Does Quantum Threaten Bitcoin? | The Brainstorm EP 112

By ARK Invest

Share:

Key Concepts

  • Quantum Computing: A new type of computing that uses quantum-mechanical phenomena (superposition, entanglement) to solve problems intractable for classical computers.
  • Shor's Algorithm: A quantum algorithm that can efficiently factor large integers, posing a threat to widely used public-key cryptography like RSA and ECC (Elliptic Curve Cryptography), which Bitcoin relies on.
  • Public Key Cryptography: A cryptographic system that uses a pair of keys: a public key (shared openly) and a private key (kept secret). Bitcoin transactions use public keys to derive addresses and private keys to sign transactions.
  • Quantum Resistance: Cryptographic algorithms or systems designed to be secure against attacks from quantum computers.
  • Logical Qubits vs. Physical Qubits: Physical qubits are the actual quantum bits, while logical qubits are error-corrected physical qubits, which are much more stable and reliable for computation. Many physical qubits are needed to form one logical qubit.
  • Digital Asset Treasury (DAT): A company that holds a significant portion of its treasury in digital assets, primarily Bitcoin.
  • MNAV (Market Net Asset Value): The market value of a company's assets minus its liabilities.
  • Fractional Reserve Banking: A banking system where only a fraction of bank deposits are held in reserve, and the rest is lent out.
  • FUD (Fear, Uncertainty, Doubt): A marketing or propaganda tactic used to spread negative or misleading information about a product, company, or technology.

Bitcoin's Existential Threat: Quantum Computing

The discussion begins by positing that the biggest threat to Bitcoin is not regulation but mathematics itself, specifically the advent of quantum computing. Ray Nick Carter's article on quantum risks to Bitcoin highlights the immediate vulnerabilities.

Specific Vulnerabilities and Scope:

  • Total Vulnerable Supply: Approximately one-third of Bitcoin's total supply, around 6.7 million tokens, are currently in wallets vulnerable to quantum computing.
  • Older Wallets: 1.9 million tokens are in older wallets that reveal the public key by default. A quantum computer could reverse-engineer the private key from this public key, circumventing ownership.
  • Reused Addresses: 4.7 million tokens are in reused addresses. While not immediately vulnerable, once a transaction is made from such a wallet, the public key is revealed, allowing for potential reverse-engineering of the private key and theft of tokens.
  • Impact: This represents a significant portion of Bitcoin's supply, posing an "existential threat" to the network.

Nature of the Threat:

  • The primary risk is to wallet security (securing private keys), not to Bitcoin's core hashing algorithm or consensus mechanism.
  • The article explores various scenarios based on which actors (e.g., nation-states) might achieve quantum supremacy first and their potential actions, emphasizing the need for the Bitcoin community to prepare.

Solutions and Challenges for Bitcoin's Quantum Resistance

The proposed solution involves migrating to a quantum-resistant signature scheme. However, this presents significant challenges:

Community Consensus and Scalability:

  • Slow Consensus: Historically, the Bitcoin community has struggled to reach quick consensus on new changes, which could delay the adoption of quantum-resistant measures.
  • Migration Difficulty: Migrating vulnerable tokens to quantum-proof addresses is a massive undertaking due to Bitcoin's scalability limitations.
    • Analogy: Citing a podcast by Preston Pysh, moving just $100 worth of Bitcoin for every user to a new address could take 10 to 30 months.
    • Realistic Timeline: Even if only a third of the vulnerable tokens (a smaller portion) were moved, it could still take 6 months to a year due to network capacity constraints.
  • Proactive Measures: The community needs to be at least two years ahead of the quantum threat timeline to implement effective solutions.

Arguments for an Accelerating Quantum Threat

Nick Carter's article presents ten reasons suggesting an accelerating timeline for quantum computing breakthroughs:

  1. Government Planning: Governments are actively planning for a post-quantum world.
  2. Rapid Qubit Scaling: Qubit counts are increasing rapidly.
  3. Inflecting Investment: Investment in quantum firms (both public and private) is surging.
  4. Major Milestones: Several significant quantum milestones have been achieved recently (e.g., Google Willow).
  5. Accelerated Breakthroughs: Quantum firms project breaking ECC (Elliptic Curve Cryptography) by 2028-2033.
  6. Dropping Qubit Requirements: The number of logical qubits needed to break crypto systems is decreasing, and the ratio of logical to physical qubits is compressing.
  7. Bitcoin as Bug Bounty: Bitcoin's substantial market cap makes it an "epic bug bounty" for achieving quantum supremacy.
  8. Geopolitical Stakes: Quantum computing has high geopolitical stakes, with national interests driving development.
  9. AI Acceleration: Artificial intelligence could accelerate the pace of quantum development.
  10. Revised Timelines: Credible experts, such as Scott Aaronson, have revised their quantum timelines, expressing increased optimism that the race to build a scalable, fault-tolerant quantum computer is "actually underway." Aaronson suggests useful fault-tolerant quantum computers could emerge in the "next decade" if current rates continue.

Skeptic's Perspective on Quantum Timelines

Brett, the resident mathematician/quantum skeptic, offers a counter-perspective:

Perpetual "15-20 Years Away" Technologies:

  • Revolutionary technologies often remain perpetually 15-20 years away (e.g., fusion power has always been "20-30 years away").
  • Physical qubit scaling, even at best-in-class levels, isn't meaningfully accelerating timelines.
  • Earliest Threat for Shor's Algorithm: Brett expects Shor's algorithm to pose a threat no earlier than the early 2030s, making 2030 Bitcoin's "Y2K moment."

Impact and Broader Ramifications:

  • While a quantum attack on Bitcoin would be a "huge blunder" for those affected, resulting in a "one-time third of the network back into the float," it wouldn't fundamentally change Bitcoin's underlying logic or network.
  • Quantum breaking cryptography would have far more significant ramifications for other industries and systems beyond Bitcoin.
  • Bitcoin's network is likely to be secured against quantum computing "well ahead of practical implementation windows."

Challenges in Quantum Development:

  • Overstated Progress: Public quantum firms often overstate their progress to attract capital, creating unrealistic expectations.
  • Engineering and Scientific Hurdles: Significant engineering and scientific thresholds must be crossed before practical commercial applications are feasible.
  • Slipping Timelines: Quantum development timelines have "slipped somewhat," effectively doubling over the last five years.
  • AI Competition: Advances in AI are providing capabilities that were once sought from quantum systems, potentially "eating some of the early commercial applications" and thus reducing the capital flow needed for quantum development.
    • Comparison: Quantum (know the algorithm, can't build the machine) vs. AI (don't know what it can do, can build the machine). AI offers immediate commercial returns (e.g., a paper showed a 15% sales uplift using AI in e-commerce), whereas current API-callable quantum computers offer no demonstrable useful productivity.

State-Sponsored Quantum Development and Geopolitical Scenarios

The discussion touches on the possibility of secret state-sponsored quantum breakthroughs:

Transparency and Capital:

  • Skepticism exists regarding secret state breakthroughs, as billions of dollars in transparent Western markets are not yielding meaningful results.
  • Historical state-sponsored technological developments (e.g., the internet, nuclear power) laid groundwork but didn't lead to immediate, secret commercializable breakthroughs.

Nick Carter's Geopolitical Scenarios:

  • Carter outlines four scenarios, none ideal for Bitcoin, depending on which state actor achieves quantum supremacy first.
  • North Korea (Neutral Evil) vs. China (Chaotic Evil): China is considered potentially worse because the US's embrace of crypto (especially stablecoins for dollar hegemony) means an attack on Bitcoin could undermine the entire industry.
  • Incentive for Obfuscation: Nation-states with less transparency have an incentive to hide their quantum progress, then launch a surprise attack on major wallets (e.g., Binance, Satoshi's coins) to destabilize the industry.
  • Unlimited Budget: While a nation like China might have an "effectively unlimited budget," it's questioned whether this would meaningfully accelerate progress beyond fundamental scientific and engineering limits.

Metrics for Real Quantum Progress

Brett outlines what he would consider a true indicator of quantum progress:

  • First Milestone: Successfully factoring a three-digit number using Shor's algorithm (which has not yet happened). This would signal a shift into a more predictable "engineering scale-up mode."
  • Problem with Current Metrics: The industry often highlights "physical qubits," which is an "upstream" variable, rather than "logical qubits," which are error-corrected and practically useful.
    • Logical Qubits Requirement: Thousands of logical qubits are needed to run Shor's algorithm, and they must operate for a sufficient duration without error.
    • Quantum Volume: More fundamental benchmarks like "quantum volume" offer a better measure of progress, but companies often present misleading metrics to show progress.
  • Timeline Discrepancy: Even reports like DARPA's cite physical qubits. Brett's analysis suggests Google has missed its own milestones, and industry timelines have effectively doubled over the last five years.

