The Biggest Pile Of Treasure To Ever Exist

Quantum risk to Bitcoin is less about magic computers and more about incentives and governance. But stealing Satoshi’s pile changes the game.

A glowing pile of gold coins in a sci-fi cave with a digital "unlocking" interface and a hooded figure.

Date

Mar 05, 2026

0 min read
0

People like to say Bitcoin can’t be confiscated, can’t be inflated, can’t be stopped. But what if it can be unlocked by someone who never owned it?

That's the question explored in Nic Carter’s Trillion-Dollar Salvage. It's fiction (for now) but it needles a real nerve, which is that a single cryptographic weakness can turn dormant coins into a prize. The weakness itself is exploitable by a sufficiently powerful quantum computer that can crack Bitcoin's cryptography. The prize, Satoshi Nakamoto's gargantuan hoard of Bitcoin worth approximately $100 billion, is the single largest pile of treasure to ever exist in human history thus far. 

This is worth thinking through today because the post-quantum computing migration conversation is (finally) turning operational. The next step is to understand why the prize is going to bend behavior long before the tech to implement the attack actually exists.

This bounty is too lucrative to leave on the table

When a single jackpot like Satoshi's stash is sitting in plain view for everyone to see, the game shifts from “can we take it” to “who will move the fastest to take it”. 

A donut chart titled "Actor Archetype" by Quantum Canary, illustrating the distribution of players in the quantum space. The largest segment represents State Intelligence Services, followed by Big Tech Quantum Labs, Protocol-Focused Startups, and a small sliver for Criminal Groups.

On that note, Bitcoin transaction authorization relies on ECDSA over secp256k1, and the quantum worry is that Shor-style attacks can target discrete logs on elliptic curves if a sufficiently capable fault-tolerant machine shows up. A conservative resource estimate for elliptic-curve discrete logs is laid out in Roetteler et al., and it implies a large gulf between impressive lab demos and anyone ever being able to steal coins on demand. 

That gulf, however, is closing.

Google’s recent error-correction results are a tangible step towards meaningful quantities of logical qubits, yet they're still very far from an attack-ready stack, and even if they had it, it isn't in their line of business to implement it. Similarly, IBM’s roadmap frames a path to large-scale fault tolerance, including a target system with 200 logical qubits. That's marking meaningful progress compared to yesteryear, but it's not the same thing as forging signatures at scale, and again, hacking Bitcoin isn't something they'd ever want to be understood as being in their wheelhouse.

So, it's worth also pushing back on the seductive claim that governments can already do everything they want with quantum computing, because it's simply highly unlikely to be fully true even under pessimistic assumptions. The capabilities involved are simply quite difficult to build at the scale needed, even by highly-resourced actors. 

Why the quantum grab is a game worth following

If the prize is big enough, the competition plays out via timing, signaling, and commitment, not to mention raw compute power and other forms of technical prowess.

One red-team framing is laid out in Project Eleven’s “Quantum Wargames”, which sketches how an adversary might behave if Q-Day becomes imminently plausible. The key idea is an attacker’s objective function, which is to extract value while delaying the moment defenders coordinate. The attacker doesn't need to serially crack and use keys; they could crack many keys and then use them all at once in an alpha strike if they wanted to inflict maximum damage on the ecosystem.

Note that defenders must realize they're under attack before coordinating an active response, but also that they can make defensive preparations according to their willingness to devote resources. The first credible theft attempt increases the odds of an emergency response that makes later theft attempts harder.

That timing dynamic creates a first-mover advantage, and, in contexts like Satoshi's stash, where no defense can credibly exist, it also heavily incentivizes attempting imperfect attacks which may not succeed initially (if they are developed). It also creates a coordination trap for everyone else. If multiple actors believe the threat is real, each has an incentive to act before disclosure forces a migration, even if they would prefer a world where nobody acts at all.

So who can chase Satoshi's hoard credibly, and what holds them back?

Who's aiming at Satoshi's pile today?

Another way of framing this question is asking who can sustain a highly capital-intensive and secretive engineering platform, where there's a known intelligence payoff for future success. You can probably see where this is going already.

  • On the government side, the NSA’s algorithm suite update is explicit about quantum transition pressure, as shown in CNSA 2.0. The NSA is releasing what's nominally a defensive document, but obviously it signals serious institutional acceptance of the threat model. 

  • CISA has also emphasized PQC migration planning in this joint resource announcement, which is another marker that “harvest now, crack later” thinking is not niche anymore. 

To keep the operational logic straight, this table separates attacker archetypes from the constraints that keep this from being an immediate crisis.

Actor archetype

Examples

What they plausibly have

What blocks them

What defenders can do

State intelligence services

NSA, SCS (Russia), MSS (China)

Budget, secrecy, coercion, patience

Fault-tolerant scale, plus attribution risk

Build crypto-agility plans guided by NIST IR 8547

Big tech quantum labs

IBM, Google

Hardware talent and error-correction roadmaps

Reputational blowback and legal exposure

Reduce exposed-key surface with proposals like BIP 360

Protocol-focused startups

Lightning Labs, Chaincode Labs

Product focus and fundraising access

They depend on public trust to sell tools

Demand measurable milestones and adversarial testing

Criminal groups

LockBit, ALPHV

Motivation and flexible operations

They can’t build fault tolerance from scratch

Pay security professionals for active threat monitoring; make “easy targets” disappear by moving to safer script paths

The table should make one point feel unavoidable: The attack to worry about is if a sufficiently sophisticated quantum computer exists, and that the attacker can execute an attack using it, preferably without triggering a fast migration. 

That brings us back to Nic Carter’s story.

Nic Carter’s base case

Carter is explicit that his story is more a thought experiment about governance coordination with Bitcoin than it is an actual prediction. 

His implied base case is that even after a quantum computing breakthrough, the response is procedural and political. Institutions push for a fork, miners and custodians pick sides, and the transition is slow, and uneven among different types of holders.

On that note, it's important to see that Bitcoin developers are not asleep at the wheel even if they're moving very slowly relative to what major holders might prefer. A hard-fork style concept to enforce migration from legacy outputs is under consideration.

The uncomfortable part is time: Even with a social consensus, migrating signature schemes across the economy of Bitcoin is a big coordination project, and attackers only need a short window of capability to create irreversible damage. As stated previously, there may not be much of an incentive for an attacker to sit quietly and wait for someone else to take the prize.  

An attack on Satoshi's stash is probably not imminent. So where does that leave things? If the world stays pre-Q-Day forever, the biggest pile of treasure to ever exist will remain as some numbers on a blockchain, owned only by an absent Satoshi. 

But that probably won't happen. That means the race to capture the motherlode is undeniably on.

To keep up with the latest in blockchain technology and quantum computing, join us on X and .

Sources

Christopher Smith's close up photo
Editor-in-Chief
Christopher Smith

Serial Entrepreneur, Hacker, Engineer, Musician.
With a rich career in AI leadership, blockchain innovation, and quantum technology, Chris brings a unique blend of technical mastery and philosophical insight. He continues to push the boundaries of what's possible, driven by a belief that technology, wielded thoughtfully, can redefine humanity's future for the better.

Related Insights

quantum canary's logo

Sponsored by: