Connect with us
DAPA Banner

Crypto World

Bitcoiners Propose Freezing Quantum-Vulnerable Coins Under BIP-361

Published

on

Crypto Breaking News

Bitcoin researchers led by cypherpunk Jameson Lopp, along with five co-authors focused on quantum security, have put forward a controversial plan to shield the network from a future quantum-enabled theft. The proposal, labeled BIP-361 and titled “Post Quantum Migration and Legacy Signature Sunset,” would be implemented in three stages to migrate coins away from quantum-vulnerable output types — including Satoshi’s widely discussed stash — and to harden the network before quantum computers become practical threats. The draft was posted to GitHub this week as the second installment in the broader plan.

The impetus for the proposal is clear: researchers warn that roughly 1.7 million BTC stored in early P2PK addresses could be at risk if a quantum adversary gains access to powerful quantum hardware. Among these coins is the so‑called Satoshi stash, which some estimate could be valued in today’s dollars at around $74 billion. The aim, the authors argue, is to prevent a scenario in which quantum-enabled theft undermines trust in the Bitcoin network. The plan is framed as a defensive mechanism—a private incentive to upgrade—rather than an offensive maneuver to seize control of others’ funds.

Key takeaways

  • BIP-361 is a three-phase plan that follows BIP-360’s soft-fork approach and aims to migrate vulnerable coins to quantum-resistant paths, addressing about 34% of Bitcoin’s supply that remains at risk unless moved.
  • The phases are timed: Phase A begins three years after activation and would stop new BTC from being sent to old-style addresses, requiring users to migrate to quantum-resistant types.
  • Phase B arrives five years after activation, invalidating old-style signatures and effectively freezing any funds remaining in vulnerable addresses.
  • Phase C provides a zero-knowledge proof-based recovery mechanism for those who missed the deadline but can still demonstrate ownership via seed recovery, offering a potential rescue path.
  • The proposal has drawn swift pushback from parts of the Bitcoin community, with critics calling it heavy-handed or confiscatory, arguing it undermines Bitcoin’s ethos of opt-in upgrades.

Context and the technical what-ifs

In February, developers released BIP-360, which proposed a soft fork introducing a new output type known as pay-to-Merkle-root (P2MR). The idea mirrors Bitcoin’s existing Taproot (P2TR) structure but removes the quantum-vulnerable key path from legacy addresses. While BIP-360 would protect funds moving forward, it does not automatically safeguard the substantial portion of the supply that remains vulnerable in old addresses unless owners proactively move funds to quantum-resistant forms.

BIP-361 extends this concept into a staged migration. Three years after activation, Phase A would bar transfers to old-style addresses, forcing users to adopt quantum-secure address formats. Then, five years after activation, Phase B would invalidate old-style signatures altogether, rendering coins in vulnerable addresses effectively unspendable unless they have already migrated. Phase C offers a potential rescue mechanism using zero-knowledge proofs to allow recovery for users who still possess their seed phrases but failed to upgrade in time.

Related: Bitcoin Magazine has noted the debate’s potential hard-fork implications, underscoring that the policy could center the fate of historical coins and alter the network’s long-term security model.

Advertisement

“This is not an offensive attack, rather, it is defensive: our thesis is that the Bitcoin ecosystem wishes to defend itself and its interests against those who would prefer to do nothing and allow a malicious actor to destroy both value and trust.”

Community reaction and the philosophical divide

The plan has ignited a robust discussion about Bitcoin’s core principles and the trade-offs of upgrading a global, permissionless system. Critics argue that forcing upgrades or rendering unupgraded UTXOs unspendable would mark a significant departure from Bitcoin’s ethos of non-coercive change and could set a dangerous precedent for future interventions.

Bitcoin protocol developer and researcher Mark Erhardt, who circulated BIP-361 on social media, faced immediate critique. Responders described the proposal as “authoritarian and confiscatory,” questioning the rationale for mandating upgrades and the legitimacy of rendering old spends invalid.

Other voices weighed in with skepticism as well. Bitcoin Magazine’s editors and contributors have been vocal in challenging the premise, while TFTC founder Marty Bent characterized aspects of the approach as inconsistent with the community’s expectations. Phil Geiger, head of business development at Metaplanet, offered a provocative take on the tension between protection and coercion. The broader sentiment remains unsettled: the consensus on whether a crypto-legalistic safeguard should override voluntary evolution is far from settled.

