Coinbase commits $150 million to protect Bitcoin from quantum computing threats
Coinbase CEO Brian Armstrong announced this week that he will personally oversee a new industry initiative to protect Bitcoin against quantum computing threats, committing $150 million to a "Quantum Defense Fund" that will award grants to developers working on integrating post-quantum cryptography into the Bitcoin protocol.
The announcement, made at a crypto industry summit in San Francisco, followed a paper published on March 31 by Google Quantum AI that significantly shortened the estimated timeline before quantum computers could threaten cryptocurrencies. The paper, co-written with Justin Drake, a researcher at the Ethereum Foundation, and Dan Boneh, a cryptographer at Stanford, demonstrated that a superconducting quantum computer with fewer than 500,000 physical qubits could break Bitcoin's elliptic curve cryptography in approximately nine minutes — well within Bitcoin's average ten-minute block confirmation window. That figure represents a roughly twentyfold reduction from the previous best estimate of around 9 million physical qubits.
The move marks an escalation from Armstrong's February statements, when he told CNBC that quantum threats were "entirely solvable" and that Coinbase was "ahead" on these issues. Coinbase had already assembled an independent advisory board of prominent cryptographers in January to assess quantum risks. The Google paper appears to have accelerated the company's posture from monitoring to mobilization.
Coinbase Chief Security Officer Philip Martin cautioned that while post-quantum cryptography offers viable solutions, its implementation across the Bitcoin ecosystem remains uneven and cannot be rushed without introducing new vulnerabilities. Armstrong's coalition is reported to include participants from Block and the Bitcoin Core development team.
At the technical core of the effort is BIP-360, a Bitcoin Improvement Proposal integrated into the Bitcoin Core repository in February 2026. The proposal introduces a new address type called Pay-to-Merkle-Root that reduces public key exposure — the specific vulnerability quantum computers would exploit. Discussions around BIP-360 have included the potential use of Winternitz one-time signatures, a hash function-based scheme considered resistant to quantum attacks.
BTQ Technologies has already implemented BIP-360 on a test network, providing a real-world environment for developers to experiment with quantum-resistant Bitcoin transactions. However, a full migration would require wallets, exchanges, and hardware providers to update their systems — a process that could take years.
The nine-minute attack window identified in the Google paper casts a shadow over the effort. Under idealized conditions, researchers estimated a 41 percent probability that a prepared quantum computer could derive a private key before a Bitcoin transaction is confirmed. No such machine exists today, but as Armstrong told attendees, the quantum threat is no longer a problem for future generations.
-
16:37
-
16:01
-
15:50
-
15:25
-
14:59
-
14:46
-
14:15
-
14:00
-
13:45
-
13:25
-
13:04
-
11:13
-
11:00
-
10:45
-
10:30
-
10:15
-
10:00
-
09:45
-
09:30
-
09:15
-
09:00
-
08:45
-
08:30
-
08:15
-
08:00
-
07:35