As the pace of quantum computing innovation outstrips traditional expectations, a fundamental issue long lurking in the margins of cryptocurrency discourse is now taking center stage. In March 2026, Litecoin founder Charlie Lee issued a major warning: if quantum computing achieves a breakthrough, the roughly 1.1 million bitcoins held by Bitcoin’s anonymous creator Satoshi Nakamoto could become the first target for hackers. This warning isn’t just about technical vulnerabilities—it strikes at the heart of Bitcoin’s decentralized ethos: when an immutable ledger faces irreversible technological disruption, do we have the right to intervene to protect assets? This article dives deep into the technical roots, data scale, community divisions, and future scenarios that could define Bitcoin’s next decade.
Event Overview
On March 13, Litecoin founder Charlie Lee explained in an interview that during Satoshi’s era, Bitcoin primarily used Pay-to-Public-Key (P2PK) transaction scripts. These early bitcoins have much weaker cryptographic protection compared to modern wallet standards. Once quantum computers mature, attackers will prioritize cracking addresses that directly expose their public keys.
Lee’s warning pushed a long-standing hypothetical debate in tech circles into the mainstream: if Satoshi is deceased or has permanently lost access to his wallets, these coins can never be migrated to quantum-resistant wallets. As a result, they become an open treasure trove for quantum hackers. If stolen and dumped onto the market, they could devastate both Bitcoin’s price and its trust system.
The Technical Root: P2PK Address Vulnerabilities
To understand the origin of this risk, we need to revisit Bitcoin’s early days. From 2009 to early 2010, Bitcoin transactions mainly used the P2PK format, which directly includes the recipient’s full public key in the transaction output.
Later, the P2PKH format became standard. P2PKH only exposes the hash of the public key, and the actual public key is revealed only briefly when the wallet owner initiates a transaction and signs it on-chain. This design adds a time buffer for funds—attackers must crack the key in the short window between transaction broadcast and block confirmation, making the task exponentially harder.
By contrast, P2PK addresses from Satoshi’s era have their public keys permanently etched into the blockchain, essentially providing quantum attackers with an unlimited timeframe to break the code.
Data Breakdown: How Big Is the Risk?
According to a joint whitepaper by Ark Invest and Unchained published in March 2026, while most bitcoin supply has gained better protection through address format upgrades, a significant portion of existing assets remains exposed to long-term quantum computing risk.
| Address Type & Risk Category | Amount (BTC) | Risk Description |
|---|---|---|
| Early P2PK Address Assets | ~1.7 million | Public keys fully exposed; highest quantum attack risk; mostly early miner rewards and Satoshi’s holdings. |
| Assets from Address Reuse | ~5 million | Repeated use exposes public keys, theoretically vulnerable to retrospective cracking. |
| P2TR Address Assets | ~200,000 | Taproot format; theoretical vulnerabilities in key path. |
| Relatively Safe Assets | ~19.5 million | Mainly P2PKH, P2SH, and other modern formats that don’t expose public keys. |
Source: Ark Invest / Unchained Whitepaper
As shown above, the roughly 1.7 million bitcoins in P2PK addresses at highest risk are the focal point of this debate. At current prices, this represents over $120 billion in value.
As of March 16, 2026, Gate market data shows Bitcoin (BTC) is priced at $72,588.8, with 24h trading volume at $549.17M and market cap at $1.43T. Satoshi’s 1.1 million bitcoins alone are worth about $79.85 billion. If hackers were to dump this volume all at once, the impact on the market would be enormous.
Community Debate: Freeze or Let It Be?
This looming threat has sparked sharp divisions within the crypto community, with debates extending from technical feasibility to political philosophy.
Tech Optimists: The Threat Is Distant, No Need to Worry Yet
Bitcoin core developers like Adam Back and Jameson Lopp have repeatedly emphasized that current quantum computers are far from the scale needed to crack Bitcoin’s ECC encryption. The Ark Invest report notes that breaking Bitcoin would require at least 2,330 logical qubits, while current technology is still in the hundreds. The real threat may not emerge until the mid-2030s. Lopp also cautions that even if action starts now, migrating the entire Bitcoin network to quantum-resistant standards could easily take 5 to 10 years. Short-term panic isn’t necessary, but long-term research and preparation are essential.
