From mboxrd@z Thu Jan 1 00:00:00 1970 Delivery-date: Sun, 23 Mar 2025 18:29:17 -0700 Received: from mail-oo1-f59.google.com ([209.85.161.59]) by mail.fairlystable.org with esmtps (TLS1.3) tls TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (Exim 4.94.2) (envelope-from ) id 1twWct-00032G-44 for bitcoindev@gnusha.org; Sun, 23 Mar 2025 18:29:17 -0700 Received: by mail-oo1-f59.google.com with SMTP id 006d021491bc7-6021ab9731dsf3312207eaf.1 for ; Sun, 23 Mar 2025 18:29:15 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1742779749; cv=pass; d=google.com; s=arc-20240605; b=SkD0859RSn6r94bSRl2fjk0SOf14HnYH6kZeSZG8DCSaefNsTtK3yqtp76vMGQu6yh /6+BW9ur5zvC+ASUxu994cH09UaNGz62PE+2MTiukqqDwzYmMprVY4PR2O9p1gNmfjVv pKcCRpoKUHzQiGDr14CLTxdtYS268eHcN2zkopkVlSSm8xRX8tKYSQBMgbi3RAj+wwHA ioRR9XQcWmpQx2h/ySawx4XxJQf0yvPQ1MU1IDZXxFf1YbVcbuJe/5T9j//B4q0aypX/ MbzFkee3njGyOdGTphEmOoy2huVpzNlOrj+PLKetzEf9GKnq87oms8F32H0HvTomCmvc bQXA== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20240605; h=list-unsubscribe:list-subscribe:list-archive:list-help:list-post :list-id:mailing-list:precedence:to:date:message-id:subject :mime-version:from:content-transfer-encoding:sender:dkim-signature; bh=JKdFhfxW4Ol1hVPDaNKFcXRsmyS2w+O+1IIQvSfOrIY=; fh=TkfRp1HWc/HKa9kuoYN9bOm11n9WbDROgRB7h4ZTfww=; b=UZ/Y2sookRG7kPjcVEPfROyOvYRtPouW26RK3V7y5kW8mhWeIOqtMtJfcqrIMwMXfM oqXA1utE+A9pJYzCzPWl4KB6t6g92+lBymKj1SjhEhV+U58B91jk4vl2pKLN58oN2GG+ jxZqSYGsr2FKbVsdps9OSRszZlG1u5YQLOm+ljYHlw6x2g+DSJcAJcb9jqt7EZrwSYtt ZvDCAMVksE4IyZ4QarcvHs7mKkPCMkwsNTCxC7NBQh4wX+iDlNuizjDPJZ2jxPN6Alr/ ueYmLHN8dv3O5EBbJMKKpokZprrOlZmBb9hTzIRgO5l+s1UZlle0RfPb5dbo7Y17qHxR ISSQ==; darn=gnusha.org ARC-Authentication-Results: i=2; gmr-mx.google.com; spf=pass (google.com: domain of saulo@astrotown.de designates 54.38.158.53 as permitted sender) smtp.mailfrom=saulo@astrotown.de; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=astrotown.de DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=googlegroups.com; s=20230601; t=1742779749; x=1743384549; darn=gnusha.org; h=list-unsubscribe:list-subscribe:list-archive:list-help:list-post :list-id:mailing-list:precedence:x-original-authentication-results :x-original-sender:to:date:message-id:subject:mime-version:from :content-transfer-encoding:sender:from:to:cc:subject:date:message-id :reply-to; bh=JKdFhfxW4Ol1hVPDaNKFcXRsmyS2w+O+1IIQvSfOrIY=; b=bJ5YCzDBkgpdhF3SWWplWDM8DUs1J82AHneoOMZ8HdW7MchAIiXN2DCMC8ft7UcKmu P0RFstqZU7YOmS3/zl29DEFH1Rs3KqTQFDuBTWnckvEJmCSQ/TV0UEIArBGtwydPfjGd p/9iDF7duKgmXq6Hr5fHG7ZRuaaZ+9t+izRryVmFQRHA/w3sPV6lJ3xJwmwmhAeo68wW 11DZThMWESnQ297moQxIkYMQQzRV1sEhN7LV+rlyo2VravJ7eF9sTWw7DzLeFWNSs0Vz t+dqhbcYWxGx3jGij/UHWv8lQYnk/2ERo2UrD74i8uhDPdkHLDEbPxlpvO9JgKGIR80J BsXg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1742779749; x=1743384549; h=list-unsubscribe:list-subscribe:list-archive:list-help:list-post :list-id:mailing-list:precedence:x-original-authentication-results :x-original-sender:to:date:message-id:subject:mime-version:from :content-transfer-encoding:x-beenthere:x-gm-message-state:sender :from:to:cc:subject:date:message-id:reply-to; bh=JKdFhfxW4Ol1hVPDaNKFcXRsmyS2w+O+1IIQvSfOrIY=; b=pSs9X2mlC1iWfgdM4ORwwrsDampTsjElPRcOXjcOI6MWvZ+T0NDbbuNbu1o10STXdF qWGfOAWlqXbIiVLxMdwnIXb8MMvb5RzCfIwF2scPh+SnHv3Z42xg851tHQBDPdHBJXz9 i8GimYfBii79LKCoNrSd7BdcYJudHcwKUhnptwm7V+ZIk6MiF/vLXWx7Ix2qHbs+V0nQ 9/R+RBuZq/E4FjmzXKogNSFui0KydZVMVYk0SK9zOlxd674etgRRqdNGv03H+WtABqzX dnqETwlH7+r3wJGrT2pNaN0lwfpzxhZ2JCv9cJZtt3s1EWj33muIZ9Y8piW4UZMXtW/A 4/Og== Sender: bitcoindev@googlegroups.com X-Forwarded-Encrypted: i=2; AJvYcCW+mcY/uOpWNu4SbeCaYYKZ8hL1Osj8TyqU+OH2bwvtaeAOH03FIXE2T8+pQ9zyhvWL8mENWzOVhz5u@gnusha.org X-Gm-Message-State: AOJu0YxTu1aCJM6dyHgNoiYaEYnStAvGMJVtTQKe0bHe02BnFNevhFMc wjEuESWoZFCuCnHHfRhEmXe4Og7e5dep4EwOzKdhlVmCHlswqbA5 X-Google-Smtp-Source: AGHT+IH653aNxm5TaYgL2qwnYhpnbz16zA3vptDxkZ/OeVvKI2INRnuuvgCwoy31iq8JstdLEttYlQ== X-Received: by 2002:a05:6820:430a:b0:601:d8be:efcc with SMTP id 006d021491bc7-60228d05da3mr11145547eaf.4.1742779748873; Sun, 23 Mar 2025 18:29:08 -0700 (PDT) X-BeenThere: bitcoindev@googlegroups.com; h=ARLLPALpj4eE10r2GGBSdhCSzDJUcDKeG2mTY/akeb5bOSz2hQ== Received: by 2002:a4a:e6d6:0:b0:601:15b8:befd with SMTP id 006d021491bc7-60228f2812fls1347023eaf.1.-pod-prod-00-us; Sun, 23 Mar 2025 18:29:06 -0700 (PDT) X-Received: by 2002:a54:4013:0:b0:3f6:ab0d:8d90 with SMTP id 5614622812f47-3febeda6b19mr6065303b6e.3.1742779746248; Sun, 23 Mar 2025 18:29:06 -0700 (PDT) Received: by 2002:a50:cd07:0:b0:5e6:1486:31dd with SMTP id 4fb4d7f45d1cf-5ebccfc5e1bmsa12; Sat, 22 Mar 2025 12:02:28 -0700 (PDT) X-Received: by 2002:a17:907:e841:b0:ac2:32a:ee17 with SMTP id a640c23a62f3a-ac3f2100662mr816155166b.3.1742670145844; Sat, 22 Mar 2025 12:02:25 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1742670145; cv=none; d=google.com; s=arc-20240605; b=QHQ1SJBZXe2xeOnU36/iRRA7zC9RXn5ofllINoml06BCnYCJ4gahPzqqCWGqY41dof ino/QH1C559zOu2VzYO5xmqPKeaVBpvFNcCyT36A7SpV3y42FUy78Nb7EWH3j1vz7VDt SRHR3cOw4nCGkRJS4C7yYjPMkd4Y+i0QmdL0brBatHJmsIsTjO37h6f9ybuLLMXSgqdz ijrdyUA55pPxaGcH415SZWFu6dyGberDia3GdAh9A9nPWPOxH9UsJdVETCznGGdliLug tdWIuZ47XMkrbma2qpBfteWEaNb4EEd/mMoEUi8D+J6ZAe7G3CvkQZiM5J5fNU3fGPwC VQdQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20240605; h=to:date:message-id:subject:mime-version:from :content-transfer-encoding; bh=U30aT8I4hhk21e7Mbt8802EMuCLOkirhcRHw6ElSwME=; fh=VcGcg+Zjs9gw1uDcHbxsAILhBAcecnbJzZRdxgKVDIc=; b=Rn6HkpyuXA3nMbJJ/tu3CIxGVqIN7zwr+fxkXyqKTpIAHEXsgma79jtBSivRS0NBo7 1s0Dr2ppYj/M2rZQwi5oAksoWUteCvNEnWWS7se7vWMiNHoJK9a742OnV5OmWC4JZN74 +gPL5ezCnHdMAl4ne+/OaixFaFGXL6IhyEYqxKl6G1LQHEEJd2LnaAA+Fqabn2U5fQPs /0sK2hUqaLDeVo8NrFJVL2/5Kg0KWPUhOpdEhTX32PHyKx5WgkE7M6sLgSYXCW+XuNsn 4ZOqTnWvEnwyyO58EJ3788hh0dYj7FCreqvr+5tNxwp+amk7HnICIJiwEsZVLFPTCEwO ZKSQ==; dara=google.com ARC-Authentication-Results: i=1; gmr-mx.google.com; spf=pass (google.com: domain of saulo@astrotown.de designates 54.38.158.53 as permitted sender) smtp.mailfrom=saulo@astrotown.de; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=astrotown.de Received: from astrotown.de (astrotown.de. [54.38.158.53]) by gmr-mx.google.com with ESMTP id 4fb4d7f45d1cf-5ebcd098fe5si132618a12.4.2025.03.22.12.02.25 for ; Sat, 22 Mar 2025 12:02:25 -0700 (PDT) Received-SPF: pass (google.com: domain of saulo@astrotown.de designates 54.38.158.53 as permitted sender) client-ip=54.38.158.53; Received: from smtpclient.apple (unknown [209.198.144.183]) by astrotown.de (Postfix) with ESMTPSA id 39B464CA8 for ; Sat, 22 Mar 2025 20:02:25 +0100 (CET) Content-Type: multipart/alternative; boundary=Apple-Mail-0ACFD50B-3670-406F-BC40-FBA4063F0795 Content-Transfer-Encoding: 7bit From: AstroTown Mime-Version: 1.0 (1.0) Subject: Re: [bitcoindev] Against Allowing Quantum Recovery of Bitcoin Message-Id: Date: Sat, 22 Mar 2025 20:02:13 +0100 To: bitcoindev@googlegroups.com X-Mailer: iPhone Mail (22D82) X-Original-Sender: saulo@astrotown.de X-Original-Authentication-Results: gmr-mx.google.com; spf=pass (google.com: domain of saulo@astrotown.de designates 54.38.158.53 as permitted sender) smtp.mailfrom=saulo@astrotown.de; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=astrotown.de Precedence: list Mailing-list: list bitcoindev@googlegroups.com; contact bitcoindev+owners@googlegroups.com List-ID: X-Google-Group-Id: 786775582512 List-Post: , List-Help: , List-Archive: , List-Unsubscribe: , X-Spam-Score: 2.1 (++) --Apple-Mail-0ACFD50B-3670-406F-BC40-FBA4063F0795 Content-Type: text/html; charset="UTF-8" Content-Transfer-Encoding: quoted-printable
I= believe that having some entity announce the decision to freeze old UTXOs = would be more damaging to Bitcoin=E2=80=99s image (and its value) than havi= ng them gathered by QC. This would create another version of Bitcoin, simil= ar to Ethereum Classic, causing confusion in the market.

It would be better t= o simply implement the possibility of moving funds to a PQC address without= a deadline, allowing those who fail to do so to rely on luck to avoid havi= ng their coins stolen. Most coins would be migrated to PQC anyway, and in m= ost cases, only the lost ones would remain vulnerable. This is the free-mar= ket way to solve problems without imposing rules on everyone.

Saulo Fonseca


On 1= 6. Mar 2025, at 15:15, Jameson Lopp <jameson.lopp@gmai= l.com> wrote:

<= div dir=3D"ltr">The quantum computing debate is heating up. There are many = controversial aspects to this debate, including whether or not quantum comp= uters will ever actually become a practical threat.

I won't tread i= nto the unanswerable question of how worried we should be about quantum com= puters. I think it's far from a crisis, but given the difficulty in changin= g Bitcoin it's worth starting to seriously discuss. Today I wish to focus o= n a philosophical quandary related to one of the decisions that would need = to be made if and when we implement a quantum safe signature scheme.
Several Scenarios
Because this essay will refer= ence game theory a fair amount, and there are many variables at play that c= ould change the nature of the game, I think it's important to clarify the p= ossible scenarios up front.

1. Quantum computing never materializes,= never becomes a threat, and thus everything discussed in this essay is moo= t.
2. A quantum computing threat materializes suddenly and Bitcoin does = not have quantum safe signatures as part of the protocol. In this scenario = it would likely make the points below moot because Bitcoin would be fundame= ntally broken and it would take far too long to upgrade the protocol, walle= t software, and migrate user funds in order to restore confidence in the ne= twork.
3. Quantum computing advances slowly enough that we come to conse= nsus about how to upgrade Bitcoin and post quantum security has been minima= lly adopted by the time an attacker appears.
4. Quantum computing advanc= es slowly enough that we come to consensus about how to upgrade Bitcoin and= post quantum security has been highly adopted by the time an attacker appe= ars.

For the purposes of this post, I'm envisioning being in situati= on 3 or 4.

To Freeze or not to Freeze?
I'= ve started seeing more people weighing in on what is likely the most conten= tious aspect of how a quantum resistance upgrade should be handled in terms= of migrating user funds. Should quantum vulnerable funds be left open to b= e swept by anyone with a sufficiently powerful quantum computer OR should t= hey be permanently locked?

"I don't see why old coins should be confiscated. The better= option is to let those with quantum computers free up old coins. While thi= s might have an inflationary impact on bitcoin's price, to use a turn of ph= rase, the inflation is transitory. Those with low time preference should su= pport returning lost coins to circulation." 
- Hunter Beast
On the other hand:

"Of course they have to be confiscated. If and when (an= d that's a big if) the existence of a cryptography-breaking QC becomes a cr= edible threat, the Bitcoin ecosystem has no other option than softforking o= ut the ability to spend from signature schemes (including ECDSA and BIP340)= that are vulnerable to QCs. The alternative is that millions of BTC become= vulnerable to theft; I cannot see how the currency can maintain any value = at all in such a setting. And this affects everyone; even those which dilig= ently moved their coins to PQC-protected schemes."
- Pieter Wuille
I don't think "confiscation" is the most precise term to use, as= the funds are not being seized and reassigned. Rather, what we're really d= iscussing would be better described as "burning" - placing the funds <= b>out of reach of everyone.

