Executive Summary
Digital asset security faces a dual threat from artificial intelligence-driven fraud and quantum computing. AI-powered scams, such as mentorship pretexting and synthetic identity creation, are already extracting significant funds, with Chainalysis reporting that 60% of inflows into scam crypto wallets in 2025 came from AI-enabled fraud. Simultaneously, quantum computing poses a future risk to encryption standards, with practical machines capable of breaking current public-key systems estimated to emerge within 10 to 20 years. This convergence necessitates a rapid shift to post-quantum cryptography and enhanced verification mechanisms. Regulatory bodies, including the EU and US, have set a 2035 deadline for quantum-resistant cryptography, adding urgency. Security providers like Ledger are innovating to address these challenges, underscoring the need for proactive measures to prevent irreversible losses in the digitized economy.
The Immediate AI Threat and Its Mechanisms
AI-powered fraud is a present reality, not a speculative risk. Scammers use AI-generated video tutorials for mentorship pretexting, with one fraudster shifting over $900,000 from victims' accounts. The GreedyBear cybercrime group leveraged AI code generators to produce 150 malicious wallet extensions for Firefox, stealing more than $1 million. These attacks exploit the digitization of value, lowering barriers to creating convincing synthetic identities and fake information. Charles Guillemet, Ledger's chief technology officer, emphasizes the challenge: "As a user, it is very difficult to know if you are interacting with a human or with a bot. How do you know that you are interacting with me and that I’m a human? Because it’s already quite easy for AI to impersonate me." This immediacy demands enhanced verification systems and user education to mitigate risks.
The Looming Quantum Computing Menace
Quantum computing represents a slower but more profound threat. A quantum computer capable of storing a million qubits is needed to break today's commonly used public-key encryption, with practical deployment estimated in the next decade or two. However, the "harvest now, decrypt later" scheme means sensitive data collected today remains vulnerable to future decryption. Ian Rogers, Ledger's chief experience officer, contextualizes this: "We have lived through the ‘once in humanity’ digitization of all information, and now we are living through the ‘once in humanity’ digitization of all value. And I would say, we may all have a bit of whiplash from the internet, but you ain’t seen nothing yet." This foresight necessitates the adoption of post-quantum cryptographic algorithms now, ahead of regulatory mandates and before quantum computers become viable.
Key Insights
Key factual highlights include:
- AI-generated fraud schemes are active, with one case involving over $900,000 stolen through mentorship pretexting.
- In 2025, approximately 60% of all inflows into scammers' crypto wallets originated from AI-powered scams, according to Chainalysis.
- Cybercriminals use AI code generators for scalable attacks, such as creating 150 malicious wallet extensions that stole over $1 million.
- Quantum computing requires a machine with a million qubits to break current encryption, with practical deployment in 10-20 years.
- The EU and US are moving to require quantum-resistant cryptography by 2035, setting a regulatory compliance timeline.
- Ledger is developing next-generation devices and tools, including Transaction Check and Clear Signing, to enhance security and prepare for post-quantum readiness.
- Charles Guillemet notes that cryptography is essential for authentication: "Cryptography is the answer. If I can authenticate myself and authenticate my content, then you will have the strong guarantee that you are talking to me and that I’m a human."
- Ledger's initiatives aim to make post-quantum security easier to adopt and prove digital asset authenticity.
Global Trends and Economic Shifts
The digitization of value parallels historical shifts in information technology, but with higher stakes due to the irreversible nature of cryptocurrency theft. Compared to traditional assets, digital assets face unique vulnerabilities: bits are easily copied, whereas atoms require physical effort. This dynamic connects to broader economic trends, such as the rise of decentralized finance and central bank digital currencies, which amplify security needs. The regulatory push for quantum-resistant crypto by 2035 aligns with global efforts to standardize cybersecurity in financial systems, influencing cross-border transactions and interoperability. As the ecosystem evolves, security architecture must balance innovation with resilience, avoiding technical debt from legacy systems.
