#733: The Truth About The Quantum Threat with Brandon Black

A measured look at quantum computing's real threat to Bitcoin—why the risk isn't immediate, how to prioritize defenses, and which post‑quantum options need careful testing.

Key Takeaways

  • No immediate cryptographic emergency: guests estimate decades (rough gut 50–100 years) before cryptographically relevant quantum breaks—continue research and monitoring, not panic-driven upgrades.
  • Adopt evidence‑based change: require clear proof of a single scalable quantum architecture before protocol changes; use gradual, progressive measures and explicit thresholds for action.
  • Manage trade‑offs: don't divert scarce developer effort from high‑impact Bitcoin work; use multisig, MPC, and layered custody as practical interim defenses.
  • Evaluate post‑quantum primitives: near‑term favor hash‑based approaches for well‑understood assumptions; pursue lattice/isogeny for functionality; advance Shrimps, BIP360, and Merkelized routes with extensive testing.
  • Respect Bitcoin's coordination cost: protocol changes are costly and risky—define acceptable failure probabilities, prefer hybrid ECC+post‑quantum designs, and demand strong proofs and threat modeling.
  • Counter FUD and social attacks: read original papers, question sensational claims, foster level‑headed dialogue, and set credibility deadlines to avoid panic-driven market behavior.

Original Source

#733: The Truth About The Quantum Threat with Brandon Black

Visit Source