Not freezing user funds is one of Bi= tcoin's inviolable properties. However, if quantum computing becomes a thre= at to Bitcoin's elliptic curve cryptography, an inviolable property= of Bitcoin will be violated one way or another.

Fundamental Properties at Risk
5 years ago I attempted to compr= ehensively categorize all of Bitcoin's fundamental properties that give it = value. https://nakamoto.com/what-are-the-key-properties-of-bitcoin/
<= /a>
The particular properties in play with regard to this issue seem to = be:

Censorship Resistance - No one should have the power= to prevent others from using their bitcoin or interacting with the network= .

Forward Compatibility - changing the rules such that c= ertain valid transactions become invalid could undermine confidence in the = protocol.

Conservatism - Users should not be expected to= be highly responsive to system issues.

As a result of the above pri= nciples, we have developed a strong meme (kudos to Andreas Antonopoulos) th= at goes as follows:

Not your keys, not your coins.

I posit that the corol= lary to this principle is:

Your keys, only your coins.

A quantum capabl= e entity breaks the corollary of this foundational principle. We secure our= bitcoin with the mathematical probabilities related to extremely large ran= dom numbers. Your funds are only secure because truly random large numbers = should not be guessable or discoverable by anyone else in the world.
This is the principle behind the motto vires in numeris -= strength in numbers. In a world with quantum enabled adversaries, this pri= nciple is null and void for many types of cryptography, including the ellip= tic curve digital signatures used in Bitcoin.

Who i= s at Risk?
There has long been a narrative that Satoshi's coins a= nd others from the Satoshi era of P2PK locking scripts that exposed the pub= lic key directly on the blockchain will be those that get scooped up by a q= uantum "miner." But unfortunately it's not that simple. If I had a powerful= quantum computer, which coins would I target? I'd go to the Bitcoin rich l= ist and find the wallets that have exposed their public keys due to re-usin= g addresses that have previously been spent from. You can easily find them = at 
https://bitinfocharts.com/top-100-richest-bitcoin-addresses.html<= /a>

Note that a few of these wallets, like Bitfinex / Kraken / Tethe= r, would be slightly harder to crack because they are multisig wallets. So = a quantum attacker would need to reverse engineer 2 keys for Kraken or 3 fo= r Bitfinex / Tether in order to spend funds. But many are single signature.=

Point being, it's not only the really old lost BTC that are at risk= to a quantum enabled adversary, at least at time of writing. If we add a q= uantum safe signature scheme, we should expect those wallets to be some of = the first to upgrade given their incentives.

The Et= hical Dilemma: Quantifying Harm
Which decision results in the mos= t harm?

By making quantum vulnerable funds unspendable we potentiall= y harm some Bitcoin users who were not paying attention and neglected to mi= grate their funds to a quantum safe locking script. This violates the "cons= ervativism" principle stated earlier. On the flip side, we prevent those fu= nds plus far more lost funds from falling into the hands of the few privile= ged folks who gain early access to quantum computers.

By leaving qua= ntum vulnerable funds available to spend, the same set of users who would o= therwise have funds frozen are likely to see them stolen. And many early ad= opters who lost their keys will eventually see their unreachable funds scoo= ped up by a quantum enabled adversary.

Imagine, for example, being J= ames Howells, who accidentally threw away a hard drive with 8,000 BTC on it= , currently worth over $600M USD. He has spent a decade trying to retrieve = it from the landfill where he knows it's buried, but can't get permission t= o excavate. I suspect that, given the choice, he'd prefer those funds be pe= rmanently frozen rather than fall into someone else's possession - I know I= would.

Allowing a quantum computer to access lost funds doesn't mak= e those users any worse off than they were before, however it would= have a negative impact upon everyone who is currently holding bitcoin.<= br>
It's prudent to expect significant economic disruption if large amou= nts of coins fall into new hands. Since a quantum computer is going to have= a massive up front cost, expect those behind it to desire to recoup their = investment. We also know from experience that when someone suddenly finds t= hemselves in possession of 9+ figures worth of highly liquid assets, they t= end to diversify into other things by selling.

Allowing quantum reco= very of bitcoin is tantamount to wealth redistribution. What we= 'd be allowing is for bitcoin to be redistributed from those who are ignora= nt of quantum computers to those who have won the technological race to acq= uire quantum computers. It's hard to see a bright side to that scenario.
Is Quantum Recovery Good for Anyone?

Do= es quantum recovery HELP anyone? I've yet to come across an argument that i= t's a net positive in any way. It certainly doesn't add any security to the= network. If anything, it greatly decreases the security of the network by = allowing funds to be claimed by those who did not earn them.

But wai= t, you may be thinking, wouldn't quantum "miners" have earned their coins b= y all the work and resources invested in building a quantum computer? I sup= pose, in the same sense that a burglar earns their spoils by the resources = they invest into surveilling targets and learning the skills needed to brea= k into buildings. What I say "earned" I mean through productive mutual trad= e.

For example:

* Investors earn BTC by trading for other cur= rencies.
* Merchants earn BTC by trading for goods and services.
* Mi= ners earn BTC by trading thermodynamic security.
* Quantum miners don't = trade anything, they are vampires feeding upon the system.

There's n= o reason to believe that allowing quantum adversaries to recover vulnerable= bitcoin will be of benefit to anyone other than the select few organizatio= ns that win the technological arms race to build the first such computers. = Probably nation states and/or the top few largest tech companies.

On= e could certainly hope that an organization with quantum supremacy is benev= olent and acts in a "white hat" manner to return lost coins to their owners= , but that's incredibly optimistic and foolish to rely upon. Such a situati= on creates an insurmountable ethical dilemma of only recovering lost bitcoi= n rather than currently owned bitcoin. There's no way to precisely differen= tiate between the two; anyone can claim to have lost their bitcoin but if t= hey have lost their keys then proving they ever had the keys becomes rather= difficult. I imagine that any such white hat recovery efforts would have t= o rely upon attestations from trusted third parties like exchanges.

= Even if the first actor with quantum supremacy is benevolent, we must assum= e the technology could fall into adversarial hands and thus think adversari= ally about the potential worst case outcomes. Imagine, for example, that No= rth Korea continues scooping up billions of dollars from hacking crypto exc= hanges and decides to invest some of those proceeds into building a quantum= computer for the biggest payday ever...

Downsides = to Allowing Quantum Recovery
Let's think through an exhaustive li= st of pros and cons for allowing or preventing the seizure of funds by a qu= antum adversary.

Historical Precedent
Pre= vious protocol vulnerabilities weren=E2=80=99t celebrated as "fair game" bu= t rather were treated as failures to be remediated. Treating quantum theft = differently risks rewriting Bitcoin=E2=80=99s history as a free-for-all rat= her than a system that seeks to protect its users.

= Violation of Property Rights
Allowing a quantum adversary to take= control of funds undermines the fundamental principle of cryptocurrency - = if you keep your keys in your possession, only you should be able to access= your money. Bitcoin is built on the idea that private keys secure an indiv= idual=E2=80=99s assets, and unauthorized access (even via advanced tech) is= theft, not a legitimate transfer.

Erosion of Trust= in Bitcoin
If quantum attackers can exploit vulnerable addresses= , confidence in Bitcoin as a secure store of value would collapse. Users an= d investors rely on cryptographic integrity, and widespread theft could dri= ve adoption away from Bitcoin, destabilizing its ecosystem.

This is = essentially the counterpoint to claiming the burning of vulnerable funds is= a violation of property rights. While some will certainly see it as such, = others will find the apathy toward stopping quantum theft to be similarly c= oncerning.

Unfair Advantage
Quantum attac= kers, likely equipped with rare and expensive technology, would have an unj= ust edge over regular users who lack access to such tools. This creates an = inequitable system where only the technologically elite can exploit others,= contradicting Bitcoin=E2=80=99s ethos of decentralized power.

Bitco= in is designed to create an asymmetric advantage for DEFENDING one's wealth= . It's supposed to be impractically expensive for attackers to crack the en= tropy and cryptography protecting one's coins. But now we find ourselves di= scussing a situation where this asymmetric advantage is compromised in favo= r of a specific class of attackers.

Economic Disrup= tion
Large-scale theft from vulnerable addresses could crash Bitc= oin=E2=80=99s price as quantum recovered funds are dumped on exchanges. Thi= s would harm all holders, not just those directly targeted, leading to broa= der financial chaos in the markets.

Moral Responsib= ility
Permitting theft via quantum computing sets a precedent tha= t technological superiority justifies unethical behavior. This is essential= ly taking a "code is law" stance in which we refuse to admit that both code= and laws can be modified to adapt to previously unforeseen situations.
=
Burning of coins can certainly be considered a form of theft, thus I th= ink it's worth differentiating the two different thefts being discussed:
1. self-enriching & likely malicious
2. harm prevention & n= ot necessarily malicious

Both options lack the consent of the party = whose coins are being burnt or transferred, thus I think the simple argumen= t that theft is immoral becomes a wash and it's important to drill down int= o the details of each.

Incentives Drive Security
I can tell you from a decade of working in Bitcoin security - the a= verage user is lazy and is a procrastinator. If Bitcoiners are given a "dro= p dead date" after which they know vulnerable funds will be burned, this pr= essure accelerates the adoption of post-quantum cryptography and strengthen= s Bitcoin long-term. Allowing vulnerable users to delay upgrading indefinit= ely will result in more laggards, leaving the network more exposed when qua= ntum tech becomes available.

Steel Manning
Clearly this is a complex and controversial topic, thus it's worth thinki= ng through the opposing arguments.

