🚨 Q‑Day Brought Forward? Google’s 2029 Pivot, 9‑Minute Attacks, and Bitcoin’s Governance Test
Bankless•
April 6, 2026

🚨 Q‑Day Brought Forward? Google’s 2029 Pivot, 9‑Minute Attacks, and Bitcoin’s Governance Test

Highlights

  • Two new quantum papers — from Google and a Caltech-linked neutral-atom team — sharply lower resource estimates to break ECDSA/secp256k1 via Shor’s algorithm.
  • Short-range ā€œon-spendā€ attacks move from theoretical to plausible: Google’s fast-clock approach implies ~9 minutes to derive a private key from a revealed public key — fast enough to front-run unconfirmed Bitcoin spends.
  • Timelines just tightened: Google accelerated its internal post-quantum migration target from 2032 → 2029; U.S. government guidance frames a 2030–2035 window for critical upgrades. One assessment: ā€œ2030 is only four years away.ā€
  • Bitcoin’s governance strain: migrating signatures, re-keying ~50 million addresses (estimated ~3 months at full blocks), and resolving the status of ~2.3 million dormant/Satoshi coins — all against a culture that defaults to the status quo.
  • Ethereum’s posture: proactive PQ roadmap, account abstraction advantages, and visible engagement (e.g., Justin Drake co-authoring the Google paper).

ā€œIt won’t be like Y2Kā€ — The New Quantum Reality

ā€œWe will not get significant prior notice… It’ll just happen one day.ā€

Two papers dropped the same day — one from Google (superconducting qubits, fast clock) and another from a Caltech/neutral-atom group (slow clock) — each offering improved resource estimates to run Shor’s algorithm against ECC used in Bitcoin and parts of Ethereum.

  • Google’s fast-clock result: a ~20x reduction in resource requirements, with the alarming implication that an attacker could derive a private key in about 9 minutes once a public key is revealed in a Bitcoin spend. That window could allow interception before confirmation — a true short-range ā€œon-spendā€ attack.
  • Neutral-atom (Caltech) slow-clock result: a ~50x efficiency gain; estimates suggest ECC could be cracked with 10k–26k physical qubits (previously ā€œhalf a millionā€ to ā€œmillionsā€). State-of-the-art neutral-atom arrays are already around 6,000 physical qubits, bringing long-range attacks much closer.

Google did not disclose its circuit, publishing a ZK proof of correctness instead — a sign of tightening information controls reminiscent of pre–Manhattan Project self-censorship dynamics.

Threat Model: From Long-Range to ā€œOn-Spendā€ āš ļø

  • Long-range attacks: Target already exposed public keys (e.g., historical spends, dormant wallets). Earlier modeling placed first attacks at ~200 days to crack; the new neutral-atom path compresses that timeline materially.
  • Short-range (on-spend) attacks: With Google’s fast-clock path, a public key revealed in a Bitcoin spend could be reversed in ~9 minutes — enough to replace the transaction in the mempool. Crucially, this is Bitcoin-specific due to how public keys are revealed at spend.
ā€œThis was the thing… I’d never ever seen a result… where they’re saying, ā€˜No, this could be done in 9 minutes.’ So, it completely changes the threat model.ā€

One relief valve: Proof-of-work remains largely unaffected near-term. Grover’s algorithm offers at best a quadratic speedup — a ā€œslightly better miner,ā€ but not an economic use of a breakthrough machine.

Timelines and Signals: 2029 Is Now In Play 🧭

  • Google’s own posture: internal migration target moved from 2032 → 2029. One reaction: ā€œThat’s 2.7 years away… for the biggest internet company on the planet.ā€
  • U.S. Government: guidance frames a migration window of 2030–2035 for critical functions; some anticipate forward revisions given new estimates.
  • Market infrastructure: Cloudflare has reportedly already migrated; Apple and others are described as actively mitigating.
ā€œThis paper is the notice… the next [thing] will be actual real in-production attacks.ā€

Bitcoin’s Governance Stress Test āš™ļø

ā€œBitcoin governance is spectacularly unsuited to a threat that is of an uncertain timeline and requires total mobilization.ā€

