Quantum Threats and Blocksize Wars: Can Bitcoin Stay Secure?

Quantum signatures are huge, and Bitcoin blocks are tiny. The next upgrade may pit decentralization against survival, just as quantum hardware edges closer.

Chained block and chained bitcoin floating

Date

Aug 05, 2025

Author

Quantum Canary Staff

0 min read
0

Nearly a decade ago, the Bitcoin community spent two bruising years arguing over whether one megabyte should stay sacred. That fight feels quaint now. 

Quantum computers are maturing, but the clash is no longer just a squabble between developers. Institutional adoption of Bitcoin, sovereign coin holdings, and mainstream custody platforms means that hundreds of billions of dollars in value now sit onchain. Any upgrade proposal must now placate governments, auditors, and insurers, a far bigger and more diverse group of stakeholders than the IRC channels of 2016.

Quantum Threats and Blocksize Wars Chart

On that note, before diving into today’s quantum anxieties, it helps to recall the network’s last capacity skirmish for context.

Why One Megabyte Still Haunts the Network

From 2015 to 2017 developers, miners and users wrangled over the 1 MB ceiling, a saga later dubbed the Blocksize War

The uneasy compromise, Segregated Witness, boosted effective throughput without touching that cap. Dissidents soon launched Bitcoin Cash, proving that technical disputes quickly become political. After a few years of struggling to gain traction, Bitcoin Cash is still treading water now, indicating that such political spats can carry a high cost for those who commit to backing one side over another. 

Today, node operators cite the war when rejecting marginal tweaks. Memory footprints, upload caps, and ASIC influence all trace back to those arguments, which is a useful reminder that governance frictions scale with adoption.

That lesson matters because integrating post‑quantum cryptography (PQC) is far more invasive than rearranging witness data. If a one‑line parameter tweak required a user‑activated soft fork, imagine the friction when every wallet, exchange, and hardware signer must swap algorithms.

Quantum Computers Are A Threat That Won't Just Go Away

Shor’s algorithm collapses both RSA factorization and elliptic‑curve discrete logs once machines reach roughly 20 million physical qubits, assuming sufficient error-correction which would enable around 2,500 logical qubits. That's a problem that's only going to get more pressing over time as quantum computers become more sophisticated. 

Deloitte warns that about 25% of existing Bitcoins already sit in vulnerable address types and urges migration before such hardware arrives. Some observers question the timetable, but headlines like "Will Quantum Computing Kill Bitcoin?" keep the risk on investors’ dashboards. Meanwhile, River Financial estimates almost 1.9 million BTC remain in early Pay‑to‑Public‑Key outputs, which is to say public keys long exposed and ready for a “store‑now, crack‑later” raid.

Venture capital is betting the risk materializes sooner rather than later: quantum computing startups raised more than $1.9 billion in 2024 alone, and the National Quantum Initiative continues to add new federal labs. Money flows to where breakthroughs are expected.

Before brushing off the danger here as being in the far future, or as being already solved, consider the main attack vectors:

  • Early P2PK outputs reveal public keys the moment coins are mined

  • Reused P2PKH addresses expose keys after first spend

  • Roughly 5.9 million BTC in total sit in addresses with known keys, which could include your coins if they're in someone else's custody, or even your own

  • Fault‑tolerant machines are still theoretical, yet signatures can be archived today

Taken together, these vectors show why the community must next examine the hard numbers behind quantum‑safe signatures, and determine whether those bytes can realistically fit inside Bitcoin’s longstanding block ceiling.

Remember: if that tail risk ever materializes, it strikes in a single block. There won't be time to react even if you're watching like a hawk. 

Post‑Quantum Signatures Versus the One‑Megabyte Wall

Quantum‑safe signatures exist, but they are bulky. Dilithium 2 weighs in at about 2,420 bytes, while Falcon‑512 trims the payload to roughly 666 bytes, which is still an order of magnitude above ECDSA.

Below is a size comparison to illustrate why block space becomes the next battlefield.

Scheme

Claimed security

Public key bytes

Signature bytes

Key plus signature bytes

Simple TXs per 1 MB block

ECDSA‑secp256k1

Classical 128‑bit

32

70

~100

~4,000

Falcon‑512

NIST Level 1

897

512 - 752

~1,650

~1,180

Dilithium‑2

NIST Level 2

1312

2,420

~3,600

< 385

The table underscores a brutal trade‑off. 

