Skip to main content

133 posts tagged with "Security"

Cybersecurity, smart contract audits, and best practices

View all tags

Move VM Memory Safety vs EVM Reentrancy: Why the Aptos and Sui Resource Model Eliminates Entire Classes of Smart Contract Vulnerabilities

· 9 min read
Dora Noda
Software Engineer

The DAO hack of 2016 drained $60 million from Ethereum in a single afternoon. Nine years later, reentrancy attacks still cost DeFi protocols $35.7 million across 22 separate incidents in 2024 alone. The same class of vulnerability — an attacker calling back into a contract before its state is updated — continues to haunt the EVM ecosystem despite years of developer education, audit tooling, and battle-tested patterns.

Aptos and Sui, both built on the Move language, take a fundamentally different approach: they make entire categories of vulnerabilities impossible by design.

Ethereum's Post-Quantum Emergency: The $2M Race Against Q-Day

· 9 min read
Dora Noda
Software Engineer

What if everything securing Ethereum's $500 billion network could be cracked in minutes? That's no longer science fiction. The Ethereum Foundation just declared post-quantum security a "top strategic priority," launching a dedicated team and backing it with $2 million in research prizes. The message is clear: the quantum threat isn't theoretical anymore, and the clock is ticking.

The Quantum Ticking Time Bomb

Every blockchain today relies on cryptographic assumptions that quantum computers will shatter. Ethereum, Bitcoin, Solana, and virtually every major network use elliptic curve cryptography (ECC) for signatures—the same math that Shor's algorithm can break with sufficient qubits.

The threat model is stark. Current quantum computers are nowhere near capable of running Shor's algorithm on real-world keys. Breaking secp256k1 (the elliptic curve Bitcoin and Ethereum use) or RSA-2048 requires hundreds of thousands to millions of physical qubits—far beyond today's 1,000+ qubit machines. Google and IBM have public roadmaps targeting 1 million physical qubits by the early 2030s, though engineering delays likely push this to around 2035.

But here's the kicker: estimates for "Q-Day"—the moment quantum computers can break current cryptography—range from 5-10 years (aggressive) to 20-40 years (conservative). Some assessments give a 1-in-7 chance that public-key cryptography could be broken by 2026. That's not a comfortable margin when you're securing hundreds of billions in assets.

Unlike traditional systems where a single entity can mandate an upgrade, blockchains face a coordination nightmare. You can't force users to upgrade wallets. You can't patch every smart contract. And once a quantum computer can run Shor's algorithm, every transaction that exposes a public key becomes vulnerable to private key extraction. For Bitcoin, that's roughly 25% of all BTC sitting in reused or revealed addresses. For Ethereum, account abstraction offers some relief, but legacy accounts remain exposed.

Ethereum's $2M Post-Quantum Bet

In January 2026, the Ethereum Foundation announced a dedicated Post-Quantum (PQ) team led by Thomas Coratger, with support from Emile, a cryptographer working on leanVM. Senior researcher Justin Drake called post-quantum security the foundation's "top strategic priority"—a rare elevation for what was previously a long-term research topic.

The foundation is backing this with serious funding:

  • $1 Million Poseidon Prize: Strengthening the Poseidon hash function, a cryptographic building block used in zero-knowledge proof systems.
  • $1 Million Proximity Prize: Continuing research into post-quantum cryptographic proximity problems, signaling a preference for hash-based techniques.

Hash-based cryptography is the foundation's chosen path forward. Unlike lattice-based or code-based alternatives standardized by NIST (like CRYSTALS-Kyber and Dilithium), hash functions have simpler security assumptions and are already battle-tested in blockchain environments. The downside? They produce larger signatures and require more storage—a tradeoff Ethereum is willing to make for long-term quantum resistance.

LeanVM: The Cornerstone of Ethereum's Strategy

Drake described leanVM as the "cornerstone" of Ethereum's post-quantum approach. This minimalist zero-knowledge proof virtual machine is optimized for quantum-resistant, hash-based signatures. By focusing on hash functions rather than elliptic curves, leanVM sidesteps the cryptographic primitives most vulnerable to Shor's algorithm.

Why does this matter? Because Ethereum's L2 ecosystem, DeFi protocols, and privacy tools all rely on zero-knowledge proofs. If the underlying cryptography isn't quantum-safe, the entire stack collapses. LeanVM aims to future-proof these systems before quantum computers arrive.