Protecting Prope= rty Rights
Allowing quantum computers to take vulnerable bitcoin = could potentially be spun as a hard money narrative - we care so greatly ab= out not violating someone's access to their coins that we allow them to be = stolen!

But I think the flip side to the property rights narrative i= s that burning vulnerable coins prevents said property from falling into un= deserving hands. If the entire Bitcoin ecosystem just stands around and all= ows quantum adversaries to claim funds that rightfully belong to other user= s, is that really a "win" in the "protecting property rights" category? It = feels more like apathy to me.

As such, I think the "protecting prope= rty rights" argument is a wash.

Quantum Computers W= on't Attack Bitcoin
There is a great deal of skepticism that suff= iciently powerful quantum computers will ever exist, so we shouldn't bother= preparing for a non-existent threat. Others have argued that even if such = a computer was built, a quantum attacker would not go after bitcoin because= they wouldn't want to reveal their hand by doing so, and would instead att= ack other infrastructure.

It's quite difficult to quantify exactly h= ow valuable attacking other infrastructure would be. It also really depends= upon when an entity gains quantum supremacy and thus if by that time most = of the world's systems have already been upgraded. While I think you could = argue that certain entities gaining quantum capability might not attack Bit= coin, it would only delay the inevitable - eventually somebody will achieve= the capability who decides to use it for such an attack.

Quantum Attackers Would Only Steal Small Amounts
Some have= argued that even if a quantum attacker targeted bitcoin, they'd only go af= ter old, likely lost P2PK outputs so as to not arouse suspicion and cause a= market panic.

I'm not so sure about that; why go after 50 BTC at a = time when you could take 250,000 BTC with the same effort as 50 BTC? This i= s a classic "zero day exploit" game theory in which an attacker knows they = have a limited amount of time before someone else discovers the exploit and= either benefits from it or patches it. Take, for example, the recent ByBit= attack - the highest value crypto hack of all time. Lazarus Group had comp= romised the Safe wallet front end JavaScript app and they could have simply= had it reassign ownership of everyone's Safe wallets as they were interact= ing with their wallet. But instead they chose to only specifically target B= yBit's wallet with $1.5 billion in it because they wanted to maximize their= extractable value. If Lazarus had started stealing from every wallet, they= would have been discovered quickly and the Safe web app would likely have = been patched well before any billion dollar wallets executed the malicious = code.

I think the "only stealing small amounts" argument is stronges= t for Situation #2 described earlier, where a quantum attacker arrives befo= re quantum safe cryptography has been deployed across the Bitcoin ecosystem= . Because if it became clear that Bitcoin's cryptography was broken AND the= re was nowhere safe for vulnerable users to migrate, the only logical optio= n would be for everyone to liquidate their bitcoin as quickly as possible. = As such, I don't think it applies as strongly for situations in which we ha= ve a migration path available.

The 21 Million Coin = Supply Should be in Circulation
Some folks are arguing that it's = important for the "circulating / spendable" supply to be as close to 21M as= possible and that having a significant portion of the supply out of circul= ation is somehow undesirable.

While the "21M BTC" attribute is a str= ong memetic narrative, I don't think anyone has ever expected that it would= all be in circulation. It has always been understood that many coins will = be lost, and that's actually part of the game theory of owning bitcoin!
=
And remember, the 21M number in and of itself is not a particularly imp= ortant detail - it's not even mentioned in the whitepaper. What's important= is that the supply is well known and not subject to change.

Self-Sovereignty and Personal Responsibility
Bitcoin=E2= =80=99s design empowers individuals to control their own wealth, free from = centralized intervention. This freedom comes with the burden of securing on= e's private keys. If quantum computing can break obsolete cryptography, the= fault lies with users who didn't move their funds to quantum safe locking = scripts. Expecting the network to shield users from their own negligence un= dermines the principle that you, and not a third party, are accountable for= your assets.

I think this is generally a fair point that "the commu= nity" doesn't owe you anything in terms of helping you. I think that we do,= however, need to consider the incentives and game theory in play with rega= rd to quantum safe Bitcoiners vs quantum vulnerable Bitcoiners. More on tha= t later.

Code is Law
Bitcoin operates on = transparent, immutable rules embedded in its protocol. If a quantum attacke= r uses superior technology to derive private keys from public keys, they=E2= =80=99re not "hacking" the system - they're simply following what's mathema= tically permissible within the current code. Altering the protocol to stop = this introduces subjective human intervention, which clashes with the objec= tive, deterministic nature of blockchain.

While I tend to agree that= code is law, one of the entire points of laws is that they can be amended = to improve their efficacy in reducing harm. Leaning on this point seems mor= e like a pro-ossification stance that it's better to do nothing and allow h= arm to occur rather than take action to stop an attack that was foreseen fa= r in advance.

Technological Evolution as a Feature,= Not a Bug
It's well known that cryptography tends to weaken over= time and eventually break. Quantum computing is just the next step in this= progression. Users who fail to adapt (e.g., by adopting quantum-resistant = wallets when available) are akin to those who ignored technological advance= ments like multisig or hardware wallets. Allowing quantum theft incentivize= s innovation and keeps Bitcoin=E2=80=99s ecosystem dynamic, punishing compl= acency while rewarding vigilance.

