A series of discussions among Bitcoin developers and researchers has highlighted growing debate over how the network should approach potential quantum computing threats.
Several prominent figures are cautioning against rushing changes to Bitcoin’s cryptography, particularly as differing views emerge on the urgency of post-quantum (PQ) solutions.
The discussion intensified following comments from Coinbase CEO Brian Armstrong, who stated he plans to begin working on the issue personally, adding that it is something the industry needs to solve “sooner rather than later.”
https://x.com/brian_armstrong/status/2039595011013009714
His remarks followed broader calls from industry participants to accelerate coordination around quantum-resistant upgrades.
In response, JAN3 CEO Samson Mow pushed back on the urgency narrative, arguing that acting too quickly could create greater risks than the threat itself.
https://x.com/Excellion/status/2040474428446855500
He stated that “solving the QC problem later rather than sooner is the best course of action,” and warned that hastily replacing existing signature schemes like ECDSA or Schnorr could expose Bitcoin to classical computing attacks.
Mow also pointed to potential trade-offs in performance and scalability, noting that PQ signatures could be significantly larger, potentially reducing transaction throughput and reigniting debates similar to the Blocksize Wars.
He further raised concerns that some proposed PQ approaches could act as a “Trojan horse,” potentially introducing vulnerabilities such as backdoors in random number generation or cryptographic schemes.
He referenced historical examples where such weaknesses were later uncovered, including disclosures associated with Edward Snowden.
Blockstream CEO Adam Back also emphasized the risks of prematurely adopting PQ cryptographic schemes.
https://x.com/adam3us/status/2002132867649081653
He argued that insufficiently reviewed implementations could introduce security flaws long before quantum computers pose a credible threat to Bitcoin’s existing encryption.
Back pointed to prior examples of PQ algorithms based on newer mathematical assumptions being broken, noting that such risks are not merely theoretical.
He suggested that hash-based signature schemes, such as those derived from Lamport, Winternitz, or SPHINCS+, may offer a more conservative approach due to their reliance on long-established cryptographic primitives.
Jonas Schnelli highlighted additional technical trade-offs associated with PQ upgrades.
He noted that PQ signatures are significantly larger than current Schnorr signatures, which could increase blockchain data requirements and force trade-offs between block size expansion and reduced transaction throughput.
Schnelli also emphasized that PQ algorithms have undergone far less real-world testing compared to the cryptographic systems currently used in Bitcoin.
“The cure, rushed, could be worse than the disease,” Schnelli wrote.
Additional commentary addressed the current scope of quantum-related risks.
A user identified as ₿ruce argued that many Bitcoin holdings remain protected because public keys are not exposed until funds are spent, limiting the potential attack surface for quantum adversaries.
https://x.com/techexe/status/2039726676524093867
The post also referenced proposals such as BIP-360, which aim to introduce optional post-quantum protections without requiring immediate network-wide changes.
The discussion reflects a broader tension within the Bitcoin ecosystem between preparing for long-term technological risks and maintaining the security and reliability of the network today.
While quantum computing is widely acknowledged as a potential future threat, many researchers note that practical risks to Bitcoin remain years away, reducing the urgency of immediate countermeasures.
Across the conversation, a consistent theme emerged: changes to Bitcoin’s cryptographic foundations should be approached cautiously, with extensive review and testing to avoid introducing new risks in the process.