Multiple teams are already running multi-client post-quantum development networks, including Zeam, Ream Labs, PierTwo, Gean client, and Ethlambda, collaborating with established consensus clients like Lighthouse, Grandine, and Prysm. This isn't vaporware—it's live infrastructure being stress-tested today.

The foundation is also launching biweekly breakout calls as part of the All Core Developers process, focusing on user-facing security changes: specialized cryptographic functions built directly into the protocol, new account designs, and longer-term signature aggregation strategies using leanVM.

The Migration Challenge: Billions in Assets at Stake

Migrating Ethereum to post-quantum cryptography isn't a simple software update. It's a multi-year, multi-layer coordination effort affecting every participant in the network.

Layer 1 Protocol: Consensus must switch to quantum-resistant signature schemes. This requires a hard fork—meaning every validator, node operator, and client implementation must upgrade in sync.

Smart Contracts: Millions of contracts deployed on Ethereum use ECDSA for signature verification. Some can be upgraded via proxy patterns or governance; others are immutable. Projects like Uniswap, Aave, and Maker will need migration plans.

User Wallets: MetaMask, Ledger, Trust Wallet—every wallet must support new signature schemes. Users must migrate funds from old addresses to quantum-safe ones. This is where the "harvest now, decrypt later" threat becomes real: adversaries could record transactions today and decrypt them once quantum computers arrive.

L2 Rollups: Arbitrum, Optimism, Base, zkSync—all inherit Ethereum's cryptographic assumptions. Each rollup must independently migrate or risk becoming a quantum-vulnerable silo.

Ethereum has an advantage here: account abstraction. Unlike Bitcoin's UTXO model, which requires users to manually move funds, Ethereum's account model can support smart contract wallets with upgradeable cryptography. This doesn't eliminate the migration challenge, but it provides a clearer pathway.

What Other Blockchains Are Doing

Ethereum isn't alone. The broader blockchain ecosystem is waking up to the quantum threat:

  • QRL (Quantum Resistant Ledger): Built from day one with XMSS (eXtended Merkle Signature Scheme), a hash-based signature standard. QRL 2.0 (Project Zond) enters testnet in Q1 2026, with audit and mainnet release to follow.

  • 01 Quantum: Launched a quantum-resistant blockchain migration toolkit in early February 2026, issuing the $qONE token on Hyperliquid. Their Layer 1 Migration Toolkit is scheduled for release by March 2026.

  • Bitcoin: Multiple proposals exist (BIPs for post-quantum opcodes, soft forks for new address types), but Bitcoin's conservative governance makes rapid changes unlikely. A contentious hard fork scenario looms if quantum computers arrive sooner than expected.

  • Solana, Cardano, Ripple: All use elliptic curve-based signatures and face similar migration challenges. Most are in early research phases, with no dedicated teams or timelines announced.

A review of the top 26 blockchain protocols reveals that 24 rely purely on quantum-vulnerable signature schemes. Only two (QRL and one lesser-known chain) have quantum-resistant foundations today.

The Q-Day Scenarios: Fast, Slow, or Never?

Aggressive Timeline (5-10 years): Quantum computing breakthroughs accelerate. A 1 million qubit machine arrives by 2031, giving the industry only five years to complete network-wide migrations. Blockchains that haven't started preparations face catastrophic key exposure. Ethereum's head start matters here.

Conservative Timeline (20-40 years): Quantum computing progresses slowly, constrained by error correction and engineering challenges. Blockchains have ample time to migrate at a measured pace. The Ethereum Foundation's early investment looks prudent but not urgent.

Black Swan (2-5 years): A classified or private quantum breakthrough happens before public roadmaps suggest. State actors or well-funded adversaries gain cryptographic superiority, enabling silent theft from vulnerable addresses. This is the scenario that justifies treating post-quantum security as a "top strategic priority" today.

The middle scenario is most likely, but blockchains can't afford to plan for the middle. The downside of being wrong is existential.

What Developers and Users Should Do

For developers building on Ethereum:

  • Monitor PQ breakout calls: The Ethereum Foundation's biweekly post-quantum sessions will shape protocol changes. Stay informed.
  • Plan contract upgrades: If you control high-value contracts, design upgrade paths now. Proxy patterns, governance mechanisms, or migration incentives will be critical.
  • Test on PQ devnets: Multi-client post-quantum networks are already live. Test your applications for compatibility.

