Close Menu
FSNN | Free Speech News NetworkFSNN | Free Speech News Network
  • Home
  • News
    • Politics
    • Legal & Courts
    • Tech & Big Tech
    • Campus & Education
    • Media & Culture
    • Global Free Speech
  • Opinions
    • Debates
  • Video/Live
  • Community
  • Freedom Index
  • About
    • Mission
    • Contact
    • Support
Trending

Bitcoin Treasury Sell-Off Could Signal Deeper Capitulation Coming: Analyst

2 minutes ago

Fed’s Barr Says Stablecoins Need Tighter Controls to Fight Money Laundering

4 minutes ago

Copyright Industry Continues Its Efforts To Ban VPNs

31 minutes ago
Facebook X (Twitter) Instagram
Facebook X (Twitter) Discord Telegram
FSNN | Free Speech News NetworkFSNN | Free Speech News Network
Market Data Newsletter
Wednesday, April 1
  • Home
  • News
    • Politics
    • Legal & Courts
    • Tech & Big Tech
    • Campus & Education
    • Media & Culture
    • Global Free Speech
  • Opinions
    • Debates
  • Video/Live
  • Community
  • Freedom Index
  • About
    • Mission
    • Contact
    • Support
FSNN | Free Speech News NetworkFSNN | Free Speech News Network
Home»Cryptocurrency & Free Speech Finance»BTQ’s Bitcoin Quantum Testnet and “Old BTC” Risk, Explained
Cryptocurrency & Free Speech Finance

BTQ’s Bitcoin Quantum Testnet and “Old BTC” Risk, Explained

News RoomBy News Room2 months agoNo Comments7 Mins Read1,252 Views
Share Facebook Twitter Pinterest Copy Link LinkedIn Tumblr Email VKontakte Telegram
BTQ’s Bitcoin Quantum Testnet and “Old BTC” Risk, Explained
Share
Facebook Twitter Pinterest Email Copy Link

Listen to the article

0:00
0:00

Key Takeaways

Playback Speed

Select a Voice

Key takeaways

  • Bitcoin’s quantum risk centers on exposed public keys and signature security.

  • BTQ’s testnet explores post-quantum signatures in a Bitcoin-like environment.

  • Post-quantum signatures significantly increase transaction size and block space demands.

  • “Old BTC risk” is concentrated in legacy output types and address reuse patterns.

BTQ Technologies said it had launched a Bitcoin Quantum testnet on Jan. 12, 2026, a Bitcoin-like network designed to trial post-quantum signatures without touching Bitcoin mainnet governance.

The idea is that BTQ would replace Bitcoin’s current signature scheme with ML-DSA, the module-lattice signature standard formalized by the National Institute of Standards and Technology (NIST) as Federal Information Processing Standard (FIPS) 204, for post-quantum security assumptions.

It is worth remembering that in most Bitcoin quantum-threat models, the key precondition is public-key exposure. If a public key is already visible onchain, a sufficiently capable future quantum computer could, in theory, attempt to recover the corresponding private key offline.

Did you know? BTQ Technologies is a research-focused firm working on post-quantum cryptography and blockchain security. Its Bitcoin Quantum testnet is designed to study how quantum-resistant signatures behave in a Bitcoin-like system.

What quantum changes?

Most Bitcoin quantum-risk discussions focus on digital signatures, not on Bitcoin’s coin supply or the idea that a quantum computer could magically guess random wallets.

The specific concern is that a cryptographically relevant quantum computer (CRQC) could run Shor’s algorithm to solve the discrete logarithm problem efficiently enough to derive a private key from a known public key, undermining both the Elliptic Curve Digital Signature Algorithm (ECDSA) and Schnorr-based signing.

Chaincode Labs frames this as the dominant quantum threat model for Bitcoin because it could enable unauthorized spending by producing valid signatures.

The risk can be separated into long-range exposure, where public keys are already visible onchain for some older script types or due to reuse, and short-range exposure, where public keys are revealed when a transaction is broadcast and awaits confirmation, creating a narrow time window.

Of course, no quantum computer today poses an immediate risk to Bitcoin, and mining-related impacts should be treated as a separate and more constrained discussion compared with signature breakage.

Did you know? Shor’s algorithm already exists as mathematics, but it requires a large, fault-tolerant quantum computer to run. If such machines are built, they could be used to derive private keys from exposed public keys.

What BTQ built and why it’s interesting

BTQ’s Bitcoin Quantum testnet is essentially a Bitcoin Core-based fork that swaps out one of Bitcoin’s most important primitives, signatures.

In its announcement, BTQ said the testnet replaces ECDSA with ML-DSA, the module-lattice signature scheme standardized by the NIST as FIPS 204 for post-quantum digital signatures.

