Bitcoiners push for quantum-resistant BIP-360 upgrade as debate heats up

cointelegraphPublicado a 2025-12-18Actualizado a 2025-12-18

Resumen

A group of Bitcoin advocates and fund managers is urging the network to accelerate the adoption of quantum-resistant cryptography, citing BIP-360 as a potential solution. Proponents like Charles Edwards of Capriole warn that a significant portion of Bitcoin could be vulnerable to quantum attacks within years and argue for a migration deadline by 2028. However, critics including Adam Back of Blockstream dismiss these concerns as premature, stating quantum threats are “decades away” and emphasizing that Bitcoin doesn’t rely on encryption vulnerable to near-term quantum breaks. Debate continues as Taproot adoption declines, possibly reflecting user anxiety, while alternative quantum-resistant signature schemes like hash-based proposals from Blockstream Research gain attention.

A small but growing group of Bitcoin advocates and crypto fund managers is urging the network to accelerate work on quantum-resistant signatures, arguing that the perception of a future “quantum threat” could become a market risk long before it becomes a practical one.

Some supporters are pointing to a draft Bitcoin Improvement Proposal known as BIP-360, which would introduce a post-quantum signature option for Bitcoin addresses that could be vulnerable to future advances in quantum computing.

The implementation must be finalized and deployed in 2026, said Charles Edwards, the founder of quantitative Bitcoin (BTC) and digital asset fund Capriole.

However, the implementation of the new standard would require wider consensus among hardware wallet providers, node operators and cryptocurrency exchanges, added Capriole in a Thursday X post. Around “20-30% of Bitcoin will be taken by a quantum hacker in the next few years,” Edwards said. “I believe we should burn all coins that do not migrate to BIP-360 by 2028.”

Source: Charles Edwards

Related: Bitcoin treasuries stall in Q4, but largest holders keep stacking sats

However, other industry watchers see quantum computing as a short-term risk for Bitcoin’s price.

“Pro-tip for quantum FUD promoters. Bitcoin does not use encryption. Get your basics right, or it’s a tell,” wrote Adam Back, co-founder and CEO of Blockstream, and the inventor of Hashcash, in a Thursday X post, adding that the quantum computing threat is still “decades away.”

Samson Mow, the CEO of Bitcoin technology company Jan3, also mocked the idea of early quantum computing threatening the Bitcoin network.

“Quantum computing can’t even factor 21, yet people are panic selling because they think it will kill Bitcoin,” wrote Mow in a Wednesday X post.

Related: Bitcoin investor loses retirement fund in AI-fueled romance scam

Taproot questions and competing proposals

Bitcoin’s latest Taproot format, which is perceived as quantum vulnerable, is declining in usage, from 42% of transactions in 2024 to just 20%, signaling that users may be worried about Bitcoin's quantum threat.

Source: Willy Woo

“I’ve NEVER seen the latest format losing adoption before. Taproot is Quantum Vulnerable, while older SegWit and Legacy are not,” wrote Bitcoin analyst Willy Woo, in a Wednesday X post.

Bitcoin’s Taproot update is the most important upgrade the cryptocurrency has experienced since 2017, when Segregated Witness (SegWit) was activated. Taproot aimed to upgrade the privacy and efficiency of the Bitcoin network.

Meanwhile, Back, one of the leading cryptographers, proposed a new hash-based signature scheme as a promising post-quantum alternative for Bitcoin, where security would rely solely on hash function assumptions similar to the ones currently used in the Bitcoin network’s design.

Hash-based signature schemes for Bitcoin, research paper. Source: Blockstream Research

Hash-based signature schemes like ECDSA and Schnorr signatures “offer a promising path for securing Bitcoin in a post-quantum world,” according to the paper released by Back’s Blockstream Research on Dec. 5.

The Elliptic Curve Digital Signature Algorithm (ECDSA) uses elliptic-curve cryptography to verify the authenticity and integrity of a message. Schnorr signatures are another signature scheme praised for enhancing privacy and reducing data size, due to their ability to combine multiple signatures into one.

Magazine: Bitcoin vs. the quantum computer threat — Timeline and solutions (2025–2035)

Preguntas relacionadas

QWhat is the main purpose of the proposed BIP-360 upgrade for Bitcoin?

AThe main purpose of the proposed BIP-360 upgrade is to introduce a post-quantum signature option for Bitcoin addresses, making them resistant to potential future attacks from advanced quantum computers.

