Key Takeaways
- Anatoly Yakovenko, Solana’s co-founder, issued a warning that Ethereum Layer 2 solutions lack quantum resistance
- According to Yakovenko, artificial intelligence may compromise post-quantum cryptography before adequate industry defenses are implemented
- His suggested mitigation involves implementing two-of-three multisig configurations using independent cryptographic signature schemes
- The Solana network is transitioning to Falcon-512 post-quantum cryptography for newly created accounts
- Galaxy Digital’s Alex Thorn reports emerging agreement to preserve Satoshi Nakamoto’s Bitcoin holdings
Anatoly Yakovenko, the co-founder of Solana, delivered a blunt assessment of quantum computing vulnerabilities facing the cryptocurrency ecosystem. His remarks addressed threats to Ethereum Layer 2 solutions, the limitations of post-quantum cryptographic methods, and how artificial intelligence might accelerate future security breaches.
In a May 2, 2026 social media post, Yakovenko declared: “Ethereum L2s are not quantum safe, abandon all hope.” His comment responded to developer communications highlighting Solana’s advancement in quantum-resistant technology.
Ethereum’s Layer 2 scaling solutions—including Arbitrum, Optimism, Base, and zkSync—continue to depend on the Elliptic Curve Digital Signature Algorithm. These systems employ the secp256k1 elliptic curve, a cryptographic standard that sufficiently advanced quantum computers could potentially compromise.
During transaction broadcasts, the sender’s public key gets exposed on the blockchain. A quantum computer with adequate processing capabilities could theoretically analyze this information to derive private keys and gain unauthorized access to cryptocurrency holdings.
Yakovenko characterized this vulnerability as a “harvest now, decrypt later” scenario. Malicious actors could capture transaction data in the present and deploy quantum computing systems in subsequent years to exploit it through Shor’s algorithm.
Zero-knowledge proof systems employed in rollup technologies also present theoretical vulnerabilities. Cryptographic frameworks such as Groth16 and Plonk, which power zkEVM architectures, depend on elliptic-curve pairings that sophisticated quantum systems might eventually compromise.
How Solana Plans to Counter Quantum Threats
Solana is implementing Falcon-512, a cryptographic signature algorithm specifically engineered to withstand quantum computing attacks. Development teams Anza and Firedancer are both advancing initiatives to integrate these security measures.
The network plans to enable Falcon-512 protection for newly created Solana accounts initially. Engineers are simultaneously developing migration strategies for legacy wallet addresses, though no immediate network-wide transition is mandated.
Yakovenko expanded his warning to include artificial intelligence as a more immediate concern. He suggested that AI systems could exploit vulnerabilities in post-quantum cryptography before the blockchain industry adequately strengthens these defenses.
“I think the biggest risk is that PQC signature schemes will get broken by AI, we don’t know all the implementation footguns even, let alone the math footguns,” Yakovenko stated.
His recommended defense strategy involves deploying two-of-three multisignature configurations that combine distinct signature algorithms natively within Solana’s transaction processing infrastructure using Program Derived Addresses.
Michael Egorov, who founded Curve Finance, questioned whether formal verification methodologies could identify and address security weaknesses. Yakovenko responded that verification processes only prove effective when developers already understand which vulnerabilities require examination.
The Bitcoin Quantum Dilemma
Regarding Bitcoin, Galaxy Digital’s Alex Thorn identified an emerging industry consensus surrounding Satoshi Nakamoto’s approximately 1.1 million Bitcoin holdings.
These cryptocurrency units are distributed across an estimated 22,000 Pay-to-Public-Key addresses, each containing 50 Bitcoin. Thorn explained that quantum attackers would need to compromise each individual address separately rather than executing a single coordinated breach.
He observed that Bitcoin markets routinely process selling activity exceeding one million Bitcoin. This liquidity depth suggests the network could potentially withstand a catastrophic security event without fundamentally undermining established property rights.
Meanwhile, Cardano and Algorand are conducting independent post-quantum cryptography research initiatives. Ripple has publicly committed to implementing quantum-resistant protections for its token by 2028. Bitcoin’s post-quantum security planning remains in relatively preliminary stages.





