Unchained - Why Bitcoin Developers Are Not Incentivized to Talk About the Quantum Threat

Episode Date: February 12, 2026

Thank you to our sponsors! Figure Crypto Tax Girl Are bitcoiners underestimating the quantum threat to Bitcoin? That's the question Castle Island Ventures Partner Nic Carter has posed with ...some recent posts gauging the views of several leading Bitcoin developers on quantum computing. To help answer the question, Unchained reached out to Ethereum Foundation Researcher Justin Drake and Michigan University Professor Chris Peikert. In this episode, Justin and Chris, who is one of the foremost experts on lattice cryptography, break down the quantum computing threat to crypto and the potential timelines. Justin theorizes that Bitcoin developers may not be incentivized to talk about the quantum computing risk while still saying that a number of smart people are already taking it seriously and that may be enough. Conversely, Chris highlights the constraints that come with uncertainty around risks and timelines. Listen to find out what they conclude. Plus, could AI do crypto in before quantum computers? Guests: Justin Drake, Researcher at the Ethereum Foundation Chris Peikert, Professor, Computer Science and Engineering, University of Michigan Links: Ethereum and Optimism Lay the Groundwork for a Post-Quantum Future Q-Day Is Imminent. Can Bitcoin Survive the Quantum Threat? Solana Deploys Post-Quantum Signatures on Testnet Cracking Bitcoin Encryption Is Getting Much Easier, Google Says Learn more about your ad choices. Visit megaphone.fm/adchoices

Transcript
Discussion (0)
Starting point is 00:00:00 We face of this very uncertain timeline of when and if quantum computers will emerge to the point where they can break our crypto is a very interesting kind of at an intellectual level, right? How do you apportion your resources? How do you measure the risk? How do you predict, well, we've got a long migration ahead of us. When do we start? If you have the fast flavor, so for example, you have Google working on the superconducting stuff. The estimate for the time it takes to crack a key is on the order of minutes, like roughly 10 minutes. And so what you could imagine is that Satoshi's coins would actually be stolen at the same rate at which they were mined in the early days.
Starting point is 00:00:55 Hi, everyone. Welcome to Unchained. You're no-hype resource for all things crypto. I'm your host, Laura Shin. Thanks for joining this live stream. Before we get started, a quick reminder, nothing you hear on Unchained is investment advice. This show is for informational and entertainment purposes only, and my guest and I may hold assets discussed in the show. For more disclosures, visit Unchained Crypto.com.
Starting point is 00:01:15 Quick note before we get into today's episode. Bits and Bits Now has its dedicated feeds. We're spinning off from the Unchained feed and moving to a new podcast and YouTube channel. So if you want to keep up with our weekly live streams and macro meets, crypto breakdowns, make sure to subscribe to Bits and Bips directly. Don't publish there until March, but subscribe today so you can be ready for launch. Be sure to subscribe to the new feeds at Unchained Crypto.com slash bits and bibs. Did you know that figure is giving away $25,000 in USDC?
Starting point is 00:01:47 They're a decentralized digital asset platform for earning, borrowing, and lending. Download the Figure Markets app using our link. Figure Markets.com slash Unchained DP. deposit into their democratized prime pools and earn about 9% APY paid hourly while you enter. Every dollar you keep in for 25 consecutive days counts as an entry. Again, the link is figuremarkets.co slash unchained DP for full details. If crypto taxes feel overwhelming, you are not alone. That's why Crypto Tax Girl, a team that's been helping crypto investors since 2017,
Starting point is 00:02:30 is offering $100 off on one-on-one crypto tax help. To get $100 off your crypto tax services, go to Cryptotaxgirl.com slash unchained. Again, that's Cryptotaxgirl.com slash unchained. Today's topic is the quantum threat to crypto. Welcome, Justin and Chris. Hi, Laura. Thanks for having us. Great to be with you, Laura and Justin.
Starting point is 00:02:58 So, everyone, I know we're a bit, late to this topic in the sense that others have been talking about this for a while. But we're also quite early because the threat to crypto that quantum poses is, you know, going to happen at some indeterminate point in the future. However, this threat is already influencing investment and it is the kind of threat that will take a lot of coordination and planning to overcome, which is why we are discussing it now. So let's just start by laying the groundwork. Justin, why don't you start by explaining what quantum computing is and what threat it poses to crypto. Sure.
Starting point is 00:03:35 So quantum computing is a form of computing that leverages microscopic physics, if you will, that is hidden to the day-to-day world that we live in, but is very much present. And using this hidden structure, you can run computation theoretically faster for certain classes of algorithms, including algorithms that break the cryptography that we have right now in terms of elliptic curves. And the major threat for crypto is that it breaks the current cryptography that we have. So for a firm specifically, there's three pieces of cryptography that are vulnerable. The first one for user transactions is called ECDSA. The second one is at the consensus layer, we have something called BLS signatures. And then,
Starting point is 00:04:28 And then finally, at the data layer for the blobs, we have something called KCG. And the common thread for all these three layers is elliptic curve cryptography, which would get broken by computers. And Chris, how would you describe quantum computing and the threat that it poses to crypto? Yeah, I think Justin said it perfectly. You know, this is a technology that is still in somewhat early and even speculative stages. but there's been a lot of progress in building these quantum computers by efforts that have invested billions of dollars
Starting point is 00:05:08 toward engineering these devices. And a theoretical level and also at an engineering level, we know and have known for several decades now that quantum computers, if they are built at large enough scale, can and would break all of the cryptography that we've been using heavily on the internet and in blockchain applications and all around the world for several decades now. And so I know timelines can be difficult to project, but I was curious when you both personally thought that quantum computing would pose a threat to crypto, you know, how many years from now? And either of you can answer.
Starting point is 00:05:52 Sure. Well, I started kind of going all in on quantum resistant cryptography research. about 21 years ago. So at the time, I thought, you know, this is going to matter. This is going to be important someday. You know, in those 21 years, we still haven't seen a quantum computer, but the level of effort and investment that's gone in has has really skyrocketed in recent years. And so most people who are experts in this domain, I'm not sure I consider myself one of them in terms of actually building quantum computers. but most people who are experts in this domain do believe that we will have them at some point in time. And those timelines range from, well, how likely do you think a quantum computer is to emerge within a certain amount of time? So I think most people believe that, you know, in the next three to five years, very unlikely. But perhaps at the 10 year, 15 years out from now, it starts to become more of a significant probability. and then predicting the future, even 20 years out, is a fool's game.