Even adopting the slimmer Falcon scheme slashes on‑chain throughput by nearly 90%, turning today’s median fee spikes into a permanent feature. Dilithium is worse, as it would reserve almost the entire block for a handful of simple payments unless the limit grows, thereby guaranteeing a rerun of the 2017 hysteria.

Bitcoin’s full history already totals more than 666 GB. Initial sync for a pruned node still downloads the entire chain, and guides aimed at hobbyists concede that a pruned copy settles near 10 GB. Inflate every transaction by 3X to 10X and the chain balloons, forcing a choice. 

Either raise block size, or price casual node runners out of the network with high fees -- and it's a surprise to nobody that the latter option will probably be the preferred one for major new holders, like BlackRock and other institutions.

Developers are brainstorming ways to dodge that squeeze, and the most prominent options are worth listing:

  • SegWit and Taproot keep public keys off‑chain until spend, buying time

  • MuSig2 and batching reduce aggregate signature weight

  • Lightning and other Layer‑2 (L2) channels offload routine payments

  • Ongoing research seeks even more compact PQC schemes or hybrid designs

All might be helpful, but none would be decisive. Furthermore, given the mediocre adoption of Lightning today, it's questionable whether L2 solutions are appropriate at all. And if signatures stay on the main layer, someone will inevitably campaign for larger blocks.

QRAMP, Soft‑Fork Plans and Side‑Chain Experiments

There are two proposed solutions discussed in the contemporary crypto ecosystem: 

QRAMP

Soft Fork

One camp wants a mandatory hard fork, which, while previously unthinkable, is likely the technical approach that could offer the most comprehensive solution if there's a political impasse that can't be resolved in time. 

A gentler route appears in a GitHub discussion proposing new address versions that wallets adopt voluntarily. Coins remain spendable under old rules, but rising fees and wallet defaults nudge users to migrate.

The Quantum‑Resistant Address Migration Protocol (QRAMP) forces users to move coins or lose them, betting that tough love beats quantum theft. Critics say the plan sets a confiscation precedent. Yet QRAMP’s supporters counter that inaction simply hands the thieves a timetable. Their argument: provoking temporary dissent is preferable to watching Satoshi’s original stash vanish in a single quantum‑enabled swipe.

Meanwhile, a venture‑funded group is trying to duck consensus entirely. Project Eleven just raised $6 million to prototype a quantum‑safe side‑chain. Users peg their Bitcoin into the chain, enjoy Dilithium security, then peg out when ready. Side‑chains avoid the block‑size impasse, yet add trust assumptions and liquidity frictions.

What Holders and Builders Should Do Now

Waiting for universal agreement is risky and unnecessary. 

You can buy time with a few simple moves:

  • Shift coins from legacy P2PK to P2PKH or Taproot addresses so the public key stays hidden until final spend

  • Rotate cold‑storage outputs on a schedule to minimize long‑term exposure

  • Budget for higher on‑chain fees if bulky signatures ultimately win consensus

In parallel, institutions should rehearse key‑refresh drills and integrate watch‑only wallets that flag any outgoing transactions. Small operational tweaks today could prevent eight‑figure losses tomorrow.

These actions do not eliminate quantum risk, but they convert an existential threat into a manageable upgrade cycle.

The Countdown Has Started

Bitcoin’s culture often treats past code as scripture. 

Something must yield. Either cryptographers invent signatures slim enough for a 1‑megabyte world, or governance finds a way to stomach bigger blocks without fragmenting again. 

Optimists pin their hopes on breakthroughs like hash‑based aggregate signatures or zero‑knowledge (ZK) rollups that compress witness data. Pessimists prepare for another civil war. 

Investors who remember 2017 know that politics will decide how quickly any compromise arrives -- and for most of us who were there, that's a gut-wrenching realization, to say the least.

To keep up with the latest in blockchain technology and quantum computing, join us on X and .

Sources:

Christopher Smith's close up photo
Editor-in-Chief
Christopher Smith

Serial Entrepreneur, Hacker, Engineer, Musician.
With a rich career in AI leadership, blockchain innovation, and quantum technology, Chris brings a unique blend of technical mastery and philosophical insight. He continues to push the boundaries of what's possible, driven by a belief that technology, wielded thoughtfully, can redefine humanity's future for the better.

Related Insights

quantum canary's logo

Sponsored by:

quantus network's logo