Web Analytics
cryptonews
2026-05-21 09:36:35

Bitcoin News: Quantum Countdown, The Data Behind the ‘20% Vulnerable’ Bitcoin Supply

Bitcoin News: New Glassnode data puts 4.12 million BTC at quantum risk from behavioral factors alone, address reuse, partial spending, and custody practices, more than double the 1.92 million BTC exposed by Bitcoin’s older script architecture. Combined, the two categories cover 30.2% of all issued Bitcoin, but the more urgent finding is this: the dominant source of today’s Bitcoin quantum risk is not legacy code. It is how holders manage their keys. Source: Glassnode on X Discover: The best crypto to diversify your portfolio with Bitcoin News: Two Categories of Exposure. Why Structural and Operational Risk Are Not the Same Thing Glassnode splits quantum-exposed supply into two distinct buckets, and conflating them produces exactly the kind of vague, unhelpful headline that obscures where the real risk is concentrated. Structural exposure covers outputs where the public key appears on-chain by design, baked into the protocol itself, not the result of user behavior. The primary offenders are Pay-to-Public-Key (P2PK) outputs, the script type used in Bitcoin’s earliest blocks, where the public key is embedded directly in the UTXO with no hash layer at all. Also included: bare multisig outputs and, more recently, Pay-to-Taproot (P2TR) outputs, which expose the public key at rest as part of their design. Glassnode estimates structural exposure at 1.92 million BTC. Source: Glassnode Operational exposure is a different problem. Address types like Pay-to-Public-Key-Hash (P2PKH) and Pay-to-Witness-Public-Key-Hash (P2WPKH) do not expose public keys by default; they hide them behind cryptographic hash functions (SHA-256 and RIPEMD-160) that are considered quantum-resistant under current models. A quantum computer running Shor’s Algorithm can derive a private key from a known public key in polynomial time using ECDSA’s elliptic curve structure. But it cannot reverse a hash to discover the public key in the first place. The hash layer is a genuine protection, until it isn’t. The protection breaks the moment a holder spends from a P2PKH or P2WPKH address. Spending requires broadcasting a transaction that includes the public key in the signature, and once that transaction is confirmed on the blockchain, the public key is permanently on-chain. If that address then receives additional funds, address reuse, those funds are now exposed in exactly the same way as a P2PK output. The hash layer protected the coins until the address was spent from. After that, it protects nothing for any remaining or subsequent balance. Glassnode puts operationally exposed supply at 4.12 million BTC, 2.1 times the structural figure. The firm’s conclusion is direct: “The main insight is that most current at-rest exposure is not simply a legacy script-design problem, it is a key- and address-management problem.” Discover: The best pre-launch token sales The post Bitcoin News: Quantum Countdown, The Data Behind the ‘20% Vulnerable’ Bitcoin Supply appeared first on Cryptonews .

Crypto 뉴스 레터 받기
면책 조항 읽기 : 본 웹 사이트, 하이퍼 링크 사이트, 관련 응용 프로그램, 포럼, 블로그, 소셜 미디어 계정 및 기타 플랫폼 (이하 "사이트")에 제공된 모든 콘텐츠는 제 3 자 출처에서 구입 한 일반적인 정보 용입니다. 우리는 정확성과 업데이트 성을 포함하여 우리의 콘텐츠와 관련하여 어떠한 종류의 보증도하지 않습니다. 우리가 제공하는 컨텐츠의 어떤 부분도 금융 조언, 법률 자문 또는 기타 용도에 대한 귀하의 특정 신뢰를위한 다른 형태의 조언을 구성하지 않습니다. 당사 콘텐츠의 사용 또는 의존은 전적으로 귀하의 책임과 재량에 달려 있습니다. 당신은 그들에게 의존하기 전에 우리 자신의 연구를 수행하고, 검토하고, 분석하고, 검증해야합니다. 거래는 큰 손실로 이어질 수있는 매우 위험한 활동이므로 결정을 내리기 전에 재무 고문에게 문의하십시오. 본 사이트의 어떠한 콘텐츠도 모집 또는 제공을 목적으로하지 않습니다.