Quantum Computing Dey Threaten Bitcoin Security, Hacker-CEO Warn
David Carvalho, wey be former teenage hacker and current CEO for Naoris Protocol, dey warn say quantum computing and AI fit break Bitcoin security quietly. Attackers fit use strategy like “harvest now, decrypt later” to store encrypted transactions now make dem fit crack private keys later. Bitcoin SHA-256 and ECDSA protections wey demy think be unbreakable for classical computing fit spoil if algorithms like Shor’s come. About 25–30% of BTC—like 6–7 million coins—for legacy Pay-to-Public-Key addresses still dey exposed. Security bodies like NIST and NSA dey recommend make we migrate to post-quantum cryptography between 2030 and 2035. Some proposed solutions na BIP-360 (P2QRH hybrid addresses), STARK-based zero-knowledge rollups, plus Naoris Sub-Zero Layer for EVM-compatible chains. But because consensus dey decentralized and users dey adopt slow, e fit make coins vulnerable. Some experts like Michael Saylor say quantum threat dey overblown, but most cryptographers dey advise make we upgrade early. Traders suppose dey monitor Bitcoin security developments and post-quantum cryptography to sabi long-term risks and network upgrade timeline.
Neutral
Even tho di quantum computing threat to Bitcoin security real and fit spoil long-term confidence, di risk span na years no be days. Historical parallels like how dem stop di sha-1 for early 2010s show say crypto community fit yarn upgrade together when threat clear. Presently, no practical quantum attack dey, and migration plans (BIP-360, STARK rollups) dey. But slow decentralized governance and legacy address exposure fit make traders lose confidence. For short term, market volatility go still dey normal, but as people dey sabi more about post-quantum cryptography, demand for security-focused projects fit rise. For long term, progress for quantum defenses go be key factor for Bitcoin stability and how many people go use am.