For users holding ETH or tokens:

  • Avoid address reuse: Once you sign a transaction from an address, the public key is exposed. Quantum computers could theoretically derive the private key from this. Use each address once if possible.
  • Watch for wallet updates: Major wallets will integrate post-quantum signatures as standards mature. Be ready to migrate funds when the time comes.
  • Don't panic: Q-Day isn't tomorrow. The Ethereum Foundation, along with the broader industry, is actively building defenses.

For enterprises and institutions:

  • Evaluate quantum risk: If you're custody billions in crypto, quantum threats are a fiduciary concern. Engage with post-quantum research and migration timelines.
  • Diversify across chains: Ethereum's proactive stance is encouraging, but other chains may lag. Spread risk accordingly.

The Billion-Dollar Question: Will It Be Enough?

Ethereum's $2 million in research prizes, dedicated team, and multi-client development networks represent the most aggressive post-quantum push in the blockchain industry. But is it enough?

The optimistic case: Yes. Ethereum's account abstraction, robust research culture, and early start give it the best shot at a smooth migration. If quantum computers follow the conservative 20-40 year timeline, Ethereum will have quantum-resistant infrastructure deployed well in advance.

The pessimistic case: No. Coordinating millions of users, thousands of developers, and hundreds of protocols is unprecedented. Even with the best tools, migration will be slow, incomplete, and contentious. Legacy systems—immutable contracts, lost keys, abandoned wallets—will remain quantum-vulnerable indefinitely.

The realistic case: Partial success. Core Ethereum will migrate successfully. Major DeFi protocols and L2s will follow. But a long tail of smaller projects, inactive wallets, and edge cases will linger as quantum-vulnerable remnants.

Conclusion: The Race No One Wants to Lose

The Ethereum Foundation's post-quantum emergency is a bet that the industry can't afford to lose. $2 million in prizes, a dedicated team, and live development networks signal serious intent. Hash-based cryptography, leanVM, and account abstraction provide a credible technical path.

But intent isn't execution. The real test comes when quantum computers cross from research curiosity to cryptographic threat. By then, the window for migration may have closed. Ethereum is running the race now, while others are still lacing their shoes.

The quantum threat isn't hype. It's math. And the math doesn't care about roadmaps or good intentions. The question isn't whether blockchains need post-quantum security—it's whether they'll finish the migration before Q-Day arrives.


Ethereum's proactive quantum defense strategy highlights the importance of robust, future-proof blockchain infrastructure. At BlockEden.xyz, we provide enterprise-grade Ethereum and multi-chain API access built on foundations designed to evolve with the industry's security needs. Explore our services to build on infrastructure you can trust for the long term.

Post-Quantum Blockchains: 8 Projects Racing to Build Quantum-Proof Crypto

· 8 min read
Dora Noda
Software Engineer

When Coinbase formed a post-quantum advisory board in January 2026, it validated what security researchers warned for years: quantum computers will break current blockchain cryptography, and the race to quantum-proof crypto has begun. QRL's XMSS signatures, StarkWare's hash-based STARKs, and Ethereum's $2M research prize represent the vanguard of projects positioning for 2026 market leadership. The question isn't if blockchains need quantum resistance—it's which technical approaches will dominate when Q-Day arrives.

The post-quantum blockchain sector spans two categories: retrofitting existing chains (Bitcoin, Ethereum) and native quantum-resistant protocols (QRL, Quantum1). Each faces different challenges. Retrofits must maintain backward compatibility, coordinate distributed upgrades, and manage exposed public keys. Native protocols start fresh with quantum-resistant cryptography but lack network effects. Both approaches are necessary—legacy chains hold trillions in value that must be protected, while new chains can optimize for quantum resistance from genesis.

QRL: The Pioneer Quantum-Resistant Blockchain

Quantum Resistant Ledger (QRL) launched in 2018 as the first blockchain implementing post-quantum cryptography from inception. The project chose XMSS (eXtended Merkle Signature Scheme), a hash-based signature algorithm providing quantum resistance through hash functions rather than number theory.

Why XMSS? Hash functions like SHA-256 are believed quantum-resistant because quantum computers don't meaningfully accelerate hash collisions (Grover's algorithm provides quadratic speedup, not exponential like Shor's algorithm against ECDSA). XMSS leverages this property, building signatures from Merkle trees of hash values.

