As quantum computing edges closer to practical reality, a nuanced risk picture is taking shape for Bitcoin. Rather than a sudden, network-wide catastrophe, researchers and industry observers are highlighting a tiered vulnerability focused on dormant addresses with exposed public keys. Many of these are among the oldest coins from Bitcoin’s early era, and their combination of long-standing exposure, high value, and inertia in defense makes them salient targets for a first generation of quantum-enabled attackers, should such capabilities mature.
Bitcoin relies on two cryptographic pillars: the hash function SHA-256 for mining and block security, and public-key cryptography (ECDSA/Schnorr) for transaction signatures. Quantum computers would affect these components in distinct ways. Hash functions are relatively resilient; even with Grover’s algorithm, they would be weakened but not rendered obsolete. Public-key cryptography, however, presents a sharper exposure path. With Shor’s algorithm, a sufficiently powerful quantum computer could derive a private key from a known public key. In practical terms for Bitcoin, that means any coins whose public key has been revealed could theoretically be spent by an attacker if a quantum-capable adversary can perform the computation in time to act on a vulnerability.
Understanding the timing of attacks is crucial to assessing risk. There are two broad categories of quantum attacks:
The contrast is telling. On-spend attacks face a tight clock, while at-rest attacks operate on a long-term timescale, hinging on technical breakthroughs rather than a race against a block window. If a large tranche of the supply has already disclosed its public keys, the window for opportunistic action expands dramatically.
Dormant wallets—those that have not actively moved funds or upgraded security—combine three attributes that amplify risk:
Notes from industry observers emphasize that coins in inactive wallets cannot upgrade their security after the fact. Thus, the burden of adoption and migration would fall to active participants and future protocol changes, not the dormant accounts themselves.
The risk is not uniform across the blockchain. Several categories stand out as more exposed than others:
Certain modern script formats, such as those associated with Taproot, also expose public-key material in ways that could fall into an at-rest exposure category under quantum assumptions. While Taproot was designed to improve efficiency and privacy, it does not entirely escape the theoretical risk if keys remain exposed long-term due to address reuse or legacy holdings.
Quantifying quantum risk goes beyond theoretical math; it hinges on measurable exposure. Reports indicate that billions of dollars’ worth of Bitcoin remains in addresses whose public keys are exposed, with a significant portion tracing back to early-era mining rewards. A notable share of these coins has not moved for more than a decade, creating a silent pool of assets that could become vulnerable as quantum capabilities advance. Among the most cited examples are the large blocks rewarded to miners in Bitcoin’s infancy — many of these blocks yielded 50 BTC rewards that subsequently remained idle for years. This concentration implies that the largest quantum-targets are often the largest Bitcoin holdings.
The emergence of a quantum threat for dormant wallets also raises governance and policy questions that extend beyond pure cryptography. If a future quantum attack were to surface, the Bitcoin community might face difficult choices about asset salvage, fund protection, or even temporary protocol adjustments to address long-dormant coins. Questions include whether such coins should remain spendable, whether there should be mechanisms to protect or freeze longitudinal holdings, and how public policy interacts with the immutable nature of the protocol when a subset of assets appears irrecoverable by design.
Crucially, observers stress that there is no current, widely accepted evidence that quantum computers capable of breaking Bitcoin’s cryptography exist today. The development path toward practical, scalable quantum systems is expected to span years, if not decades, of sustained engineering progress. The risk is not imminent, but incremental and evolving. In the near term, the impact is likely to be selective rather than universal as early-stage quantum capabilities emerge and defenses are refined. Active users can adapt more quickly than dormant wallets, which means mitigation may initially favor those who actively manage their keys and upgrade security models.
Holders and the broader ecosystem can take concrete steps to reduce exposure and accelerate readiness:
Practically, these measures primarily benefit active participants today, highlighting the gap between movable funds and long-dormant assets. The broader lesson is that a staged approach to upgrading cryptography may be essential to maintain resilience as technology evolves.
In summary, the dormant-wallet vulnerability reframes the quantum risk narrative for Bitcoin. It underscores a layered challenge: the network isn’t threatened as a monolith, but certain pockets of the supply could be more fragile than others if and when quantum capabilities advance. The future resilience of Bitcoin will depend not only on breakthroughs in quantum hardware but on decisive action by the ecosystem to strengthen, migrate, and adapt the way keys are managed across the lifecycle of the blockchain.
Readers should watch for ongoing research into quantum-resistant cryptography, milestones in post-quantum upgrades, and policy discussions about how to handle historical holdings that may be irretrievably exposed to future computational breakthroughs. The next phase will likely hinge on practical migration pathways and protocol-level safeguards that can extend protection to both active and dormant users without compromising Bitcoin’s core principles.
This article was originally published as Dormant Bitcoin Wallets Pose the Biggest Quantum Risk, Explained on Crypto Breaking News – your trusted source for crypto news, Bitcoin news, and blockchain updates.