Zcash as a Quantum-Resistant Beneficiary

Zcash has seen increased attention due to its perceived quantum resistance:

  • Shielded Pools: Zcash's "shielded pools" offer privacy by obfuscating ownership and preventing public key revelation, making tokens within them "technically quantum proof."
  • Conspiracy Theory: A "personal conspiracy theory" suggests that Bitcoin OGs (Original Gangsters) might be using Zcash to evade taxation. They could move Bitcoin to an exchange without KYC, convert it to Zcash, and then slowly withdraw it, obscuring the original owner.
  • Privacy Narrative: The general narrative around privacy, fueled by concerns about government overreach, also contributes to Zcash's appeal.

MicroStrategy and Michael Saylor's Strategy

The discussion shifts to the financial risks associated with MicroStrategy (MSTR), a major Digital Asset Treasury (DAT) company holding significant Bitcoin.

Recent Actions and Concerns:

  • Dilution for USD: Michael Saylor's MicroStrategy recently raised $1.44 billion USD by selling its own shares (diluting shareholders) to build a USD reserve, rather than buying Bitcoin as per its usual program. This was done to pay out obligations on preferred shares.
  • End of Bull Market Indicator: Brett suggests that MSTR being forced to delever could "mark the end of this crypto bull market."
  • Leverage and Yield: MSTR has taken on leverage through preferred shares, which pay out a high yield (7% to 10.75%) in USD, despite Bitcoin being a non-yield-bearing asset (0% yield) and cash yielding only 3.5-4%.
  • Unsustainable Yield Source: The source of this high yield is questioned. The theory is that it relies on continually launching new products and raising new capital above MNAV (Market Net Asset Value) to pay earlier shareholders, akin to a Ponzi scheme. This strategy is highly dependent on a perpetual Bitcoin price increase and a bull market.
  • Debt Obligations: MSTR has approximately $700 million in annual debt obligations.
  • Precarious Situation: When MSTR's share price is below MNAV, raising capital dilutes Bitcoin per share. Saylor's reluctance to sell Bitcoin leaves the company in a "precarious situation."
  • First Leveraged Cycle: This is the first full market cycle where Saylor has been "levered up with preferred shares" and has debt obligations to pay out, making it a new and significant risk factor.
  • "Big Scalp" of the Cycle: Unlike previous cycles where entities like Three Arrows Capital or FTX were the "big scalp," DATs like MicroStrategy are seen as the "marginal point of leverage" for this cycle. However, it's suggested that they might "muddle through" this time, only to take on more "dumb stuff" that eventually leads to their downfall.
  • Complexity as a Red Flag: The use of complex financial terms to explain the yield from non-yield-bearing assets is seen as a red flag, suggesting a lack of fundamental soundness.

Tether FUD

The conversation briefly touches on the FUD surrounding Tether (USDT):

  • Fractional Reserve Banking: Tether operates on a fractional reserve model, holding a mix of cash, cash-like entities, and higher-yield assets (Bitcoin, gold) to back USDT.
  • Liquidity Profile: Unlike fully reserved stablecoins (e.g., Circle's USDC), Tether's reserves are not designed for instant liquidation of all assets simultaneously.
  • Genius Act Compliance: While some speculate Tether might clean up its balance sheet for Genius Act compliance (potentially leading to sell pressure on Bitcoin/gold), Tether's roadmap indicates they plan a new, fully compliant stablecoin for US markets, not a restructuring of USDT.
  • Persistent FUD: The FUD around Tether is not new, as their reserve strategy has been consistent for years. The current negative sentiment is attributed to broader crypto market anxieties.

Conclusion

The episode delves into two distinct but significant areas of "FUD" in the crypto space. The long-term, theoretical threat of quantum computing to Bitcoin's security is acknowledged, with specific vulnerabilities identified in existing wallets. While solutions like quantum-resistant signature schemes exist, their implementation faces challenges related to community consensus and Bitcoin's network scalability. The timeline for a practical quantum threat remains a point of contention, with skeptics highlighting persistent technological hurdles and the overhyping of commercial quantum progress.

The more immediate and tangible concerns revolve around MicroStrategy's leveraged Bitcoin strategy and the financial stability of its preferred shares. The reliance on continuous capital raising to pay high yields on non-yield-bearing assets, especially in a potentially volatile market, is identified as a significant systemic risk. The discussion also briefly addresses the ongoing Tether FUD, concluding that its reserve strategy, while fractional, is not new and current anxieties are largely driven by broader market sentiment. Ultimately, the episode serves as a comprehensive overview of these critical discussions, urging the crypto community to remain aware and proactive.

Chat with this Video

AI-Powered

Hi! I can answer questions about this video "Does Quantum Threaten Bitcoin? | The Brainstorm EP 112". What would you like to know?

Chat is based on the transcript of this video and may not be 100% accurate.

Related Videos

Ready to summarize another video?

Summarize YouTube Video