Developer and researcher Woody Wertheimer warns that the Lightning Community has structural issues with quantum computing that no quantity of fine person practices can clear up.
For the Lightning Community to work, Each side of the cost channel must trade public keys. That trade doesn’t stay on the blockchain, however within the palms of the service supplier that manages the channel. The builders declare that when a quantum pc with ample capability (CRQC) has obtained the general public key, it could possibly calculate the personal key, which might give it full entry to the person’s steadiness.
Powered by platforms comparable to Coinbase, Binance, and Money App, the Lightning Community presently strikes over 5,000 Bitcoins in locked capability distributed throughout over 50,000 lively nodes.
You do not want pace, simply time.
The builders emphasize that in contrast to quantum assaults on Bitcoin’s reminiscence pool, it intercepts transactions within the minutes it takes to verify them. Lightning assault vectors need not function in real-time. The general public key’s already saved. It ought to solely be processed if quantum capability permits. Google estimates paper It was lately reported that CRQC can decrypt keys in transit in simply 9 minutes, however with Lightning you do not even want that pace.
Udi factors out that the usual “do not reuse addresses” protection would not apply right here. Lightning public keys are shared by design, not inadvertence. This drawback extends to different factors within the ecosystem: {hardware} wallets that had been linked to compromised gadgets, customers who handed over their public keys to tax accounting platforms for automated monitoring of their wallets, and prospects of suppliers.
Nevertheless, Wertheimer factors out that the potential for hazard is even higher with Ethereum and Solana. Many good contracts include a key that offers you full management over your locked funds.. An attacker with CRQC doesn’t want weeks of social engineering or oracle manipulation. The attacker merely obtains the contract’s public key, calculates the personal key, and empties the funds.
Final week’s Drift Protocol hack resulted in $285 million in losses and required weeks of preparation. With quantum capabilities, that course of will be diminished to a couple hours.
Proposals comparable to BIP-360, which have been introduced as an answer to Bitcoin’s quantum threat, don’t think about the Lightning case. In keeping with Wertheimer, this drawback can solely be solved by incorporating post-quantum cryptography into the basic layers of the protocol. Till then, Lightning builders haven’t got the instruments to guard customers, and as soon as Bitcoin’s technical debates are lastly resolved, the transition, which entails analysis, software program redesign, implementation, and mass adoption, may take years.