Starting point is 00:07:02 I don't think anybody can do that. Justin, what do you think of the timeline? Yeah, so at the Film Foundation, we've been thinking about this since 2018. We actually gave a large grant, several millions of dollars to stockware back then to start building this technology. And with all of the progress that we've seen recently, both on the quantum computing side things, but also on the algorithmic side of things, my personal date is now 2032. And I've partially stolen this from a friend in Cambridge who happens to be the founder and CEO of River Lane, one of the top error correction companies in the world.
Starting point is 00:07:42 And we both have a son who sons who are in the same class, which is how I met him. And he's been in the space for 15 years. And his date 15 years ago was 2032. And so I'm feeling pretty good about it. And going back to what Chris said, very few people believe that we're going to have so-called cryptographically relevant quantum computers by the end of this decade.
Starting point is 00:08:09 So we're talking 2030s. But I think there's a reasonable chance, for example, that in 2013, maybe a 1% chance, 2% chance, maybe more that we'll have a quantum relevant computer. And then it really increases steeply the probability of having a cryptogram graphically rather than a quantum computer. And one of the things that I can share is that there's been this really big improvement
Starting point is 00:08:34 on the algorithmic side of thing. So if you rewind the clock two, three years ago, the best known algorithm for breaking Ethereum cryptography required about 10 million physical qubits. And then about a year ago, so last year in 2025, we had a paper bringing that down to one million cubits. and in 2026 we're going to have another paper that brings it down even further. And so I wouldn't be surprised if the end game is much closer to 100,000 qubits. And so we have these two curves.
Starting point is 00:09:09 Eventually, we'll cross. And because of the time it takes to migrate to new cryptography, we have to be thinking about this several years in advance. And if indeed I'm right that 2032 is the date. then today is one we really need to get started. And explain what a qubit is. So a qubit is the fundamental quantum building block, which is the equivalent of the bit.
Starting point is 00:09:39 So a bit can take two values. A qubit can be in a superposition of states and it can also be entangled with other qubits. This is what gives its power. And when we talk about qubits, there's two flavors. there's the logically perfect cubic, which we call a logical qubit. And this is what the theoretical quantum algorithm designers will be using.
Starting point is 00:10:09 And then you have what's called the physical cubit, which is the physical insinciation using atoms or photons or whatever it is. And because of the noise involved, you have to do so-called error correction. You have to take a collection of physical qubits in order to form one perfect, logical one. And this ratio between physical and logical is very important, and it might be on the order of a thousand or 100 or maybe 10,000. This is very much in the engineering stage. But one thing that we should expect in addition to the algorithms improving is that the error correction will improve so that the ratio will improve. And of course, we should see more and more physical qubits in the same way that we have
Starting point is 00:11:02 more slow that increases the number of bits and transistors that we have on a single chip. Okay. So as you said in the beginning, the threat that quantum computing poses to crypto is kind of limited to a certain area. Just to explain what that means in practical terms, like what are the actual dangers that everyday users would perceive, that businesses would perceive, what are the things that could happen
Starting point is 00:11:33 if the crypto industry and all these different chains don't come up with ways to protect themselves against the quantum threat in advance. Long story short, with a cryptographically relevant quantum computer, you can take a public key
Starting point is 00:11:53 and re-derive, re-compute the private key from that. So normally, you're meant to keep your seed phrase secret and your private keys safe and you only expose the public key. But if we have a cryptographically-runnerable computer, it's basically game over. It's systemically bad for the whole industry where the notion of property rights starts to crumble. Yeah, I would add that cryptocurrency is built on the foundation of secure cryptography. And there's all kinds of cryptographic primitives and tools of by various names, digital signatures and hash functions and encryption and all these different kinds of tools and primitives that we use so that we can build a secure cryptocurrency. And when that foundation crumbles and becomes completely insecure, while everything built atop of it also collapses.
Starting point is 00:12:51 So it is, as Justin said, a completely systemic risk, as well as a particular risk to specific protocols that are out there, whether they be Ethereum or Bitcoin or any of the many other kinds of blockchains that are out there. And so essentially, like, it's something like whoever creates a first quantum computer could steal as many coins as they want from pretty much any chain. Is that sort of the doomsday scenario? That's a fair description of what would happen, right? If you can take any public key off of the blockchain, you could empty its account, right? And just forge a transaction that transfers all the assets from this account to the account of your choice. Those are some of the very simple to imagine consequences of having a cryptographically relevant quantum computer. There are other sort of more subtle or nuanced situations like one could potentially
Starting point is 00:13:54 use a quantum computer to break consensus or cause some kind of fork in certain types of blockchains that are protected by digital signatures that are vulnerable to quantum computers. So Justin also mentioned this at the beginning. The actual consensus layer of many blockchains is protected by cryptography that would be broken by quantum computers. So whether an attacker would actually want to do this and destroy the entire consensus of the network or not is an open question, but it's at least something that in principle could be done. And so that would be a systemic destruction of maybe all the value in that blockchain.
Starting point is 00:14:38 I do want to kind of share some up the nitrically details of quantum computers. So there's several so-called modalities, which are different flavors of quantum computing. There's, for example, trapped iron and neutral atoms. And those involve, like, moving particles around, and they tend to be relatively slow in terms of their clock cycles. And so if you were to run the algorithm to break our cryptography known as Grover's algorithm, it might actually take several hours or several days. And so if you only have a limited number of quantum computers at the very beginning, then you should only expect a small number of keys to break if these are the modalities that are going to win.
Starting point is 00:15:19 There's other modalities, for example, supercomputing and photonics that are much faster because there's no moving parts. And here you could expect a key to break in a matter of minutes. But again, if there's a limited number of sufficiently powerful quantum computers, most addresses will actually be safe. because, for example, Satoshi has a very large number of addresses, each with 50 Bitcoin in the early days of mining Bitcoin. And so one very easy mitigation, actually, is to just make sure that in your wallet, you have less than 50 Bitcoin's worth of value, because then the attacker will target Satoshi's coins first,
Starting point is 00:16:08 and we'll have a bunch of lead time. seeing Satoshi's coins being drained before everyone else's. Well, okay. Yeah, I mean, the one thing, of course, is if Satoshi's coins get drained, then that would cause like a systemic panic. And so the price of Bitcoin might go south. But let's say that now it was 2032. We would wake up one morning and like, fine,
Starting point is 00:16:36 that all of Binance's wallets got drained, even like cold storage. same with Coinbase. Is that kind of how to think about it? So a lot of the large exchanges for their cold wallet actually implement a very easy mitigation, or at least they should implement a very easy mitigation, which is to not reveal the public key. So on most blockchains like Bitcoin and Ethereum,
Starting point is 00:17:03 you have the address, which is the hash of the public key, and then you have the public key which needs to be revealed the very first time spend from that address. But if you have a cold storage address for which you've never made any spends, then the public key has not been revealed, and that's actually secure against quantum computers. So the very easy mitigation is to make sure that you're hiding your public key
Starting point is 00:17:30 behind the hash, which is your address. Now, there is a company called Project 11 that has this. a tracker website that will tell you what percentage of keys are protected behind the hash and those that are not. And I believe we're talking roughly 30%. Don't quote me on this. Just check the website. And some of the top addresses are indeed exchanges. So if you are a security officer at one of these exchanges or your parts of management, do consider this very simple mitigation. of putting all your cold storage in an address that has never made a single spend. Okay. Okay. Yeah, I guess. From what I understand, you know, the way these exchanges work,
Starting point is 00:18:25 they have cold storage. They'll have like a lukewarm storage, right? For what it's called. And then the hot wallet. So presumably there are times when certain cold storage wallets might need to transact with the lukewarm wallets or whatever they're called but um but yeah it's probably pretty infrequent um okay so now let's talk about um something that chris kind of alluded to he said you know if whoever develops the first computer wants to go after these coins i'm so curious there must be a race to develop this type of computer first so who were sort of the different players and are any of them ones that, yeah, might be motivated to attack crypto. Sure.
