threat Model

The paper, titled "Securing Elliptic Curve Cryptocurrencies against Quantum Vulnerabilities," is the first time a major quantum hardware lab has done the unglamorous engineering work of translating Shor's algorithm from a 1994 theoretical attack into a step-by-step blueprint against the elliptic-curve discrete logarithm problem (ECDLP) that secures Bitcoin, Ethereum, and virtually every chain that signs transactions with secp256k1 or secp256r1.

Three things make the paper land harder than prior estimates.

First, the qubit count. Earlier academic work pegged the resource requirement for breaking 256-bit ECDLP at multiple millions of physical qubits. The Google authors knock that down to fewer than 500,000 — a 20-fold reduction driven by improved circuit synthesis, better error-correction overhead, and tighter routing of magic states. IBM has publicly committed to a 100,000-qubit machine by 2029. Google has not published a comparable target, but its in-house roadmap is widely understood to be similar in slope. Half a million qubits is no longer a number that requires hand-waving toward the 2050s.

Second, the runtime. The paper estimates that once a sufficient machine exists, recovering a single private key from a public key takes on the order of nine minutes of quantum runtime — not days, not hours. That number matters enormously, because it determines how many high-value targets an attacker can drain inside the window between detection and response.

Third, and most consequential for Ethereum specifically, the authors do not stop at "ECDSA is broken." They walk through the protocol stack and identify five distinct attack surfaces, each with named victims.

The Five Attack Paths Against Ethereum

The paper organizes Ethereum's quantum exposure into five vectors, deliberately avoiding the lazy framing of "all crypto dies on the same day."

1. Externally Owned Account (EOA) compromise. Once an Ethereum address has signed even a single transaction, its public key is permanent and visible on-chain. A quantum attacker derives the private key in roughly nine minutes, then drains the wallet. Google's analysis identifies the top 1,000 wallets by ETH balance — collectively holding about 20.5 million ETH — as the most economically rational targets. At nine minutes per key, an attacker clears the entire list in under nine days.

2. Admin-controlled smart contract takeover. Ethereum's stablecoin economy and most production DeFi protocols rely on multisigs, upgrade keys, and minter roles controlled by EOAs. The paper enumerates 70-plus admin-controlled contracts, including the upgrade or minter keys behind major stablecoins. Compromising those keys does not just steal a balance — it lets the attacker mint, freeze, or rewrite the contract logic. Google estimates roughly $200 billion in stablecoins and tokenized assets sit downstream of these vulnerable keys.

3. Proof-of-stake validator key compromise. Ethereum's consensus layer uses BLS signatures, which are also based on elliptic-curve assumptions and equally broken by Shor's algorithm. An attacker who recovers enough validator private keys can, in principle, equivocate, finalize conflicting blocks, or stall finality. The exposure here is not stolen ETH — it is the integrity of the chain itself.

4. Layer 2 settlement compromise. The paper extends the analysis to major rollups. Optimistic rollups depend on EOA-signed proposer and challenger keys; ZK rollups depend on operator keys for sequencing and proving. Compromising those keys does not break the underlying validity proofs, but it does let an attacker steal sequencer fees, censor exits, or — in the worst case — rug the bridge that holds canonical L2 deposits.

5. Permanent forgery of historical data availability. This is the path that cryptographers find most disturbing. The original Ethereum trusted setup (and the KZG ceremony powering EIP-4844 blobs) relies on assumptions that a sufficiently powerful quantum machine can break by reconstructing setup secrets from public artifacts. The result is not theft — it is a permanent ability to forge historical state proofs that look valid forever. There is no rotation that fixes data already published.

The five paths collectively put more than $100 billion at immediate risk, and an order of magnitude more at structural risk if confidence in chain integrity collapses.

Ethereum Is More Exposed Than Bitcoin

A subtle but important conclusion of the paper: Ethereum's quantum exposure runs deeper than Bitcoin's, despite both chains using the same secp256k1 curve.

The reason is account abstraction in reverse. Bitcoin's UTXO model, particularly post-Taproot, supports addresses derived from a hash of the public key — meaning the public key is only revealed at spend time. A user who never reuses an address has a one-shot exposure window measured in the seconds between broadcast and confirmation. Funds parked in unspent, untouched addresses are quantum-safe by construction.

