Quantum computing could break Bitcoin’s cryptography tomorrow - but Roastbeef just showed it might not matter.
On Bitcoin Optech, the developer demonstrated a recovery system using ZK-Starks on RISC Zero. Users prove ownership of a BIP-32 seed without exposing private keys, bypassing SECP256k1 entirely. Initial proofs were bulky, but recursive verification cut them to 200KB - small enough for on-chain use in an emergency.
"The idea is to prove you derived a key correctly from a seed, without revealing the seed or the key."
- Roastbeef, Bitcoin Optech
This isn’t a protocol upgrade. It’s a break-glass mechanism. If quantum computers crack ECDSA, users could reclaim funds via cryptographic proof, not signature. The tool shifts the threat model: Bitcoin’s security no longer hinges solely on unbroken math.
Meanwhile, Antoine Poinsot used Cygnet to stress-test old attack vectors. Blocks exploiting quadratic hashing took over a minute to validate - a DoS risk if centralized pools weaponize them. BIP-347 would close these loopholes, including time-warp exploits.
"We’re not proposing changes to how Bitcoin works today. We’re preparing for the day it doesn’t."
- Antoine Poinsot, Bitcoin Optech
Light client performance is advancing too. Chaba Pursky’s benchmarks show binary fuse filters speed up mobile wallet syncing by up to 45x compared to GCS. The trade-off? Slightly more false positives and bandwidth. But the shift could reduce reliance on centralized block explorers like mempool.