Starting point is 00:19:15 Well, we know of many of the public players, at least. So Google has a serious high dollar investment in building various types of quantum computers, engineering them. And as Justin mentioned before about error correction, just last year, Google had a major breakthrough in the quality of error correction. that it was able to attain. That's one of the most important ingredients in ultimately building a large-scale quantum computer.
Starting point is 00:19:46 You also have IBM and a large number of, moderate number of startups of various names that are all trying different engineering approaches. And then you have the not-so public players. We know that governments around the world of various large countries are very interested in this kind of technology.
Starting point is 00:20:08 They don't report out their progress to a large degree. And so we don't really know where they lie and whether the private sector that's making public announcements is ahead of them or catching up, it's very hard to say. But, you know, naturally the U.S. government, the Chinese government, all kinds of rich countries are almost certainly investing a lot of effort into building quantum computers. Yeah. And in the public quantum computing industry, there's a bunch of companies that have gone public, and there's been a little bit of speculation around those.
Starting point is 00:20:50 So some names that Chris didn't mention, there's like Cy Quantum and Quantum and Continium and Rigetti. Now, one, I was talking to the Google team recently, and one thing they mentioned is that in China, instead of having many different commercial companies working on this, it's mostly centralized at the government level and they're extremely quiet. So I would say those are the two primary polls, the public companies and the Microsoft, the IBMs and the Googles, versus a government like China. Yeah, I feel like, I mean, this is sort of something that's been said a lot,
Starting point is 00:21:35 in crypto, but, you know, a government like China is probably one of the few players that would be very motivated to try to attack blockchains in this way. So, yeah, I could see that being a threat. Okay. Well, I'm so curious, and I know you guys are kind of affiliated with certain chains, but you probably have made an assessment of which chains are maybe more vulnerable than others and which ones are least vulnerable. So I'm just curious to hear the lay of the land, like what your opinion is on if there are any particular coins that you think probably are better positioned and which ones need to, you know, up their game. So when migrating to post-quantum cryptography, there's really two challenges. One is a technical
Starting point is 00:22:26 one and the other one is a social one. In my opinion, the major technical challenge is what's known as the size problem for post-quantum cryptography. We're dealing with signatures that are at least 10 times larger than ECDSA. So ECDSA has 64 bytes signatures, and the smallest NIST standardized scheme is called Falcon, 512, and it has signature sizes of 66 bytes. And then there's all sorts of other schemes that have even larger signatures. And so if you maintain the...
Starting point is 00:23:09 the block size, which for pretty much any blockchain is like the scarcest resource that you have, your throughput, and you increase your size of your transactions by a factor of 10, then your TPS, your throughput is going to go down by a factor of 10. So imagine Bitcoin going from 3 TPS to 0.3 TPS, or a film going from 25 to 2.5 or Solana going from 1,000 to 200. it. In my personal opinion, this is just a non-starter, just from a commercial standpoint. It would just be way too disruptive. And so what the Affirm Foundation has been investing in to solve this technical size problem is what's known as signature aggregation. So the idea is to take
Starting point is 00:23:55 multiple, all of the signatures corresponding to all of the transactions in the block and to snarkify them into a single proof that would get published alongside the, the block. And this is something that we've been working on for a while now. We have something called Lean VM, and we have the variance of the NIST standardized signatures that are much more friendly to this aggregation. Now, putting aside the technical problem, which is real, for some other blockchains, there's an even more real problem, which is the social one. First of all, they need to recognize that indeed there is a problem. And then even once they've recognized, they need to put in place all of the coordination infrastructure.
Starting point is 00:24:41 And the topic blockchain that I have in mind here is Bitcoin. You have leaders like Adam Beck that are in complete denial that quantum computers could be coming in the early 2030s. He's talking about at minimum decades until cryptographically relevant quantum computers come. And Nick Carter wrote this report recently where he went through, the whole list of Bitcoin high priests. And of the 10 that he identified, only one of them, Jonas Nick, was worried about quantum computers and the nine others didn't seem too worried. And Bitcoin is a chain that only makes upgrades extremely infrequently.
Starting point is 00:25:28 In the last 10 years, it's only made two upgrades. And it's plausible that it would take them at least five years. to upgrade to post quantum cryptography and that quantum computers could come within that time frame. Now, one of the things that I'm hoping will happen, ironically, is that there's a collaboration between Ethereum and Bitcoin. Because what happened in 2009 when Satoshi launched Bitcoin is that he created a de facto,
Starting point is 00:26:05 standard for signatures. So he went with ECDSA, he picked a specific curve, sec 256, sec P 256 K-1. And then most of the chains just just copied this. And this was really good because it meant that you had the same key derivation standards across all of the chains. You have the same wallet infrastructure, the same hardware wallets. You had the same MPC protocols, etc., etc. And it would be pretty catastrophic, in my opinion, if every chain were to come up with its own solution. And so the strategy that we're taking at the Affirm Foundation is actually to try and pill the Bitcoiners
Starting point is 00:26:43 to reuse whatever we have so that if Bitcoin and Ethereum together have the exact same solution, that all of the other chains most likely will just copy it. And so the Lean VN that I mentioned is built with Bitcoiner security in mind. We're trying to be as conservative as possible, not cutting any corners.
Starting point is 00:27:07 And we're also collaborating with Bitcoin researchers. So there's Mihal Kudina, for example, we wrote four different papers, academic papers, with him in 2025, in early 2026. These are papers on post-quantum cryptography. And last year, we organized a workshop in Cambridge in October. This was a three-day post-quantum workshop, which he came to.
