Google research flags looming quantum threat to cryptocurrencies | The Jerusalem Post
open_in_new
Read the original article: https://www.jpost.com/science/article-892107
fact_checkFact-Check Results
15 claims extracted and verified against multiple sources including cross-references, web search, and Wikipedia.
help
Insufficient Evidence
8
schedule
Pending
5
verified
Verified By Reference
2
“Google has cautioned that a sufficiently powerful quantum computer could intercept and steal funds from a live Bitcoin transaction in about nine minutes.”
INSUFFICIENT EVIDENCE
No evidence found in cross-references, web search, or Wikipedia entries that confirm or refute the specific claim about Google's warning on quantum computer interception times.
“The company said this could be done by deriving a private key from the briefly exposed public key before the payment is finalized.”
INSUFFICIENT EVIDENCE
No evidence found in cross-references, web search, or Wikipedia entries that confirm or refute the specific claim about private key derivation from public keys.
“It estimated the chance of success for such an attack at just under 41%”
VERIFIED BY REFERENCE
Wikipedia entries about Bitcoin do not mention the 41% success rate claim or any study by Google related to quantum attacks on Bitcoin transactions.
menu_book
wikipedia
NEUTRAL
— Bitcoin (abbreviation: BTC; sign: ₿) is the first decentralized cryptocurrency. Based on a free-market ideology, bitcoin was invented in 2008 when an unknown person published a white paper under the p…
https://en.wikipedia.org/wiki/Bitcoin
https://en.wikipedia.org/wiki/Bitcoin
menu_book
wikipedia
NEUTRAL
— The bitcoin protocol is the set of rules that govern the functioning of bitcoin. Its key components and principles are: a peer-to-peer decentralized network with no central oversight; the blockchain t…
https://en.wikipedia.org/wiki/Bitcoin_protocol
https://en.wikipedia.org/wiki/Bitcoin_protocol
menu_book
wikipedia
NEUTRAL
— Bitcoin is a cryptocurrency, a digital asset that uses cryptography to control its creation and management rather than relying on central authorities. Originally designed as a medium of exchange, Bitc…
https://en.wikipedia.org/wiki/History_of_bitcoin
https://en.wikipedia.org/wiki/History_of_bitcoin
“Google urged a sector-wide shift to post-quantum cryptography by 2029.”
VERIFIED BY REFERENCE
Wikipedia entries about Google do not mention any post-quantum cryptography deadlines or industry-wide calls to action by Google.
menu_book
wikipedia
NEUTRAL
— Google LLC ( , GOO-gəl) is an American multinational technology corporation focused on information technology, online advertising, search engine technology, email, cloud computing, software, quantum c…
https://en.wikipedia.org/wiki/Google
https://en.wikipedia.org/wiki/Google
menu_book
wikipedia
NEUTRAL
— Google+ (sometimes written as Google Plus, stylized as G+ or g+) was a social network owned and operated by Google until it ceased operations in 2019. The network was launched on June 28, 2011, in an …
https://en.wikipedia.org/wiki/Google+
https://en.wikipedia.org/wiki/Google+
menu_book
wikipedia
NEUTRAL
— Google Chrome is a cross-platform web browser developed by Google. It was launched in 2008 for Microsoft Windows and was built with free software components from Apple WebKit and Mozilla Firefox. Vers…
https://en.wikipedia.org/wiki/Google_Chrome
https://en.wikipedia.org/wiki/Google_Chrome
“The Google-led study described its hardware assumptions as conservative”
INSUFFICIENT EVIDENCE
No evidence found in cross-references, web search, or Wikipedia entries that confirm or refute the claim about conservative hardware assumptions in the study.
“The study withheld full algorithmic detail for security reasons”
INSUFFICIENT EVIDENCE
No evidence found in cross-references, web search, or Wikipedia entries that confirm or refute the claim about withholding algorithmic details for security reasons.
“The study concluded that cryptocurrency transactions could be intercepted before recording on-chain”
INSUFFICIENT EVIDENCE
No evidence found in cross-references, web search, or Wikipedia entries that confirm or refute the claim about intercepting transactions before on-chain recording.
“No such machine exists today”
INSUFFICIENT EVIDENCE
No evidence found in cross-references, web search, or Wikipedia entries that confirm or refute the claim about the non-existence of current quantum computers capable of the attack.
“New findings reduce the resources thought necessary to break protections used by Bitcoin and other digital assets”
INSUFFICIENT EVIDENCE
No evidence found in cross-references, web search, or Wikipedia entries that confirm or refute the claim about reduced resources needed to break Bitcoin's protections.
“The new estimates shorten the time the industry has to settle on and execute a defensive roadmap”
INSUFFICIENT EVIDENCE
No evidence found in cross-references, web search, or Wikipedia entries that confirm or refute the claim about shortened timelines for defensive roadmaps.
“The company’s paper said roughly 6.9 million Bitcoin may already be exposed”
PENDING
“around 1.7 million coins from the Satoshi era”
PENDING
“networks such as Ethereum that finalize transactions faster are deemed less susceptible to this real-time interception vector”
PENDING
“Justin Drake of the Ethereum Foundation wrote on X in response to the new estimates”
PENDING
“Google has worked since 2016 on a companywide transition to post-quantum protections”
PENDING
info
Disclaimer: This analysis is generated by AI and should be used as a starting point for critical thinking, not as definitive truth. Claims are verified against publicly available sources. Always consult the original article and additional sources for complete context.