Podcast Summary: Unchained — Quantum Computing Got 20x Closer. It Threatens A Third of All Bitcoin
Host: Laura Shin
Guests: Alex Pruden (CEO, Project 11), Delev Bleufstein (CEO, Oratomic)
Date: April 3, 2026
Episode Overview
This episode covers two landmark breakthroughs in quantum computing that have dramatically accelerated the timeline for quantum computers that could break the cryptography underpinning major blockchains, such as Bitcoin and Ethereum. Host Laura Shin convenes with quantum and crypto experts to unpack Google’s new white paper, a major development from Oratomic, and the urgent implications for crypto asset security. The conversation zeroes in on the technical, practical, and philosophical ramifications for blockchains and lays out what the ecosystem must do to prepare for a post-quantum world.
Key Discussion Points & Insights
1. Quantum Breakthroughs & Crypto’s Timeline to ‘Q-Day’ (01:06–09:23)
-
Google’s White Paper
- Announced a landmark cryptanalysis showing that quantum computers could soon break elliptic curve cryptography (ECC), the basis for securing Bitcoin and Ethereum.
- Notably co-authored by Google, members of the Ethereum Foundation (e.g., Justin Drake), and Dan Boneh (Stanford).
- Used a zero-knowledge proof to avoid revealing exploit details while proving the threat is real.
- “[The analysis] covered quite a breadth of potential attack vectors…even systems like zero knowledge proof systems or data availability systems for layer twos, all of those are covered.” — Alex Pruden (02:24)
- The paper posits a hard deadline for post-quantum migration: 2029.
-
Oratomic’s Breakthrough
- Oratomic’s new paper: Shor’s Algorithm as possible with as few as 10,000 reconfigurable atomic qubits.
- Previous estimates for a “crypto-breaking” quantum computer required millions to a billion physical qubits; Oratomic claims they can get there with just 10,000 using reconfigurable atomic qubits and novel error correction methods.
- “We have systems in the lab that…are getting as large as 6,000 atomic qubits…It is starting to become substantially closer.” — Delev Bleufstein (06:37)
- This reduces the assumed timeline and makes a relevant quantum attack “substantially closer.”
-
AI Acceleration Factor
- Oratomic and others in the field use AI extensively for accelerating hardware and science breakthroughs, but constructing utility-scale quantum computers overnight isn’t plausible.
- “It is highly unlikely that another actor…is going to just spontaneously do it.” — Delev Bleufstein (10:21)
2. Timeline Debates & Community Skepticism (10:53–15:34)
- Matthew Green (Johns Hopkins cryptographer) expressed skepticism: “I am not convinced we have anything to worry about in my lifetime…”
- Alex Pruden highlights a rift: physicists are increasingly optimistic quantum threats are near-term, while some cryptographers lag in taking this seriously.
- “Physicists like Dolev are clearly making progress and are much more optimistic… The quantum computing space is moving incredibly fast.” — Alex Pruden (12:20)
- Both Alex and Delev agree: the uncertainty around the timeline means crypto communities cannot afford to wait—prudent action is needed now rather than betting on low probabilities.
3. Secrecy, Disclosure, and the Quantum Tipping Point (15:34–18:34)
- Google’s use of a zero-knowledge proof rather than a full disclosure of their method represents a cautious new trend in responsible disclosure, motivated by fears of enabling malicious actors.
- Responsible disclosure from cybersecurity is now entering quantum research.
- Quantum Tipping Point: Once a quantum computer can crack a 32-bit number, it’s likely one could soon crack a 256-bit key (e.g., Bitcoin). The transition from “possible” to “practically threatening” could be abrupt.
- “When you get a quantum computer that can…run Shor’s algorithm on a 32-bit number, it…implies…you could trivially build a machine that could do 256 bits.” — Alex Pruden (16:30)
4. Urgency for Migration: Blockchains Must Act Now (18:34–22:04)
- There’s no “safe deadline;” blockchains should begin post-quantum migration immediately.
- Migration will require sweeping changes to protocols, smart contracts, user wallets—the entire stack.
- “The act of migrating to an entirely new foundation of cryptography… is not a button press and it’s going to take a long time.” — Alex Pruden (14:45, 19:02)
5. Primer on “Utility-Scale” Quantum Computers and Error Correction (21:19–29:18)
- Utility-scale quantum computer: can solve commercially and scientifically useful problems, including breaking public-key cryptography via Shor’s Algorithm.
- Error Correction is the key hurdle. Quantum states are fragile. Breakthroughs (like Oratomic’s) make robust, fault-tolerant quantum computers seem plausible within years.
- Quantum error correction allows analog-like computation with digital reliability—an innovation that opened the field in 1995.
- “The remarkable thing about quantum error correction is you can do analog type computation but correct the system as if it’s digital… That is, at its fundamental essence, why quantum computers are more powerful…” — Delev Bleufstein (24:01)
6. The Direct Impact: Crypto’s Quantum Vulnerabilities (31:36–38:47)
- What ‘Q-Day’ Means for Bitcoin (and others):
- Once a quantum computer is built, all exposed public keys in Bitcoin, Ethereum, and similar systems would be at risk of private key recovery within minutes or hours.
- Satoshi’s coins and all “lost” coins could be claimed by whoever has the quantum computer—raising profound questions about digital asset ownership and protocol governance.