Upgrading Bitcoin to post-quantum (PQ) signatures presents both technical and social challenges:

  • Decision latency: A Chaincode paper reportedly frames a ~7-year reasonable horizon for such a transition, potentially ~2 years if rushed — before any mass address migration even begins.
  • Network-wide rekeying: ~50 million addresses must turn over. Even at full blocks, that’s ~3 months just to process the movements.
  • Algorithm selection (NIST): Three PQ families are on the table (including lattice-based and hash-based). Trade-offs are severe:
    • Elliptic-curve signatures today are <100 bytes.
    • Post-quantum signatures imply a minimum ~10x size increase and potentially far higher: ā€œ100 to a,000x additional resource requirements.ā€
  • Throughput hit (illustrative): As one estimate put it, if Bitcoin processes ~3 TPS today, lattice-based signatures could drop this to ~0.3 TPS. A block-size increase would likely accompany any PQ shift.

The Satoshi Coin Dilemma: Freeze, Burn, or Build a Trapdoor? šŸ”„

Per the Google paper’s accounting, roughly 6.9 million BTC are currently vulnerable (keys publicly exposed or susceptible), with an estimated ~2.3 million BTC likely tied to Satoshi/lost coins — often cited as ~10–15% of supply.

Outlined options include:

  • Do nothing: The first CRQC actor seizes the treasure.
  • Burn: Make the Satoshi/lost coins permanently unspendable.
  • Hourglass: Slow or stage unlocks of dormant coins.
  • ā€œBad sidechainā€: Park coins on a pegged chain; original owners can later present proofs to reclaim.
ā€œThese times call for a dictator… Someone’s going to have to do it.ā€

One projected path: institutions coordinate. A group of major custodians could publicly commit to only support a fork that freezes or burns the Satoshi/lost set — making that chain de facto BTC for exchanges and ETFs. Ideologically costly, but framed as fiduciary necessity to block a foreseeable catastrophic loss event. A minority fork could persist, but with limited support.

An alternative lens borrows from maritime law: a salvage regime. A designated entity could legally ā€œsalvage and protectā€ the coins in trust, potentially earning a ~10–15% finder’s fee, while preserving claims for a re-emergent owner or, absent that, escheating to the state. This avoids protocol-level supply edits but requires state action and coordination — and does not constrain adversarial nations.

Ethereum’s Posture: Proactive and Modular 🧰

  • Visible mobilization: Work like PQEthereum.org and direct involvement in the Google paper (e.g., Justin Drake) signal preparation.
  • Account abstraction: Eases hot-swapping signature schemes under a single address, aiding user migration.
  • Complexity caveat: Multiple layers (execution, consensus, rollups) widen the scope of PQ transition.
ā€œIf nothing changes in Bitcoin, ETH/BTC could look pretty interesting here.ā€

What to Watch Next šŸ“Š

  • Bitcoin Core signals: Any movement toward PQ algorithm selection, activation methods, or a coordinated migration plan.
  • Institutional alignment: Public statements from exchanges, custodians, and ETF sponsors on fork criteria regarding dormant/Satoshi coins.
  • Standards convergence: NIST trajectories and industry preference between lattice‑based vs hash‑based signatures for L1s.
  • Address tooling: Wallet upgrades that minimize public key exposure and prepare for dual‑signing periods.
  • Market signals: Relative performance of ETH/BTC as a barometer of perceived governance/upgrade agility.

Bottom Line

  • Resource estimates have shifted meaningfully toward feasibility — including an on‑spend, ~9‑minute attack window under a fast-clock path.
  • Migration timelines referenced by Google (2029) and U.S. guidance (2030–2035) now create a public yardstick for crypto protocols.
  • Bitcoin’s core challenge is no longer technical alone; it’s coordination — choosing PQ signatures, rekeying tens of millions of addresses, and resolving the Satoshi/lost coin set under time pressure.
  • Ethereum appears comparatively mobilized, with architecture (e.g., account abstraction) that may ease user‑level transitions.
ā€œTrusting the process is great when it’s peacetime. It’s not peacetime — it’s wartime.ā€

The notice has arrived. Next comes execution.

More from Bankless