Developers in the Bitcoin community are engaged in a heated debate over a groundbreaking approach to counter potential threats posed by quantum computing. A newly released proposal from BitMEX Research suggests a “canary” system as a response mechanism, which diverges from previous strategies that would lead to an automatic freeze of vulnerable wallets on a predetermined schedule. Instead, this innovative plan advocates for a more responsive strategy that activates only when a credible threat manifests.
The core of this proposal centers on the idea of not preemptively freezing older bitcoin wallets unless an attacker demonstrates their quantum capabilities in an on-chain transaction. This is a significant shift from previous plans like BIP-361, which mandated a fixed five-year timeline for phasing out wallets reliant on signature schemes deemed susceptible to quantum attacks.
Under the proposed canary system, a limited quantity of bitcoin would be deposited into a special address that only a quantum-capable attacker could access. If that bitcoin is spent, it would serve as public evidence of the quantum threat, triggering a network-wide restriction on older wallets. This “wait and react” strategy is designed to mitigate risks while providing incentives for security.
Users would have the option to contribute additional bitcoin to the canary address, effectively creating a bounty for the first entity to publicly demonstrate their quantum attack capabilities, rather than opting for a silent heist of the exposed wallets. Importantly, contributors would maintain control over their funds, as the structure allows for withdrawals at any time.
The proposal also introduces a “safety window” as an additional layer of protection. This mechanism enables vulnerable coins to still be transferred while preventing immediate spending by the recipient for an extended period, possibly up to a year. If the canary is triggered during this window, any involved coins would be retroactively frozen, heightening the stakes for any would-be attacker seeking to exploit vulnerabilities quietly.
However, the proposal is not without its challenges. It hinges on a considerable gamble: that the first entity capable of breaching Bitcoin’s security would act altruistically and claim the bounty, rather than executing a potentially catastrophic theft that could have far-reaching consequences for the network. This assumption contradicts the worst-case scenario precautions that Bitcoin’s design has consistently aimed to prevent, and historical precedents suggest that the network is generally resistant to retroactive measures, unlike Ethereum, which intervened during the DAO hack in 2016.
If the assumptions of this canary system fail, Bitcoin may face the double risks of a major theft occurring while also grappling with the regret that a preemptive approach could have potentially mitigated the disaster. As the community weighs these complex considerations, the stakes remain high for the future of the Bitcoin network in the face of advancing quantum computing technologies.