Ethereum has no such property. The moment an EOA signs its first transaction, its public key is on-chain forever. There is no "fresh address" pattern that hides it. A wallet that has transacted even once is a static target whose vulnerability does not decay over time. The 20.5 million ETH in the top 1,000 wallets is not just theoretically exposed — it is permanently fingerprinted on a public ledger waiting for a sufficiently powerful machine.

Worse, Ethereum cannot rotate keys without abandoning the account. Sending funds to a new address creates a new account with a new public key, but anything still associated with the old address — ENS names, contract permissions, vesting positions, governance allowlists — does not move with the funds. The migration cost is not just the gas to move tokens; it is the cost of unwinding every relationship the old address has accumulated.

The 2029 Deadline and Ethereum's Multi-Fork Roadmap

In parallel with the Google paper, the Ethereum Foundation launched pq.ethereum.org in March 2026 as the canonical hub for post-quantum research, the roadmap, open-source client repos, and weekly devnet results. More than 10 client teams are now running interoperability devnets focused on post-quantum primitives, and the community has converged on a target of completing L1 protocol-layer upgrades by 2029 — the same year Google has set for migrating its own authentication services off ECDSA.

The roadmap is staged across four upcoming hard forks rather than one big-bang fork. Roughly:

  • Fork 1 — Post-Quantum Key Registry. A native registry that lets accounts publish a post-quantum public key alongside their ECDSA key, enabling opt-in PQ co-signing without breaking existing tooling.
  • Fork 2 — Account Abstraction Hooks. Building on EIP-8141's "Frame Transaction" abstraction, accounts can specify validation logic that no longer assumes ECDSA, providing a native off-ramp toward lattice-based schemes such as ML-DSA (Dilithium) or hash-based SLH-DSA (SPHINCS+).
  • Fork 3 — PQ Consensus. Validator BLS signatures are replaced with a post-quantum aggregation scheme, the largest engineering lift in the entire roadmap because of the signature-size implications for block propagation.
  • Fork 4 — PQ Data Availability. A new trusted setup or transparent setup for blob commitments that does not depend on ECC assumptions, closing the historical-forgery vector.

Vitalik Buterin signaled the urgency in late February 2026 when he wrote that "validator signatures, data storage, accounts, and proofs all need to be updated" — naming all four forks in a single sentence and implicitly conceding that piecemeal upgrades will not suffice.

The challenge is not the cryptography. NIST has already standardized ML-KEM, ML-DSA, and SLH-DSA. The challenge is rolling those primitives through a live $300B+ network without breaking thousands of dapps that hard-code ECDSA assumptions, and without leaving billions of dollars of dormant ETH stranded in wallets whose owners never migrate.

The Frozen-or-Stolen Dilemma

Both Ethereum and Bitcoin face a governance question that no purely technical roadmap resolves: what happens to coins in vulnerable addresses whose owners never migrate?

The Ethereum Foundation's own FAQ frames the choice in plain terms: do nothing, or freeze. Doing nothing means that on Q-Day, an attacker drains every dormant address with a known public key — including the genesis-era wallets, the legacy ICO buyers, the lost-key holders, and a meaningful slice of Vitalik's own historical contributions to public goods funding. Freezing means social-consensus action to invalidate withdrawals from any address that has not migrated by a deadline.

Bitcoin's BIP 361, "Post Quantum Migration and Legacy Signature Sunset," lays out the same trilemma in a three-phase framework. Co-author Ethan Heilman has publicly estimated that a full Bitcoin migration to a quantum-resistant signature scheme would take seven years from the day rough consensus forms — which means BIP 361 needs to be substantively merged in 2026 to hit the 2033 horizon, and probably much sooner to hit 2029.

Neither chain has a precedent for mass coin invalidation. Ethereum did roll back the DAO hack in 2016, but that was a single-event reversal, not the deliberate freezing of millions of unrelated wallets based on cryptographic posture. The decision will inevitably read as a referendum on whether immutability or solvency is the chain's deeper commitment.