This change forces a set of engineering trade-offs. ML-DSA signatures are roughly 38-72 times larger than ECDSA, so the testnet raises the block size limit to 64 mebibytes (MiB) to make room for the additional transaction data.

The company also treats the network as a full lifecycle proving ground, supporting wallet creation, transaction signing and verification, and mining, along with basic infrastructure such as a block explorer and mining pool.

In short, the testnet’s practical value is that it turns post-quantum Bitcoin into a performance and coordination experiment.

Where old BTC risk concentrates

When analysts talk about “old BTC risk” in a post-quantum context, they are usually referring to public keys that are already exposed onchain.

A future CRQC capable of running Shor’s algorithm could, in theory, use those public keys to derive the corresponding private keys and then produce valid spends.

There are three output types immediately vulnerable to long-range attacks, specifically because they place elliptic-curve public keys directly in the locking script (ScriptPubKey): Pay-to-Public-Key (P2PK), Pay-to-Multi-Signature (P2MS) and Pay-to-Taproot (P2TR).

The distribution is uneven:

  • P2PK is a tiny share of today’s unspent transaction outputs (UTXOs), around 0.025%, but it locks a disproportionate share of BTC value, about 8.68% or 1,720,747 Bitcoin (BTC), mostly dormant Satoshi-era coins.

  • P2MS accounts for about 1.037% of UTXOs, but reports estimate that it secures only around 57 BTC.

  • P2TR is common by count, around 32.5% of UTXOs, yet small by value in the same snapshot, about 0.74% or 146,715 BTC. Its exposure is tied to Taproot’s key-path design, where a tweaked public key is visible onchain.

Address reuse can also turn what would otherwise be “spend-time” exposure into long-range exposure because once a public key appears onchain, it remains visible.

BTQ’s own messaging uses this exposed-key framing to argue that the potentially affected pool is large. It cites 6.26 million BTC as exposed, which is part of why the company says testing post-quantum signatures in a Bitcoin-like environment is worth doing now.

What’s next for Bitcoin?

In the near term, the most concrete work is observability and preparedness.

As explored, the signature threat model is driven by public-key exposure. This is why discussions often center on how Bitcoin’s existing wallet and scripting practices either reveal public keys early, as with some legacy script types, or reduce exposure by default, as with common wallet behavior that avoids reuse.

“Old BTC risk” is therefore largely a property of historical output types and reuse patterns and not something that suddenly applies evenly to every coin.

The second, more practical constraint is capacity. Even if a post-quantum migration were socially agreed upon, it would still be a blockspace and coordination problem.

River’s explainer summarizes academic estimates showing how sensitive timelines are to assumptions. A theoretical scenario in which all transactions are migrations can compress timelines dramatically, while more realistic blockspace allocation stretches a transition into years, even before accounting for governance and adoption.

BTQ’s testnet fits into that bucket. It lets engineers observe the operational costs of post-quantum signatures, including larger data sizes and different limits, in a Bitcoin-like setting, without claiming that Bitcoin is imminently breakable.

Did you know? The biggest factor holding quantum computers back is noise, or errors. Today’s qubits make mistakes frequently, so fault-tolerant error correction is required. This means using many physical qubits to produce a small number of reliable “logical” qubits before running the long computations needed to break real-world cryptography.

What Bitcoin-level mitigation might look like

At the protocol level, quantum preparedness is often discussed as a sequenced path.

Post-quantum signature schemes tend to be much larger than elliptic-curve signatures, which have knock-on effects for transaction size, bandwidth and verification costs; the same kinds of trade-offs BTQ is surfacing by experimenting with ML-DSA.

That is why some Bitcoin proposals focus first on reducing the most structural exposure within existing script designs, without committing the network to a specific post-quantum signature algorithm immediately.

A recent example is Bitcoin Improvement Proposal (BIP) 360, which proposes a new output type called Pay-to-Tapscript-Hash (P2TSH). P2TSH is nearly identical to Taproot but removes the key-path spend, the path that relies on elliptic-curve signatures, leaving a tapscript-native route that can be used in ways intended to avoid that key-path dependency.

Related ideas have circulated on the Bitcoin developer mailing list under the broader “hash-only” or “script-spend” Taproot family, often discussed as Pay-to-Quantum-Resistant-Hash (P2QRH)-style constructions. These proposals again aim to reuse Taproot’s structure while skipping the quantum-vulnerable key spend.

Importantly, none of this is settled. The main point is that Bitcoin’s likely response, if it moves, is debated as an incremental coordination problem that balances conservatism, compatibility and the cost of changing the transaction format.

The BTQ testnet is quite revealing

BTQ’s Bitcoin Quantum testnet does not settle the quantum debate, but it does make two points harder to ignore.

First, most credible threat models focus on where public keys are already exposed, which is why “old coin” patterns keep appearing in analyses.

