The Bitcoin protocol may soon force users to move their coins or lose access. BIP 361, co-authored by Jameson Lopp, proposes a three-phase soft fork that would eventually invalidate spending from legacy addresses with exposed public keys - 34% of all Bitcoin. The trigger: the looming threat of cryptographically relevant quantum computers capable of reverse-engineering private keys.
David Bennett dismisses claims like Project 11’s 15-bit key break as marketing stunts. Breaking a 15-bit key is trivial compared to 256-bit elliptic curve cryptography. "The gap," he says, "is like the distance between the sun and the edge of the known universe." Yet the vulnerability of exposed public keys is real, and the network’s oldest wallets are the most at risk.
Bennett argues that Bitcoin developers have known about quantum risks since 2010. But BIP 361 marks a philosophical shift - away from "your keys, your coins" and toward mandatory user action. "This isn't protection," he warns, "it's coercion." The proposal would even freeze the legendary Satoshi coins, which have never moved.
"Your keys should work even if you've been in a coma for twenty years."
- Q, Ungovernable Misfits
Nick Carter, a backer of Project 11, sees the alarmism as justified. He believes Bitcoin must act before a state-level actor cracks ECC at scale. But Bennett counters that Carter and others are using the threat to push Ethereum-aligned post-quantum solutions. The debate is as much about ecosystem influence as it is about security.
Meanwhile, Nunchuck’s new CLI enables AI agents to manage Bitcoin under human-enforced miniscript policies. It’s a step toward secure automation - exactly the kind of innovation that could be jeopardized if protocol changes fracture consensus. As Q noted, reducing friction matters, but not at the cost of core principles.
"The government failed to distinguish between the immutable protocol and the user interface."
- Q, Ungovernable Misfits
Forcing migration may prevent future theft, but it risks breaking the promise that Bitcoin is forever. The network faces a choice: adapt with coercion, or trust users to protect themselves.
