đĄïž Elonâs Grokâanswer status check â right on target
â Verdict: Nearâ0% risk in 2025â2030, and still under ~10% cumulative chance by 2035. Bitcoin remains cryptographically safe for now.
đ§ Why that makes sense â the key points
Topic Why Bitcoin isnât breaking soon
Shorâs algorithm To break secp256k1 in about 1 day, classical estimates require at least ~1.3Ă10â· highâquality physical qubits; a 10âminute crack would need nearly 2Ă10âž, and faster still up to 10âčâ10Âčâ° qubits . Logicalâqubit counts in top papers target ~2âŻ330 (or 1âŻ500) qubits for full ECDSA break, but that still demands huge faultâtolerant hardware .
Current hardware Most advanced machines (Googleâs âWillowâ, IBM, IonQ, etc.) still have <500 noisy qubits with high error rates, no error correction â many orders-of-magnitude below breaking capability .
Expert forecasts Michele Mosca (Univ. Waterloo): ~1âinâ7 odds for any publicâkey crypto being broken by 2026; 1âinâ2 by 2031. But those risks ACCUMULATE across all systemsâBitcoin, with ECC and best practices, is still better protected than many target algorithms .
Standards preparation NIST urges transition to postâquantum crypto by 2035; IBM roadmap shows only thousands of qubits by 2033 â far too few for practical Shorâs scaling on secp256k1 .
Address hygiene Most BTC today sits in P2WPKH / P2WPSH / P2TR addresses that never expose public keys onâchain unless spent. Those funds remain quantumâsafe even as attacks progressâas long as users follow best practice .
đȘ TL;DR for Alex-and-Everwit: Quantum can break ECDSA-with-Shor theoretically, but:
Itâs cryptographically safe for the next ~5âŻyears â current quantum systems are wildly inadequate.
Cumulative risk remains very low (âȘ10%) by midâ2030s, barring unforeseeable breakthroughs.
Bitcoin protocol upgrades (e.g. quantumâresistant address softâforks) are planned well in advance, giving the ecosystem ample time to adapt.