QAccording to Charles Edwards, by when must the quantum-resistant implementation be deployed, and what is his proposal for non-migrated coins?

ACharles Edwards stated that the implementation must be finalized and deployed by 2026, and he proposed that all coins not migrated to BIP-360 by 2028 should be burned.

QWhy is Bitcoin's Taproot format considered a decline in usage significant, as noted by Willy Woo?

AThe decline in Taproot usage, from 42% of transactions in 2024 to just 20%, is significant because it is the first time a newer Bitcoin format has lost adoption. This signals that users may be concerned about Taproot's vulnerability to quantum threats, unlike older SegWit and Legacy formats.

QWhat alternative post-quantum solution did Adam Back and Blockstream Research propose for Bitcoin?

AAdam Back and Blockstream Research proposed a new hash-based signature scheme as a post-quantum alternative. This scheme's security relies solely on hash function assumptions, similar to those already used in Bitcoin's design, with ECDSA and Schnorr signatures being highlighted as promising paths.

QWhat are the differing views on the immediacy of the quantum computing threat to Bitcoin, as presented in the article?

AThe article presents differing views: Charles Edwards and others see it as a near-term market risk, urging immediate action. In contrast, Adam Back and Samson Mow consider the quantum threat to be decades away or currently insignificant, with Mow mocking the idea that quantum computing, which 'can't even factor 21,' is a reason for panic selling.

Lecturas Relacionadas

From Theft to Re-entry: How Was $292 Million "Laundered"?

A sophisticated crypto laundering operation was executed following the $292 million hack of Kelp DAO on April 18. The attack, attributed to the North Korean Lazarus group, began with anonymous infrastructure preparation using Tornado Cash to fund wallets untraceably. The hacker exploited a vulnerability in Kelp’s cross-chain bridge, stealing 116,500 rsETH. To avoid crashing the market, the attacker used Aave and Compound as laundering tools—depositing the stolen rsETH as collateral to borrow $190 million in clean, liquid ETH. This move triggered a bank run on Aave, causing an $8 billion drop in TVL. After consolidating funds, the attacker fragmented them across hundreds of wallets to evade detection. A major breakpoint was THORChain, where over $460 million in volume—30 times its usual activity—was processed in 24 hours, converting ETH into Bitcoin. This shift to Bitcoin’s UTXO model exponentially increased tracing complexity by shattering funds into countless untraceable fragments. The final destination was Tron-based USDT, the primary channel for illicit crypto flows. From there, funds were cashed out via OTC brokers in China and Southeast Asia, using unlicensed underground banks and UnionPay networks outside Western sanctions scope. Ultimately, the laundered money supports North Korea’s weapons programs, which rely heavily on crypto hacking for foreign currency. The incident underscores structural challenges in DeFi: its openness, composability, and lack of central control make such laundering not just possible, but inherently difficult to prevent.

marsbitHace 7 min(s)

From Theft to Re-entry: How Was $292 Million "Laundered"?

marsbitHace 7 min(s)

Google and Amazon Simultaneously Invest Heavily in a Competitor: The Most Absurd Business Logic of the AI Era Is Becoming Reality

In a span of four days, Amazon announced an additional $25 billion investment, and Google pledged up to $40 billion—both direct competitors pouring over $65 billion into the same AI startup, Anthropic. Rather than a typical venture capital move, this signals the latest escalation in the cloud wars. The core of the deal is not equity but compute pre-orders: Anthropic must spend the majority of these funds on AWS and Google Cloud services and chips, effectively locking in massive future compute consumption. This reflects a shift in cloud market dynamics—enterprises now choose cloud providers based on which hosts the best AI models, not just price or stability. With OpenAI deeply tied to Microsoft, Anthropic’s Claude has become the only viable strategic asset for Google and Amazon to remain competitive. Anthropic’s annualized revenue has surged to $30 billion, and it is expanding into verticals like biotech, positioning itself as a cross-industry AI infrastructure layer. However, this funding comes with constraints: Anthropic’s independence is challenged as it balances two rival investors, its safety-first narrative faces pressure from regulatory scrutiny, and its path to IPO introduces new financial pressures. Globally, this accelerates a "tri-polar" closed-loop structure in AI infrastructure, with Microsoft-OpenAI, Google-Anthropic, and Amazon-Anthropic forming exclusive model-cloud alliances. In contrast, China’s landscape differs—investments like Alibaba and Tencent backing open-source model firm DeepSeek reflect a more decoupled approach, though closed-source models from major cloud providers still dominate. The $65 billion bet is ultimately about securing a seat at the table in an AI-defined future—where missing the model layer means losing the cloud war.

marsbitHace 6 hora(s)

Google and Amazon Simultaneously Invest Heavily in a Competitor: The Most Absurd Business Logic of the AI Era Is Becoming Reality

marsbitHace 6 hora(s)

Computing Power Constrained, Why Did DeepSeek-V4 Open Source?

