Jameson Lopp, the chief security officer at a Bitcoin custody firm, recently expressed his opposition to the idea of quantum recovery for lost BTC, suggesting that destroying these coins instead would better safeguard the protocol’s integrity.
Lopp argues that permitting individuals or organizations equipped with quantum computers to recover lost bitcoins undermines essential characteristics of the Bitcoin network, such as its resistance to censorship, the immutability of transactions, and its conservative nature.
In a blog post from March 16, the crypto executive stated that quantum recovery does not benefit anyone. He elaborated:
“Facilitating quantum recovery of bitcoin equates to wealth redistribution. We would essentially be enabling a transfer of bitcoins from those who are unaware of quantum technology to those who have succeeded in harnessing it.”
“It’s challenging to find any positive aspect to that situation,” he added, concluding that quantum recovery would only threaten the security of the Bitcoin network.
The impact of quantum computers on Bitcoin is a subject of intense debate. Some believe that the threat to current encryption methods is still many years away, while others claim that practical quantum computing may never materialize, and some warn that the danger is already upon us.

Jameson Lopp addresses the dangers posed by quantum computers at a Bitcoin conference in 2024.
The Quantum Dilemma of 2024
In October 2024, researchers from a university in Shanghai claimed to have breached encryption standards utilized in military and financial sectors through a quantum computer.
Nonetheless, a YouTuber known as “Mental Outlaw” later argued that those claims were exaggerated and that the researchers had not actually cracked modern encryption standards.
The YouTuber pointed out that the quantum computer used by the research team had only managed to factor the integer 2,269,753, marking a new achievement for quantum technology but still falling short compared to some classical computers.
Mental Outlaw noted that the experimental device was limited to defeating a 22-bit key, while a classical computer had previously broken an 892-bit key.
Contemporary encryption key sizes typically range from 2048 to 4096 bits, with possibilities for extending these sizes in the future to enhance security further.