Futures
Access hundreds of perpetual contracts
TradFi
Gold
One platform for global traditional assets
Options
Hot
Trade European-style vanilla options
Unified Account
Maximize your capital efficiency
Demo Trading
Introduction to Futures Trading
Learn the basics of futures trading
Futures Events
Join events to earn rewards
Demo Trading
Use virtual funds to practice risk-free trading
Launch
CandyDrop
Collect candies to earn airdrops
Launchpool
Quick staking, earn potential new tokens
HODLer Airdrop
Hold GT and get massive airdrops for free
Launchpad
Be early to the next big token project
Alpha Points
Trade on-chain assets and earn airdrops
Futures Points
Earn futures points and claim airdrop rewards
Researchers Assess the Quantum Threat to Bitcoin Mining
The Growing Interest in Quantum Technology Fuels the Debate
Market Concerns About Quantum Threats May Be Overstated
Focus Shifts Toward Security Risks of Wallets
Quantum computing is often cited as a major threat to Bitcoin. However, recent academic research suggests that concerns about quantum attacks on Bitcoin mining are largely exaggerated. Physical constraints and energy limitations make such attacks impractical with current and foreseeable technology.
Researchers Assess the Quantum Threat to Bitcoin Mining
Researchers analyzed whether quantum computers could outperform Bitcoin miners using Grover's algorithm. Although the algorithm offers a theoretical speed advantage, practical implementation faces significant limitations.
Estimates indicate that a quantum attack on Bitcoin mining would require:
Approximately 10²³ qubits;
Energy consumption of about 10²⁵ watts;
Large-scale parallel quantum systems.
These requirements approach the energy output of a star, making the attack physically unfeasible.
The Growing Interest in Quantum Technology Fuels the Debate
Concerns about quantum threats have increased due to repeated headlines about breakthroughs in quantum computing. However, many of these claims rely on simplified scenarios.
Two main quantum algorithms are often discussed:
Shor's algorithm – targeting cryptographic security;
Grover's algorithm – targeting mining operations.