DeepSeek-V4 has been released as a preview open-source model, featuring 1 million tokens of context length as a baseline capability—previously a premium feature locked behind enterprise paywalls by major overseas AI firms. The official announcement, however, openly acknowledges computational constraints, particularly limited service throughput for the high-end DeepSeek-V4-Pro version due to restricted high-end computing power. Rather than competing on pure scale, DeepSeek adopts a pragmatic approach that balances algorithmic innovation with hardware realities in China’s AI ecosystem. The V4-Pro model uses a highly sparse architecture with 1.6T total parameters but only activates 49B during inference. It performs strongly in agentic coding, knowledge-intensive tasks, and STEM reasoning, competing closely with top-tier closed models like Gemini Pro 3.1 and Claude Opus 4.6 in certain scenarios. A key strategic product is the Flash edition, with 284B total parameters but only 13B activated—making it cost-effective and accessible for mid- and low-tier hardware, including domestic AI chips from Huawei (Ascend), Cambricon, and Hygon. This design supports broader adoption across developers and SMEs while stimulating China's domestic semiconductor ecosystem. Despite facing talent outflow and intense competition in user traffic—with rivals like Doubao and Qianwen leading in monthly active users—DeepSeek has maintained technical momentum. The release also comes amid reports of a new funding round targeting a valuation exceeding $10 billion, potentially setting a new record in China’s LLM sector. Ultimately, DeepSeek-V4 represents a shift toward open yet realistic infrastructure development in the constrained compute landscape of Chinese AI, emphasizing engineering efficiency and domestic hardware compatibility over pure model scale.

marsbitHace 6 hora(s)

Computing Power Constrained, Why Did DeepSeek-V4 Open Source?

marsbitHace 6 hora(s)

Trading

Spot
Futuros

Artículos destacados

Cómo comprar PUSH

¡Bienvenido a HTX.com! Hemos hecho que comprar Push Protocol (PUSH) sea simple y conveniente. Sigue nuestra guía paso a paso para iniciar tu viaje de criptos.Paso 1: crea tu cuenta HTXUtiliza tu correo electrónico o número de teléfono para registrarte y obtener una cuenta gratuita en HTX. Experimenta un proceso de registro sin complicaciones y desbloquea todas las funciones.Obtener mi cuentaPaso 2: ve a Comprar cripto y elige tu método de pagoTarjeta de crédito/débito: usa tu Visa o Mastercard para comprar Push Protocol (PUSH) al instante.Saldo: utiliza fondos del saldo de tu cuenta HTX para tradear sin problemas.Terceros: hemos agregado métodos de pago populares como Google Pay y Apple Pay para mejorar la comodidad.P2P: tradear directamente con otros usuarios en HTX.Over-the-Counter (OTC): ofrecemos servicios personalizados y tipos de cambio competitivos para los traders.Paso 3: guarda tu Push Protocol (PUSH)Después de comprar tu Push Protocol (PUSH), guárdalo en tu cuenta HTX. Alternativamente, puedes enviarlo a otro lugar mediante transferencia blockchain o utilizarlo para tradear otras criptomonedas.Paso 4: tradear Push Protocol (PUSH)Tradear fácilmente con Push Protocol (PUSH) en HTX's mercado spot. Simplemente accede a tu cuenta, selecciona tu par de trading, ejecuta tus trades y monitorea en tiempo real. Ofrecemos una experiencia fácil de usar tanto para principiantes como para traders experimentados.

192 Vistas totalesPublicado en 2024.12.13Actualizado en 2025.03.21

Cómo comprar PUSH

Discusiones

Bienvenido a la comunidad de HTX. Aquí puedes mantenerte informado sobre los últimos desarrollos de la plataforma y acceder a análisis profesionales del mercado. A continuación se presentan las opiniones de los usuarios sobre el precio de PUSH (PUSH).

活动图片