Interventionists: Inactive Assets Must Be Frozen
Represented by Michael Saylor and Jameson Lopp, this camp argues that the network must upgrade in response to quantum threats. Saylor proposes a "quantum leap" scenario: after a network upgrade, active coins migrate to secure outputs, while lost or abandoned coins (including Satoshi’s) are frozen. This would reduce circulating supply and strengthen Bitcoin’s value. Lopp’s QBIP proposal sets migration deadlines; funds not moved by the cutoff can no longer be spent, serving as a filter against quantum theft. Supporters see this as a necessary evil to prevent 20%-30% of supply from being unlocked by hackers and undermining Bitcoin’s fixed supply narrative.
Libertarians: Private Property Is Sacred and Untouchable
This faction firmly opposes any form of freezing. They believe nodes have no right to confiscate anyone’s bitcoins, even those belonging to deceased individuals. It’s impossible to distinguish lost coins from simply old ones at a societal level, and any forced freezing could lead to highly contentious chain splits. Extremist Pierre Rochard even argues these coins should be up for grabs—people can use quantum computers to mine old coins, which is part of Bitcoin’s freedom.
Market Gamblers: OGs Will Buy, Hackers Won’t Crash the Market
Analyst Willy Woo offers another perspective: if quantum attacks do occur, many long-term holders will buy during the crash, allowing the network to survive. Some believe hackers would rationally sell slowly or short the market using futures, rather than dump everything and destroy value. BitMEX Research suggests zero-knowledge proofs could let real owners claim assets, but this doesn’t work for pre-seed phrase era P2PK addresses.
Narrative Dynamics: The Threat Isn’t Here Yet, But Its Impact Is
Interestingly, even though the technical threat is still distant, its narrative has already influenced market behavior. Jefferies strategist Christopher Wood removed Bitcoin allocations from his portfolio earlier this year, and Kevin O’Leary noted that institutions are limiting exposure because of this risk. This shows the real impact of the quantum threat isn’t just technological—it’s about how market participants perceive and price it.
A deeper narrative also questions whether Satoshi’s design was intentional. BIP-360 co-author Hunter Beast points out that the 2009 original client defaulted to P2PK addresses for mining rewards, and Satoshi was likely aware of Shor’s algorithm. Did he deliberately ensure that lost early coins would eventually return to circulation? This speculation adds a philosophical dimension to what is otherwise a cold technical debate.
Future Scenarios: Four Possible Outcomes
Facing this dilemma, Bitcoin’s future could unfold along several paths:
| Scenario | Trigger Condition | Core Dynamics |
|---|---|---|
| Scenario 1: Gradual Soft Fork Upgrade | Community reaches fragile consensus and prepares before the threat materializes. | Through BIP-360 or similar proposals, a migration window lasting years is set. Most active supply moves to quantum-resistant addresses, while a minority of P2PK coins (including Satoshi’s) are deemed permanently lost, effectively deflationary. This process is controversial but avoids network-splitting hard forks. |
| Scenario 2: Contentious Hard Fork | Interventionists and libertarians can’t compromise, and freezing proposals are forced through. | The network splits into two chains: one (BTC-A) freezes old address assets for security and supply certainty; the other (BTC-B) sticks to fundamentalism, allowing any coin to be claimed by quantum attacks. Core dev Matt Corallo believes the market will favor the chain with less supply and no quantum sell pressure, eventually producing a single winner. |
| Scenario 3: Quantum Attack and "Code Is Law" | Quantum computing breakthroughs arrive before the community is ready, and attacks occur. | Satoshi’s coins are stolen, massive sell-offs trigger price crashes and a crisis of trust. However, Willy Woo’s scenario of OGs buying the dip may play out, and the network survives after intense turmoil. Some see the attackers as legitimate, others call for rollbacks. The consensus mechanism faces its ultimate test. |
| Scenario 4: Inaction and Long-Term Paralysis | Debate continues, no effective solution gains majority support until the risk becomes imminent. | The quantum threat hangs like a sword of Damocles, leading to persistent risk discounts and holding back institutional capital. Eventually, when an attack actually happens, the market is forced into the chaos of Scenario 3. |
Conclusion
Charlie Lee’s warning is like a stone cast into a lake, with ripples far beyond the tech community. It forces the crypto world to confront a fundamental question: as the cryptographic foundations protecting network security erode with technological progress, how should a decentralized system that claims "code is law" evolve?
Satoshi’s 1.1 million bitcoins are both a monument to Bitcoin’s origin story and a touchstone for testing its governance wisdom. Should we intervene, sacrificing some principles to preserve overall value, or stick to immutable beliefs and let fate be decided by future technological battles? There’s no definitive answer, but this debate will undoubtedly shape Bitcoin’s trajectory for decades to come. Whatever the outcome, this early stress test may be a necessary warm-up for Bitcoin’s long-term survival in a post-quantum world.


