Back

Quantum Computing and Bitcoin: Separating Hype From Reality

Glenn Cameron

Glenn Cameron | Global Head, Onramp Institutional

Feb 17, 2026

Quantum Computing and Bitcoin: Separating Hype From Reality

Why most quantum computing headlines are misleading, what the actual numbers look like, how to evaluate real progress, and why the market keeps overreacting to a threat that is real but distant.

Every few months, a quantum computing headline sends Bitcoin markets into a brief spiral. A new chip is announced. A qubit count is touted. A portfolio strategist reallocates. And for a few days, "quantum computing Bitcoin" trends on social media while prices dip on volume driven almost entirely by people who could not explain the difference between a physical qubit and a logical qubit.

That distinction, boring as it sounds, is the single most important thing to understand about the quantum threat to Bitcoin. It is also the distinction that headlines consistently ignore, because the misleading number is always the bigger number, and bigger numbers make better stories.

Physical Qubits vs. Logical Qubits: The Number That Matters

If you remember only one thing from this article, make it this: Bitcoin's cryptography cares about logical qubits, not physical qubits. Headlines almost always report physical qubits.

Physical qubits are the raw hardware units in a quantum computer. They are noisy, fragile, and error-prone. Heat, electromagnetic interference, imperfect control pulses, and even observation introduce errors that compound quickly. A computation that requires thousands of sequential steps will fail long before it finishes if the errors are not corrected.

Logical qubits are built from many physical qubits through error correction. They are the reliable units that can actually sustain long computations. The conversion rate is brutal: depending on hardware and error rates, one logical qubit can require 100 to 1,000 or more physical qubits.

When a headline announces "1,500 qubits," it means physical qubits. That is impressive engineering. It is also not what Bitcoin cares about. The question is: how many logical qubits can the machine run, at what logical error rate, for how long?

As of early 2026, the most advanced public demonstrations have achieved roughly 24 to 28 logical qubits in certain experiments. Leading systems operate in what quantum computing researcher John Preskill calls the "Noisy Intermediate-Scale Quantum" (NISQ) era, with circuit depths (the number of sequential reliable operations) of around 65. These are the numbers that matter, and they are nowhere near what would be needed to threaten Bitcoin.

Breaking Bitcoin's 256-bit elliptic curve cryptography would require at least 2,330 logical qubits at the theoretical minimum, with more detailed estimates suggesting roughly 6,000 logical qubits and over 100 million Toffoli gates per key. In terms of physical hardware, that translates to approximately 9.4 million physical qubits under common fault-tolerant assumptions.

The comparison is stark: roughly 24 to 28 logical qubits demonstrated in public experiments vs. approximately 6,000 needed in a prominent estimate. This is not a gap that closes quietly. It is the difference between a paper airplane flying and a 747 crossing the Atlantic. Same verb. Entirely different reality.

Why "More Qubits" Does Not Mean "More Dangerous"

There is a persistent assumption in media coverage that quantum computing scales linearly: more qubits equals more capability equals closer to breaking Bitcoin. This is wrong in a way that matters.

Adding physical qubits to a quantum computer does not automatically produce more logical qubits. If the error rates are too high, adding more hardware simply adds more noise. The computation turns to randomness before it can finish anything useful. You spend enormous resources just to buy reliability, not capability.

The key milestone researchers track is called "below threshold" error correction, where adding more error correction overhead actually makes the logical qubit more reliable rather than less. There has been real progress here. Google's Willow chip demonstrated "exponential error reduction" in 2025, proving that in their architecture, adding more qubits can increase stability. This was a genuine achievement.

But benchmark wins on carefully designed experiments do not translate directly into cryptographic capability. No quantum computer has outperformed a classical supercomputer on any commercially relevant application. The "wins" are demonstrations on contrived tasks that showcase quantum properties, not practical workloads that map to breaking real-world encryption.

This is an uncomfortable truth that the quantum computing industry itself acknowledges. After years of investment and hype, no quantum computer has delivered a commercially useful result. The entire industry runs on belief in future potential, not current returns. Total historical investment has reached approximately $60 billion, and no profitable quantum computing business currently exists. This does not mean quantum computing is a fantasy. It means the gap between current capability and useful capability remains large.

The Neven's Law Trap

You will sometimes see claims that quantum capability is improving at a "doubly exponential" rate, a reference to what is informally called Neven's law. The implication is that the threat must be imminent because the curve is so steep.

The problem is that these projections are based on expectations about physical qubit scaling and hardware improvements, not on observed long-run scaling of logical qubits performing cryptographically meaningful work. Physical qubit counts have risen and hardware error rates have improved. But more physical qubits does not automatically become more logical qubits running deep fault-tolerant circuits. The translation from one to the other is where the hard engineering lives, and it is where the hype tends to get ahead of the reality.

Until we see sustained, repeatable growth in logical qubit counts performing non-trivial computations, treating doubly exponential projections as inevitable timelines is technological optimism, not observation.

What Investors Should Actually Track

If you want to avoid being misled by headlines, use an evidence ladder. These are the milestones that would actually signal meaningful progress toward a cryptographically relevant quantum computer:

Repeatable fault-tolerant wins on tasks people care about. Not contrived benchmark demonstrations. Commercially useful results in fields like chemistry, materials science, or drug discovery. When quantum computers start doing things classical computers cannot do for real-world applications, the timeline to cryptographic capability shortens meaningfully. This is Stage 1 in the Ark Invest framework.

Sustained growth in logical qubits, not just physical. The number that matters is growing logical qubit counts demonstrated in peer-reviewed experiments, not marketing announcements about physical qubit totals.