Trade-offs: XMSS signatures are large (~2,500 bytes vs. 65 bytes for ECDSA), making transactions more expensive. Each address has limited signing capacity—after generating N signatures, the tree must be regenerated. This stateful nature requires careful key management.

Market position: QRL remains niche, processing minimal transaction volume compared to Bitcoin or Ethereum. However, it proves quantum-resistant blockchains are technically viable. As Q-Day approaches, QRL could gain attention as a battle-tested alternative.

Future outlook: If quantum threats materialize faster than expected, QRL's first-mover advantage matters. The protocol has years of production experience with post-quantum signatures. Institutions seeking quantum-safe holdings might allocate to QRL as "quantum insurance."

STARKs: Zero-Knowledge Proofs with Quantum Resistance

StarkWare's STARK (Scalable Transparent Argument of Knowledge) technology provides quantum resistance as a side benefit of its zero-knowledge proof architecture. STARKs use hash functions and polynomials, avoiding the elliptic curve cryptography vulnerable to Shor's algorithm.

Why STARKs matter: Unlike SNARKs (which require trusted setups and use elliptic curves), STARKs are transparent (no trusted setup) and quantum-resistant. This makes them ideal for scaling solutions (StarkNet) and post-quantum migration.

Current usage: StarkNet processes transactions for Ethereum L2 scaling. The quantum resistance is latent—not the primary feature, but a valuable property as quantum threats grow.

Integration path: Ethereum could integrate STARK-based signatures for post-quantum security while maintaining backward compatibility with ECDSA during transition. This hybrid approach allows gradual migration.

Challenges: STARK proofs are large (hundreds of kilobytes), though compression techniques are improving. Verification is fast, but proof generation is computationally expensive. These trade-offs limit throughput for high-frequency applications.

Outlook: STARKs likely become part of Ethereum's post-quantum solution, either as direct signature scheme or as wrapper for transitioning legacy addresses. StarkWare's production track record and Ethereum integration make this path probable.

Ethereum Foundation's $2M Research Prize: Hash-Based Signatures

The Ethereum Foundation's January 2026 designation of post-quantum cryptography as "top strategic priority" accompanied a $2 million research prize for practical migration solutions. The focus is hash-based signatures (SPHINCS+, XMSS) and lattice-based cryptography (Dilithium).

SPHINCS+: A stateless hash-based signature scheme standardized by NIST. Unlike XMSS, SPHINCS+ doesn't require state management—you can sign unlimited messages with one key. Signatures are larger (~16-40KB), but the stateless property simplifies integration.

Dilithium: A lattice-based signature scheme offering smaller signatures (~2.5KB) and faster verification than hash-based alternatives. Security relies on lattice problems believed quantum-hard.

Ethereum's challenge: Migrating Ethereum requires addressing exposed public keys from historical transactions, maintaining backward compatibility during transition, and minimizing signature size bloat to avoid breaking L2 economics.

Research priorities: The $2M prize targets practical migration paths—how to fork the network, transition address formats, handle legacy keys, and maintain security during the multi-year transition.

Timeline: Ethereum developers estimate 3-5 years from research to production deployment. This suggests mainnet post-quantum activation around 2029-2031, assuming Q-Day isn't earlier.

Bitcoin BIPs: Conservative Approach to Post-Quantum Migration

Bitcoin Improvement Proposals (BIPs) discussing post-quantum cryptography exist in draft stages, but consensus-building is slow. Bitcoin's conservative culture resists untested cryptography, preferring battle-hardened solutions.

Likely approach: Hash-based signatures (SPHINCS+) due to conservative security profile. Bitcoin prioritizes security over efficiency, accepting larger signatures for lower risk.

Taproot integration: Bitcoin's Taproot upgrade enables script flexibility that could accommodate post-quantum signatures without hard fork. Taproot scripts could include post-quantum signature validation alongside ECDSA, allowing opt-in migration.

Challenge: The 6.65 million BTC in exposed addresses. Bitcoin must decide: forced migration (burns lost coins), voluntary migration (risks quantum theft), or hybrid approach accepting losses.

Timeline: Bitcoin moves slower than Ethereum. Even if BIPs reach consensus in 2026-2027, mainnet activation could take until 2032-2035. This timeline assumes Q-Day isn't imminent.