What This Means for Builders Right Now

The 2029 deadline can feel comfortably distant, but the decisions that determine whether a project is ready or scrambling get made in 2026 and 2027. A few practical implications surface immediately.

Smart contract architects should audit for ECDSA assumptions. Any contract that hard-codes ecrecover, embeds an immutable signer address, or depends on EOA-signed proposer keys needs an upgrade path. Contracts deployed without admin keys today look elegant; in a post-quantum world, they may look unrecoverable.

Custodians need to begin key-rotation hygiene now. A custody provider with billions under management cannot rotate every wallet in a single Q-Day weekend. Rotation, segregation by exposure tier, and pre-positioned PQ-ready cold storage are 2026 problems, not 2028 ones.

Bridge operators face the highest urgency. Bridges concentrate value behind a small number of multisig keys. The first economically rational quantum attack will not target a randomly chosen wallet — it will target the most valuable single key in the ecosystem. Bridges should be the first to implement hybrid PQ + ECDSA signing.

Application teams should track the four-fork roadmap. Each Ethereum hard fork in the PQ sequence will introduce new transaction types and validation semantics. Wallets, indexers, block explorers, and node operators that lag the upgrade window will degrade gracefully if they planned for it and break catastrophically if they did not.

BlockEden.xyz operates production RPC and indexing infrastructure across Ethereum, Sui, Aptos, and a dozen other chains, and tracks each network's post-quantum migration roadmap so application developers don't have to. Explore our API marketplace to build on infrastructure designed to survive the next decade of cryptographic transitions, not just the current one.

The Quiet Revolution in Threat Modeling

The deepest contribution of the Google paper may be sociological rather than technical. For ten years, "quantum-resistant" was a marketing claim that mostly attached to projects no one used. The serious chains treated PQ migration as a problem for the next generation of researchers. The 57 pages from Google, Justin Drake, and Dan Boneh shifted that posture in a single publication.

Three quantum-cryptography papers have landed in three months. A consensus has formed that the resource gap between current quantum hardware and a cryptographically relevant machine is closing faster than the gap between current chain protocols and post-quantum readiness. The intersection of those two curves — somewhere between 2029 and 2032, depending on whose estimate proves correct — is the most important deadline crypto infrastructure has ever faced.

The chains that treat 2026 as a year for serious engineering work, not vague reassurance, will still be standing on the other side. The ones that wait for the first headline about a stolen Vitalik wallet will not have time to react.

Sources

Ika on Sui: The Sub-Second MPC Network Trying to Kill the Bridge Industry

· 11 min read
Dora Noda
Software Engineer

Cross-chain bridges have stolen more money from users than any other category of Web3 infrastructure. The ledger reads like a horror story: Ronin Bridge drained twice, first for $624M in 2022 and again for roughly $625M in May 2025 through an almost identical attack vector. Wormhole lost $326M. Nomad bled $190M from a bug in its initialization process. Between July 2024 and November 2025 alone, cross-chain bridges lost another $320M to exploits.

The industry's response has been to patch, audit, and pray. Ika is betting on a different thesis: burn the bridge.

Bitcoin's Fastest Sentiment Reversal: How the Institutional Floor Stopped the 2026 Crash

· 11 min read
Dora Noda
Software Engineer

Ten weeks ago, the Crypto Fear & Greed Index hit 5 — its lowest reading in recorded history, surpassing even the depths of the FTX collapse. Bitcoin was spiraling through $60,000 on its way down from a $126,272 all-time high, liquidating $3.2 billion in leveraged positions in a single day. Analysts were dusting off the bear-market playbook, predicting a 2022-style multi-year grind.

On April 15, 2026, that same index registered daily Greed.

The 10-week reversal from an all-time-low Fear reading to Greed is the fastest sentiment recovery in crypto market history — and it happened for a reason that didn't exist in any previous cycle: a $128 billion institutional floor made of spot Bitcoin ETFs.