Cointelegraph reached out to Lopp for comment on the proposal; there was no immediate response at the time of publication. The GitHub draft, however, provides a concrete framework for discussion and potential future forks, even as many stakeholders call for a cautious, community-driven examination of the implications.

Advertisement

For readers tracking the evolution of quantum resilience in Bitcoin, the conversation now shifts from theoretical risk to concrete, staged mitigation. The three-phase design is designed to minimize disruption by letting the ecosystem migrate over time, but it also raises fundamental questions about asset-holding rights, upgrade incentives, and the governance of a decentralized network.

Implications for holders, users, and builders

From a practical standpoint, BIP-361 highlights two enduring tensions in Bitcoin’s path to quantum readiness. First, there is the temptation to act decisively to protect value, especially when the stakes include a multi-trillion-dollar network and the world’s most valuable cryptocurrency by market capitalization. Second, there is the risk that coercive upgrades or automatic penalties could fragment the ecosystem or erode trust among users who prefer to manage their own keys and seeds at their own pace.

For investors and developers, the proposal underscores the importance of forward-looking security models. If the plan progresses, the market could see increased demand for quantum-resistant wallets and services, as well as migrations that push older holders toward newer output types. The timeline—three years to Phase A and five to Phase B—provides a window for infrastructure teams to test compatibility, wallets to implement support for P2MR-like paths, and communities to debate the ethics and practicality of forced upgrades.

As the discussion unfolds, observers will be watching how this approach interacts with existing upgrade narratives, such as soft forks and user-initiated migrations. The zero-knowledge recovery proposed in Phase C is a particularly notable element: it aims to offer a path back to funds for those who missed the deadline, but the feasibility and privacy implications of such a mechanism will require rigorous scrutiny before any real-world deployment.

Advertisement

What to watch next

The BIP-361 draft opens a testing ground for how the Bitcoin community might address quantum threats without waiting for a single, sweeping upgrade. The next steps will likely involve broader discussions on GitHub, more technical vetting of the P2MR architecture, and public comment on the ethical and philosophical implications of effectively freezing or confiscating old UTXOs. Investors and builders should monitor how proponents respond to pushback from core developers and community voices, and whether practical consensus emerges around the timing and scope of any future activation.

As the conversation evolves, the central question remains: can a planned, staged migration deliver robust quantum protection without compromising Bitcoin’s foundational principles? The answer will shape not just security strategies, but the culture of upgrade, trust, and governance in the years ahead.

Risk & affiliate notice: Crypto assets are volatile and capital is at risk. This article may contain affiliate links. Read full disclosure

Advertisement

Source link

Continue Reading
Click to comment

You must be logged in to post a comment Login

Leave a Reply

Crypto World

Crude Oil Tumbles Over 3% on US-Iran Diplomatic Breakthrough Hopes

Published

on

Brent Crude Oil Last Day Financ (BZ=F)

TLDR

  • Brent crude slipped toward $98 per barrel, WTI approached $93, with both benchmarks losing more than 3% over the week
  • President Trump announced a 10-day Israel-Lebanon truce and stated Iran accepted critical terms
  • Tehran has not publicly verified any agreements, including reopening the Strait of Hormuz
  • IEA cautioned that restoring oil and gas output could require as long as two years
  • IEA and OPEC both project softer global oil demand in the months ahead

Oil prices tumbled on Friday following diplomatic overtures from Washington suggesting a potential resolution to the nearly 50-day US-Iran standoff.

Brent crude declined 1.1% to approximately $98.32 per barrel, while West Texas Intermediate fell 1.3% to $89.95. Weekly losses for both benchmarks exceeded 3%.

Brent Crude Oil Last Day Financ (BZ=F)
Brent Crude Oil Last Day Financ (BZ=F)

The confrontation erupted in February following coordinated US-Israeli strikes against Iran. In response, Tehran severely restricted traffic through the Strait of Hormuz, choking off approximately 20% of worldwide oil shipments. Washington subsequently imposed its own naval blockade.

President Donald Trump adopted an upbeat stance on Thursday, asserting that Iran had accepted previously rejected conditions, notably agreeing to reopen the Strait of Hormuz. Iranian officials have not publicly acknowledged these claims.