Starting point is 00:27:33 He's a great guy. I'm basically hoping that Mihal can single-handedly be the bridge between the Bitcoin world and the Film World. And I forgot to mention that Mihal works at Blockstream, the primary company that has, you know, soft power over Bitcoin upgrades. Yeah, and that is run by Adam Back, who actually, you mentioned really with not, yeah. But yeah, Jonas Nick is also at Blockstream. So maybe Adam Beck could be convinced if Michael and Jonas joined forces. Okay. And I'm curious, Chris, what you think of that idea about if Bitcoin and Ethereum are using the same strategy or the same solution,
Starting point is 00:28:20 if that would be something that other chains would naturally do because I don't know if it is even an issue. But in my head, I'm like, oh, but does that reduce resiliency? for the industry if everybody's using the same model that potentially could later on become vulnerable? I don't know. Yeah. In terms of cryptography and the standards that are underlying the technologies themselves, I think it's a very good thing to have broad industry standards that are well understood, that have been well vetted. And as Justin mentioned, You know, the Falcon signature scheme is one which has been selected by the U.S. National Institute of Standards and Technology now through a many-year post-quantum cryptography process. So that started back in 2017 or so and is just coming to the conclusion of its main activities in the past year and upcoming year.
Starting point is 00:29:26 And so it's very good if the industry can all agree on one standard so that things are interoperable. You get many fewer cryptographic disasters or unexpected incompatibilities or security issues. You know, speaking of some of the other projects out there that have taken post-quantum cryptography seriously, for example, I've been connected to Algarand since 2020. through Algaran Technologies. That's a company that works on cryptographic research and protocol security. And one of the reasons I got excited to do that at the time was they specifically wanted to understand
Starting point is 00:30:12 the post-quantum cryptography landscape and to bring their chain up to date and understand what it would take to build in post-quantum resiliency. So through those years, we developed something very similar to what Justin was talking about to address this size problem. It was called state proofs, and it uses the Falcon signature scheme.
Starting point is 00:30:34 And it basically offers a fairly frequent but periodic checkpoint, a post-quantum secure checkpoint about the state of the Al-Gran chain, for example. So it allows you to say, you know, every 256 blocks, which is every few minutes on Al-Grand, you can get signatures, Falcon signatures from many, many different validators and accounts that attests to the state of the chain. And then there's a thing called a state proof that kind of condenses these falcon signatures down to a small number of them that together prove that a large percentage of the stake in the AGRAN system has attested to, yes, this is the state of the blockchain at this point in time. And that's a post-quantum secure attestation or proof.
Starting point is 00:31:22 And so it allows one to, for example, interact with other chains or have a long-term post-quantum secure kind of snapshot of what the chain actually looked like. And that keeps it secure even in the ultimate future when quantum computers emerge and might try to, you know, fork the chain through a historical path or try to convince a light client that the chain looks like this when it actually looks like that. So light clients and other users can look at these state proofs and determine, yes, this is the actual state of the chain at this point in time. And then recently, Ogrant also added these post-quantum secured wallets. So you can actually give post-quantum-secured transactions for using the same Falcon signature scheme. Okay. And for the transaction, that just means, like, that the transaction wouldn't be vulnerable to a quantum computer? Exactly.
Starting point is 00:32:24 Yeah, the transaction, the signature, transaction has a signature. It's a Falcon signature. That's a post-quantum secure signature. And those, the idea is that a quantum computer would not even be able to forge such a signature. It would not be able to, you know, empty your wallet if you've got this feature enabled that requires post-quantum signatures on its transactions. Oh, got it. Okay. Okay. So these are addressing sort of the two layers that Justin mentioned at the top of the show where you have, you know, there's protection for individual accounts and wallets.
Starting point is 00:33:00 And then there's protection at the base layer of the blockchain itself and the consensus layer. And, you know, does everybody agree that the same thing is happening? Okay. Got it. That makes sense. All right. So in a moment, we're going to talk a little bit more about some of the other efforts that are being made. but first a quick word from the sponsors who make this show possible. Bits and Bits Now has its dedicated feeds. We're spinning off from the Unchained Feed and moving to a new podcast and YouTube channel. So if you want to keep up with our weekly live streams and macro meets crypto breakdowns, make sure to subscribe to Bits and Bips directly.
Starting point is 00:33:36 We won't publish there until March, but subscribe today so you can be ready for launch. Be sure to subscribe to the new feeds at UnchainedCripto.com slash Bits and Bips. Want a chance to win $25,000 in USDC? Figure, a platform to earn yield, borrow against crypto, and access lending markets is running a $25,000 USDC sweepstakes tied to their democratized prime product. Here's how it works. Download the Figure Markets app using our link, Figure Markets.com slash Unchained DP,
Starting point is 00:34:10 deposit into a democratized prime lending pool, and leave your funds there for 25 consecutive days. Every dollar equals one entry, so $1,000 equals 1,000 chances. While your funds stay in the pool, you're also earning around 9% APY, paid out hourly. To learn more and enter, go to figuremarkets.com slash unchained DP, which is also available in the show notes. If you're looking for help with crypto taxes, Crypto Tax Girl is offering $100 off for unchained listeners. They provide personalized crypto tax reports and returns, and spots before April 15th are limited. Go to Cryptotaxgirl.com slash Unchained to save $100.
Starting point is 00:34:56 Once again, the link is Cryptotaxgirl.com slash unchained. Back to my conversation with Justin and Chris. So are those all the different types of problems that could happen with quantum cryptography, sorry, quantum computing? Or are there any others that might affect blockchains? There's another type of attack that we haven't really mentioned so far, and it's of lesser significance to the blockchain space, but still can have some important implications, and that is what's known as a store now, decrypt later attack.
Starting point is 00:35:35 This primarily affects encryption. So if you have data that you want to keep secret, let's say your account balance is private, or you're using a chain that offers some privacy to the transactions, that usually uses a technology called encryption. And just like with ECDSA signatures that Justin mentioned earlier, all of the predominant encryption methods of the past several decades are also vulnerable to quantum computing attacks. And so would that affect like pretty much all the privacy coins and all the privacy chains? Is that?
Starting point is 00:36:11 It might. It would depend on what kind of level. of privacy that they provide. But what it would allow is if there's some encrypted data that is stored on the blockchain, for example, and is meant to remain secret for a long time, when a quantum computer ultimately emerges, it can look at that encrypted data, break the key, and decrypt the data, and learn what was supposed to remain private. And so you have this problem where if you're encrypted data, things today with
Starting point is 00:36:46 cryptography that would be vulnerable to quantum computers, you have a problem because if you're trying to keep it secret for 10 years, for example, and quantum computers emerge in six, or as whatever the prediction is, you can't, you're going to lose, right?