Community divide: Some Bitcoin maximalists deny quantum urgency, viewing it as distant threat. Others advocate immediate action. This tension slows consensus-building.

Quantum1: Native Quantum-Resistant Smart Contract Platform

Quantum1 (hypothetical example of emerging projects) represents the new wave of blockchains designed quantum-resistant from genesis. Unlike QRL (simple payments), these platforms offer smart contract functionality with post-quantum security.

Architecture: Combines lattice-based signatures (Dilithium), hash-based commitments, and zero-knowledge proofs for privacy-preserving, quantum-resistant smart contracts.

Value proposition: Developers building long-term applications (10+ year lifespan) may prefer native quantum-resistant platforms over retrofitted chains. Why build on Ethereum today only to migrate in 2030?

Challenges: Network effects favor established chains. Bitcoin and Ethereum have liquidity, users, developers, and applications. New chains struggle gaining traction regardless of technical superiority.

Potential catalyst: A quantum attack on a major chain would drive flight to quantum-resistant alternatives. Quantum1-type projects are insurance policies against incumbent failure.

Coinbase Advisory Board: Institutional Coordination

Coinbase's formation of a post-quantum advisory board signals institutional focus on quantum preparedness. As a publicly-traded company with fiduciary duties, Coinbase can't ignore risks to customer assets.

Advisory board role: Evaluate quantum threats, recommend migration strategies, coordinate with protocol developers, and ensure Coinbase infrastructure prepares for post-quantum transition.

Institutional influence: Coinbase holds billions in customer crypto. If Coinbase pushes protocols toward specific post-quantum standards, that influence matters. Exchange participation accelerates adoption—if exchanges only support post-quantum addresses, users migrate faster.

Timeline pressure: Coinbase's public involvement suggests institutional timelines are shorter than community discourse admits. Public companies don't form advisory boards for 30-year risks.

The 8 Projects Positioning for Leadership

Summarizing the competitive landscape:

  1. QRL: First mover, production XMSS implementation, niche market
  2. StarkWare/StarkNet: STARK-based quantum resistance, Ethereum integration
  3. Ethereum Foundation: $2M research prize, SPHINCS+/Dilithium focus
  4. Bitcoin Core: BIP proposals, Taproot-enabled opt-in migration
  5. Quantum1-type platforms: Native quantum-resistant smart contract chains
  6. Algorand: Exploring post-quantum cryptography for future upgrades
  7. Cardano: Research into lattice-based cryptography integration
  8. IOTA: Quantum-resistant hash functions in Tangle architecture

Each project optimizes for different trade-offs: security vs. efficiency, backward compatibility vs. clean slate, NIST-standardized vs. experimental algorithms.

What This Means for Developers and Investors

For developers: Building applications with 10+ year horizons should consider post-quantum migration. Applications on Ethereum will eventually need to support post-quantum address formats. Planning now reduces technical debt later.

For investors: Diversification across quantum-resistant and legacy chains hedges quantum risk. QRL and similar projects are speculative but offer asymmetric upside if quantum threats materialize faster than expected.

For institutions: Post-quantum preparedness is risk management, not speculation. Custodians holding client assets must plan migration strategies, coordinate with protocol developers, and ensure infrastructure supports post-quantum signatures.

For protocols: The window for migration is closing. Projects starting post-quantum research in 2026 won't deploy until 2029-2031. If Q-Day arrives in 2035, that leaves only 5-10 years of post-quantum security. Starting later risks insufficient time.

Sources

The Quantum Migration Problem: Why Your Bitcoin Address Becomes Unsafe After One Transaction

· 9 min read
Dora Noda
Software Engineer

When you sign a Bitcoin transaction, your public key becomes permanently visible on the blockchain. For 15 years, this hasn't mattered—ECDSA encryption protecting Bitcoin is computationally infeasible to break with classical computers. But quantum computers change everything. Once a sufficiently powerful quantum computer exists (Q-Day), it can reconstruct your private key from your exposed public key in hours, draining your address. The underappreciated Q-Day problem isn't just "upgrade encryption." It's that 6.65 million BTC in addresses that have signed transactions are already vulnerable, and migration is exponentially harder than upgrading corporate IT systems.

