Skip to main content
A vintage typewriter with a paper displaying the term Quantum Computing.
Crypto Watch

Bitcoin devs bet on a quantum bounty instead of fixed freeze

Bitcoin developers are debating a radical shift in how the network will respond to the inevitable quantum computing threat.

Bitcoin developers are debating a radical shift in how the network will respond to the inevitable quantum computing threat. Instead of implementing a pre-scheduled, fixed freeze on vulnerable older wallets, a new proposal suggests a "wait and react" mechanism that only restricts funds if the threat is proven on-chain. This approach fundamentally changes the risk profile of the network's most vulnerable assets. The core of the proposal, outlined by BitMEX Research, centers on a "canary" address.

Subscribe to the channels

Key Points

  • The Mechanics of the Quantum Canary System
  • A Departure from BIP-361’s Mandates
  • The Uncomfortable Bet on the Attacker

Overview

Bitcoin developers are debating a radical shift in how the network will respond to the inevitable quantum computing threat. Instead of implementing a pre-scheduled, fixed freeze on vulnerable older wallets, a new proposal suggests a "wait and react" mechanism that only restricts funds if the threat is proven on-chain. This approach fundamentally changes the risk profile of the network's most vulnerable assets.

The core of the proposal, outlined by BitMEX Research, centers on a "canary" address. This specialized address would hold a bounty that can only be unlocked by a quantum-capable attacker. Any successful spend from this address would serve as undeniable, public proof that Bitcoin's current digital signature scheme has been broken. This single event would then automatically trigger a network-wide freeze on all older, vulnerable wallets.

This mechanism attempts to balance the urgent need for security upgrades with the need to maintain Bitcoin's core principle of private key sovereignty. It replaces the certainty of a predetermined timeline with a conditional response, shifting the burden of proof onto the attacker.

The Mechanics of the Quantum Canary System
A close-up of a golden Bitcoin highlighting its digital currency design.

The Mechanics of the Quantum Canary System

The proposed canary system introduces a financial incentive layer to the quantum threat model. It works by allowing users to contribute Bitcoin to the special canary address, effectively creating a bounty. The reward is designed to entice the first entity capable of executing a quantum attack to claim it publicly.

The structure is intended to be self-correcting. If the threat is real, the attacker is financially incentivized to reveal their capability through the bounty mechanism, rather than attempting a silent, massive theft. This public demonstration of capability would trigger the necessary network-wide restrictions.

Furthermore, the proposal includes a "safety window." This feature does not immediately lock down all vulnerable coins. Instead, it allows vulnerable funds to move, but the recipient would be unable to spend them for an extended period—potentially up to a year. This creates a significant deterrent against stealth attacks. If the canary is triggered during this safety window, those coins would be retroactively frozen, dramatically increasing the risk for any attacker attempting to quietly drain funds.

Golden Bitcoin displayed prominently on a white background showcasing cryptocurrency value.

A Departure from BIP-361’s Mandates

The canary system is positioned as a direct alternative to BIP-361, a controversial proposal that has long dominated the discussion around quantum preparedness. BIP-361 advocates for imposing restrictions on vulnerable addresses over a fixed, pre-scheduled timeline, regardless of whether quantum computers are actually capable of breaking Bitcoin's signature schemes.

Critics have labeled the fixed-timeline approach "authoritarian and confiscatory." The primary objection centers on the idea that such a mandate undermines Bitcoin's foundational principle: that control over funds rests solely with the private key holder. A fixed, scheduled freeze, even if implemented gradually, suggests an external authority dictating access rights based on a future, unproven technological capability.

The canary model sidesteps this political and philosophical hurdle. By making the network response conditional on proof, it maintains the illusion of self-sovereignty. The network does not restrict funds based on a calendar date; it restricts funds based on a verifiable, on-chain event—the successful execution of a quantum attack.


The Uncomfortable Bet on the Attacker

Despite its technical elegance in avoiding pre-emptive confiscation, the canary system rests on a highly speculative and uncomfortable assumption. The entire mechanism hinges on the belief that the first entity capable of breaking Bitcoin's cryptography will choose to claim the bounty rather than maximizing profit through stealth theft.

This is the central vulnerability of the plan. If a state actor or a sophisticated criminal group possesses quantum capabilities but chooses to operate quietly, they could potentially drain vulnerable wallets on a massive scale without triggering the canary address. Such a quiet theft would bypass the bounty mechanism entirely, leaving the network vulnerable without the public signal required to activate the freeze.

The proposal also requires users to contribute funds to the bounty address. While the structure allows for withdrawals at any time, this initial contribution represents a trust mechanism, requiring participants to bet on the system's integrity and the attacker's behavior. The success of the entire plan is therefore predicated on a behavioral prediction about the world's most powerful adversaries.