Most of the online reaction to Google Quantum AI's paper, released late Monday, focused on bitcoin. The nine-minute attack, a 41% theft probability and the 6.9 million in possibly exposed BTC.
Ethereum's section got less attention. It deserves more.
The whitepaper, co-authored with Ethereum Foundation researcher Justin Drake and Stanford's Dan Boneh, mapped five ways a quantum computer could attack Ethereum, each targeting a different part of the network.
The combined exposure exceeds $100 billion at current prices, and the knock-on effects could be far larger.
There is no way to rotate it without abandoning the account entirely. Google ( GOOG ) estimates the top 1,000 Ethereum wallets by balance, holding roughly 20.5 million ETH, are exposed.
A quantum computer cracking one key every nine minutes could work through all 1,000 in under nine days.
Google ( GOOG ) found at least 70 major contracts with admin keys exposed on-chain, holding about 2.5 million ETH. But the bigger risk is what those keys control beyond ETH.
Admin accounts also govern minting authority for stablecoins like USDT and USDC, meaning a quantum attacker who cracks one could print unlimited tokens. The paper estimates roughly $200 billion in stablecoins and tokenized assets on Ethereum depend on these vulnerable admin keys.
Forging even one could trigger a chain reaction across every lending market that accepts those tokens as collateral.
These L2s rely on Ethereum's built-in cryptographic tools, none of which are quantum-resistant. The paper estimates at least 15 million ETH across major L2s and cross-chain bridges is exposed.
Only StarkNet, which uses a different type of math based on hash functions rather than elliptic curves, is considered safe.
Roughly 37 million ETH is staked. If an attacker compromises one-third of validators, the network can no longer finalize transactions. Two-thirds gives the attacker the ability to rewrite the chain's history.
The paper notes that if staking is concentrated in large pools, such as Lido at roughly 20%, targeting a single provider's infrastructure could dramatically shorten the attack timeline.
A quantum computer could recover that secret from publicly available data. Once recovered, it becomes a permanent tool, a piece of normal software, that can forge data verification proofs forever without needing quantum access again.
Google ( GOOG ) describes this exploit as "potentially tradable." Every L2 that depends on Ethereum's blob data system would be affected.
Ethereum's 12-second block times also make real-time transaction theft far harder than on bitcoin, where blocks take 10 minutes.
But the paper is clear that upgrading Ethereum's base layer does not automatically fix the thousands of smart contracts already deployed on it. Each protocol, bridge and L2 would need to independently upgrade its own code and rotate its own keys. No single entity controls that process.