A fresh deep-dive was released by A16z research partner and Georgetown professor Justin Thaler, which pours cold water on breathless quantum panic. He argues that while quantum threats are real, a mismatch between urgency and reality is being demonstrated by the crypto industry.
a16z Research Partner Separates Quantum Hype From Cryptographic Reality
One of crypto’s most misunderstood anxieties the looming threat of quantum computing to blockchains is tackled in a newly circulated research article from Justin Thaler, a research partner at A16z and an associate professor at Georgetown University.
Timelines for a cryptographically relevant quantum computer are being wildly overstated according to Justin Thaler, a Georgetown professor and A16z research partner, who argues that rushed calls for sweeping post-quantum migrations may introduce more risk than protection. Based on publicly known milestones, he asserts that a quantum system capable of breaking real-world cryptography remains well beyond reach, even over the next decade.
A sharp distinction is drawn by Thaler between encryption and digital signatures, two concepts he notes are frequently conflated in online discourse. Encryption remains vulnerable to “harvest now, decrypt later” tactics, where data intercepted today could be cracked by maturing quantum machines years in the future. Consequently, it is argued by Thaler that post-quantum encryption should already be implemented in sectors where long-term confidentiality is essential.
Digital signatures operate on an entirely different timeline. Transactions are authorized by blockchains through the use of signatures rather than the concealment of data. Nothing exists for retroactive decryption, as it is argued by Justin Thaler that vulnerability only arises after a cryptographically relevant quantum computer is physically realized. This distinction, he observes, significantly diminishes the necessity for an immediate cryptographic migration.
Public blockchains such as Bitcoin and Ethereum, which expose transaction data by design, are fundamentally impacted by this distinction. Contrary to some official analyses, it is stressed by Justin Thaler that these networks are not exposed to “harvest-now-decrypt-later” attacks at all. The real quantum risk is identified as future signature forgery, rather than the decryption of past transactions.
Privacy-focused chains represent a different story entirely. Historical activity could be retroactively exposed for networks that encrypt transaction details if elliptic curve cryptography is eventually defeated by quantum computers. For those systems, earlier transitions—or hybrid approaches—may be justified if performance costs remain tolerable.
A unique headache is faced by Bitcoin that stems from governance rather than quantum timelines, according to Justin Thaler. Because any transition to post-quantum signatures would necessitate active user participation, millions of abandoned coins could be left exposed. Determining the fate of those funds may require years of social coordination, irrespective of when quantum machines eventually emerge.
Post-quantum cryptography is not a free lunch, according to a warning from Justin Thaler. Many candidate schemes are noted to involve massive increases in signature size, slower performance, and far more complex implementations. Cautionary tales are offered by history where “quantum-safe” algorithms were later broken by ordinary computers rather than quantum ones.
In fact, it is argued by Justin Thaler that bugs, side-channel attacks, and faulty implementations pose a far more immediate threat to blockchains than quantum computers. The risk of locking networks into fragile systems that may require complete replacement is suggested by Thaler if immature cryptography is rushed into production.
After the research thread was shared publicly by A16z, replies quickly filled with users championing their favorite so-called “quantum-resistant” coins, often without acknowledging the technical trade-offs or the long timelines outlined by Thaler. This response served to highlight his broader point: the conversation surrounding quantum risk is moving at a faster pace than the actual science.
The research was released just as quantum-resistance strategies were being explored by Bitcoin developers, while a dedicated task force was formed in parallel by the Ethereum Foundation to tackle the same concern.



