
LA FIN D’ETHEREUM ? (C’est sérieux)
Audio Summary
AI Summary
Vitalik Buterin, one of the co-founders of the Ethereum project, has recently broken his silence regarding the looming quantum threat to the crypto ecosystem, particularly Ethereum. He stresses the urgent need for the Ether network to evolve and transform as quickly as possible to counteract this threat. However, this necessary transformation comes at a cost, potentially turning the currently fast and scalable blockchain into a slow, heavy, and extremely expensive system to operate. This leads Buterin to pose two critical questions: first, are we willing to sacrifice Ethereum's performance and flexibility to ensure its long-term survival? And second, and perhaps more importantly, are the funds in older crypto wallets, those not updated in years, still secure, or have they already been compromised by this quantum threat?
To understand why Buterin is so concerned, it's essential to grasp how cryptocurrencies are currently secured. The entire system relies on asymmetric cryptography, also known as ECDSA. Simply put, imagine your cryptocurrencies are stored in a safe with an access code so long that a classical computer would need more than the lifespan of the entire universe to decrypt it using brute force—trying every combination one after another. So, under normal circumstances, our funds are quite secure.
However, this security is jeopardized by Shor's algorithm and the advent of quantum computers. A classical computer processes information using bits, which are either 0 or 1. This is why it takes an immense amount of time to try all possible combinations to crack an access key. Quantum computers, on the other hand, operate with qubits. Thanks to their unique properties, qubits allow a quantum computer to test all combinations almost instantaneously. This means that cryptocurrencies stored in a seemingly impenetrable safe could be easily accessed by a quantum computer. To use an analogy, if finding the exit of a maze with a classical computer means testing every path one by one, a quantum computer with Shor's algorithm is like having a helicopter above the maze, allowing you to see the exit instantly.
If a quantum computer with approximately 20 million qubits—a standard in current quantum computing—were to obtain your public key (which is shared to receive funds), it could easily recalculate your private key from it. This is normally impossible with classical computers, as one can only derive public keys from a private key, not vice versa. The problem is clear: possessing the private key grants access to the associated funds. Therefore, anyone with such a quantum computer could automatically seize the funds in your wallet, posing a significant problem.
But this doesn't mean all current cryptocurrency concepts are obsolete. Methods and techniques, such as post-quantum cryptography, are being developed to protect against this threat. Post-quantum cryptography involves entirely new mathematical models, notably based on Euclidean lattice structures, which are highly resilient to quantum attacks. Continuing the maze analogy, this would be like stretching a huge tarp over the maze, preventing even the "quantum helicopter" from seeing the exit.
However, there's a major downside: post-quantum signatures are extremely "heavy." A classic signature on the Ethereum network is only a few octets. A post-quantum signature, however, is 10 to 100 times heavier, potentially reaching kilobytes or even hundreds of kilobytes. If the Ethereum blockchain is an highway where current transactions are like small cars, post-quantum transactions would be like massive convoys, hundreds of meters long. This would inevitably lead to severe congestion on the network, causing gas fees and transaction costs to skyrocket. Securing a spot in an Ethereum block would become a luxury operation.
This presents Vitalik with a titanic dilemma: protecting Ethereum from the quantum threat could potentially kill its accessibility and render it unusable for the average person. Buterin has a plan involving "account abstraction" through the ERC 4337 update, which he calls Ethereum's "Trojan horse." The goal is to transform user accounts into "smart accounts." Instead of a private key etched into the blockchain, your account becomes a small computer program. This program would have the incredible ability to modify the signature method used by your wallet overnight, without needing to create a new wallet, offering ultimate agility to the system.
However, this solution introduces new major problems, including what is being called the "hard fork of the apocalypse." This update would integrate a critical feature into the Ethereum network: the ability to completely halt, or even perform a rollback—to go back in time before a potential quantum attack—and then only accept signatures that pass through post-quantum cryptography. This implies accepting the extremely heavy signatures that burden the network.
For blockchain purists, two enormous problems arise. First, the ability to roll back the blockchain. A fundamental principle of blockchain is its immutability and continuous forward progression. If data can be modified or rolled back, the blockchain's credibility is severely undermined, striking at the core of cryptocurrency's integrity. The second problem, which might be less obvious, is that of "zombie" or "ghost" wallets. For the "hard fork of the apocalypse" to be effective, all Ethereum stakeholders and holders must adopt this hard fork to counter the quantum threat. However, many wallets might not be updated. This could be due to users not following news, moving on from crypto, losing access keys (especially for older wallets from 2015 when security practices were less stringent), or even due to the death of wallet owners who didn't transmit their access information.
If these "zombie" wallets are not updated with post-quantum cryptography, malicious actors with quantum computing power could automatically decrypt and decipher these wallets and private keys, gaining access to their contained cryptocurrencies. This could lead to a catastrophic scenario where hundreds of thousands, or even millions, of Ether are suddenly dumped onto the markets, creating widespread panic.
Another crucial aspect of the Ethereum ecosystem that hasn't been fully addressed is Layer 2 solutions like Arbitrum, Optimism, and Base. These Layer 2s are currently responsible for much of the network's scalability. They use mathematical proofs to validate transactions, and these proofs must also be quantum-resistant. Such quantum-resistant proofs would demand ten times more computing power and, critically, ten times more space on Ethereum's main chain. This post-quantum update would severely penalize the economic model of Layer 2s, which are designed to be extremely fast and, most importantly, very inexpensive to use. This would no longer be the case.
The question then becomes whether newer blockchains, natively incorporating post-quantum capabilities, will eventually overtake Ethereum, or if the sheer development power of Ethereum's community—which boasts the most active developers—will be sufficient to optimize these "giant signatures" and make them more accessible. This represents the biggest technical gamble of the decade.
So, what should users do? Should they panic and divest from cryptocurrencies? Or can the quantum threat be seen as a positive force for the ecosystem? The latter perspective suggests that this threat acts as a form of natural selection for crypto projects. Those too slow or unable to adapt will perish, while resilient projects will thrive. Ethereum is clearly not willing to succumb; numerous developments and integrations are underway, as evidenced by its packed roadmap for the coming years, all aimed at combating the quantum threat.
The most important advice is to stay well-informed about the latest news in the ecosystem. Updates for Ethereum and other projects will be released, and it will be your sole responsibility to perform transactions and optimizations, particularly regarding wallet updates, to ensure your resistance to the quantum threat. No one else can do it for you. Therefore, always ensure you have access to your wallets, private keys, and seed phrases. If subjects like the quantum threat and quantum computers interest you, or if you'd like more analytical videos on related topics, such as Bitcoin's own vulnerability to this threat, please leave a comment. Until then, take care of yourselves and your crypto investments. This is Mr. TK, signing off.