Get the latest crypto news, updates, and reports by subscribing to our free newsletter.
Giấy phép số 4978/GP-TTĐT do Sở Thông tin và Truyền thông Hà Nội cấp ngày 14 tháng 10 năm 2019 / Giấy phép SĐ, BS GP ICP số 2107/GP-TTĐT do Sở TTTT Hà Nội cấp ngày 13/7/2022.
© 2026 Index.vn
The “9 minutes” claim refers to a potential future quantum computing capability to recover a Bitcoin private key from a public key far faster than classical computers. It is not an assertion that Bitcoin’s proof-of-work would be broken, that the network would be shut down, or that wallets could be drained immediately by pointing a machine at the Bitcoin network today.
Bitcoin transactions are authorized using private keys. Those private keys correspond to public keys, and—under normal computing assumptions—deriving a private key from a public key is effectively infeasible. Quantum computing changes that premise because Shor’s algorithm, if run on a sufficiently advanced fault-tolerant quantum computer, could solve the elliptic-curve mathematics used in Bitcoin signatures much faster than classical systems.
The “9 minutes” figure is an estimate of how long a future quantum computer might need to recover a private key from a public key under assumptions about hardware quality, error correction, and algorithmic efficiency. The paper’s focus is on what could become plausible if quantum systems continue to improve, not on an attack that exists today.
Not all Bitcoin addresses are equally exposed. In many cases, Bitcoin addresses are hashes of public keys rather than the raw public keys themselves. That means an attacker cannot run the quantum attack until the actual public key becomes visible.
This creates two broad risk categories:
When a user broadcasts a transaction, the public key can become visible before the transaction is fully confirmed. If a quantum attacker could derive the private key within minutes, they could theoretically race the network by crafting a competing transaction to redirect funds. This is the “9-minute” style scenario, where a mempool wait could become an attack window.
A larger and more problematic category involves Bitcoin held in addresses where the public key has already been revealed. This can include reused addresses, certain older transaction formats, and early-era holdings. In that case, an attacker would not need to front-run a live payment and could instead derive the private key and drain funds at a chosen time.
According to the source material, roughly 6.9 million BTC—about one-third of supply—may be more exposed under this model. That figure is presented as the number that matters most, not only the “9-minute” line.
Even under a serious quantum attack scenario, Bitcoin’s block production would likely continue. Mining is a separate process from signature security. A quantum machine capable of recovering private keys from public keys does not automatically replace miners, halt consensus, or invalidate the chain.
What would be damaged is confidence in ownership. If private keys can be reconstructed from public information, the basic guarantee that “only the owner can spend these coins” becomes unreliable. The impact would be deeper than short-term volatility because it undermines the wallet-level trust model. In other words, Bitcoin would not instantly disappear, but market trust could deteriorate quickly if enough coins become stealable.
Satoshi-era coins and other early holdings are highlighted because many were stored using address patterns that may be more quantum-exposed than modern best practices. At the time, address reuse or direct public key exposure was more common, and quantum attacks were theoretical and distant. If the technology curve bends in the wrong direction, those older outputs could become soft targets.
The risk is also described as unevenly distributed: a user holding newer unspent transaction outputs (UTXOs) in a modern wallet with careful address hygiene would be in a better position than someone holding ancient coins or reusing addresses across years.
The source notes that Bitcoin is not the only network facing a quantum-related cryptography problem, but it may be slower to mitigate. It states that Ethereum has at least begun discussing migration paths toward post-quantum cryptography, while Bitcoin has not started a full network transition.
This does not mean Ethereum is “safe” or Bitcoin is “doomed.” It is framed as a governance and implementation challenge for Bitcoin: upgrading a live, large network is difficult, and doing so in a conservative environment can be even harder. Post-quantum migration would likely involve new signature schemes, wallet upgrades, user coordination, and difficult questions about what to do with vulnerable dormant coins that may never move voluntarily.
The article emphasizes that the risk depends on two simultaneous timelines: (1) how quickly fault-tolerant quantum hardware improves, and (2) how quickly Bitcoin can coordinate a move to post-quantum security before those machines become practical.
Because neither timeline is precisely known, the issue can be easy to ignore until it becomes urgent. The suggested framing is not whether Bitcoin can be cracked today, but how much “upgrade runway” the network truly has.
A realistic response begins with reducing unnecessary exposure before any protocol-wide overhaul. The source lists measures such as avoiding address reuse, migrating coins into output types that minimize public key exposure until spending, and having exchanges and custodians audit how much inventory sits in more vulnerable formats. Large entities are also described as potentially treating quantum readiness as a treasury security issue rather than a sci-fi footnote.
At the protocol level, the hard part is introducing post-quantum signature options without breaking compatibility or creating new attack surfaces. The article also notes the political and coordination challenge of getting sufficient ecosystem buy-in to make the transition meaningful. Dormant coins complicate decisions about whether to leave them vulnerable, pressure migration, or consider more controversial rule changes.
The article characterizes the underlying warning as one of asymmetry: Bitcoin does not need quantum computers to destroy mining. It only needs them to make ownership less reliable for a meaningful portion of supply, which could trigger serious economic and governance consequences.
For now, it remains a future-risk story rather than a live exploit story. Still, the exposed-coin problem and the migration challenge are described as real, and Bitcoin is said not to have solved either one yet. The piece concludes that if quantum hardware stays impractical, the concern remains long-tail; if progress accelerates, attention should focus on wallet standards, BIP discussions, and how actively major custodians discuss post-quantum upgrades.
In brief\n\nBitcoin dropped to about $93,000, falling back below the EMA50 and putting its recent golden cross at risk of invalidation. The global crypto market cap stands at $3.15 trillion, down 2.38% in 24 hours. On Myriad Markets, 82% of the money is betting on Bitcoin pumping to $100K before…