Starting point is 00:37:01 You're not going to be able to keep it secret for that long. So it means that if you want to keep secrets for a longer term period, then you need to start using quantum, quantum secure cryptography right now. Laura, you're asking about the privacy chains. So I have a piece of good news and a piece of bad news. The piece of good news is that quantum computers will break the soundness of these privacy schemes like Zcash, but they will not break privacy. So, you know, someone can spend coins that are not theirs, but at least the whole, you know,
Starting point is 00:37:43 least the whole history of past transactions will not be like magically decrypted. So that's the good news. The bad news is that I think privacy coins like Zcash are going to be the very first target of a quantum computer. And the reason is that you can steal funds without anyone noticing. So within the privacy pool, you can just empty the privacy pool and no one will know. And so you mentioned Laura that there would be kind of mass panic if Satoshi's coins were to move.
Starting point is 00:38:12 Well, there wouldn't be any mass panic if the Zcash coins were to move because no one would really notice. Oh, my gosh. Yeah, that is, that's really scary. And would this also affect, because there's, you know, as I'm sure you know, there's a bunch of layer twos that have privacy on Ethereum. You know, I just interviewed Aztec back at DefConnect when they launched. Like, you know, there's a bunch. So would those also be affected? Yes, unfortunately, they would be affected.
Starting point is 00:38:48 And really the solution here is to try and migrate as quickly as possible to post-quantum snarks, because a lot of these are based on snarks. And hash-based stocks are basically the only solution that is production grade today. Now, in addition to deploying new technology, one of the social problems is trying to force the community to exit one system and move to another one. So for example, in the context of Zcash, they have these multiple shielded pools. I think one is called sapling,
Starting point is 00:39:24 and they have various names. And one thing that you can do is basically keep track of the total amount of funds that have been deposited in the privacy pool and the total amount of funds that have left. And so what you could potentially do is have a policy that says, you know, by this date, we need to have this specific, vulnerable privacy pool be emptied. Otherwise, all of the coins might be deemed, might be destroyed
Starting point is 00:39:54 as a policy decision by the community. And one of the things that I want to highlight going back to Bitcoin is that they have this big issue around what do you do with the Satoshi coins, which is about a million BTC, which has done. you know, tens of billions of dollars. And, you know, there's basically potentially going to be a contentious fork here with one side wanting to burn them and the other side saying, no, no, no, privacy rights are sacred. We definitely cannot burn them.
Starting point is 00:40:28 The good news for Ethereum is that there's, roughly speaking, 0.1% of the eF circulating supply, which is known to be lost, of all, you know, belief to be to be lost. And so that's essentially a rounding error. And I don't think we'll have this consensus fork in Ethereum land. And wait, so I'm sorry, just to understand, are you saying for something like Bitcoin that in order for any coins to be saved, all the owners have to voluntarily move? No.
Starting point is 00:41:01 For any chain, we need to have the owners perform an action where they spend their coin, from a quantum insecure wallet and migrate them to a post-quantam secure wallet. There is this like one exception, which is that it is possible to basically have a proof of knowledge of the seed phrase as opposed to a proof of knowledge of the private key. And that would allow you to migrate without any user action. But this is not something that many chains are. are considering as the default path. They are considering, for example, as an emergency path.
Starting point is 00:41:44 So if, let's say, tomorrow, we had a quantum computer that was able to crack Ethereum addresses at will, what would probably happen is that we would just shut down the chain, and then we would have a mechanism for people to prove that they own the seed phrase, which is, you know, a post-quantam secure thing as opposed to proving that they know their private key because that's something that the attacker would know. And then we would have this reboot mechanism that would take several weeks, potentially several months.
Starting point is 00:42:25 So, yeah, it is being considered right now as an emergency backup, but it's not the default path. Wait, and I'm sorry, like to quote-unquote shut down the chain, you have to get all the individual miners, all the stakers, I get like, but I guess because there's a lot of, so you'd have to get all the solo stakers and all the, you know, kind of like places like Lido and whatever that are doing it for, for individuals. Like you'd have to get them all to do that, right? Or? So there's two separate problems. There's the users and the validators. for the users, the community more likely than not would say,
Starting point is 00:43:08 hey, like any transaction that has been made from this point onwards is just considered a null and void. What we're going to do in order to prove your ownership of a specific address is we're going to ask you to prove that you know your seed phrase. So just to back up a little bit, the way that you go from the seed phrase to the private key involve some hashing. And hashing is quite,
Starting point is 00:43:32 quantum secure. So that step here is quantum secure and it can be leveraged to do an emergency reboot for the users. You could also do a similar thing for the stakers. So Ethereum has roughly $100 billion of stake and each validator can have a zero knowledge proof that they know the corresponding seed phrase and then use that to basically send the EF to a new new post-quantam-secure address. But this is a process that would take many weeks, potentially many months. And so for a period of time, the Ethereum chain would go down. But having said all this, the plan right now is to upgrade every single piece of Ethereum cryptography to be post-quantum secure by 2029. And so hopefully this should not be
Starting point is 00:44:26 an issue if indeed 2022 is 2032 is the correct date. Okay. Yeah. Yeah. Obviously you want to do it ahead of time because what you just described sounds like chaos. But Ethereum has done similar things in the past. Like if I think about the Dow hard fork, like there are messy situations that it's come across. And yeah, okay, maybe the solution was messy in its own way. But like it worked, you know, basically. So, okay, that is that's for. really interesting. So Chris, well, yeah, so okay, so now Justin just briefly gave us a little bit of a glimpse of like how how Ethereum is thinking about trying to tackle this. Like, does Algrin have any plans or do you know of any other chains that have like certain plans around, you know, how to kind of transition before the threat arrives? Yeah, there are, you know, several chains that are thinking, I think,
Starting point is 00:45:32 seriously or to some degree of seriousness about how to do these kinds of upgrades and transitions. I think it's absolutely important to do it very deliberatively and iteratively. So the approach at Algonaut for example has been, let's deploy this state proofs, right, for the underlying consensus and chain and a long-term viability and accuracy of the chain. And then let's learn from that and let's iterate. And then they moved it to post-quantum transactions, post-quant protected transactions. We'll learn from that and discover new techniques, new ideas that allow to move forward to other pieces of the picture. And so I think another reason to start early in addition to the ones that Justin has mentioned about
Starting point is 00:46:29 you know, the uncertain timeline of when are we going to be at Q day, right? When are we going to hit the cupocalypse? Is you have to learn and you have to iterate and you have to try some things that might not work and adjust your approach. Because the performance profiles of these post-quantum schemes is very, very different from what people are used to with the current classical cryptography. So, you know, the sizes are much larger. there's, you know, on the plus side, verifying signatures is much faster in post-quantum schemes like Falcon. And so, you know, for blockchain applications, fast verification is a very useful fact. You want to be able to verify a lot of signatures very quickly because there are so many of them on the chain.