Trump simultaneously unveiled a 10-day ceasefire arrangement between Israel and Lebanon. He extended White House invitations to Israeli Prime Minister Benjamin Netanyahu and Lebanese President Joseph Aoun for further discussions.

Incorporating Lebanon into a ceasefire framework represented a critical Iranian prerequisite for wider negotiations. The agreement remained intact through Friday morning.

Advertisement

“The prevailing narrative has shifted from escalation to stabilization,” remarked Priyanka Sachdeva, senior market analyst at Phillip Nova. “Fear propelled the surge, diplomacy is fueling the pullback.”

Peace Negotiations May Require Months

Several Gulf Arab and European officials indicated that finalizing a comprehensive US-Iran agreement might span approximately six months. They encouraged both nations to prolong the existing ceasefire throughout this negotiation window.

OCBC analysts observed that the US naval blockade reached its fourth day, maintaining Hormuz traffic at virtually stagnant levels. Oil transit through the waterway remains minimal compared to pre-conflict volumes.

Trump expressed confidence he wouldn’t need to prolong the ceasefire to secure an agreement, forecasting a settlement “fairly soon.” He mentioned potentially visiting Pakistan, which facilitated the initial negotiating round, should a deal materialize.

Following weeks of extreme market turbulence, price fluctuations have moderated. Brent oscillated within roughly a $10 per barrel range this week, sharply contrasting with the historic $38 swing recorded in mid-March.

Production Disruptions Could Persist for Years

IEA Executive Director Fatih Birol cautioned that restoring a substantial portion of interrupted oil and gas production might extend up to two years. Any recovery would unfold incrementally, he emphasized.

Advertisement

Both the IEA and OPEC released downwardly revised global oil demand projections for upcoming months, compounding bearish pressure on crude prices.

“Despite some encouraging geopolitical developments, they haven’t resulted in concrete improvements in actual flows,” observed Rebecca Babin, senior energy trader at CIBC Private Wealth Group.

Authority over the Strait of Hormuz continues unresolved. Iran has indicated intentions to impose transit fees on vessels even following the conflict’s conclusion.

The present US-Iran ceasefire is scheduled to lapse on April 21.

Advertisement

Source link

Continue Reading

Crypto World

Texas man behind $20M Meta-1 Coin fraud gets 23-year sentence

Published

on

Crypto Breaking News

A Texas man who helped orchestrate a cryptocurrency scam that defrauded roughly $20 million from about 1,000 investors was sentenced to 23 years in federal prison on Tuesday. U.S. District Judge LaShonda Hunt handed down the sentence to Robert Dunlap, who served as a trustee for the Meta-1 Coin project and helped market the fictitious token.

According to the U.S. Attorney’s Office for the Northern District of Illinois, Dunlap and his co-conspirators used a self-created Meta Exchange to inflate the token’s market price and trading volume with automated trading bots, while presenting investors with misleading assurances about asset backing and potential returns. Prosecutors said the scheme relied on false statements and concealed expenses, with funds ultimately used for personal purchases, including luxury vehicles such as a Ferrari.

The defendant was convicted in November on two counts of mail fraud, each carrying a potential sentence of up to 20 years in federal prison. Prosecutors noted in the sentencing memorandum that Dunlap was “unrepentant” and that his misrepresentations escalated over time, underscoring the seriousness of the case as a warning to would-be crypto scammers.

The SEC has been active in pursuing similar schemes. In March 2020, the agency ordered an asset freeze and other emergency relief against Dunlap, an alleged accomplice, Nicole Bowdler, and former Washington state Senator David Schmidt to stop marketing and selling Meta-1 Coin. The SEC alleged that investors were told Meta-1 Coin was risk-free and could deliver enormous returns—claims that investors later learned were false. The agency noted that the coins were never distributed and that funds were diverted to personal use.

Advertisement

Token claims, market manipulation, and the broader crackdown

The case centers on Meta-1 Coin, a token that prosecutors said was touted as backed by a $1 billion art collection—including works by Picasso and van Gogh—and $44 billion in gold. Those asset-backed claims were part of the fraud profile presented by the government, which also described how Dunlap and associates marketed the token through a trust structure from 2018 to 2023. The government alleged investors were promised returns that would dwarf typical crypto gains, with figures that were manipulated to create an illusion of robust trading activity.

