Blog

The Quantum Timer is Ticking, and Crypto Is Hitting Snooze

Hans Lombardo

October 22, 2025



Earlier this week, I attended Q+AI in New York City - Inside Quantum Technology’s conference, and walked away with a deeply unsettling conviction: the cryptocurrency industry is asleep at the wheel, drifting toward an iceberg.

The Quantum Timer is Ticking, and Crypto Is Hitting Snooze

As co-founder of Blockpass, my world revolves around identity, security, and the cryptographic promises that underpin the entire Web3 ecosystem. I live and breathe risk assessment. And what I saw at this conference, particularly in the "Q+Crypto" track, was a jarring disconnect from the "business as usual" froth I see in the broader crypto market.

While our industry focuses on the next memecoin, ETF approvals, or L2 scaling, a structural, existential threat is coming. It’s not a vague, distant-future "science project." It’s an engineering problem that is being solved with terrifying speed. And almost no one—not VCs, not startup founders, and certainly not the average crypto native—is prepared for it.

I led my panel, "The Business of Quantum & Crypto," and then listened to keynotes from some of the sharpest minds in the field. The message was uniform: "Q-day," the moment a quantum computer can shatter our encryption, is coming. And the collective "laissez-faire" attitude of our industry is our single greatest vulnerability.

The Attack Isn't Theoretical, It's a Ticking Clock

The first dose of cold reality came from Steve Yalovitser, a Principal Engineer at Amazon Web Services (AWS) and founder of the NYC Quantum Computing Meetup. In his keynote, he wasn't ambiguous. He laid out the "how" in terms a child could understand.

Our entire world—Bitcoin, Ethereum, every wallet, every "secure" transaction—is built on a prayer called Elliptical Curve Cryptography (ECC). This system's security relies on a simple premise: it's easy to use your private key to create a public key, but it's classically impossible to reverse the process.

Quantum computers, Yalovitser explained, don't play by our rules.

Using Shor's algorithm, a quantum machine leverages properties like superposition—the almost magical ability to exist in multiple states at once. This isn't like a classical computer trying one key at a time. It's like a quantum computer trying all the keys simultaneously to find the one that works. It finds the "period" of the function and, from there, calculates your private key.

But it was Yalovitser's next point that truly chilled the room. He drew a line between this and a classical data breach. Decrypting old, encrypted SWIFT bank messages from the 1990s would be an attack on privacy. It's embarrassing, but the money is long gone.

Decrypting the blockchain is fundamentally different. It's an attack on possession. It "will enable a quantum computer owner to obtain the private keys for anyone, enabling theft".

This isn't reading old mail. This is getting a master key to every bank vault on Earth, all at the same time. It's the "game over" scenario.

Our Biggest Chains Are Our Biggest Targets

So, if the threat is so clear, what are the big players like Ethereum doing?

This is where Michael Strike, Chief Technical Evangelist for the Quantum Resistant Ledger (QRL), delivered the second, more brutal, punch. He argued that Ethereum’s greatest strength, its massive scale and ecosystem, is also its "quantum Achilles heel".

He pointed directly to Ethereum's own research on a potential "quantum emergency" plan. Let me tell you, it's not a "patch." It's a panicked, centralized reboot that would destroy the very premise of decentralization. The proposed plan involves:

  1. Reverting blocks: An admission of failure, rolling back the "immutable" ledger to before the theft was noticed.
  2. Disabling traditional transactions: Freezing the entire network for every normal user.
  3. Forcing a mass migration: Requiring users to navigate complex STARK proofs to move their assets to new, "safe" smart contract wallets.

This isn't a hard fork; it's a heart transplant on a running patient. It would shatter user trust and vaporize value. Strike's point was that true quantum security cannot be bolted on as an afterthought. It must be built-in from "the first block".

He laid out the criteria for survival: Is your chain using NIST-recognized cryptography (like QRL's XMSS or the new ML-DSA/Crystals-Dilithium standard)? Has it been audited by third parties for both classical and quantum security? Is it completely free of legacy ECC?

If the answer is no, you are vulnerable. His blunt assertion that "ERC20s Are NOT Quantum Secure" should be carved into the door of every DeFi protocol and VC firm

The "When" Is Irrelevant. The Threat Is Now.

This brings us to the "when." This is the part that VCs and founders, in particular, need to internalize.

Yalovitser mentioned the comfortable industry consensus timeline: a capable quantum computer might arrive around 2030. Many in our industry hear that and think, "Great, two more bull cycles. We'll deal with it then."

This is a dangerously naive, and wrong, assumption for two reasons.

First: the "Harvest Now, Decrypt Later" (HNDL) attack. This is not a future threat; it is happening right now. Malicious state actors are recording the entire, public history of the Bitcoin and Ethereum blockchains. They are storing this data, waiting for the day their quantum computer is ready. They don't need to break it today. They just need to copy it. Every transaction you've ever made, every wallet you've ever funded, is being filed away for future draining. The 2030 date is not a deadline; it's a "go-live" date for theft. The vulnerability is now.

Second: the 2030 date itself is based on a linear view of progress. And we are no longer on a linear path.

The conference theme was Q+AI. And AI is the ultimate force multiplier. As I argued on my panel, we are living in the age of "Neven's Law," a term coined by Google's quantum AI chief Hartmut Neven. He observed that quantum computing power is advancing at a doubly exponential rate. It's not just 2, 4, 8, 16. It's 2, 4, 16, 256. It's a pace where, as Neven put it, "it looks like nothing is happening… and then whoops, suddenly you're in a different world".

AI is the engine of this new law. It's being used to solve the biggest engineering hurdles in quantum—optimizing qubit control, designing novel algorithms, and, most critically, creating the quantum error correction needed for stable, large-scale machines.

This is why experts like Michele Mosca of the Global Risk Institute have been warning that a 5-year timeline is not unrealistic. His "Mosca's Theorem" should be the guiding principle for every crypto investor: If the time you need your data to be secure (X) plus the time it takes to migrate your systems (Y) is greater than the time until Q-day (Z), you are already insecure.

For crypto, X is "forever" and Y is "many years." We are deep in the vulnerability window.

As an industry, we need to wake up. For VCs, funding a new L1 that isn't post-quantum secure is risky considering a 5 year timeline. For founders, building on this vulnerable foundation is myopic. And for crypto natives, "HODLing" is a prayer, not a strategy, if your keys can be calculated and your assets seized.

This is an identity and security crisis at its most fundamental level. We must demand crypto-agility, fund and build on actually quantum-resistant foundations, and stop treating this existential threat as someone else's problem. It's our problem. And the timer is ticking.

The opinions I expressed in this article are my own and not those of Blockpass.

Hans Lombardo

Hans Lombardo is President and Co-founder of Blockpass.