‘Technologically impossible’: Could Kentucky bill threaten crypto self-custody?

ambcryptoОпубліковано о 2026-03-20Востаннє оновлено о 2026-03-20

Анотація

Kentucky's proposed HB 380 amendment aims to regulate cryptocurrency kiosks but includes a controversial provision requiring hardware wallet providers to reset users' seed phrases upon request. The Bitcoin Policy Institute warns this measure would effectively outlaw self-custody, calling it "technologically impossible" and a violation of Bitcoin’s core security principles. They argue it would push users toward centralized custodians, increasing vulnerability to hacks. The amendment, added last minute, has drawn criticism for potentially infringing on residents' rights to secure their digital assets. Meanwhile, only seven U.S. states have established strategic Bitcoin reserves, with the federal government holding the largest share globally.

Kentucky is under scrutiny ahead of its planned passage of a key crypto legislation that would ban self-custody wallets.

According to the Bitcoin Policy Institute, a research and advocacy group, Kentucky’s HB 380 amendment would harm residents. The firm noted,

BPI has just learned of an amendment buried in Kentucky HB 380 that would require hardware wallet providers to reset users’ seed phrases on request. This would effectively outlaw self-custody in Kentucky.

Source: BPI

Kentucky crypto plans

The HB 380 is an amendment to the 77-page virtual currency kiosk legislation, part of a broader effort to regulate crypto ATMs, especially those that facilitate BTC transfers.

It was a last-minute amendment added in January. It requires hardware providers to be able to reset and recover users’ hardware wallet passwords and seed phrases, something BPI called ‘technologically impossible.’

The mandate is technologically impossible for non-custodial wallets. Requiring a backdoor for seed phrase recovery breaks Bitcoin’s fundamental security guarantees and pushes users toward centralized custodians that are vulnerable to hacks and failures.

The advocacy group wrote to the Kentucky Senate, informing it of the harmful nature of the amendment’s language. It added that the legislators should “protect Kentucky constituents’ right to secure their property.”

However, one analyst noted that ‘commercial hardware wallets’ are vulnerable to government overreach because their parent firms are legal entities operating in different jurisdictions.

Race for strategic Bitcoin reserve

Last year, at the state level, the race for the strategic Bitcoin reserve (SBR) became hot. But, as of 2026, only a handful of states in the U.S. have managed to codify the plans into law. Currently, only seven states have approved an SBR, including Arizona, Texas, and New Mexico.

At the federal level, however, there’s been little commitment or update on whether the U.S. SBR will be established. Even so, the U.S. now holds 328,272 BTC, about 1.5% of the total supply.

This was nearly half of the total 650,296 BTC held by governments, making the U.S. the top holder, followed by China at 190,000 BTC and the UK at 61,245 BTC.


Final Summary

  • The Bitcoin Policy Institute pressed the Kentucky Senate to reconsider its recent amendment on crypto ATM rules to safeguard self-custody.
  • There are about 7 U.S. states with approved strategic BTC reserve frameworks.

Пов'язані питання

QWhat is the main concern raised by the Bitcoin Policy Institute regarding Kentucky's HB 380 amendment?

AThe Bitcoin Policy Institute is concerned that the amendment would require hardware wallet providers to reset users' seed phrases on request, which they call 'technologically impossible' and argue it would effectively outlaw self-custody in Kentucky.

QWhy does the Bitcoin Policy Institute claim the mandate in HB 380 is 'technologically impossible'?

AThey state it is technologically impossible for non-custodial wallets because requiring a backdoor for seed phrase recovery breaks Bitcoin's fundamental security guarantees.

QWhat is the primary purpose of the broader HB 380 legislation that this amendment is a part of?

AHB 380 is an amendment to virtual currency kiosk legislation, which is part of a broader effort to regulate crypto ATMs, especially those that facilitate BTC transfers.

QHow many U.S. states have approved a strategic Bitcoin reserve (SBR) framework as of 2026, according to the article?

AAs of 2026, seven U.S. states have approved a strategic Bitcoin reserve framework.

QWhich country is the largest government holder of Bitcoin, and how much does it hold?

AThe United States is the largest government holder of Bitcoin, with 328,272 BTC, which is about 1.5% of the total supply.

Пов'язані матеріали

From Theft to Re-entry: How Was $292 Million "Laundered"?

