Quick Summary
- A new Bitcoin improvement proposal targets protection against emerging quantum computing dangers to the network.
- Users may face mandatory migration of assets to quantum-secure wallet types under the plan.
- The strategy outlines a multi-stage approach that could ultimately render older wallet types unusable.
- The first phase would prohibit transactions to at-risk addresses following a designated timeframe.
- The second phase would invalidate traditional cryptographic signatures, blocking access to funds in outdated wallets.
A group of Bitcoin developers has put forward a strategy to address quantum computing vulnerabilities that pose risks to cryptocurrency wallet infrastructure. The initiative details mandatory transitions to updated address systems and the potential restriction of access to funds in older formats. This approach has sparked significant controversy among Bitcoin community members regarding autonomy and protective measures.
Multi-Stage Implementation Strategy Outlined in BIP 361
The development team has formally submitted Bitcoin Improvement Proposal 361 as a response to anticipated threats from advanced quantum computing systems. This framework expands upon previous technical innovations that established alternative transaction architectures.
The proposal establishes a gradual shift toward cryptographically secure address formats resistant to quantum interference throughout the ecosystem. Additionally, it sets forth protocols that systematically phase out legacy encryption standards.
Still dislike but looking forward to all the spirited debates. Inactive users are not acceptable collateral damage. And this reeks of central planning with the deadlines, behavior coercion, and forced migration. Will try and keep an open mind.
— MK (@zerosandohs) April 14, 2026
The initial stage, designated Phase A, commences thirty-six months following network activation and prevents new transfers to address types identified as vulnerable. Importantly, holders retain withdrawal capabilities from existing balances throughout this window.
Phase B launches after a five-year implementation period and completely eliminates the validity of traditional cryptographic signatures. Consequently, any wallet utilizing deprecated formats would become effectively frozen.
The proposal’s authors explained, “This is not an offensive attack; rather, it is defensive.” Their position emphasizes proactive network safeguarding against emerging technological capabilities.
A third phase currently under consideration could introduce recovery mechanisms leveraging zero-knowledge cryptographic techniques. Such an approach would enable ownership authentication without revealing sensitive key information.
Growing Quantum Computing Capabilities Heighten Network Vulnerability
The Bitcoin network currently depends on the Elliptic Curve Digital Signature Algorithm to authenticate transactions and establish ownership credentials. This cryptographic framework operates through paired private and public key infrastructure to maintain asset security.
During transaction broadcasting, public keys become permanently recorded within the blockchain’s transparent ledger. Security experts caution that sufficiently powerful quantum processors could potentially derive private keys from this exposed information.
Recent analysis from Google’s quantum research division suggests these systems may require less computational capacity than previously calculated. Several expert assessments position the practical threat window as early as 2029.
Current blockchain analysis reveals approximately 6.7 million BTC remain stored in address formats susceptible to quantum-based attacks. These holdings could face significant security compromises should quantum decryption capabilities materialize.
Community opposition centers on concerns about imposed requirements within what was designed as a permissionless system. One participant argued, “Upgrade should be 100% voluntary.”
Another community member said, “This reeks of central planning with deadlines and forced migration.” Such reactions underscore growing divisions regarding the proposal’s implementation approach.
Proposal advocates counter that the measures serve essential protective functions for both network stability and individual asset security against malicious exploitation. They stress that failing to act could leave the entire ecosystem vulnerable to coordinated attacks.
Bitcoin Improvement Proposal 361 continues undergoing technical review within the official development repository following its latest revision. Ongoing deliberations among core contributors focus on practical deployment considerations and potential modifications.