Second, post-quantum Bitcoin is an engineering and coordination problem. BTQ Technologies’ own design choices, such as moving to ML-DSA and lifting block limits to accommodate much larger signatures, illustrate those trade-offs.

Ultimately, the testnet is a sandbox for measuring costs and constraints and should not be seen as proof that Bitcoin is imminently breakable.

Cointelegraph maintains full editorial independence. The selection, commissioning and publication of Features and Magazine content are not influenced by advertisers, partners or commercial relationships.

Read the full article here

Fact Checker

Verify the accuracy of this article using AI-powered analysis and real-time sources.

Get Your Fact Check Report

Enter your email to receive detailed fact-checking analysis

5 free reports remaining

Continue with Full Access

You've used your 5 free reports. Sign up for unlimited access!

Already have an account? Sign in here

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Telegram Copy Link
News Room
  • Website
  • Facebook
  • X (Twitter)
  • Instagram
  • LinkedIn

The FSNN News Room is the voice of our in-house journalists, editors, and researchers. We deliver timely, unbiased reporting at the crossroads of finance, cryptocurrency, and global politics, providing clear, fact-driven analysis free from agendas.

Related Articles

Cryptocurrency & Free Speech Finance

Bitcoin Treasury Sell-Off Could Signal Deeper Capitulation Coming: Analyst

2 minutes ago
Cryptocurrency & Free Speech Finance

Fed’s Barr Says Stablecoins Need Tighter Controls to Fight Money Laundering

4 minutes ago
Cryptocurrency & Free Speech Finance

Quantum computing could break Bitcoin sooner, says Google

59 minutes ago
Cryptocurrency & Free Speech Finance

Naoris Launches Post-Quantum Blockchain as Quantum Risks Grow

1 hour ago
Cryptocurrency & Free Speech Finance

Cambodia Extradites Alleged Huione Crypto Scam Kingpin to China: Report

1 hour ago
Cryptocurrency & Free Speech Finance

Governance is the real Layer 1

2 hours ago
Add A Comment

Comments are closed.

Editors Picks

Fed’s Barr Says Stablecoins Need Tighter Controls to Fight Money Laundering

4 minutes ago

Copyright Industry Continues Its Efforts To Ban VPNs

31 minutes ago

Conspiracy Lawsuit Against National Students for Justice in Palestine Parent Organization Can Go Forward

34 minutes ago

Attacks on journalists in focus after CPJ and partners’ joint mission to Serbia

45 minutes ago
Latest Posts

Quantum computing could break Bitcoin sooner, says Google

59 minutes ago

Naoris Launches Post-Quantum Blockchain as Quantum Risks Grow

1 hour ago

Cambodia Extradites Alleged Huione Crypto Scam Kingpin to China: Report

1 hour ago

Subscribe to News

Get the latest news and updates directly to your inbox.

At FSNN – Free Speech News Network, we deliver unfiltered reporting and in-depth analysis on the stories that matter most. From breaking headlines to global perspectives, our mission is to keep you informed, empowered, and connected.

FSNN.net is owned and operated by GlobalBoost Media
, an independent media organization dedicated to advancing transparency, free expression, and factual journalism across the digital landscape.

Facebook X (Twitter) Discord Telegram
Latest News

Bitcoin Treasury Sell-Off Could Signal Deeper Capitulation Coming: Analyst

2 minutes ago

Fed’s Barr Says Stablecoins Need Tighter Controls to Fight Money Laundering

4 minutes ago

Copyright Industry Continues Its Efforts To Ban VPNs

31 minutes ago

Subscribe to Updates

Get the latest news and updates directly to your inbox.

© 2026 GlobalBoost Media. All Rights Reserved.
  • Privacy Policy
  • Terms of Service
  • Our Authors
  • Contact

Type above and press Enter to search. Press Esc to cancel.

🍪

Cookies

We and our selected partners wish to use cookies to collect information about you for functional purposes and statistical marketing. You may not give us your consent for certain purposes by selecting an option and you can withdraw your consent at any time via the cookie icon.

Cookie Preferences

Manage Cookies

Cookies are small text that can be used by websites to make the user experience more efficient. The law states that we may store cookies on your device if they are strictly necessary for the operation of this site. For all other types of cookies, we need your permission. This site uses various types of cookies. Some cookies are placed by third party services that appear on our pages.

Your permission applies to the following domains:

  • https://fsnn.net
Necessary
Necessary cookies help make a website usable by enabling basic functions like page navigation and access to secure areas of the website. The website cannot function properly without these cookies.
Statistic
Statistic cookies help website owners to understand how visitors interact with websites by collecting and reporting information anonymously.
Preferences
Preference cookies enable a website to remember information that changes the way the website behaves or looks, like your preferred language or the region that you are in.
Marketing
Marketing cookies are used to track visitors across websites. The intention is to display ads that are relevant and engaging for the individual user and thereby more valuable for publishers and third party advertisers.