Strategic Implications
Industry Wins and Losses
The security industry is undergoing significant realignment. Companies like Ledger, which adopt post-quantum cryptography and AI-resistant verification early, gain a competitive advantage. Ian Rogers highlights the necessity: "If we’re doing cryptocurrency, then we need self-custody, and if we have self-custody, then we need security. It doesn’t matter if it’s on the user side, the organizational side, or the government side — somebody is going to hold those tokens, and while stealing a billion in gold bars is very difficult, stealing a billion in cryptocurrency is easy." This underscores the expanding scope of security needs. Conversely, traditional fraud prevention systems relying on legacy methods lose effectiveness as AI lowers barriers for synthetic identities. Entities not upgrading to post-quantum solutions risk obsolescence and increased liability, creating a divide between innovators and laggards.
Investor Risks and Opportunities
Investors face nuanced risks and opportunities. Digital assets secured with current encryption are exposed to future quantum attacks, potentially leading to devaluation if not migrated. However, the burgeoning market for quantum-resistant cryptography and AI fraud detection tools presents lucrative opportunities. The regulatory push for 2035 compliance creates a clear investment timeline, with firms developing these technologies likely to see increased demand. Additionally, as scams become more sophisticated, insurance products and security audits emerge as growth sectors. Investors must navigate technical debt from transitioning security architectures, weighing costs against protection imperatives. The convergence of AI and quantum threats signals a shift towards long-term, resilient investments in security infrastructure.
Competitive Dynamics
The competitive landscape is evolving rapidly. Ledger's initiative with next-generation devices positions it as a leader, but other hardware and software providers must follow to avoid vendor lock-in. Charles Guillemet states: "We are working on our next-generation devices, and we are making sure they will be post-quantum-crypto ready. We will have this capability on the newer generations." This triggers a race to market for secure solutions. Competitors must innovate in both security and user experience, as simplicity drives adoption. The threat of AI-generated attacks means any lag in integrating advanced verification could result in loss of user trust and market share. Collaboration with regulatory bodies and standardization efforts becomes a key differentiator, shaping alliances and partnerships across the ecosystem.
Policy and Regulatory Ripple Effects
Policy developments are accelerating the security overhaul. With the EU and US mandating quantum-resistant crypto by 2035, governments are taking a proactive stance to mitigate future threats. This regulatory framework forces ecosystem-wide adoption, reducing fragmentation but introducing compliance costs and timelines. As AI fraud prevalence rises, increased scrutiny and potential legislation around digital identity verification and content authenticity are expected. The blurring lines between asset security and identity protection drive policy innovations in privacy and authentication standards. These changes impact global compliance, requiring alignment with international norms to ensure interoperability and security in the digitized economy.
The Bottom Line
The structural shift in digital asset security is inevitable and urgent. AI and quantum computing are present and future challenges demanding immediate action. The entire cryptocurrency ecosystem must transition to post-quantum cryptographic algorithms and integrate robust AI-resistant identity verification. Ledger's efforts, such as Clear Signing and post-quantum-ready devices, illustrate necessary innovation, but widespread adoption is critical. Charles Guillemet warns: "So we are talking about next generation, but I think it's already here and we can't wait. This is what we need to prepare for the future." Executives and investors must prioritize security architecture upgrades to safeguard value in the digitized economy, recognizing that the weakest link, often the user, requires intuitive and fail-safe solutions to mitigate risks and capitalize on emerging opportunities.
This analysis is based on data from MIT Technology Review Insights.
Source: MIT Tech Review AI
Intelligence FAQ
AI-powered scams accounted for 60% of inflows into scam wallets in 2025, indicating an immediate and substantial risk that demands enhanced verification systems and user awareness.
A practical quantum computer needed to break current encryption is estimated to be deployable in the next decade or two, but sensitive data must be protected now with post-quantum cryptography to prevent future decryption.
The EU and US are setting a 2035 deadline for quantum-resistant crypto, creating a clear compliance timeline that drives industry-wide adoption of new security standards and influences global policy frameworks.



