Quantum risk is no longer a purely theoretical topic for Bitcoin investors, but the scale and immediacy of the threat are often misunderstood. According to research from Galaxy Digital analyst Will Owens, the danger posed by quantum computers is real – yet the majority of crypto wallets are not currently exposed in the way many fear. The key nuance: a wallet’s vulnerability largely depends on whether its public key is visible on-chain.
Owens explains that, in principle, a sufficiently powerful quantum computer could work backwards from a public key to derive the corresponding private key. If that became possible, an attacker could sign transactions as if they were the legitimate owner and drain funds. This is the classic “quantum break” scenario for public key cryptography. However, he stresses that this does not automatically mean that every Bitcoin address is sitting ducks today.
Most modern Bitcoin wallets use address formats and spending patterns that keep public keys hidden until the moment of use. What gets exposed first is usually a hash of the public key, not the key itself. Owens notes that, under current conditions, “funds are at risk only when public keys are exposed on-chain.” This splits wallets into two basic categories: those whose public keys are already visible in the blockchain, and those whose keys only appear at the time of spending.
The first group includes older-style addresses and wallets that have already spent from an address, thus revealing the underlying public key in a previous transaction. These coins, sitting at addresses with already-disclosed keys, would be among the first targets in a genuine quantum attack scenario. The second group consists of coins in addresses where the public key is still hidden behind a cryptographic hash and has never been broadcast in a transaction. For these, the bar for a successful quantum attack is meaningfully higher.
Debate over the quantum threat has simmered in the crypto ecosystem for years. One camp treats quantum computing as a looming breaking point for existing cryptography, warning that once machines capable of running sufficiently powerful algorithms become practical, they could expose private keys, reveal sensitive financial data and undermine the security assumptions of proof-of-work networks. The opposing camp argues that this fear is exaggerated, pointing out that truly scalable, fault-tolerant quantum computers appear to be decades away, and that high-value traditional targets such as large banks and state secrets would likely attract attackers long before decentralized networks.
Owens acknowledges both sides of this discussion but emphasizes a middle ground: dismissing quantum risk entirely is no more reasonable than sounding the alarm as if an attack is imminent next year. He points out that there is active technical work being done to prepare for a post-quantum world, and that the development pace has accelerated rather than stalled. Claims that Bitcoin’s core developers are ignoring or blocking quantum-related proposals, including ideas like the BIP 360 soft fork, do not match what he observed in his review of recent contributions.
Contrary to accusations that maintainers are “gatekeeping” quantum discussions, Owens reports “substantial developer work addressing the question of quantum vulnerabilities and mitigations,” and notes that proposals have picked up meaningfully since late 2025. The work spans research into alternative signature schemes, potential soft-fork paths, and approaches to migrate existing coins without creating chaos or splitting the network.
Outside core protocol work, other industry voices have suggested more practical mitigations for individual users. Analyst Willy Woo has argued that simply holding Bitcoin in certain address types, such as SegWit wallets, and allowing enough time to pass between transactions can reduce specific categories of quantum risk. The rationale is tied to how and when public keys are revealed and how newer address formats structure spending, although this is not a complete solution to a fully mature quantum threat.
Even if the technical community converges on a robust post-quantum cryptographic scheme, Owens warns that governance and coordination will pose a different kind of challenge. Bitcoin has no chief executive, no board of directors and no central body empowered to force a mandatory upgrade. Any major cryptographic change must be adopted voluntarily by node operators, miners, wallets, exchanges and end users. Historically, disagreements over upgrades have led to prolonged debates and, in some cases, chain splits.
Despite this, Owens believes the nature of quantum risk is uniquely capable of aligning incentives. Previous disputes often revolved around economic design choices – block size, fee markets, monetary policy side effects – where different groups could benefit from different outcomes. A quantum attack is different: it is external, technical and universally harmful. As he puts it, every honest participant in the network, from miners to long-term holders to trading venues, has a direct financial interest in keeping the network secure. That shared interest may make consensus on a quantum-resilient upgrade easier than past governance battles.
To understand why this matters so much, it helps to briefly revisit what makes quantum computing so disruptive. Classical computers process information in bits, which are either 0 or 1. Quantum computers use qubits, which can be in a superposition of states and become entangled with each other. Algorithms such as Shor’s algorithm can, in theory, factor large numbers and solve discrete logarithm problems exponentially faster than classical machines. Modern public key systems, including those securing Bitcoin, rely on the hardness of these mathematical problems. Once scalable quantum machines exist, the underlying assumptions start to erode.
However, that theoretical power comes with practical caveats. Building large-scale, error-corrected quantum computers is extremely difficult. Current devices are noisy, limited in qubit count and far from being able to run attacks at the scale needed to threaten major public blockchains. This gap between theory and practice is the main reason some observers downplay near-term risk. Still, security engineers tend to design for the worst-case future rather than the current snapshot of hardware. Cryptographic transitions, especially in open networks, take many years to plan, deploy and adopt.
From an investor’s perspective, the most important takeaway is not that “quantum will kill Bitcoin” nor that “quantum doesn’t matter,” but rather that exposure is uneven and, to some extent, manageable. Coins on addresses whose public keys have never been revealed are in a better relative position. Frequent spending from the same address, reusing addresses across many payments or relying on legacy address types can increase theoretical vulnerability. Good operational hygiene – using modern wallet software, minimizing address reuse, and periodically consolidating funds into more secure address formats – already helps reduce future risk.
Looking ahead, any serious post-quantum roadmap for Bitcoin will likely involve introducing new signature algorithms that resist known quantum attacks. These algorithms, often referred to as post-quantum or quantum-safe schemes, come with trade-offs: larger signatures, increased bandwidth usage, and more complex implementation details. Developers will need to balance security with performance and ensure that upgrades can coexist with the existing system for a long transition period. In practice, this might mean supporting both current and post-quantum signatures in parallel, allowing users to migrate coins gradually.
The logistics of such a migration are non-trivial. Every coin is effectively tied to a specific script and public key format. To move safely to a new scheme, users must spend their coins into addresses protected by post-quantum signatures before a credible quantum adversary emerges. Many coins are lost or held by inactive owners who may never participate in such a migration. This raises delicate policy questions: should the system leave those coins in potentially vulnerable forms indefinitely, or should there be mechanisms, social or technical, to handle abandoned funds? Any hint of forced movement would be deeply controversial in a system that prizes property rights and immutability.
There is also a broader market dimension. Institutions considering multi-decade exposure to Bitcoin increasingly ask how it will fare in a post-quantum age. Clear communication from researchers like Owens, and visible progress on protocol-level work, can influence long-term confidence. If investors believe the ecosystem is sleepwalking into a cryptographic cliff, they may reduce exposure. If, instead, they see a structured plan, active experimentation and eventual consensus around a migration path, the quantum question becomes another manageable technological evolution rather than an existential crisis.
For individual users and businesses today, practical steps remain straightforward: prefer modern wallet software that uses up-to-date address types, avoid reusing addresses, keep private keys offline where possible and stay informed about ongoing protocol developments. None of these actions alone “solve” quantum computing, but they position holders to adapt more easily when concrete upgrade paths are deployed.
Ultimately, Owens’ analysis reframes the quantum debate away from sensational extremes. Quantum-capable attackers would pose a serious danger to any system relying on current public key cryptography, including Bitcoin. Yet not all wallets are exposed equally, and not all funds are immediately at risk. Behind the scenes, developers and researchers are already working on defenses, and the shared economic interest in preserving network security could make the community more cooperative on this issue than on many previous controversies. The challenge is substantial, but it is being actively confronted rather than ignored.