The Ethereum Foundation's $2 million post-quantum research prize and January 2026 formation of a dedicated PQ team signal that "top strategic priority" status has arrived. This isn't future planning—it's emergency preparation. Project Eleven raised $20 million specifically for quantum-resistant crypto security. Coinbase formed a post-quantum advisory board. The race against Q-Day has begun, and blockchains face unique challenges traditional systems don't: immutable history, distributed coordination, and 6.65 million BTC sitting in addresses with exposed public keys.

The Public Key Exposure Problem: Why Your Address Becomes Vulnerable After Signing

Bitcoin's security relies on a fundamental asymmetry: deriving a public key from a private key is easy, but reversing it is computationally impossible. Your Bitcoin address is a hash of your public key, providing an additional layer of protection. As long as your public key remains hidden, attackers can't target your specific key.

However, the moment you sign a transaction, your public key becomes visible on the blockchain. This is unavoidable—signature verification requires the public key. For receiving funds, your address (hash of public key) suffices. But spending requires revealing the key.

Classical computers can't exploit this exposure. Breaking ECDSA-256 (Bitcoin's signature scheme) requires solving the discrete logarithm problem, estimated at 2^128 operations—infeasible even for supercomputers running for millennia.

Quantum computers break this assumption. Shor's algorithm, running on a quantum computer with sufficient qubits and error correction, can solve discrete logarithms in polynomial time. Estimates suggest a quantum computer with ~1,500 logical qubits could break ECDSA-256 in hours.

This creates a critical vulnerability window: once you sign a transaction from an address, the public key is exposed forever on-chain. If a quantum computer later emerges, all previously exposed keys become vulnerable. The 6.65 million BTC held in addresses that have signed transactions are sitting with permanently exposed public keys, waiting for Q-Day.

New addresses with no transaction history remain safe until first use because their public keys aren't exposed. But legacy addresses—Satoshi's coins, early adopter holdings, exchange cold storage that has signed transactions—are ticking time bombs.

Why Blockchain Migration Is Harder Than Traditional Cryptography Upgrades

Traditional IT systems face quantum threats too. Banks, governments, and corporations use encryption vulnerable to quantum attacks. But their migration path is straightforward: upgrade encryption algorithms, rotate keys, and re-encrypt data. While expensive and complex, it's technically feasible.

Blockchain migration faces unique challenges:

Immutability: Blockchain history is permanent. You can't retroactively change past transactions to hide exposed public keys. Once revealed, they're revealed forever across thousands of nodes.

Distributed coordination: Blockchains lack central authorities to mandate upgrades. Bitcoin's consensus requires majority agreement among miners, nodes, and users. Coordinating a hard fork for post-quantum migration is politically and technically complex.

Backward compatibility: New post-quantum addresses must coexist with legacy addresses during transition. This creates protocol complexity—two signature schemes, dual address formats, mixed-mode transaction validation.

Lost keys and inactive users: Millions of BTC sit in addresses owned by people who lost keys, died, or abandoned crypto years ago. These coins can't migrate voluntarily. Do they remain vulnerable, or does the protocol force-migrate, risking destroying access?

Transaction size and costs: Post-quantum signatures are significantly larger than ECDSA. Signature sizes could increase from 65 bytes to 2,500+ bytes depending on the scheme. This balloons transaction data, raising fees and limiting throughput.

Consensus on algorithm choice: Which post-quantum algorithm? NIST standardized several, but each has trade-offs. Choosing wrong could mean re-migrating later. Blockchains must bet on algorithms that remain secure for decades.

The Ethereum Foundation's $2 million research prize targets these exact problems: how to migrate Ethereum to post-quantum cryptography without breaking the network, losing backward compatibility, or making the blockchain unusable due to bloated signatures.

The 6.65 Million BTC Problem: What Happens to Exposed Addresses?

As of 2026, approximately 6.65 million BTC sit in addresses that have signed at least one transaction, meaning their public keys are exposed. This represents about 30% of the total Bitcoin supply and includes:

Satoshi's coins: Approximately 1 million BTC mined by Bitcoin's creator remain unmoved. Many of these addresses have never signed transactions, but others have exposed keys from early transactions.

Early adopter holdings: Thousands of BTC held by early miners and adopters who accumulated at pennies-per-coin. Many addresses are dormant but have historical transaction signatures.

Exchange cold storage: Exchanges hold millions of BTC in cold storage. While best practices rotate addresses, legacy cold wallets often have exposed public keys from past consolidation transactions.