Market Signals Dr= ive Security
If quantum attackers start stealing funds, it sends = a clear signal to the market: upgrade your security or lose everything. Thi= s pressure accelerates the adoption of post-quantum cryptography and streng= thens Bitcoin long-term. Coddling vulnerable users delays this necessary ev= olution, potentially leaving the network more exposed when quantum tech bec= omes widely accessible. Theft is a brutal but effective teacher.

Centralized Blacklisting Power

Burning vulnerable f= unds requires centralized decision-making - a soft fork to invalidate certa= in transactions. This sets a dangerous precedent for future interventions, = eroding Bitcoin=E2=80=99s decentralization. If quantum theft is blocked, wh= at=E2=80=99s next - reversing exchange hacks? The system must remain neutra= l, even if it means some lose out.

I think this could be a potential= slippery slope if the proposal was to only burn specific addresses. Rather= , I'd expect a neutral proposal to burn all funds in locking script types t= hat are known to be quantum vulnerable. Thus, we could eliminate any subjec= tivity from the code.

Fairness in Competition
Quantum attackers aren't cheating; they're using publicly available ph= ysics and math. Anyone with the resources and foresight can build or access= quantum tech, just as anyone could mine Bitcoin in 2009 with a CPU. Early = adopters took risks and reaped rewards; quantum innovators are doing the sa= me. Calling it =E2=80=9Cunfair=E2=80=9D ignores that Bitcoin has never prom= ised equality of outcome - only equality of opportunity within its rules.
I find this argument to be a mischaracterization because we're not ta= lking about CPUs. This is more akin to talking about ASICs, except each ASI= C costs millions if not billions of dollars. This is out of reach from all = but the wealthiest organizations.

Economic Resilien= ce
Bitcoin has weathered thefts before (MTGOX, Bitfinex, FTX, etc= ) and emerged stronger. The market can absorb quantum losses, with unaffect= ed users continuing to hold and new entrants buying in at lower prices. Fea= r of economic collapse overestimates the impact - the network=E2=80=99s ant= ifragility thrives on such challenges.

This is a big grey area becau= se we don't know when a quantum computer will come online and we don't know= how quickly said computers would be able to steal bitcoin. If, for example= , the first generation of sufficiently powerful quantum computers were stea= ling less volume than the current block reward then of course it will have = minimal economic impact. But if they're taking thousands of BTC per day and= bringing them back into circulation, there will likely be a noticeable mar= ket impact as it absorbs the new supply.

This is where the circumsta= nces will really matter. If a quantum attacker appears AFTER the Bitcoin pr= otocol has been upgraded to support quantum resistant cryptography then we = should expect the most valuable active wallets will have upgraded and the j= uiciest target would be the 31,000 BTC in the address 12ib7dApVFvg82TXKycWB= NpN8kFyiAN1dr which has been dormant since 2010. In general I'd expect that= the amount of BTC re-entering the circulating supply would look somewhat s= imilar to the mining emission curve: volume would start off very high as th= e most valuable addresses are drained and then it would fall off as quantum= computers went down the list targeting addresses with less and less BTC.
Why is economic impact a factor worth considering? Miners and busines= ses in general. More coins being liquidated will push down the price, which= will negatively impact miner revenue. Similarly, I can attest from working= in the industry for a decade, that lower prices result in less demand from= businesses across the entire industry. As such, burning quantum vulnerable= bitcoin is good for the entire industry.

Practical= ity & Neutrality of Non-Intervention
There=E2=80=99s no relia= ble way to distinguish =E2=80=9Ctheft=E2=80=9D from legitimate "white hat" = key recovery. If someone loses their private key and a quantum computer rec= overs it, is that stealing or reclaiming? Policing quantum actions requires= invasive assumptions about intent, which Bitcoin=E2=80=99s trustless desig= n can=E2=80=99t accommodate. Letting the chips fall where they may avoids t= his mess.

Philosophical Purity
Bitcoin re= jects bailouts. It=E2=80=99s a cold, hard system where outcomes reflect pre= paration and skill, not sentimentality. If quantum computing upends the gam= e, that=E2=80=99s the point - Bitcoin isn=E2=80=99t meant to be safe or fai= r in a nanny-state sense; it=E2=80=99s meant to be free. Users who lose fun= ds to quantum attacks are casualties of liberty and their own ignorance, no= t victims of injustice.

Bitcoin's DAO Moment=
This situation has some similarities to The DAO hack of an Ethereum sma= rt contract in 2016, which resulted in a fork to stop the attacker and retu= rn funds to their original owners. The game theory is similar because it's = a situation where a threat is known but there's some period of time before = the attacker can actually execute the theft. As such, there's time to mitig= ate the attack by changing the protocol.

It also created a schism in= the community around the true meaning of "code is law," resulting in Ether= eum Classic, which decided to allow the attacker to retain control of the s= tolen funds.

A soft fork to burn vulnerable bitcoin could certainly = result in a hard fork if there are enough miners who reject the soft fork a= nd continue including transactions.