Demonstrations that map to cryptography. Credible scaling toward the elliptic curve discrete logarithm problem (ECDLP) or related workloads. This means not just more qubits, but the ability to run the deep, error-corrected circuits needed for Shor's algorithm at meaningful scale.

Converging timelines across academia and industry. Right now, expert predictions range from "soon-ish" to "decades." When those predictions start converging, it signals that the engineering path is becoming clearer. Currently, Google, IBM, Microsoft, and NIST share a consensus target in the mid-2030s for commercially useful quantum computing, still well below the threshold for cryptographic attacks on Bitcoin.

Quantum computing becomes profitable. This may sound disconnected from security, but it matters. When quantum computing companies start making money from useful applications, the industry moves from speculative research to engineering at scale. That is when capability growth accelerates. We are not there yet.

Why the Market Overreacts

The behavioral psychology behind quantum-driven Bitcoin sell-offs is well understood. Three biases dominate.

Loss aversion causes holders to feel the pain of a potential loss more intensely than the pleasure of an equivalent gain. Selling "just in case" feels rational, even when the probability of the feared event is extremely low.

Herding amplifies the effect. When other people sell, it feels safer to sell too than to be the last calm person holding. Social proof overrides individual analysis.

Availability bias makes vivid, dramatic stories feel more probable than they are. A headline about quantum computing breaking encryption is more emotionally available than a sober assessment of logical qubit counts and error correction thresholds.

These biases are compounded by an incentives problem on both sides of the debate. Quantum labs and vendors do not raise money by announcing slow, difficult progress on error correction. The media does not generate engagement with nuanced technical assessments. And some Bitcoiners get rewarded for dismissing the threat entirely, because certainty sells even when it is not well-researched certainty. Both the panic and the dismissal distort decision-making.

There is also a common misconception that a single secretive actor will build a CRQC and use it to quietly drain Bitcoin wallets. The Ark Invest/Unchained report offers a useful correction: the history of AI is instructive. The idea that one entity invented an all-powerful AI capability that had massive consequences seems silly now that AI is everywhere, advancing on multiple fronts across countless companies. If quantum computing ever advances to the point of breaking Bitcoin keys, it will already have become a sprawling global industry. Cloud services that democratize access to quantum computing already exist today. The ability to attack Bitcoin, if it ever materializes, would be widespread, not concentrated in a single pair of hands.

The grown-up question is not "panic or ignore?" It is: what would we do, and how would we do it smoothly, if the risk moves from theoretical to practical?

The Cost of Quantum Attack

Even when quantum computers eventually reach the capability to break Bitcoin keys, the economics of attack will matter. Running a CRQC is not like sending an email. These are among the most advanced machines ever built, requiring cryogenic cooling, precise control electronics, and enormous physical infrastructure. The Homeland Security Operational Analysis Center estimated in 2023 that the electricity cost alone for breaking a single public key would be approximately $100,000.

That cost will decline over time as quantum technology matures, just as all computing costs decline. But in the early stages of CRQC capability, an attacker would face a direct cost-benefit calculation: is the value of the Bitcoin at a given address worth the expense and time required to break the key? For a P2PK address holding 50 BTC, the answer may be yes. For addresses holding smaller amounts, the economics may not justify the attack, at least not initially.

This cost structure reinforces the gradual nature of the threat. Quantum theft, even if it becomes technically possible, will be constrained by economics in its early stages and will target the highest-value exposed addresses first.

The Sane Stance

The honest assessment of quantum computing's threat to Bitcoin in early 2026 is this: the threat is theoretically real, practically distant, and operationally manageable.

Current quantum computers are not close to breaking Bitcoin. The gap between demonstrated capability and the threshold for cryptographic attacks is measured in orders of magnitude. The timeline for a cryptographically relevant quantum computer is measured in decades by most credible estimates. The mathematical tools for defense already exist and are being standardized. And the Bitcoin ecosystem is actively working on implementation, even though no consensus has been reached on the specific path forward.

The risk is not that quantum computing surprises Bitcoin overnight. The risk is that the transition to quantum-resistant cryptography requires coordination, time, and action from millions of holders, and that Bitcoin's decentralized governance model makes that coordination slow. The preparation should begin now even though the threat is not imminent.

For holders, the practical stance is straightforward: plan now, do not panic now. Track real milestones. Ignore headlines about physical qubit counts. Keep your custody infrastructure clean. And choose a setup that can adapt when the cryptographic landscape eventually changes, because it will change, just not tomorrow.

The quantum era will eventually require every Bitcoin holder to migrate to new address formats. The question is whether that migration is coordinated and smooth or rushed and chaotic. Onramp's multi-institution custody is built to manage key migrations, address upgrades, and UTXO consolidation across three independent institutions, so the transition happens on your behalf. Schedule a consultation to understand the architecture, or sign up here to get started.

Related Reading:

Is Bitcoin Safe From Quantum Computing? What Holders Need to Know

Which Bitcoin Is Vulnerable to Quantum Computing? Address Types, Exposure Tiers, and What You Can Do

How Bitcoin Can Defend Against Quantum Computing: BIP-360, Post-Quantum Cryptography, and the Road Ahead

What Is Bitcoin Custody? A Complete Guide for Long-Term Holders

Not Your Keys, Not Your Coins: What It Really Means for Bitcoin Holders

What Happens to My Bitcoin if Onramp Goes Away?

Multi-Institution Custody

Are you ready?

The best security available for your Bitcoin without the technical burden. It’s time to upgrade.

Sign up