Bitcoin Developers Propose 'Wait and React' Strategy to Counter Quantum Computing Threats

The Bitcoin community is considering a novel approach to addressing the potential threat of quantum computing to the network's security. Instead of implementing a pre-scheduled freeze on vulnerable coins, the proposed 'wait and react' strategy would only trigger a network-wide restriction if a quantum-capable attacker demonstrates their capability. This approach is based on a 'canary' system, where a small amount of bitcoin is placed in a special address that can only be unlocked by a quantum-capable attacker, serving as public proof of the threat. The proposal includes a bounty system to incentivize the first entity to demonstrate a quantum attack, allowing them to claim a reward rather than exploiting the vulnerability for personal gain. However, this approach relies on the assumption that the attacker will prioritize claiming the bounty over maximizing their profits through theft. The 'wait and react' strategy is designed to provide an alternative to the controversial BIP-361 proposal, which would impose a fixed five-year timeline for implementing security measures, potentially resulting in the confiscation of coins that are not migrated to new, quantum-resistant addresses. Critics of BIP-361 argue that it undermines Bitcoin's core principle of private key holder control. The proposed 'canary' system introduces a 'safety window' to make stealth attacks more difficult, allowing vulnerable coins to be frozen retroactively if the canary is triggered during this period. However, the success of this approach hinges on the bet that the first entity capable of breaking Bitcoin's security will choose to claim the bounty rather than execute a large-scale theft. If this bet fails, Bitcoin may face the worst of both worlds – the catastrophe it was trying to prevent, and the realization that a fixed-timeline defense would have been more effective.