Circle's Arc Blockchain Is Building the Quantum-Proof Foundation for the Next Decade of Finance

· 10 min read
Dora Noda
Software Engineer

On March 31, 2026, Google quietly published a research paper that sent shockwaves through the cryptography community: breaking the elliptic curve encryption securing Bitcoin and Ethereum might require as few as 500,000 physical qubits — roughly 20 times fewer than Google's own 2019 estimate suggested. Under ideal conditions, a sufficiently powerful quantum computer could crack a private key from a broadcast transaction in approximately nine minutes. Given Bitcoin's 10-minute average block interval, that means a 41% chance an attacker could steal a transaction before it confirms.

The quantum threat to blockchain just moved from theoretical to urgent. And Circle, the issuer of the world's second-largest stablecoin, saw it coming.

Bitcoin's $1.3T Quantum Clock: The 9-Minute ECDSA Break and BIP-360 Race to Save 6.9M BTC

· 11 min read
Dora Noda
Software Engineer

Nine minutes. That is the window a 57-page Google Quantum AI paper says a future quantum computer would need to reverse-engineer a Bitcoin private key from an exposed public key — short enough to fit inside a single block confirmation, long enough to rewrite the risk profile of the entire $1.3 trillion network. The paper, co-authored with researchers from Stanford and the Ethereum Foundation and published on March 30, 2026, did something subtler than predict the apocalypse. It shrank the number that matters. The resources needed to break ECDSA dropped by a factor of 20 compared to prior estimates. Google now internally targets post-quantum migration by 2029.

FASB ASC 350-60 Meets Its First Bear Market: How Fair Value Accounting Is Reshaping Corporate Bitcoin Treasuries

· 9 min read
Dora Noda
Software Engineer

When the Financial Accounting Standards Board finalized ASC 350-60 in late 2023, corporate Bitcoin holders celebrated. The new standard replaced the punitive impairment-only model — where companies wrote down Bitcoin losses but could never mark up gains — with fair value accounting that recognized both sides of the ledger. Strategy's Michael Saylor called it a watershed moment for institutional adoption. What nobody anticipated was how quickly that celebration would curdle into quarterly earnings anxiety when Bitcoin dropped 46% from its all-time high.

Q1 2026 delivered the answer: Strategy reported a staggering $14.46 billion unrealized loss on its Bitcoin holdings, the largest single-quarter paper loss in corporate crypto treasury history. And Strategy is far from alone. Across the growing cohort of public companies holding Bitcoin on their balance sheets, the new accounting standard is doing exactly what it promised — reflecting reality — and that reality is brutally volatile.

Babylon Protocol's $4.8B BTCFi Revolution: Bitcoin Finally Earns Yield Without Leaving Home

· 10 min read
Dora Noda
Software Engineer

Most of Bitcoin's $1.3 trillion sits completely idle. No yield. No utility. Just stored value waiting for the next bull run. For years, anyone wanting to put their BTC to work had to trust bridges, accept wrapped tokens, or hand custody to third parties — each route exposing them to risks that have cost the industry billions. Then Babylon Protocol arrived and asked a deceptively simple question: what if Bitcoin could secure other blockchains without ever leaving the Bitcoin network?

The answer has attracted $4.8 billion in locked BTC, making Babylon the dominant force in the rapidly maturing BTCFi sector — and the clearest proof yet that Bitcoin's role in crypto is evolving beyond digital gold.

Bitcoin's April 9 Policy Sensitivity Proof: How One Tweet Moved a $1.5 Trillion Market

· 10 min read
Dora Noda
Software Engineer

On April 9, 2026, a single U.S. policy announcement delivered a $7,000 price swing to Bitcoin in under 24 hours — and in doing so, wrote the clearest case study yet in the transformation of crypto from speculative internet money into a fully macro-integrated asset class.

President Trump's declaration of a 90-day pause on reciprocal tariffs sent Bitcoin rocketing from roughly $74,500 to $82,000. The S&P 500 logged its best single-day performance in over 16 years, surging 9.52%. Bitcoin moved almost in lockstep. The event wasn't a crypto-specific catalyst — no protocol upgrade, no ETF approval, no exchange listing. It was a trade policy tweet. And that, more than anything, reveals where Bitcoin stands in 2026.