Beyond the Meta-1 case, regulators and authorities have signaled a broader push to curb crypto fraud and manipulation. In parallel reporting, authorities have pursued other crypto-related prosecutions, including charges related to hacking and DeFi-related exploits, underscoring a tightening stance as enforcement agencies increasingly scrutinize market misconduct in digital assets.

What this means for investors and the market

The Dunlap sentence highlights the risk profile of investment projects that promise outsized, rapid returns and rely on opaque asset claims. For investors, the case emphasizes the importance of due diligence, independent verification of asset backing, and a healthy skepticism toward platforms that blend trading activity with promises of instant wealth. For the crypto industry, the outcome signals regulators’ willingness to pursue not only misrepresentation but also the operational mechanics that enable such fraud, including automated market manipulation tied to self-hosted exchanges.

Looking ahead, readers should watch how the regulatory pendulum continues to swing on disclosure standards, enforcement actions, and the treatment of asset-backed crypto products. While the Meta-1 saga has reached a definitive sentencing point, the broader crackdown on crypto scams is far from over, with ongoing investigations and charges shaping market expectations for investor protection and compliance in the sector.

Advertisement

According to the U.S. Attorney’s Office in Illinois, the case serves as a stark reminder that alleged crypto fraud carries serious, long-lasting consequences. For further context, the original SEC filing and press release detailing the 2020 asset freeze are available through the agency’s public records.

Risk & affiliate notice: Crypto assets are volatile and capital is at risk. This article may contain affiliate links. Read full disclosure

Source link

Advertisement
Continue Reading

Crypto World

Circle Internet Group faces class action over failure to stop Drift Protocol exploit funds

Published

on

Circle Internet Group faces class action over Drift Protocol exploit
Circle Internet Group faces class action over Drift Protocol exploit
  • Circle is accused of failing to freeze exploit-linked transfers.
  • Approximately $230 million in stolen funds was routed through Circle’s USDC.
  • Drift plans $147.5 million recovery backed by future revenue.

Circle Internet Group, the issuer of the USDC stablecoin, is facing a class action lawsuit over its alleged failure to stop the movement of stolen funds linked to the Drift Protocol exploit.

The lawsuit, filed by Drift investor Joshua McCollum at the US district court in Massachusetts on behalf of over 100 impacted users, centres on whether the company had both the ability and the obligation to intervene as the exploit unfolded.

Lawsuit targets Circle’s role in fund transfers

The legal action stems from the April 2026 breach of Drift Protocol, a Solana-based decentralised exchange, where attackers drained roughly $285 million.

A significant portion of those funds, estimated at around $230 million, was quickly converted into USDC.

From there, the funds were moved across chains, primarily from Solana to Ethereum, using cross-chain infrastructure.

Advertisement

The transfers were not instantaneous. They occurred over several hours and were split into more than 100 transactions.

This detail sits at the centre of the lawsuit.

Plaintiffs argue that Circle had a window of opportunity to act.

According to the claim, the company could have frozen the affected wallets or halted the transfers, limiting the damage. Instead, the funds continued moving until they were fully out of reach.

Advertisement

The case accuses Circle of negligence and of indirectly facilitating the loss by failing to act despite having the technical capability to do so.

This argument is reinforced by previous instances where the company has frozen wallets tied to illicit activity, showing that such intervention is not only possible but already part of its operational toolkit.

At its core, the lawsuit raises a difficult question: when a centralised entity operates within a decentralised system, where does its responsibility begin and end?

Drift’s recovery plan

In response to the exploit, Drift Protocol has outlined a structured recovery plan aimed at addressing user losses while rebuilding the platform’s liquidity and operations.

Advertisement

The protocol is seeking to mobilise up to $147.5 million, with a significant portion backed by Tether and other ecosystem partners.

This figure, however, should not be viewed as immediate compensation.

A large share of the funding comes in the form of a revenue-linked credit facility estimated at around $100 million.

This means the protocol will draw funds over time and repay them using future trading fees and platform revenue rather than distributing the full amount upfront.

Advertisement

To manage user claims, Drift plans to issue a new recovery token, though its official name and final structure are yet to be confirmed.

This token will be distributed to affected users and will represent their share of the recovery pool.

It is expected to be transferable, allowing users to either hold it and wait for gradual repayments or sell it on secondary markets for immediate liquidity, likely at a discount.

The recovery pool itself will not rely solely on external funding.