A sophisticated crypto laundering operation was executed following the $292 million hack of Kelp DAO on April 18. The attack, attributed to the North Korean Lazarus group, began with anonymous infrastructure preparation using Tornado Cash to fund wallets untraceably. The hacker exploited a vulnerability in Kelp’s cross-chain bridge, stealing 116,500 rsETH. To avoid crashing the market, the attacker used Aave and Compound as laundering tools—depositing the stolen rsETH as collateral to borrow $190 million in clean, liquid ETH. This move triggered a bank run on Aave, causing an $8 billion drop in TVL. After consolidating funds, the attacker fragmented them across hundreds of wallets to evade detection. A major breakpoint was THORChain, where over $460 million in volume—30 times its usual activity—was processed in 24 hours, converting ETH into Bitcoin. This shift to Bitcoin’s UTXO model exponentially increased tracing complexity by shattering funds into countless untraceable fragments. The final destination was Tron-based USDT, the primary channel for illicit crypto flows. From there, funds were cashed out via OTC brokers in China and Southeast Asia, using unlicensed underground banks and UnionPay networks outside Western sanctions scope. Ultimately, the laundered money supports North Korea’s weapons programs, which rely heavily on crypto hacking for foreign currency. The incident underscores structural challenges in DeFi: its openness, composability, and lack of central control make such laundering not just possible, but inherently difficult to prevent.

marsbit7 хв тому

From Theft to Re-entry: How Was $292 Million "Laundered"?

marsbit7 хв тому

Google and Amazon Simultaneously Invest Heavily in a Competitor: The Most Absurd Business Logic of the AI Era Is Becoming Reality

In a span of four days, Amazon announced an additional $25 billion investment, and Google pledged up to $40 billion—both direct competitors pouring over $65 billion into the same AI startup, Anthropic. Rather than a typical venture capital move, this signals the latest escalation in the cloud wars. The core of the deal is not equity but compute pre-orders: Anthropic must spend the majority of these funds on AWS and Google Cloud services and chips, effectively locking in massive future compute consumption. This reflects a shift in cloud market dynamics—enterprises now choose cloud providers based on which hosts the best AI models, not just price or stability. With OpenAI deeply tied to Microsoft, Anthropic’s Claude has become the only viable strategic asset for Google and Amazon to remain competitive. Anthropic’s annualized revenue has surged to $30 billion, and it is expanding into verticals like biotech, positioning itself as a cross-industry AI infrastructure layer. However, this funding comes with constraints: Anthropic’s independence is challenged as it balances two rival investors, its safety-first narrative faces pressure from regulatory scrutiny, and its path to IPO introduces new financial pressures. Globally, this accelerates a "tri-polar" closed-loop structure in AI infrastructure, with Microsoft-OpenAI, Google-Anthropic, and Amazon-Anthropic forming exclusive model-cloud alliances. In contrast, China’s landscape differs—investments like Alibaba and Tencent backing open-source model firm DeepSeek reflect a more decoupled approach, though closed-source models from major cloud providers still dominate. The $65 billion bet is ultimately about securing a seat at the table in an AI-defined future—where missing the model layer means losing the cloud war.

marsbit6 год тому

Google and Amazon Simultaneously Invest Heavily in a Competitor: The Most Absurd Business Logic of the AI Era Is Becoming Reality

marsbit6 год тому

Computing Power Constrained, Why Did DeepSeek-V4 Open Source?

DeepSeek-V4 has been released as a preview open-source model, featuring 1 million tokens of context length as a baseline capability—previously a premium feature locked behind enterprise paywalls by major overseas AI firms. The official announcement, however, openly acknowledges computational constraints, particularly limited service throughput for the high-end DeepSeek-V4-Pro version due to restricted high-end computing power. Rather than competing on pure scale, DeepSeek adopts a pragmatic approach that balances algorithmic innovation with hardware realities in China’s AI ecosystem. The V4-Pro model uses a highly sparse architecture with 1.6T total parameters but only activates 49B during inference. It performs strongly in agentic coding, knowledge-intensive tasks, and STEM reasoning, competing closely with top-tier closed models like Gemini Pro 3.1 and Claude Opus 4.6 in certain scenarios. A key strategic product is the Flash edition, with 284B total parameters but only 13B activated—making it cost-effective and accessible for mid- and low-tier hardware, including domestic AI chips from Huawei (Ascend), Cambricon, and Hygon. This design supports broader adoption across developers and SMEs while stimulating China's domestic semiconductor ecosystem. Despite facing talent outflow and intense competition in user traffic—with rivals like Doubao and Qianwen leading in monthly active users—DeepSeek has maintained technical momentum. The release also comes amid reports of a new funding round targeting a valuation exceeding $10 billion, potentially setting a new record in China’s LLM sector. Ultimately, DeepSeek-V4 represents a shift toward open yet realistic infrastructure development in the constrained compute landscape of Chinese AI, emphasizing engineering efficiency and domestic hardware compatibility over pure model scale.

marsbit6 год тому

Computing Power Constrained, Why Did DeepSeek-V4 Open Source?

marsbit6 год тому

Торгівля

Спот
Ф'ючерси
活动图片