Starting point is 00:47:18 There are going to be a lot of tricky implementation issues with a lot of these cryptographic permitives. They work completely differently from what we're used to. And so all the lessons of the past actual few decades in terms of sticky points and trip-ups that people have made with insecure implementations and things of that nature, we might have to relearn some of these lessons or at least pay close attention to the mistakes that were made in the past and make sure we don't make versions of those mistakes again with a new cryptography. So, you know, it takes a long time. All of these things are slow and deliberative.
Starting point is 00:47:58 And one needs to start early because it's a marathon, right? It's not a sprint. You don't want to be sprinting for 26 miles. You're going to fall over dead at the end if you do. You'd rather have a nice, you know, well, my pace would be four miles an hour if I were running a marathon, maybe less. But, you know, you want to be able to be going carefully. and deliberately, and that means starting very early and going piece by piece. And so Justin, as you mentioned, the Ethereum Foundation just announced this post-Quantum team.
Starting point is 00:48:34 And, you know, you kind of already gave a little bit of a glimpse into what you guys were thinking. But just like tell us a little bit more about your plan and, you know, what goals you have. Right. I guess before that one thing that I want to share as a prediction is that I think the blockchain industry is going to suck in a lot of post-quantum talent in the months and years to come. One thing that, you know, it might not be clear to your audience is that Chris is like one of the very top experts in the world on lattice-faced cryptography. And it's fantastic that he is in blockchain land working with Algorand.
Starting point is 00:49:13 And, you know, Blockstream very recently hired Mikhail and we, you know, at the Firm Foundation, we had already a team of cryptographers and we're increasing that, for example, recently we hired Emil to work on Lean VM full-time. Now, the specific plan that we have is to solve this size problem via hash-based cryptography. So specifically, we're hoping to have hash-based signatures that are unaggregated, and then use hash-based snarks to aggregate the hash-based signatures. Now, why hash-based? The reason is that one of the primary reasons is that there's uncompromising security.
Starting point is 00:50:05 One of the goals of blockchains is that they're going to be securing hundreds of trillions of dollars over centuries. And hash-based cryptography is believed to stand the test of time. and is by far like the most conservative and minimal assumption that you could hope for. And, you know, hashes in some sense are sunk cost for blockchains. We have them everywhere, you know, with our Merkel trees. Even in signature schemes like Falcon, which are called like hash and sign, you have the hashing that's part of the signing process. So we're going with absolute uncompromising security.
Starting point is 00:50:53 And again, that's part of the strategy to try and appeal to the Bitcoiners. Now, if you were to ask a person on the street or a cryptographer of the street is using hash-based cryptography, a wise choice for blockchains, they might actually say no. And the reason is that hash-based signatures are larger than the other flavor, which is called lattice-based signatures. So it seems paradoxical. Why would you choose the hash-based signatures? And the way that I think about this is that it's a what I call the hash-gambit. So we have these larger signatures, but then we're solving the size problem with this other tool, which is the hash-based snocks.
Starting point is 00:51:38 And what you end up with is a very small and fast-to-verify snock-proof that you post with. every single block. And the only place where the larger signatures show up is off-chain in the mempools. So there's a solution there, which is called sharded mempool. So instead of having one mega mempool for all of Ethereum, you know, we might have 64 mempool each with 164th of the transactions flowing through. And that's perfectly fine.
Starting point is 00:52:13 It's an easy design. but really the scarce resource that we want to be preserving is the on-chain data availability throughput. And for that, we would take all the signatures and snarkify them. And ironically, when we do that, it's actually a scalability boost relative to what we have today. And the reason is that today we are consuming 64 bytes of ECDSA data availability per transaction, whereas in the future we wouldn't be having this fixed cost per transaction. And so if you look at a, you know, a blockchain like Bitcoin, the total amount of signature data that goes per block is actually larger than a single proof, which is on the order of 200 kilobytes. So that is a strategy, you know, to take the hash gambit, have slightly larger signatures, but then aggregate them.
Starting point is 00:53:11 and by going with hash-based signatures, in addition to the uncompromising security, we also have very elegant designs. So hash-based signatures are some of the simplest things that you could imagine. They were actually invented close to half a century ago. So a small historical fact is that Ralph Merkel invented Merkel trees in 1979. and what was the context of that? It was Merkel signatures, which are hash-based signatures.
Starting point is 00:53:45 And what we're hoping to put in production that the consensus layer is basically a small variant over these Merkel signatures. So we've been taking the Merkel tree part of his invention that's almost 50 years old in blockchains, and now we're kind of going back to the roots and also using it for signatures, which is a fun anecdote.
Starting point is 00:54:08 And in addition to the, security and the elegance, there's a further advantage of hash-based cryptography, which is that it's been heavily deployed in production. You know, hash-based snarks, sometimes known as stocks, you know, are the common, now the de facto standard for snarks, for roll-ups, for example, and they're extremely performant and certainly performance enough to be able to aggregate the signatures for all blockchains. Okay. And yeah, I mean, what you just explained sounds so interesting, but I'm sure Chris,
Starting point is 00:54:52 being an expert in a different type of, I guess, post-quantum computing, I'm curious, Chris, what your thoughts are on that. And if you can explain, like, you know, what a different way to approach it might be. And not just for Ethereum, but like, for any change. Sure. Yeah, it's a really exciting time because there's such a wide spectrum of possible solutions to these problems we face. And there's a lot of different tradeoffs that emerge and that in one context may make a great deal of sense. And in another context, you know, don't make any sense at all. Right. So I think the thing, the system that Justin just described is, it sounds really cool. It's, uh, these hash based signatures are, as he said, one of the oldest and most classical things, you know, you teach in crypto 101. And often things in crypto 101 that we teach, you know, we say, oh, this is like a completely theoretical thing because it's so inefficient.