Advertisement

It is designed to be continuously replenished through multiple sources, including protocol revenue, partner contributions, and any funds that may be recovered from the attackers.

This creates a system where repayments are tied directly to the platform’s ability to restart operations and generate consistent trading activity.

Despite these measures, there remains a clear shortfall.

With total losses estimated at approximately $285 million and recovery efforts targeting up to $150 million, a large portion of user funds is not immediately covered.

Advertisement

This gap highlights that users are unlikely to be fully reimbursed in the near term, and recovery will depend heavily on Drift’s long-term performance.

To support a relaunch, part of the recovery framework is also focused on restoring liquidity.

Incentives and financial support are being directed toward market makers to rebuild order books and improve trading conditions once the platform resumes full operations.

Without sufficient liquidity, even a technically sound relaunch would struggle to attract users back.

Advertisement

Another major shift is the protocol’s decision to move away from USDC as its primary settlement asset and instead adopt USDT.

This change comes after roughly $230 million of the stolen funds were converted into USDC and moved across chains during the exploit.

The switch signals a reassessment of risk and reflects a broader effort to restructure the platform’s core infrastructure following the incident.

Overall, Drift’s recovery plan is built around gradual restitution rather than immediate payouts.

Advertisement

Its success will depend on how quickly the platform can regain user trust, restore liquidity, and generate enough revenue to sustain long-term repayments.

Source link

Advertisement
Continue Reading

Crypto World

Fake Ledger Device Sold Chinese Marketplace: Research

Published

on

China, Ledger, Hardware Wallet, Cybersecurity, Hacks

A Brazilian security researcher has warned others of the latest counterfeit Ledger device scam aimed at stealing users’ crypto.

Posting as “Past_Computer2901” on the “ledgerwallet” Reddit channel on Thursday, the security researcher said they purchased what they thought was a legitimate Ledger device for personal use, but soon realized after it arrived that it was a sophisticated counterfeit aimed at stealing user funds. 

“This isn’t meant to cause panic, but rather to serve as a serious warning — I’m honestly still a bit shaken by the sheer scale of this operation,” they said. 

Scammers are adopting increasingly sophisticated strategies to target users opting for self-custody, from supply chain attacks to social engineering and approval scams.

Advertisement

Earlier this month, more than 50 victims were tricked into revealing their seed phrases on a fake Ledger Live app that made its way to the Apple App Store via a bait-and-switch strategy. The victims lost a combined $9.5 million before Apple took down the malicious app.

How the counterfeit Ledger device scam works

The researcher said he bought the Ledger Nano S Plus from a Chinese marketplace, which was priced the same as the official Ledger store. The packaging and the listing also appeared legitimate at first.

However, when they connected the device to the genuine Ledger Live app — which was luckily already installed on their computer — it failed Ledger’s built-in “Genuine Check.” 

This prompted them to pull apart the device, discovering modified hardware and firmware designed to capture and expose sensitive wallet data.

Advertisement

The security researcher said the scammers target first-time Ledger users, as the QR code that comes in the box would normally direct users to download a malicious version of the Ledger Live app that would show a fake “Genuine Check.”

Users continuing to follow the prompts will eventually allow scammers to obtain a user’s seed phrases and drain funds at any time.

China, Ledger, Hardware Wallet, Cybersecurity, Hacks
Picture of the counterfeit Ledger device being taken apart. Source: Reddit

“Stay safe out there. Only download Ledger Live from ledger.com. Only buy hardware from ledger.com,” the security researcher said. 

“If your device fails the Genuine Check — stop using it immediately.”

After pulling apart the device, they discovered clear signs of tampering, including scraped chip markings and a WiFi and Bluetooth antenna embedded inside the unit. 

Legitimate Ledger hardware products are designed to keep private keys fully offline.

Advertisement

Related: Musician loses $420K Bitcoin ‘retirement fund’ via fake Ledger app

The security researcher then looked into the firmware, putting the “chip into boot mode,” which initially identified the device as a Nano S Plus 7704 with an attached serial number.

However, once the boot sequence completed, another manufacturer’s name showed up: Espressif Systems, a publicly listed Chinese semiconductor company based in Shanghai.

Cointelegraph reached out to Espressif for comment but didn’t receive an immediate response.

Advertisement

Magazine:  What’s a ‘Network State’ and are there real-life examples? Big Questions