Quantum Vulnerability Assessment Tool · v0.9 Alpha
Quantum computers running Shor's algorithm could theoretically derive a Bitcoin private key from its corresponding public key — breaking ECDSA-256 cryptography that secures every wallet.
Estimated amount of Bitcoin held in addresses with exposed public keys (P2PK, reused P2PKH), making them potentially vulnerable to future quantum attacks.
Once a Bitcoin address is spent from, its public key becomes visible on-chain. If you've never spent from an address, only the hash is exposed — a much stronger barrier.
Today's quantum hardware is far too noisy and limited. Cryptographers estimate a capable quantum machine would require millions of stable logical qubits — years or decades away.