LIVE NEWS
  • General Atomics CCA Crashes in California, Test Flights Paused
  • Artemis II’s historic lunar flyby… in 90 seconds
  • Taiwan opposition leader heads to China in what she calls a ‘journey for peace’
  • Ethereum Ascending Channel Puts Price At $5,700, Analyst Reveals When To Sell
  • Germany Doxes “UNKN,” Head of RU Ransomware Gangs REvil, GandCrab – Krebs on Security
  • Things Not to Do When Starting a New Job, According to Etiquette Experts
  • Japan is pushing hard on autonomous weapons
  • Blackstone raises $10B for opportunistic credit fund
Prime Reports
  • Home
  • Popular Now
  • Crypto
  • Cybersecurity
  • Economy
  • Geopolitics
  • Global Markets
  • Politics
  • See More
    • Artificial Intelligence
    • Climate Risks
    • Defense
    • Healthcare Innovation
    • Science
    • Technology
    • World
Prime Reports
  • Home
  • Popular Now
  • Crypto
  • Cybersecurity
  • Economy
  • Geopolitics
  • Global Markets
  • Politics
  • Artificial Intelligence
  • Climate Risks
  • Defense
  • Healthcare Innovation
  • Science
  • Technology
  • World
Home»Crypto»Lightning Network ‘Helplessly Broken’ Against Quantum Computers, Warns Udi Wertheimer
Crypto

Lightning Network ‘Helplessly Broken’ Against Quantum Computers, Warns Udi Wertheimer

primereportsBy primereportsApril 6, 2026No Comments4 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Lightning Network ‘Helplessly Broken’ Against Quantum Computers, Warns Udi Wertheimer
Share
Facebook Twitter LinkedIn Pinterest Email



Lightning Network is structurally vulnerable as its public keys are shared, which makes funds exposed to post-quantum attacks, Wertheimer claimed in his recent post.

Crypto analyst and Taproot developer Udi Wertheimer has stated that the Lightning Network is fundamentally vulnerable in a post-quantum scenario and claimed that its design leaves user funds exposed in ways that cannot be mitigated under current assumptions.

According to Wertheimer, the core issue stems from how public and private keys function in cryptocurrency systems. While traditional cryptography relies on the idea that private keys cannot be derived from public keys, he explained that sufficiently advanced quantum computers, which are known as cryptographically relevant quantum computers (CRQCs), could break this assumption by calculating private keys directly from public ones.

Lightning’s Weak Spot

In most on-chain Bitcoin usage, users can reduce exposure by avoiding address reuse, which helps keep public keys from being exposed unnecessarily. However, Wertheimer argued that this defense does not apply to the Lightning Network, where public keys must be shared as part of its basic operation.

Lightning relies on payment channels, which are essentially multi-signature arrangements between two parties. To open and maintain these channels, participants exchange public keys with counterparties. As a result, these keys are not only exposed but also stored by third parties, sometimes without users fully knowing who controls the infrastructure behind their channels.

As such, if any entity holding these public keys gains access to a CRQC, or if such data is leaked to an entity that does, then private keys could be derived without user interaction, thereby enabling the theft of funds. Wertheimer further claimed that such an attack would not require the high-speed quantum capabilities often discussed in theoretical scenarios, as there would be no need to intercept transactions in real time.

Instead, attackers could work offline using already available public key data. The problem is compounded by the opaque nature of Lightning infrastructure, where LN service providers can operate anonymously. This can leave users unable to assess how securely their data is handled.

The developer noted that even best practices within the Bitcoin ecosystem do not address this risk, as Lightning’s requirement for key sharing cannot be avoided. He went on to add that this makes the network “helplessly broken” in a quantum context, since no changes at the Lightning layer alone can resolve the issue.

You may also like:

Addressing the issue would require Bitcoin’s core protocol to adopt a quantum-safe cryptographic method. No such changes have been carried out so far. Until such changes occur, Lightning balances remain exposed and could be compromised once quantum technology advances enough to take advantage of these built-in weaknesses.

Google’s Warning

Wertheimer’s remarks come just days after Google’s team released a white paper detailing the potential risks posed by advanced quantum systems to cryptocurrencies. The report stated that a sufficiently powerful quantum computer could break the private keys of Ethereum’s 1,000 largest wallets in under nine days, putting over 20 million ETH at risk.

Later, Blockstream outlined measures being taken to protect Bitcoin from these threats. The firm revealed implementing post-quantum cryptography on its Liquid sidechain to allow users to create contracts that require quantum-resistant signatures to spend funds.

This strategy does not alter Bitcoin’s core protocol but instead adds protection at the contract level using Blockstream’s Simplicity smart contract language. The research also identified four main risks for sidechains – forged transaction signatures, forged block signatures, vulnerabilities in confidential transactions, and attacks on mechanisms that transfer assets between chains.

SPECIAL OFFER (Exclusive)

Binance Free $600 (CryptoPotato Exclusive): Use this link to register a new account and receive $600 exclusive welcome offer on Binance (full details).

LIMITED OFFER for CryptoPotato readers at Bybit: Use this link to register and open a $500 FREE position on any coin!

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleGoogle DeepMind Researchers Map Web Attacks Against AI Agents
Next Article Trump provides details behind the dramatic rescue of an American airman trapped in Iran
primereports
  • Website

Related Posts

Crypto

Ethereum Ascending Channel Puts Price At $5,700, Analyst Reveals When To Sell

April 7, 2026
Crypto

Citadel and Fidelity just made their clearest move yet to rebuild crypto like Wall Street

April 6, 2026
Crypto

Apple Removes Jack Dorsey Bitchat App from China for Beijing

April 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Top Posts

Global Resources Outlook 2024 | UNEP

December 6, 20258 Views

The D Brief: DHS shutdown likely; US troops leave al-Tanf; CNO’s plea to industry; Crowded robot-boat market; And a bit more.

February 14, 20264 Views

German Chancellor Merz faces difficult mission to Israel – DW – 12/06/2025

December 6, 20254 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Latest Reviews

Subscribe to Updates

Get the latest tech news from FooBar about tech, design and biz.

PrimeReports.org
Independent global news, analysis & insights.

PrimeReports.org brings you in-depth coverage of geopolitics, markets, technology and risk – with context that helps you understand what really matters.

Editorially independent · Opinions are those of the authors and not investment advice.
Facebook X (Twitter) LinkedIn YouTube
Key Sections
  • World
  • Geopolitics
  • Popular Now
  • Artificial Intelligence
  • Cybersecurity
  • Crypto
All Categories
  • Artificial Intelligence
  • Climate Risks
  • Crypto
  • Cybersecurity
  • Defense
  • Economy
  • Geopolitics
  • Global Markets
  • Healthcare Innovation
  • Politics
  • Popular Now
  • Science
  • Technology
  • World
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms & Conditions
  • Disclaimer
  • Cookie Policy
  • DMCA / Copyright Notice
  • Editorial Policy

Sign up for Prime Reports Briefing – essential stories and analysis in your inbox.

By subscribing you agree to our Privacy Policy. You can opt out anytime.
Latest Stories
  • General Atomics CCA Crashes in California, Test Flights Paused
  • Artemis II’s historic lunar flyby… in 90 seconds
  • Taiwan opposition leader heads to China in what she calls a ‘journey for peace’
© 2026 PrimeReports.org. All rights reserved.
Privacy Terms Contact

Type above and press Enter to search. Press Esc to cancel.