Incentives Matt= er
We can wax philosophical until the cows come home, but what ar= e the actual incentives for existing Bitcoin holders regarding this decisio= n?

"Lost coins= only make everyone else's coins worth slightly more. Think of it as a dona= tion to everyone." - Satoshi Nakamoto

If true, the corollar= y is:

"Quantum= recovered coins only make everyone else's coins worth less. Think of it as= a theft from everyone." - Jameson Lopp

Thus, assuming we g= et to a point where quantum resistant signatures are supported within the B= itcoin protocol, what's the incentive to let vulnerable coins remain spenda= ble?

* It's not good for the actual owners of those coins. It disinc= entivizes owners from upgrading until perhaps it's too late.
* It's not = good for the more attentive / responsible owners of coins who have quantum = secured their stash. Allowing the circulating supply to balloon will assure= dly reduce the purchasing power of all bitcoin holders.

Forking Game Theory
From a game theory point of view, I se= e this as incentivizing users to upgrade their wallets. If you disagree wit= h the burning of vulnerable coins, all you have to do is move your funds to= a quantum safe signature scheme. Point being, I don't see there being an e= conomic majority (or even more than a tiny minority) of users who would fig= ht such a soft fork. Why expend significant resources fighting a fork when = you can just move your coins to a new address?

Remember that blockin= g spending of certain classes of locking scripts is a tightening of the rul= es - a soft fork. As such, it can be meaningfully enacted and enforced by a= mere majority of hashpower. If miners generally agree that it's in their b= est interest to burn vulnerable coins, are other users going to care enough= to put in the effort to run new node software that resists the soft fork? = Seems unlikely to me.

How to Execute Burning=
In order to be as objective as possible, the goal would be to announce = to the world that after a specific block height / timestamp, Bitcoin nodes = will no longer accept transactions (or blocks containing such transactions)= that spend funds from any scripts other than the newly instituted quantum = safe schemes.

It could take a staggered approach to first freeze fun= ds that are susceptible to long-range attacks such as those in P2PK scripts= or those that exposed their public keys due to previously re-using address= es, but I expect the additional complexity would drive further controversy.=

How long should the grace period be in order to give the ecosystem = time to upgrade? I'd say a minimum of 1 year for software wallets to upgrad= e. We can only hope that hardware wallet manufacturers are able to implemen= t post quantum cryptography on their existing hardware with only a firmware= update.

Beyond that, it will take at least 6 months worth of block = space for all users to migrate their funds, even in a best case scenario. T= hough if you exclude dust UTXOs you could probably get 95% of BTC value mig= rated in 1 month. Of course this is a highly optimistic situation where eve= ryone is completely focused on migrations - in reality it will take far lon= ger.

Regardless, I'd think that in order to reasonably uphold Bitcoi= n's conservatism it would be preferable to allow a 4 year migration window.= In the meantime, mining pools could coordinate emergency soft forking logi= c such that if quantum attackers materialized, they could accelerate the co= untdown to the quantum vulnerable funds burn.

Rando= m Tangential Benefits
On the plus side, burning all quantum vulne= rable bitcoin would allow us to prune all of those UTXOs out of the UTXO se= t, which would also clean up a lot of dust. Dust UTXOs are a bit of an anno= yance and there has even been a recent proposal for how to incentivize clea= ning them up.

We should also expect that incentivizing migration of = the entire UTXO set will create substantial demand for block space that wil= l sustain a fee market for a fairly lengthy amount of time.

In Summary
While the moral quandary of violating any of = Bitcoin's inviolable properties can make this a very complex issue to discu= ss, the game theory and incentives between burning vulnerable coins versus = allowing them to be claimed by entities with quantum supremacy appears to b= e a much simpler issue.

I, for one, am not interested in rewarding q= uantum capable entities by inflating the circulating money supply just beca= use some people lost their keys long ago and some laggards are not upgradin= g their bitcoin wallet's security.

We can hope that this scenario ne= ver comes to pass, but hope is not a strategy.

I welcome your feedba= ck upon any of the above points, and contribution of any arguments I failed= to consider.

= -- 
You received this message because you are subscribed to the Goo= gle Groups "Bitcoin Development Mailing List" group.
To unsubscribe from= this group and stop receiving emails from it, send an email to 
bitcoindev+unsubscribe= @googlegroups.com.
To view this discussion visit https://groups.google.com/d/msgid/bitcoindev/CADL_X_cF%3DUKVa7= CitXReMq8nA_4RadCF%3D%3DkU4YG%2B0GYN97P6hQ%40mail.gmail.com.

--
You received this message because you are subscribed to the Google Groups &= quot;Bitcoin Development Mailing List" group.
To unsubscribe from this group and stop receiving emails from it, send an e= mail to bitcoind= ev+unsubscribe@googlegroups.com.
To view this discussion visit https://groups.google.com/d/msgid/bitcoindev/= E8269A1A-1899-46D2-A7CD-4D9D2B732364%40astrotown.de.
--Apple-Mail-0ACFD50B-3670-406F-BC40-FBA4063F0795--