There are two ways a cryptographically relevant quantum computer could steal Bitcoin.
The first way is a just-in-time mempool attack. Any coin broadcast in the mempool is immediately at risk, since its public key is exposed. However, this requires a quantum computer that can derive a private key from a public key in less than the time it takes the transaction to be confirmed (~10 mins).
The second, more likely way, is a harvest-now-decrypt-later attack. Adversaries can collect certain public keys today and crack them once they have a big enough quantum processor over a longer period of time. Any addresses that reuse keys or use certain address formats become vulnerable this way. For a deep dive on which address types are harvest-now-decrypt-later vulnerable, see our post here: https://blog.projecteleven.com/posts/quantum-vulnerability-of-bitcoin-addresses
As part of our efforts to educate and inform people about the quantum vulnerabilities of Bitcoin, today we’re releasing a practical tool: The Quantum Vulnerable Bitcoin Tracker Bot.
Introducing The Quantum Vulnerable Bitcoin Tracker Bot, or “QuanBot” for short.
QuanBot monitors live transactions on X. It:
- Flags any send to a quantum-vulnerable address.
- Alerts senders if their transaction makes their own address vulnerable (reuse or partial spend).
- Posts real-time updates so you can track big movements that matter.
No more guessing which coins are exposed, or how real this problem is. Get automated insights and alerts before quantum threats arrive. And no scare tactics. Just clear info and a real tool to keep your Bitcoin safe.
Follow QuanBot today to stay informed: https://x.com/quantum_tracker