Futures
Access hundreds of perpetual contracts
TradFi
Gold
One platform for global traditional assets
Options
Hot
Trade European-style vanilla options
Unified Account
Maximize your capital efficiency
Demo Trading
Introduction to Futures Trading
Learn the basics of futures trading
Futures Events
Join events to earn rewards
Demo Trading
Use virtual funds to practice risk-free trading
Launch
CandyDrop
Collect candies to earn airdrops
Launchpool
Quick staking, earn potential new tokens
HODLer Airdrop
Hold GT and get massive airdrops for free
Launchpad
Be early to the next big token project
Alpha Points
Trade on-chain assets and earn airdrops
Futures Points
Earn futures points and claim airdrop rewards
Quantum Concerns and Bitcoin: Analysis of Michael Saylor's Position in the Context of Scientific Debate
The wave of discussions about quantum computers and their potential threat to Bitcoin cryptography has led to a clash of opinions among industry experts. At the center of this debate are two influential figures: MicroStrategy CEO Michael Saylor, who sees the threat as distant—at least a decade away—and Ethereum founder Vitalik Buterin, warning of a more immediate risk. Understanding these differing assessments requires a detailed analysis of both technical realities and current progress in post-quantum cryptography.
Optimistic Viewpoint of Michael Saylor: Why the Quantum Threat Is Not as Near as It Seems
Michael Saylor stated confidently in the Coin Stories podcast that the real threat of quantum computers to Bitcoin is at least a decade away. He bases this opinion on the consensus among leading cybersecurity experts, who agree on the timeline.
Saylor’s main argument is that the issue of quantum computing is not unique to blockchain. If and when such a threat materializes, it will impact all digital systems relying on modern cryptography—banking networks, government information systems, artificial intelligence infrastructure. However, the MicroStrategy executive expresses particular optimism about the crypto industry, claiming that the blockchain community is better prepared to adapt.
Saylor describes the crypto community as “the most advanced cybersecurity community on the planet.” This positions him as a supporter of the thesis that when post-quantum cryptographic standards need to be implemented, the cryptocurrency industry will be at the forefront of adoption. “I believe the crypto community will be the first to recognize the threat, respond to it, and show the way,” he said.
Alternative Perspective: Why Vitalik Buterin Considers the Threat More Urgent
Not all key voices in the crypto industry share Saylor’s moderate optimism. Vitalik Buterin, Ethereum’s founder, takes a noticeably more cautious stance. At the Devconnect conference in Buenos Aires last year, he warned that elliptic curve cryptography could be compromised as early as 2028—two years earlier than Saylor’s timeline.
Buterin’s concern is so significant that the Ethereum Foundation is already actively preparing for a post-quantum scenario. Last week, the organization updated its security roadmap for 2026, including a focus on post-quantum readiness. Moreover, in January of this year, EF announced the formation of a dedicated team working on post-quantum adaptation, with security researcher Justin Drake serving as coordinator. Drake called this initiative “a turning point in Ethereum Foundation’s long-term quantum strategy.”
Buterin recommends that all crypto projects complete their transition to post-quantum cryptography by 2030, creating a four-year buffer from his own threat forecast.
Empirical Data: Not All Agree with Saylor’s Optimism
Saylor’s views on the threat’s remoteness are not universally supported among experts. In 2025, the research organization ISACA conducted a survey of over 2,600 IT risk management and cybersecurity professionals worldwide. The results showed significant skepticism: 62% of respondents expressed concern that quantum computing could break current internet encryption before the new algorithms approved by NIST are fully deployed globally.
This gap between Saylor’s 10-year horizon and most experts’ concerns indicates real uncertainty regarding the timing of the threat.
Technological Solutions Already in Development: NIST Post-Quantum Standards
Regardless of when the quantum threat materializes, the industry has already made significant progress in preparing defenses. Since 2016, the U.S. National Institute of Standards and Technology (NIST) has been conducting an extensive international competition among cryptographers to develop algorithms resistant to quantum attacks.
In 2022, NIST announced four winners of this competition. These algorithms—CRYSTALS-Kyber for encryption, CRYSTALS-Dilithium for digital signatures, FALCON for signatures in resource-constrained environments, and SPHINCS+ as an alternative mechanism—represent the culmination of years of research.
In 2024, NIST released three new official standards for post-quantum cryptography based on these algorithms. These standards are ready for implementation in real systems. NIST director Lori E. Locascio commented: “Quantum computing has the potential to be a force for solving many of society’s most complex problems, and these new standards represent NIST’s commitment to ensuring that this does not undermine our security. These final standards crown NIST’s efforts to protect our confidential electronic information.”
How Michael Saylor Views Sector Coordination
Saylor made a realistic observation: coordinated global efforts to implement post-quantum protection are most likely to begin only when the threat becomes clearly imminent. Only such urgency can push the entire world toward rapid collective action. Until then, the development of standards will mainly remain in the domain of academia and industry researchers.
However, Saylor’s position suggests that the crypto industry, due to its focus on cutting-edge cybersecurity, will activate the transition earlier than other sectors and set benchmarks for the rest of the world.
Final Assessment: Who Is Right in the Timeline Dispute?
The debate between Saylor’s optimistic outlook and Buterin’s more cautious forecasts reflects genuine scientific uncertainty. ISACA data shows that most professionals lean toward a view closer to Buterin’s. But at the same time, the truth may lie in a compromise: the threat is distant enough to avoid panic but potentially serious enough to justify serious preparatory measures now.
What is clear is that thanks to NIST’s work and the mobilization of the crypto community, protective tools already exist. The question is not whether adaptation is possible but how quickly it will happen—an area where Saylor and his opponents ultimately align.