All Episodes

July 24, 2025 84 mins
Hunter Beast is the author of BIP 360: a proposal that seeks to provide quantum resistance to Bitcoin, to prevent powerful computer builders from brute forcing arbitrary addresses to steal the funds. But is the quantum threat real? Does the number of qubits really make a difference when the quantum computer is general purpose? Shouldn't other industries outside of Bitcoin, especially governments and banks, be worried about the fragility of elliptic curve cryptography? In this episode, we'll try to answer some of these questions and also refer to Hunter Beast's previous experience with building RGB for Bitcoin tokens. ––––––––––––––––––––––––––– Time stamps: 01:08 - Introducing Hunter Beast 01:27 - BIP 360 and Quantum Resistance Hunter Beast introduces BIP 360, aimed at making Bitcoin resistant to quantum computing threats, a hot topic due to predictions of advanced quantum computers potentially breaking ECDSA signatures. 02:19 - Defining Bitcoin's Quantum Threat Quantum computing is institutional, not accessible to average Bitcoiners, making verification difficult. The threat is existential but not immediate, though warnings suggest proximity. 03:58 - U.S. Government Warnings U.S. government and institutions are preparing for quantum resistance by 2030, urging upgrades to protect against potential cryptographic breaks. 05:53 - Consensus Challenges Hard forks ensure UTXO migration but face consensus issues; soft forks are preferred, but coins must move to quantum-resistant addresses to avoid vulnerabilities. 06:38 - Bitcoin’s Quantum Vulnerabilities Taproot, reused addresses, mempool-published data, and exposed public keys are vulnerable. ~90% of reused address coins are active, reducing concern, but Taproot needs upgrades. 09:41 - BIP 360 Solution for Taproot BIP 360 focuses narrowly on fixing Taproot’s vulnerability to long-exposure attacks, enabling wallets to commit to multiple scripts, including quantum-resistant ones like SLHDSA. 13:07 - Signature Schemes ECDSA is Bitcoin’s weak point. Lamport and Winternitz signatures are flawed (one-time use), but SLHDSA (using a hypertree of Winternitz signatures) allows secure address reuse. 17:10 - User Experience Impact BIP 360 minimizes changes to user experience, offering opt-in quantum-resistant scripts. Wallets could include security dials, but defaults remain familiar. 20:14 - Transaction Size and Costs Post-quantum signatures are larger (4-8k bytes), but address commitments are minimal (~34 bytes). Block size increases aren’t necessary; solutions like Bitzip could scale transactions. 22:27 – Sideshift.ai 23:17 - Drivechains and Layer Two Labs Drivechains offer secure sidechain solutions, decentralizing custody and scaling Bitcoin. Testing is available on Signet, with Litecoin considering implementation. 29:48 - Bitcoin Ossification Debate Ossification (resistance to change) vs. necessary upgrades debated. Quantum threats may force changes as Bitcoin secures more value, despite opposition. 36:36 - Conspiracy Theory Counter Concerns about government-driven fear dismissed; BIP 360 is opt-in, only used if quantum threats emerge, preserving user choice. 54:26 - Quantum Computing Progress IBM’s Condor has 1,121 qubits; breaking ECDSA needs ~20M qubits. With quantum advancements outpacing Moore’s Law, upgrades are prudent within a decade. 59:58 - Sponsor Plugs Citrea (ZK rollup for Bitcoin financial apps) and Edge Wallet (duress mode, multi-coin support) highlighted. 01:02:30 - BIP 360 Number Selection BIP 360 assigned by reviewers, not chosen by Hunterbeast, reserved for quantum-related proposals. 01:06:04 - BIP 360 Reception from Core Devs Mixed feedback from reviewers like Ava Chow (called it “stupid” but provided useful critique). Still in draft at bip360.org, open for review. 01:11:29 - Unintended Consequences BIP 360 is minimal, unlikely to cause surprises like Taproot’s ordinal inscriptions, as it enhances existing functionality. 01:12:42 - Is Quantum Resistance Perishable and Needs Updates? BIP 360 isn’t definitive; periodic updates may be needed as quantum computers advance, requiring a proactive Bitcoin culture. 01:19:12 - NoOnes, Bitcoin.com, 01:21:46 - Best Practices for Quantum Safety Avoid address reuse, use native SegWit (BC1Q) addresses, don’t expose Xpubs, and consider private mempools like MARA Slipstream for large transactions. 01:24:27 - Closing Remarks Gratitude to Hunter Beast for discussing BIP 360 and quantum threats, wishing success for the proposal.
Mark as Played

Advertise With Us

Popular Podcasts

24/7 News: The Latest
Crime Junkie

Crime Junkie

Does hearing about a true crime case always leave you scouring the internet for the truth behind the story? Dive into your next mystery with Crime Junkie. Every Monday, join your host Ashley Flowers as she unravels all the details of infamous and underreported true crime cases with her best friend Brit Prawat. From cold cases to missing persons and heroes in our community who seek justice, Crime Junkie is your destination for theories and stories you won’t hear anywhere else. Whether you're a seasoned true crime enthusiast or new to the genre, you'll find yourself on the edge of your seat awaiting a new episode every Monday. If you can never get enough true crime... Congratulations, you’ve found your people. Follow to join a community of Crime Junkies! Crime Junkie is presented by audiochuck Media Company.

The Clay Travis and Buck Sexton Show

The Clay Travis and Buck Sexton Show

The Clay Travis and Buck Sexton Show. Clay Travis and Buck Sexton tackle the biggest stories in news, politics and current events with intelligence and humor. From the border crisis, to the madness of cancel culture and far-left missteps, Clay and Buck guide listeners through the latest headlines and hot topics with fun and entertaining conversations and opinions.

Music, radio and podcasts, all free. Listen online or download the iHeart App.

Connect

© 2025 iHeartMedia, Inc.