Starting point is 00:55:52 But then with a bunch of engineering and a lot of hard work and very clever systems work, it turns out, hey, this is completely practical and you can do it in reality. So, you know, that's what's one of the exciting. parts of this post-quantum cryptography field for me and many others I think is there's like a thousand flowers blooming all over the place and oh look at this one
Starting point is 00:56:18 it looks completely different from this one and it has its own like cool advantages and you can do these kinds of things with it which well we could never do that before or oh but like oh it's got a very fragile stem well okay we can like shore up the stem and make it much more strong with this other tool right so all these combinations of really cool
Starting point is 00:56:37 almost magical cryptography allow you to do these sort of miraculous things. The work, you know, the area that I work in is called lattice-based cryptography and in addition to
Starting point is 00:56:51 hash-based cryptography, those are the two categories of schemes that NIST did ultimately select for its standards, its post-quantum cryptography standards. So both areas are old-ish,
Starting point is 00:57:08 lattice-based cryptography goes back to the mid-1990s. So it's kind of getting long in the tooth as well, which in cryptography is a good thing when something's been around a long time. That generally means it's stood the test of time and can be considered to have good security. People have looked at it for a good deal of time, which is necessary before you start putting
Starting point is 00:57:31 billions and trillions of dollars of assets at work secured by such cryptography. So the other thing I love about lattice-based cryptography is maybe some things we'll be talking about in five or 10 or maybe even three years, it has these amazing other features you can do with respect to privacy and what's called fully homomorphic computation,
Starting point is 00:57:57 fully homomorphic encryption that enables all kinds of miraculous applications. it's still in the relatively early days of being practical enough to deploy, but there's been a great deal of effort on it at the scientific side and the engineering side over the past 15 years or even getting a little bit more than that. And I think in, you know, five and 10 years, we will be pretty amazed by what we can do with those kinds of technologies as well. All right.
Starting point is 00:58:31 So now let's talk about Bitcoin. because that's really the chain that kind of kicked off this conversation. As Justin alluded to Nick Carter of Castle Island Ventures, a few months ago, released a bunch of different essays. And he talked about how he had done a bunch of interviews. And he felt like the Bitcoin core devs were not really taking the quantum threat seriously. And he found that concerning because it's the most decentralized chain with the, I guess, what you could say is least codified.
Starting point is 00:59:03 governmental infrastructure or practices for decision making and group action. And obviously, Bitcoin is easily the most important asset in crypto. And I just wondered if you, you know, had thoughts on what he was saying. You know, Justin, as you mentioned, some of the people who are very prominent Bitcoin are a little bit dismissive of this threat. And I wondered, you know, if he felt that, you know, Nick maybe kind of was making a stronger point or if you felt like you agreed more with the Bitcoin devs or, yeah, how, and either of you, you know, can answer. But I'm just for you to describe what you think are the quantum threats to Bitcoin. I think Nick is directionally correct on pretty much all of the points. I guess I would add two caveats.
Starting point is 01:00:01 The first one is that there's this weird game theory where maybe the Bitcoin developers don't have an incentive to talk about the risk, even though they themselves kind of personally, privately, appreciate the risk. And I think there might be something similar going on with the security budget. I know with very high confidence that Bitcoin is not going to stand the test of time because of the security budget and the, and the happenings. And, you know, there's some very smart people that probably understand that, but, you know, don't have an incentive to speak about it. And maybe we see something similar with quantum. The other thing that I want to kind of push back on a little bit with Nick is that
Starting point is 01:00:49 there are, like, a couple of very smart people that are taking it seriously, especially Mikhail and Jonas. And, you know, at the technical level, You don't need an army of researchers necessarily. A small group of people, especially with the advance of AI, can do a lot. And I think there is a reasonable path here where, you know, in parallel to the main net, there's some test nets or some dev nets
Starting point is 01:01:27 that are led by people like Mihal. and Jonas and that thanks to companies like Project 11 there is a reasonably swift migration now one of the data points worth sharing
Starting point is 01:01:45 is that if you're going to cycle through every single UTXO on Bitcoin it's going to take about three months if the chain is dedicated to doing nothing other than cycling through these UTXOs And so, you know, realistically, maybe we're talking, you know, more like a whole year to do the migration.
Starting point is 01:02:08 But yeah, I think the bigger issue is going to be how are they going to solve this aggregation problem. There's the technically naive way of solving it, which is just increase the block size 20x to kind of counterbalance the fact that the pop keys and the signatures are. are that much larger. But there was a whole holy war that was fought on Bitcoin block sizes. And the small blockers win. And I think it would be not super palatable to increase the block size by 20x. And so the solution that I'm presenting to the table for Bitcoiners is maximum security with hash-based signatures, a solution which gives them a scalability boost over what they have
Starting point is 01:02:54 today and doesn't require them to increase the block size. So my hope is that in the three-day post-quantum workshop that we're organizing again this year, we're going to have more than just one Bitcoin there, hopefully a handful of them. And if you'd like to come, my DMs are open, and I'd be more happy to host you. Chris, what do you think? Yeah, I mean, I would say at the sort of higher level, just, you know, backing away from the specific situation of Bitcoin, in the issue that we face of this very uncertain timeline of when and if quantum computers will emerge to the point where they can break our crypto is a very, you know, interesting kind of at an intellectual level, right? How do you apportion your resources? How do you measure
Starting point is 01:03:51 the risk? How do you predict, well, we've got a long migration ahead of us. where, when do we start that is really a challenging, a challenging thing. And so, you know, reasonable people can come to different conclusions about that in their own context and projects. But I think overall, you know, I would say there does not seem to be any intrinsic blocker to quantum computers eventually scaling up to break cryptography. I think more and more people are coming around to the idea that, you know, It's a matter of engineering.
Starting point is 01:04:28 It's a matter of are people going to put in enough budget to actually engineer these devices? And the directional that seems to be going is, yes, it's going to happen sooner or later. And technology is very hard to predict. We have many examples in history where technology came on much faster than it was maybe expected to. And we have many instances where certain technologies took a lot longer. to come out than some of maybe the reasonable predictions had made. So I did want to ask about the issue about Satoshi's coins, which we brought up earlier, because Satoshi has such a large number of coins.
Starting point is 01:05:11 And from what I understand, the coins that Satoshi mine have a public key structure that is more susceptible to the quantum threat. And obviously because of the high and dollar value on that number of coins, that, you know, would be something that maybe somebody who developed quantum competing early could be motivated to attack first. Could be the canary in the coal mine, yeah. So I'm curious, like, do you feel like Satoshi's coins in particular pose sort of a unique threat that Bitcoin out of all the blockchains has? Or do you, I don't know, what do you think about that? Yeah, I would say it is unique.
Starting point is 01:05:55 it's 5% of the Bitcoin supply. And I don't know if many chains that have such a large amount of believed to be lost coins for which the public key is exposed. As I mentioned previously in the show, the equivalent number for Ethereum is 0.1%. So about 50 times less of a problem from a quantitative standpoint. But because the delta is so big, it has qualitative different consequences. So in the case of Bitcoin, it's going to be a whole debate, it's going to be a contentious fork. In the case of Ethereum is going to be a rounding error, no one's going to care that 0.1% of the coins are going to get stolen. Okay.