- Fast vs. Slow Clock Quantum Computers:
- Fast-clock computers could snatch coins in mempool (pending transaction pool), exploiting public key exposure before a transaction is finalized.
- Slow-clock computers less likely to pull off real-time attacks, but still threaten older or exposed addresses.
- Chains with slow confirmation (e.g., Bitcoin’s 10-min blocks) are at higher risk for such attacks.
- Real-time attacks could make permission-less on-chain migration to post-quantum addresses impossible once quantum attacks are possible.
7. Why Blockchains (Especially Bitcoin) Are Especially Vulnerable (44:20–46:11)
- All public keys are, by definition, exposed and accessible for attackers to run Shor’s algorithm.
- In contrast, centralized institutions can roll back or modify records post-attack, but blockchains cannot ("not your keys, not your crypto").
- Elliptic Curve Cryptography is deeply woven into every layer—protocol-level, smart contracts, wallets.
8. The Urgency for Bitcoin and Ethereum: What Should Developers Do? (49:05–56:01)
-
Bitcoin:
- Its decentralization and governance make upgrades slow and hard to coordinate, yet over a third of coins (6.7M BTC, ~$450bn) are at risk.
- There’s currently a lack of urgent coordination on migration. Industry consensus is “action, not talk” is needed right now.
- Incremental changes, like BIP 360 (pay to Merkle root), can help, but root-level transition to post-quantum signatures is essential.
-
Ethereum:
- More complex: smart contracts, L2s, consensus protocols all pose added challenges.
- Faster block times (12 seconds) offer some protection against real-time “onspend” attacks. Nonetheless, migration complexity is greater.
- Active efforts are underway, led by Justin Drake and the EF, but migration scope is vast.
9. Broader Ecosystem and Post-Quantum Blockchains (59:34–63:27)
- Some new blockchains (unnamed, due to obscurity) are post-quantum from inception; however, value migration depends on mainstream chains’ ability to upgrade in time.
- Algorand is cited as incorporating post-quantum cryptography in a real-world deployment (uses Falcon, a NIST candidate).
- Ultimately, the existing major chains are expected to develop post-quantum upgrades, using new projects as “test beds” for algorithmic security.
Notable Quotes & Memorable Moments
-
On the magnitude of the threat & need for urgency:
- “If I can know your private key, Laura, I am you in blockchains. The meaning of a blockchain ceases to mean anything.” — Alex Pruden (19:17)
- “The date [for post-quantum migration] is as soon as they can be quantum resistant.” — Alex Pruden (19:02)
-
On Google’s zero-knowledge proof approach:
- “This will be a growing trend because we’re going to start approaching such machines.” — Delev Bleufstein (15:50)
-
On error correction’s critical role:
- “The remarkable thing about quantum error correction is you can do analog type computation but correct the system as if it’s digital… And that is, at its fundamental essence, why quantum computers are more powerful and capable of utility scale operation than classical computers.” — Delev Bleufstein (24:01)
-
On responsible disclosure:
- “We have a paradigm for this in cybersecurity, which is responsible disclosure… That’s what they’re trying to do there.” — Alex Pruden (16:30)
-
On the philosophical irony for crypto:
- “All the things that crypto people love about crypto…do make it especially vulnerable to quantum.” — Laura Shin (49:05)
Timestamps for Key Segments
- 01:06 Introduces the quantum breakthroughs and accelerates timeline for post-quantum urgency
- 04:26 Delev Bleufstein explains Oratomic’s leap in qubit efficiency and error correction
- 07:55 Assessing the realism of Google’s 2029 timeline for quantum risk
- 10:53 Community skepticism—reaction to Matthew Green’s viral tweet
- 15:34 Discussion on secrecy & responsible disclosure (zero-knowledge proofs)
- 19:02 Why blockchains must migrate ASAP; scope of migration required
- 21:19 Primer on utility-scale quantum computers and their significance
- 31:36 Crypto’s quantum vulnerability: what Q-Day means in practice
- 35:23 Public key exposure vs. block times—who’s at risk from real-time attacks
- 44:20 Why blockchains are uniquely at risk compared to legacy systems
- 49:05 The challenge and necessity of Bitcoin’s migration
- 54:31 Overview of BIP 360 and incremental protection steps
- 56:01 Ethereum’s expanded attack surface and additional challenges
- 59:34 The fate and dynamics of post-quantum-native blockchains
Project 11’s Call to Action and Roadmap (64:30–67:37)
- Project 11 is building wallet and infrastructure products to enable post-quantum migration, starting with tools for Bitcoin and Ethereum.
- Will soon release a comprehensive research report demystifying quantum threats for practitioners and institutions.
- Call for urgent, concrete action across the industry: “Decentralized systems have performed miracles… There is absolutely no reason why blockchains…can’t set the example for the rest of the world for post-quantum security.” — Alex Pruden (66:22)
Final Thoughts
This episode is a wake-up call: with new technical feats from Google and Oratomic, quantum computing threats are no longer a distant concern but are rapidly approaching. Blockchains are uniquely exposed due to their public nature and hard-to-reverse design. With a plausible Q-Day coming as soon as 2029, coordinated and immediate migration to post-quantum cryptography isn’t optional—it’s existential.
For further details and real-time risk assessment tools:
- Project 11’s risk tracker and reports: project11.com
Listen to this episode for a sober, actionable crash course on why the quantum clock is ticking for Bitcoin, Ethereum, and the whole blockchain sector.
