
The rebuttal argues the main exposure is a short force-close race window and points to multiple post-quantum upgrade proposals.
A viral claim that Bitcoin’s Lightning Network is “helplessly broken” in a post-quantum world is being challenged by a technical rebuttal that narrows the threat model to specific on-chain moments. The argument: quantum risk is real in theory, but conditional, time-bounded, and already driving concrete post-quantum upgrade work.
Bobby Shell published a rebuttal on April 18 pushing back on a claim attributed to Bitcoin developer Udi Wertheimer that the Lightning Network is “helplessly broken” in a post-quantum world and that developers can do nothing about it.
Shell’s core concession is straightforward: Lightning channel participants share public keys with counterparties when opening channels. In a world with cryptographically relevant quantum computers (CRQCs), Shor’s algorithm could theoretically derive private keys from exposed public keys, enabling theft.
Where the rebuttal changes the tradeable narrative is scope. It argues Lightning’s exposure is not a standing vulnerability during normal routing, but an episodic one that shows up when specific on-chain events reveal the information a quantum attacker would need.
While channels are open, the funding output uses P2WSH, which keeps the raw public keys inside the 2-of-2 multisig hidden on-chain until the funds are spent. Lightning payments themselves route via HTLCs, which rely on hash preimage revelation rather than broadcasting public keys to the chain.
Shell’s “realistic attack window” is a force-close. When a commitment transaction is broadcast on-chain, the locking script becomes visible for the first time, including the local_delayedpubkey. At that point, the broadcaster cannot immediately claim funds because a CSV (CheckSequenceVerify) timelock typically delays spending by 144 blocks, about 24 hours.
In the threat model described, an attacker watching the mempool could react to the confirmed commitment transaction, extract the newly revealed public key, and attempt to run Shor’s algorithm quickly enough to spend the output before the timelock expires. HTLC outputs at force-close can create additional windows “as short as 40 blocks,” roughly six to seven hours.
That reframing matters for operators because it turns “Lightning is broken” into “Lightning has a per-output timed race condition under a future capability.” Shell’s line is explicit: “None of that is "your Lightning balance is at risk today."”
The rebuttal leans on a capability gap argument. CRQCs “do not exist today,” it says, and breaking Bitcoin’s elliptic curve cryptography would require solving a discrete logarithm on a 256-bit key using “millions of stable, error-corrected logical qubits” running for an extended period.
As benchmarks, the piece states the largest number factored using Shor’s algorithm on actual quantum hardware is 21 (3×7) in 2012, with significant classical post-processing assists. It also cites a more recent hybrid quantum-classical factoring of a 90-bit RSA number, described as still “roughly 2^83 times smaller” than what would be needed to break Bitcoin.
On timelines, Shell cites a range from optimistic late-2020s estimates to more conservative projections in the 2030s or beyond. The practical implication is that near-term fear trades around Lightning abandonment are more sentiment-driven than grounded in present capability.
The next inflection is whether mitigation talk turns into concrete upgrade paths. Shell points to an active pipeline and writes: “Since December alone, the Bitcoin development community has produced more than five serious post-quantum proposals: SHRINCS (324-byte stateful hash-based signatures), SHRIMPS (2.5 KB signatures across multiple devices, roughly three times smaller than the NIST standard), BIP-360, Blockstream's hash-based signatures paper, and proposals for OP_SPHINCS, OP_XMSS, and STARK-based opcodes in tapscript.”
For traders and Lightning-dependent businesses, the signal is traction: do proposals like BIP-360 or tapscript opcode ideas (OP_SPHINCS/OP_XMSS and STARK-based variants) move into formal BIP discussion, implementations, or test vectors beyond the “proposal” stage.
Operationally, watch for Lightning client and operator guidance around force-close handling and timelock parameters, including continued reliance on ~144-block CSV delays and how HTLC window configurations are treated under a post-quantum threat model.
Finally, the narrative itself is a risk factor. Independent verification or updated benchmarks for quantum progress claims can act as a sentiment catalyst, and renewed social amplification of “helplessly broken” versus rebuttals is a proxy for reputational risk to Lightning-dependent rails.
I don’t see this as a “Lightning is safe” story. I see it as a market-structure story about when risk is actually realizable. Shell’s rebuttal narrows the attack surface to force-close moments where keys become visible and the game becomes a timelock race, not a perpetual bleed during normal routing.
The threshold that matters is whether post-quantum work graduates from idea density to consensus gravity. If proposals like BIP-360 or new tapscript opcodes start accumulating real implementation momentum, the setup starts to look structural rather than narrative-driven, and Lightning businesses get a clearer runway for planning instead of reacting to headlines.