Share this article

Bitcoin Devs Float Proposal to Freeze Quantum-Vulnerable Addresses — Even Satoshi Nakamoto’s

Bitcoin’s cryptography has never faced an existential threat and still doesn’t, except preemptive ones that can possibly target early wallets.

Updated Jul 16, 2025, 5:54 p.m. Published Jul 16, 2025, 10:30 a.m.
A statue of Satoshi Nakamoto, a presumed pseudonym used by the inventor of Bitcoin, is displayed in Graphisoft Park on September 22, 2021 in Budapest, Hungary. The statue's creators, Reka Gergely and Tamas Gilly, used anonymized facial features, as Nakamoto's true identify remains unconfirmed. (Photo by Janos Kummer/Getty Images)

What to know:

  • A new Bitcoin proposal aims to freeze coins secured by legacy cryptography to protect against future quantum computer threats.
  • The proposal, co-authored by Jameson Lopp, outlines a phased approach to transition Bitcoin to quantum-resistant formats.
  • Researchers warn that quantum computers capable of breaking Bitcoin's encryption could emerge by 2027, posing a significant threat to the cryptocurrency's security.

A new Bitcoin draft proposal wants to do what’s long been unthinkable: Freeze coins secured by legacy cryptography — including those in Satoshi Nakamoto’s wallets — before quantum computers can crack them.

That’s according to a new draft proposal co-authored by Jameson Lopp and other crypto security researchers, which introduces a phased soft fork that turns quantum migration into a ticking clock. Fail to upgrade, and your coins become unspendable.

STORY CONTINUES BELOW
Don't miss another story.Subscribe to the The Protocol Newsletter today. See all newsletters

That includes the roughly 1.1 million BTC tied to early pay-to-pubkey addresses, like those of Satoshi’s and other early miners.

“This proposal is radically different from any in Bitcoin's history just as the threat posed by quantum computing is radically different from any other threat in Bitcoin's history,” the authors explained as a motivation for the proposal. “Never before has Bitcoin faced an existential threat to its cryptographic primitives.”

“A successful quantum attack on Bitcoin would result in significant economic disruption and damage across the entire ecosystem. Beyond its impact on price, the ability of miners to provide network security may be significantly impacted,” they added.

The draft BIP outlined three phases:

Phase A: Banning sending funds to legacy ECDSA/Schnorr addresses, nudging users toward quantum-resistant formats like P2QRH. (Starts 3 years after BIP-360 implementation)

Phase B: Make all legacy signatures invalid at the consensus layer. Coins in quantum-vulnerable addresses become permanently frozen. (Kicks in 2 years after Phase A)

Phase C (optional): Introduce a recovery path for stuck coins using zero-knowledge proof of BIP-39 seed possession. This could be a hard or soft fork.

But Why Now?

Bitcoin’s cryptography has never faced an existential threat and still doesn’t, except pre-emptive ones that can possibly target early wallets. Researchers say quantum computers capable of breaking ECDSA may arrive as soon as 2027.

A May report by CoinDesk flagged a new study suggesting that breaking RSA encryption with quantum computers may require 20 times fewer resources than previously thought.

Although Bitcoin uses elliptic curve cryptography, it remains vulnerable to quantum attacks similar to those threatening RSA. Current quantum computers are not yet capable of breaking these encryption methods, but research is rapidly advancing.

Earlier in July, eight legacy Bitcoin wallets moved over $8.5 billion worth of 'Satoshi-era' bitcoin after 15 years of dormancy — sparking speculation, among some, about moving to wallets with improved security as

That’s the red line for Lopp and the team.

Around 25% of all bitcoin have exposed their public keys, meaning they’re vulnerable to a “Q-day” style attack. If attackers are patient, they could use quantum tools to quietly drain dormant wallets over time without tripping alarms.

“Quantum attackers could compute the private key for known public keys then transfer all funds weeks or months later, in a covert bleed to not alert chain watchers,” the draft proposal stated. “Q-Day may be only known much later if the attack withholds broadcasting transactions in order to postpone revealing their capabilities.”

The proposal is still in draft stage and has no BIP number yet. And it may be the only way Bitcoin survives a quantum future.

Read more: Is Crypto Ready for Q-Day?

More For You

Pudgy Penguins: A New Blueprint for Tokenized Culture

Pudgy Title Image

Pudgy Penguins is building a multi-vertical consumer IP platform — combining phygital products, games, NFTs and PENGU to monetize culture at scale.

What to know:

Pudgy Penguins is emerging as one of the strongest NFT-native brands of this cycle, shifting from speculative “digital luxury goods” into a multi-vertical consumer IP platform. Its strategy is to acquire users through mainstream channels first; toys, retail partnerships and viral media, then onboard them into Web3 through games, NFTs and the PENGU token.

The ecosystem now spans phygital products (> $13M retail sales and >1M units sold), games and experiences (Pudgy Party surpassed 500k downloads in two weeks), and a widely distributed token (airdropped to 6M+ wallets). While the market is currently pricing Pudgy at a premium relative to traditional IP peers, sustained success depends on execution across retail expansion, gaming adoption and deeper token utility.

More For You

Bitcoin's Quantum threat is ‘real but distant,’ says Wall Street analyst as doomsday debate rages on

quantum computer

Wall Street broker Benchmark argued the crypto network has ample time to evolve as quantum risks shift from theory to risk management.

What to know:

  • Broker Benchmark said Bitcoin’s main vulnerability lies in exposed public keys, not the protocol itself.
  • Coinbase’s new Quantum Advisory Council marks a shift from theoretical concern to institutional response.
  • Bitcoin’s architecture is conservative but adaptable, according to Benchmark analyst Mark Palmer, with a long runway for upgrades.