Lost coins: An estimated 3-4 million BTC are lost (owners dead, keys forgotten, hard drives discarded). Many of these addresses have exposed keys.

What happens to these coins on Q-Day? Several scenarios:

Scenario 1 - Forced migration: A hard fork could mandate moving coins from old addresses to new post-quantum addresses within a deadline. Coins not migrated become unspendable. This "burns" lost coins but protects the network from quantum attacks draining the treasury.

Scenario 2 - Voluntary migration: Users migrate voluntarily, but exposed addresses remain valid. Risk: quantum attackers drain vulnerable addresses before owners migrate. Creates a "race to migrate" panic.

Scenario 3 - Hybrid approach: Introduce post-quantum addresses but maintain backward compatibility indefinitely. Accept that vulnerable addresses will eventually be drained post-Q-Day, treating it as natural selection.

Scenario 4 - Emergency freeze: Upon detecting quantum attacks, freeze vulnerable address types via emergency hard fork. Buys time for migration but requires centralized decision-making Bitcoin resists.

None are ideal. Scenario 1 destroys legitimately lost keys. Scenario 2 enables quantum theft. Scenario 3 accepts billions in losses. Scenario 4 undermines Bitcoin's immutability. The Ethereum Foundation and Bitcoin researchers are wrestling with these trade-offs now, not in distant future.

Post-Quantum Algorithms: The Technical Solutions

Several post-quantum cryptographic algorithms offer resistance to quantum attacks:

Hash-based signatures (XMSS, SPHINCS+): Security relies on hash functions, which are believed quantum-resistant. Advantage: Well-understood, conservative security assumptions. Disadvantage: Large signature sizes (2,500+ bytes), making transactions expensive.

Lattice-based cryptography (Dilithium, Kyber): Based on lattice problems difficult for quantum computers. Advantage: Smaller signatures (~2,500 bytes), efficient verification. Disadvantage: Newer, less battle-tested than hash-based schemes.

STARKs (Scalable Transparent Arguments of Knowledge): Zero-knowledge proofs resistant to quantum attacks because they rely on hash functions, not number theory. Advantage: Transparent (no trusted setup), quantum-resistant, scalable. Disadvantage: Large proof sizes, computationally expensive.

Multivariate cryptography: Security from solving multivariate polynomial equations. Advantage: Fast signature generation. Disadvantage: Large public keys, less mature.

Code-based cryptography: Based on error-correcting codes. Advantage: Fast, well-studied. Disadvantage: Very large key sizes, impractical for blockchain use.

The Ethereum Foundation is exploring hash-based and lattice-based signatures as most promising for blockchain integration. QRL (Quantum Resistant Ledger) pioneered XMSS implementation in 2018, demonstrating feasibility but accepting trade-offs in transaction size and throughput.

Bitcoin will likely choose hash-based signatures (SPHINCS+ or similar) due to conservative security philosophy. Ethereum may opt for lattice-based (Dilithium) to minimize size overhead. Both face the same challenge: signatures 10-40x larger than ECDSA balloon blockchain size and transaction costs.

The Timeline: How Long Until Q-Day?

Estimating Q-Day (when quantum computers break ECDSA) is speculative, but trends are clear:

Optimistic (for attackers) timeline: 10-15 years. IBM, Google, and startups are making rapid progress on qubit count and error correction. If progress continues exponentially, 1,500+ logical qubits could arrive by 2035-2040.

Conservative timeline: 20-30 years. Quantum computing faces immense engineering challenges—error correction, qubit coherence, scaling. Many believe practical attacks remain decades away.

Pessimistic (for blockchains) timeline: 5-10 years. Secret government programs or breakthrough discoveries could accelerate timelines. Prudent planning assumes shorter timelines, not longer.

The Ethereum Foundation treating post-quantum migration as "top strategic priority" in January 2026 suggests internal estimates are shorter than public discourse admits. You don't allocate $2 million and form dedicated teams for 30-year risks. You do it for 10-15 year risks.

Bitcoin's culture resists urgency, but key developers acknowledge the problem. Proposals for post-quantum Bitcoin exist (BIPs draft stage), but consensus-building takes years. If Q-Day arrives in 2035, Bitcoin needs to begin migration by 2030 to allow time for development, testing, and network rollout.

What Individuals Can Do Now

While protocol-level solutions are years away, individuals can reduce exposure:

Migrate to new addresses regularly: After spending from an address, move remaining funds to a fresh address. This minimizes public key exposure time.