Starting point is 01:06:42 So even though we've kind of been arguing that like Bitcoin maybe has a little bit more of a threat, 21 shares just came out with an essay that I wouldn't say they're like minimizing the threat, but they are saying at least that they feel the way that it's been portrayed has been overstated. And so they did analysis and they are actually saying that they believe only 10,000 or 20,000 bitcoins are actually going to be vulnerable. And that only that they said so about 10,000 would be able to be suddenly, quote, suddenly and unexpectedly brought to market from compromised private keys,
Starting point is 01:07:20 and the remaining coins sit in 24,000 individual Bitcoin addresses that hold about 50 Bitcoins, and that it would take decades to steal those, quote, even with the most wildly optimistic technological breakthroughs. So in that regard, then it sort of felt like, oh, maybe the threat has been overstated. I don't know. What did you think of their analysis? I haven't read their reports, but I can imagine what they're saying. And this goes back to what I was saying previously in the show that there's different quantum computing modalities.
Starting point is 01:07:56 You know, there's the fast computers, the superconducting and photonics, and then the slow ones, the trapped ions and the neutral atoms. If you have the fast flavor, so for example, you have Google working on the, on the, on the, on the, superconducting stuff. The estimate for the time it takes to crack a key is on the order of minutes, like roughly 10 minutes. And so what you could imagine is that Satoshi's coins would actually be stolen at the same rate at which they were mined in the early days. And, you know, Satoshi only mined for a period of, you know, two years or something like that. I need to check exactly. And so it would take, you know, roughly two years to empty Satoshi. she's 1 million coins.
Starting point is 01:08:48 But that's with a single computer. But of course, you know, you could just have multiple quantum computers. You could have, you know, 10 of them, in which case the timeline shrink by a factor of 10x. So this conclusion from, you know, 21 shares doesn't make sense to me. Chris, what did you think? Yeah, I mean, putting aside the specific numbers here, I think it's important to realize that when a when a technology kind of achieves liftoff, it grows very quickly. So the time to go from one quantum computer that can break a key in a few minutes
Starting point is 01:09:27 to the time where there are 100 such computers is going to be a very short period of time. And once you're in that window, it's far too late to act. And you certainly don't want to be staring that down. So, you know, it's sort of a zero to one type of situation. situation, right, where you for a long time do not have the technology to do a task, and then all of a sudden it's there, and then very soon after, it's ubiquitous. There's also a little bit of game theory where if you do have a quantum computer, maybe your best move is not to attack addresses immediately. What you could do is kind of scale it up to
Starting point is 01:10:07 10 computers and then kind of attack those in private and then all in one go, kind of kind of of steel's Satoshi's coins. It is, yeah, we should probably mention, right, that for the situation where you have a public key that's actually public, you can run the attack in your
Starting point is 01:10:29 basement, not telling anybody, and you can discover the secret key, and you can accumulate all the secret keys that you need quietly without taking any external action. And then now, when you have all the secret keys, you use
Starting point is 01:10:44 them to make the transactions that empty the wallets. So it's not a matter of, oh, the quantum computer has to be out there actively making itself known while it's doing these cryptographic attacks. It's a quiet attack. And then when you're ready, you take your action. Oh, wow. This reminds me of the BitFinex hack where the hacker knew what all the account balances were and drained the biggest ones in order going down to the ones that had fewer coins. So basically, the upshot is that any chains that want to prevent this type of attack have to act before quantum computing poses a threat to blockchains. Is that the basic takeaway? That's the bottom line. And really, that action, that action to upgrade things is a
Starting point is 01:11:38 long, slow one that's going to take a matter of years. One kind of tangents, but I still think it's intellectually interesting is that the current elliptic curves that we have used a so-called discrete log assumption. And it is possible that a non-quantam computer, a so-called classical computer, could break these things. And the reason is that there's a lot of structure in these elliptic curves. And you could imagine some sort of a mathematical breakthrough to happen. Now, traditionally, these mathematical breakthroughs have happened by humans, by mathematicians, you know, over periods of decades. But what we're seeing with AI is that time is shrinking and we're starting to potentially see AI as being much better than humans at mathematics. And so maybe they can find these kind of clever breakthroughs that leverage the structure of elliptic curves within a similar timeline or a shorter timeline.
Starting point is 01:12:44 than that of quantum computers. So this migration to post-Quantum cryptography is also a migration to post-A-I cryptography and is one that, in my opinion, should be done relatively quickly. And Chris mentioned the amazing world that would be available to us with lattices. So for example, this technology called FHE,
Starting point is 01:13:12 fully homomorphic encryption, that uses lattices. There's even more fancy stuff like witness encryption and, you know, obfuscation. And these are all things that we want. But there is a possibility that, you know, lattices
Starting point is 01:13:28 get broken by an AI, partly because, you know, lattices involves these like very structured mathematical objects and it is at least plausible that there will be a breakthrough there. And so my personal thought here is that at the very foundations of blockchains, we should be avoiding these structured assumptions. So we should be going with maximally unstructured things like hash-based cryptography.
Starting point is 01:13:59 And the vast majority of assets, let's say 90% of them should be conservatively secured. And then there's kind of the more exotic stuff that leverages the fancier assumptions. that can be done on top. And if and when there is a break, it's actually not catastrophic and systemic to the whole industry. Yeah, as my PhD advisor said, cryptographers seldom sleep well at night
Starting point is 01:14:27 because there's always this prospect that, you know, your baseline mathematical assumptions about what is and isn't secure turn out to be wrong, right? And we have to make the best bets we can with the information we have available. But, you know, as with quantum computers, the ground can shift under you quite quickly. One final thought.
Starting point is 01:14:49 Historically, the way that we've been thinking about post-quantum cryptography is as a defensive technology against quantum computers. But in recent weeks and months at the Firm Foundation, we've actually changed our mindset. We now think of post-quantum cryptography as being an aggressive strategy in order to attract, institutional capital, for example. And we're now hoping to be the very first global financial piece of infrastructure that is post-quantum secure. And that could potentially be used as a way to attract capital from TratFi into Ethereum.
Starting point is 01:15:34 Yeah. You've probably seen some people on Twitter making that point that Ethereum as an asset is looking very good from an investable standpoint, partly because you guys are being so proactive about the quantum threat. So yeah, I think your strategy is a good one there. All right, everyone, this isn't just fabulous. Thank you so much. It's great talking with you. Thanks, Laura.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.