The Bitcoin developer community is currently embroiled in a high-stakes technical and philosophical debate following the publication of Bitcoin Improvement Proposal 361 (BIP-361) on GitHub. Authored by prominent industry figures, including Casa co-founder and Chief Technology Officer Jameson Lopp, the proposal outlines a comprehensive, multi-year strategy to transition the Bitcoin network toward quantum resistance. While the proposal is framed as a necessary defense against the future emergence of cryptographically relevant quantum computers (CRQCs), it has drawn sharp criticism for its inclusion of mechanisms that would effectively invalidate or "confiscate" approximately 1.7 million BTC currently held in legacy addresses, including those believed to belong to Bitcoin’s pseudonymous creator, Satoshi Nakamoto.
The document, titled "BIP-361: Quantum-Resistant Transition," was officially submitted on April 13, marking a pivotal moment in the ongoing discussion regarding Bitcoin’s long-term viability. As quantum computing technology advances, researchers warn that the Elliptic Curve Digital Signature Algorithm (ECDSA) and Schnorr signatures, which currently secure the Bitcoin network, could be compromised. BIP-361 seeks to address this existential threat by forcing a migration to post-quantum cryptographic (PQC) standards, but the proposed method of enforcement has raised fundamental questions about the nature of property rights and immutability within the decentralized ecosystem.
The Quantum Threat: A Technical Overview
At the heart of the proposal lies the scientific reality of Shor’s algorithm, a quantum algorithm developed by mathematician Peter Shor in 1994. Shor’s algorithm demonstrates that a sufficiently powerful quantum computer could factor large integers and solve discrete logarithm problems in polynomial time. For Bitcoin, this means that the private keys associated with specific types of addresses could be derived from their public keys.
The vulnerability is most acute for early Bitcoin addresses utilizing the Pay-to-Public-Key (P2PK) format. In the network’s earliest days, public keys were recorded directly on the blockchain. While later iterations, such as Pay-to-Public-Key-Hash (P2PKH), provide a layer of protection by hashing the public key—keeping it hidden until a transaction is initiated—the P2PK format leaves the public key exposed. It is estimated that roughly 1.7 million BTC, worth tens of billions of dollars at current market prices, reside in these vulnerable legacy formats. This includes the "Satoshi coins," which have remained unmoved for over a decade.
If a quantum adversary were to gain access to a CRQC, they could theoretically scan the blockchain for these exposed public keys, calculate the corresponding private keys, and drain the funds before the owners have a chance to migrate them to secure addresses. Proponents of BIP-361 argue that the network must act before this "quantum doomsday" scenario becomes a reality.
The Three-Phase Roadmap of BIP-361
BIP-361 proposes a structured timeline to transition the network, divided into three distinct phases aimed at incentivizing and eventually forcing user migration to quantum-secure addresses.

Phase A: The Prevention Period
Scheduled to begin approximately three years after the proposal’s activation (or roughly 160,000 blocks), Phase A would implement a soft fork to prevent any new funds from being sent to quantum-vulnerable addresses. During this period, the network would still allow spends from existing legacy addresses, but it would prohibit "change" from being sent back to vulnerable formats. This phase is designed to "stop the bleeding" and ensure that the pool of vulnerable assets does not continue to grow as the quantum threat nears.
Phase B: The Hard Deadline and Invalidation
The most controversial aspect of the proposal occurs in Phase B, slated for two years after the conclusion of Phase A. In this stage, the network would undergo a hard fork that renders all ECDSA and Schnorr signatures originating from legacy addresses invalid. Effectively, any Bitcoin that has not been moved to a designated quantum-resistant address by this deadline would become unspendable. Proponents describe this as a "proactive defense," arguing that it is better for the network to "burn" or lock these coins rather than allow them to be seized by a malicious quantum-capable actor, which could result in a catastrophic market collapse.
Phase C: Research and Recovery Mechanisms
Recognizing the severity of Phase B, the authors have included a third phase focused on "rescue" mechanisms. This phase explores the use of Zero-Knowledge Proofs (ZK-proofs) to allow legitimate owners to reclaim their funds after the Phase B deadline. The proposal suggests that if a user retains their BIP-39 seed phrase—the standard for modern wallet recovery—they might be able to generate a cryptographic proof of ownership that does not reveal their vulnerable private key to the network. This would allow them to "teleport" their legacy balance to a new, quantum-secure address. However, this technology is still in the research phase and its implementation remains a significant technical hurdle.
