Solana’s Yakovenko Says AI Could Break Crypto’s Quantum Defenses Before They’re Ready

The co-founder thinks the industry is building quantum-resistant walls out of materials it doesn't fully understand. Solana already picked its algorithm. Most chains haven't started.

Anatoly Yakovenko dropped two warnings on X this week, back to back. First: AI could crack post-quantum cryptography signature schemes before the industry finishes deploying them. Second: Ethereum Layer 2 networks are not quantum safe. His exact words on L2s were โ€œabandon all hope.โ€

Coming from the co-founder of a network that just shipped its own quantum-resistant implementation, the timing is not subtle. But the technical argument underneath the trash talk is real, and it applies to every chain running elliptic curve cryptography. That is all of them.

The risk Yakovenko is actually describing

Post-quantum cryptography is supposed to be the fix. Replace ECDSA and EdDSA with algorithms that quantum computers cannot crack, and blockchain signatures stay secure even after Q-Day. The problem, according to Yakovenko, is that PQC schemes themselves might be breakable. Not by quantum computers. By AI.

He pointed to two categories of vulnerability. The math footguns: unknown weaknesses in the mathematical structures underlying PQC algorithms. And the implementation footguns: bugs and side-channel leaks in how those algorithms are actually coded and deployed. The industry, he said, does not fully understand either one.

His proposed solution is practical. Use two-of-three multisig wallets that combine multiple signature schemes. If one gets broken, the others hold. He tagged Fuse Wallet and suggested Solana could support this natively through Program Derived Addresses in its transaction processor. Curve Finance founder Michael Egorov responded by asking whether formal verification could close the gap. Yakovenko did not say it could.

Solana already picked Falcon-512. Most chains havenโ€™t picked anything.

The Solana Foundation announced on April 27 that its technical teams, Anza and Firedancer, selected the Falcon digital signature scheme for post-quantum security. Initial implementations are on GitHub. The work is moving from research into production hardening.

Compare that to the rest of the field. Ethereumโ€™s quantum readiness roadmap targets 2029, working through upgrades code-named Glamsterdam and Hegota. Algorand has a Falcon migration roadmap in progress. Bitcoin developers are still debating whether to freeze $440 billion in old coins as a quantum precaution, with no formal implementation plan. Cardano is developing peer-reviewed post-quantum protocols but has not shipped anything to mainnet.

Q-Day, the point at which quantum computers can crack current blockchain cryptography, is projected around 2029. That gives the industry roughly three years. Regulatory timelines are already moving: G7 and EU frameworks require quantum security planning by 2026, infrastructure migration by 2030-2032, and full transition by 2035.

โ€œHarvest now, decrypt laterโ€ is the scenario nobody wants to think about

Yakovenko also flagged a specific attack vector. When a transaction is broadcast, the public keys become visible on the blockchain. An attacker could collect those keys now, store them, and decrypt the corresponding private keys later using Shorโ€™s algorithm on a future quantum computer. This is the โ€œharvest now, decrypt laterโ€ threat.

Every blockchain using ECDSA or EdDSA is exposed. Bitcoin, Ethereum, Solana before its upgrade, all of them. The recent proposal to clone and resell Satoshiโ€™s Bitcoin stash through an eCash fork touched on the same vulnerability from a different angle: what happens to coins sitting in addresses with exposed public keys?

The underlying architecture of blockchain networks assumes that private keys cannot be derived from public keys. Quantum computing could break that assumption. AI accelerating the timeline to that break is what Yakovenko is warning about.

The L2 comment is competitive, but the math checks out

Yakovenko saying โ€œEthereum L2s are not quantum safe, abandon all hopeโ€ is obviously provocative. It is also technically correct. Layer 2 networks inherit the cryptographic primitives of their base layer. If Ethereum L1 uses quantum-vulnerable signatures, every rollup built on top of it is equally exposed. Upgrading L1 does not automatically upgrade L2s, which adds another migration layer to an already complex process.

He also took a shot at L2 economics, arguing that too many rollups fragment liquidity and split user communities, weakening network effects. That is a separate debate, but it feeds into his broader point: Ethereumโ€™s scaling strategy adds complexity in a moment when the security stack needs to get simpler and stronger, not more layered.

Solanaโ€™s bet is that doing quantum cryptography on a single execution layer is easier than coordinating it across dozens of L2s. Whether that bet pays off depends on whether Falcon-512 holds up under real-world adversarial conditions. Which brings us back to Yakovenkoโ€™s original point: we do not yet know if it will.

Disclaimer The information provided on Coingo.net is for informational purposes only and does not constitute financial or investment advice. Cryptocurrency investments are highly volatile and involve risk. While we strive to provide accurate and up-to-date information, some details may change over time. Always conduct your own research before making any financial decisions.
TAGGED: