Since the user can't prove that they are using this technique, or petertodd's timelock encryption for that matter, an attacker has little incentive to stop physically attacking until they have a spendable UTXO.

I believe you can get the same effect with on-chain timelocks, or delete-the-bits plus a rangeproof and a zero-knowledge proof that the rangeproof corresponds to some secret that can be used to derive the expected public key. I think Jeremy Rubin had an idea for such a proof.

Also, adam3us has described a similar thought here:
https://bitcointalk.org/index.php?topic=311000.0

- Bryan

On Fri, Oct 4, 2019, 4:43 AM Saulo Fonseca via bitcoin-dev <bitcoin-dev@lists.linuxfoundation.org> wrote:
Hi everyone

If you are a hodler, I like to propose the creation of a key stretching as a new layer of protection over your current wallet.