Bitcoin Devs Reproduce IBM Quantum Result With 20 Lines of Random Python

Project Eleven gave 1 BTC for a 15-bit quantum key recovery. Bitcoin developers redid the same job in 20 lines of pure random Python. Now even Project Eleven says it was not Q-Day.

The Q-Day Prize Bitcoin awarded yesterday is already being walked back. Not by Project Eleven, the company that handed out the bounty, but by Bitcoin developers who showed the same 15-bit key recovery works just as well without quantum hardware. The IBM circuit and Linuxโ€™s random number generator produced statistically identical results. The quantum part, by their reading, did nothing.

Project Eleven CEO Alex Pruden has now responded, saying it was never meant to be Q-Day. The community notes flag and the cryptographer pushback came faster than the press releases.

What the developers actually did

Former Bitcoin Core maintainer Jonas Schnelli pulled apart the submission first. Researcher Giancarlo Lelli ran a two-register variant of Shorโ€™s algorithm on IBMโ€™s Heron r2 processors, totaling roughly 98,000 gates at around 99.5% per-gate fidelity. Schnelli looked at the raw outputs. They were indistinguishable from random coin flips. He then rewrote the entire key recovery in roughly 20 lines of pure Python, no quantum hardware involved, and got the same answer.

Yuval Adam confirmed it from a different angle. He swapped Lelliโ€™s IBM backend for /dev/urandom, the standard Linux random number generator that anyone can run on a laptop, and recovered the target private key identically. The 15-bit elliptic curve has only 32,767 possible private keys. A classical filter that checks each candidate against the public key finds the right one through near-random sampling at high probability.

Coinkite founder Rodolfo Novak put it in plainer language. The private key is solved classically before the quantum circuit runs. The system is not finding anything. It is being told the answer.

Project Eleven called it incremental progress, not Q-Day

Prudenโ€™s follow-up was direct about what the result actually demonstrates. Bottom line, his words, this is incremental progress in a noisy field. Not Q-Day. He acknowledged that NISQ-era experiments routinely depend on classical assistance, and argued the value lies in tracking resource reductions on accessible public hardware over time.

That is a defensible framing, except the press cycle around the prize did not read that way. Project Eleven, backed by Coinbase Ventures, Castle Island Ventures, Variant, and Balaji Srinivasan, created the bounty, judged it through three independent physicists, awarded it, and issued statements warning that 6.9 million BTC in exposed-key wallets face long-term risk. The company also sells post-quantum cryptography tools.

Critics flagged that loop. The same firm sets the test, scores the test, and warns about the threat its products are positioned to solve.

Why /dev/urandom matched the IBM result

The math behind the criticism is simple enough to write on a napkin. Fifteen bits gives a search space of 32,767 keys. A classical verifier loops through candidates, checks each one against the public key on the elliptic curve, and stops when it finds a match. With that small a search space, even pure random sampling lands on the answer quickly.

Bitcoin proponent Jimmy Song described the IBM machine in this experiment as performing the same function as /dev/urandom. The TFTC account noted in a widely shared thread that every public Shorโ€™s-on-ECC demonstration to date has relied on classical pre-computation that effectively encodes the answer into the circuit before any quantum gate runs.

Here is the side-by-side that the cryptographer pushback produced.

Metric Lelliโ€™s IBM Submission Random Bits Replication
Hardware IBM Heron r2 quantum Linux /dev/urandom
Code length ~98,000 quantum gates ~20 lines of Python
Output distribution Statistically random Statistically random
Key recovered Yes Yes
Quantum advantage detected None Not applicable

The 256-bit gap nobody is closing this year

Bitcoinโ€™s actual production cryptography uses 256-bit secp256k1. The distance from 15 bits to 256 bits is a factor of 2 raised to the 241st power. That is not a number that contracts gracefully. Even Googleโ€™s April 2026 paper, the most aggressive estimate to date, put a full 256-bit ECC break at under 500,000 physical qubits. Current quantum hardware is several orders of magnitude short of that.

Novak summarized the position the cryptographer side has held throughout. The quantum threat to Bitcoin is real, but distant. Todayโ€™s demos are classical computations wearing quantum costumes.

What this means for the migration timeline

None of this changes what the developer side is already doing. BIP-360 is still in active discussion as a path toward post-quantum signatures. Ethereum, Tron, StarkWare, and Ripple are all working on quantum-resistant primitives at varying stages. The migration playbook does not depend on whether yesterdayโ€™s IBM run cleared a real quantum bar or a theatrical one.

What it does change is the public benchmark. Quantum cryptography demonstrations now have to ship with a control test against random sampling. Pruden himself signaled the next bounty will likely target larger key sizes, where classical brute force stops working as a shortcut. Until then, the gap between demo scale and production scale remains the variable that matters.

For Bitcoin holders, the practical takeaway is the same as it was yesterday morning. Coins in modern address types where the public key has never touched the chain remain protected. Coins in pay-to-public-key outputs, including Satoshiโ€™s roughly 1.1 million BTC, are still on the long-term exposure list. A 15-bit demo does not move that needle.

The needle moves when somebody runs a 30-bit attack and the random-bits control test fails to keep up.

Disclaimer The information provided on Coingo.net is for informational purposes only and does not constitute financial or investment advice. Cryptocurrency investments are highly volatile and involve risk. While we strive to provide accurate and up-to-date information, some details may change over time. Always conduct your own research before making any financial decisions.
TAGGED: