Get the latest crypto news, updates, and reports by subscribing to our free newsletter.
Giấy phép số 4978/GP-TTĐT do Sở Thông tin và Truyền thông Hà Nội cấp ngày 14 tháng 10 năm 2019 / Giấy phép SĐ, BS GP ICP số 2107/GP-TTĐT do Sở TTTT Hà Nội cấp ngày 13/7/2022.
© 2026 Index.vn
A Bitcoin developer has created a working prototype intended to protect wallet holders if quantum computers ever threaten the network’s core cryptography. The solution was posted by Olaoluwa Osuntokun, CTO of Lightning Labs, to the Bitcoin developer mailing list.
Bitcoin wallets rely on elliptic curve cryptography to keep private keys hidden from public view. Classical computers cannot realistically derive a private key from a public key within any practical timeframe. However, quantum computers running Shor’s algorithm change that assumption.
Google researchers recently published findings suggesting a quantum computer could compromise Bitcoin’s cryptography in as little as nine minutes. The estimate also involves far fewer physical qubits than earlier research had projected, shortening the timeline compared with what the field previously assumed.
The article also notes that around 6.9 million Bitcoin across Taproot and older P2PK address formats are already in an exposed state. Their public keys are permanently recorded on the blockchain, making them potential targets for a sufficiently powerful quantum computer.
The Bitcoin developer community had already outlined an emergency soft fork to disable Taproot’s key path spend mechanism if a quantum attack became imminent. The plan, however, creates a secondary issue.
Disabling the key path spend mechanism would strand funds in most modern single-signature Taproot wallets. These wallets depend entirely on that mechanism and have no alternative spending path. In that scenario, owners would lose access to their funds permanently—not through theft, but because they would be unable to authorize transactions.
Osuntokun’s prototype uses a zk-STARK proof to bypass the disabled mechanism. The proof demonstrates that a specific public key was derived from a master seed using the standard BIP-32 derivation path, without revealing the seed or any private key material.
According to the article, the prototype generates a valid proof in 50 seconds on a standard MacBook using Metal GPU acceleration. It uses approximately 12 gigabytes of RAM and produces a proof of 1.7 megabytes.
Osuntokun also said the codebase is largely unoptimized, implying that a production build would run faster and generate smaller proofs. The article adds that multiple proofs could be aggregated into a single compact proof to reduce on-chain verification overhead.
The proposed approach would allow the Bitcoin network to verify the proof and authorize legitimate wallet owners to move their funds. As described, this means the emergency defense mechanism could be used without permanently locking holders out of their own wallets.
Premium gym chains are entering a “golden era” that is ending or already in decline, as rising operating costs collide with shifting consumer preferences toward more flexible, community-based ways to exercise. Long-term memberships are shrinking, margins are pressured by higher rents and facility expenses, and competition from smaller, more personalized…