Community Backlash and the Ideological Divide
The publication of BIP-361 has ignited a firestorm within the Bitcoin community, highlighting a deep rift between those who prioritize security and those who prioritize immutability. Critics argue that the proposal represents a dangerous departure from Bitcoin’s core tenets.
Olaoluwa Osuntokun, the CTO of Lightning Labs and a prominent Bitcoin developer, has emerged as a vocal opponent of the plan. Osuntokun characterized the proposal as "authoritarian" and "confiscatory," suggesting that it undermines the fundamental promise of Bitcoin: that it is "unstoppable money" that cannot be seized or altered by any central authority, including the developers themselves.
"This is effectively a planned redistribution of wealth or a forced burning of coins based on a hypothetical future threat," Osuntokun remarked in a public response. He argued that the group of developers advocating for such a change must be resisted, as their actions could set a precedent for future interventions that compromise the sanctity of the ledger.
Opponents also point out the logistical and ethical nightmare of Phase B. Millions of users—including those who have lost access to their keys, those in long-term cold storage, and the heirs of deceased holders—would find their assets suddenly worthless. Furthermore, the "burning" of Satoshi’s coins is seen by some as a sacrilegious act that would permanently alter the supply dynamics and historical integrity of the network.

Proponents’ Defense: The "Incentive to Upgrade"
Jameson Lopp and other supporters of BIP-361 maintain that the proposal is not an act of aggression, but an "individual incentive to upgrade." They argue that the current state of Bitcoin is akin to a city built on a fault line; while the earthquake has not yet happened, the structural weaknesses are known, and failing to retro-fit the buildings is a form of negligence.
From their perspective, a quantum attack on 1.7 million BTC would not just be a loss for the individual holders, but a systemic shock to the entire Bitcoin economy. If an attacker suddenly moved $100 billion worth of "zombie" coins, the resulting sell pressure and loss of confidence in the network’s security could drive the price of Bitcoin toward zero. BIP-361 is positioned as a way to ensure that only "active" and "aware" participants continue to hold value in the system, thereby insulating the network from the fallout of a quantum breach.
Broader Implications and the Path Forward
The debate over BIP-361 mirrors similar discussions occurring across the broader financial and technological landscape. The National Institute of Standards and Technology (NIST) in the United States has been working for years to standardize post-quantum cryptographic algorithms, and many traditional financial institutions are already beginning their transition to "quantum-safe" systems.
However, Bitcoin’s decentralized nature makes such a transition uniquely difficult. Unlike a bank or a centralized corporation, Bitcoin cannot simply push a mandatory update. Any change to the consensus rules requires the broad agreement of miners, node operators, and users. The "Block Size War" of 2017 proved how difficult it is to achieve consensus on even minor technical changes; a proposal as radical as BIP-361 is likely to face years of scrutiny and potential rejection.
Furthermore, the technical feasibility of Phase C—the recovery through ZK-proofs—is not guaranteed. If the recovery mechanism fails or is found to be insecure, Phase B would truly become a permanent confiscation event.
As it stands, BIP-361 remains a draft proposal on GitHub. Its presence there serves as a stark reminder of the technical debt that Bitcoin carries from its early years and the looming challenge of future-proofing a trillion-dollar asset class. Whether the community will eventually accept a "hard deadline" for security or choose to let the coins remain vulnerable in the name of immutability is a question that will likely define the next decade of Bitcoin development.
For now, the proposal has succeeded in one of its primary goals: forcing the community to confront the quantum reality. As quantum computers move from the realm of theoretical physics to practical engineering, the window for a peaceful transition in the world’s largest cryptocurrency may be slowly closing. The resolution of the BIP-361 debate will ultimately determine whether Bitcoin can survive the transition into the quantum era without sacrificing the principles that led to its creation.

