Use multi-signature wallets: Quantum computers must break multiple signatures simultaneously, increasing difficulty. While not quantum-proof, it buys time.

Avoid reusing addresses: Never send funds to an address you've spent from. Each spend exposes the public key anew.

Monitor developments: Follow Ethereum Foundation PQ research, Coinbase advisory board updates, and Bitcoin Improvement Proposals related to post-quantum cryptography.

Diversify holdings: If quantum risk concerns you, diversify into quantum-resistant chains (QRL) or assets less exposed (proof-of-stake chains easier to migrate than proof-of-work).

These are band-aids, not solutions. The protocol-level fix requires coordinated network upgrades across billions in value and millions of users. The challenge isn't just technical—it's social, political, and economic.

Sources

The $40M Federal Crypto Custody Scandal: How a Contractor's Son Exposed the Government's Digital Asset Security Crisis

· 8 min read
Dora Noda
Software Engineer

A bragging match on Telegram between two cybercriminals just exposed one of the most embarrassing security failures in U.S. government history — and it has nothing to do with foreign hackers or sophisticated nation-state attacks. The U.S. Marshals Service, the federal agency entrusted with safeguarding billions of dollars in seized cryptocurrency, is now investigating allegations that a contractor's son siphoned over $40 million from government wallets. The case raises a question that should alarm every taxpayer and crypto stakeholder: if the government cannot secure its own digital vaults, what does that mean for the Strategic Bitcoin Reserve?

Cold Wallet Security Crisis: How Lazarus Group's Month-Long Preparation Attacks Are Defeating Crypto's Strongest Defenses

· 9 min read
Dora Noda
Software Engineer

Your cold wallet is not as safe as you think. In 2025, infrastructure attacks — targeting private keys, wallet systems, and the humans who manage them — accounted for 76% of all stolen cryptocurrency, totaling $2.2 billion across just 45 incidents. The Lazarus Group, North Korea's state-sponsored hacking unit, has perfected a playbook that renders traditional cold storage security almost meaningless: month-long infiltration campaigns that target the people, not the code.

DeFi's Security Reckoning: What the $1.5B Bybit Heist Reveals About Cross-Chain Bridge Vulnerabilities

· 9 min read
Dora Noda
Software Engineer

A single compromised laptop. Seventeen days of patience. One malicious JavaScript injection. That's all it took for North Korea's Lazarus Group to execute the largest cryptocurrency heist in history—$1.5 billion drained from Bybit in February 2025, representing 44% of all crypto stolen that year.

The Bybit hack wasn't a failure of cryptography or blockchain technology. It was an operational failure that exposed the fragile human layer beneath DeFi's mathematical security guarantees. As the industry confronts $3.4 billion in total 2025 theft, the question isn't whether another catastrophic breach will occur—it's whether protocols will implement the changes necessary to survive it.

Project Eleven's $20M Quantum Shield: Racing to Secure $3 Trillion in Crypto Before Q-Day

· 9 min read
Dora Noda
Software Engineer

The Federal Reserve published a stark warning in September 2025: adversaries are already harvesting encrypted blockchain data today, waiting for quantum computers powerful enough to crack it open. With Google's Willow chip completing calculations in two hours that would take supercomputers 3.2 years, and resource estimates for breaking current cryptography falling by a factor of 20 in a single year, the countdown to "Q-Day" has shifted from theoretical speculation to urgent engineering reality.

Enter Project Eleven, the crypto startup that just raised $20 million to do what many considered impossible: prepare the entire blockchain ecosystem for a post-quantum world before it's too late.

Stage 1 Fraud Proofs Go Live: The Quiet Revolution That Makes Ethereum L2s Actually Trustless

· 10 min read
Dora Noda
Software Engineer

For years, critics had a point: Ethereum's Layer 2 networks weren't really trustless. Sure, they promised fraud proofs—mechanisms that let anyone challenge invalid transactions—but those proofs were either non-existent or restricted to whitelisted validators. In practice, users trusted operators, not code.

That era ended in 2024-2025. Arbitrum, Optimism, and Base have all deployed permissionless fraud proof systems, achieving what L2Beat classifies as "Stage 1" decentralization. For the first time, the security model these rollups advertised actually exists. Here's why this matters, how it works, and what it means for the $50+ billion locked in Ethereum L2s.