Hanselminutes is Fresh Air for Developers. A weekly commute-time podcast that promotes fresh technology and fresh voices. Talk and Tech for Developers, Life-long Learners, and Technologists.
…
continue reading
Content provided by Vlad Costea. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Vlad Costea or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.
Player FM - Podcast App
Go offline with the Player FM app!
Go offline with the Player FM app!
S16 E35: Hunter Beast on Bitcoin's Quantum Resistance & BIP 360
MP3•Episode home
Manage episode 496298371 series 2537320
Content provided by Vlad Costea. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Vlad Costea or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.
Hunter Beast is the author of BIP 360: a proposal that seeks to provide quantum resistance to Bitcoin, to prevent powerful computer builders from brute forcing arbitrary addresses to steal the funds. But is the quantum threat real? Does the number of qubits really make a difference when the quantum computer is general purpose? Shouldn't other industries outside of Bitcoin, especially governments and banks, be worried about the fragility of elliptic curve cryptography? In this episode, we'll try to answer some of these questions and also refer to Hunter Beast's previous experience with building RGB for Bitcoin tokens. ––––––––––––––––––––––––––– Time stamps: 01:08 - Introducing Hunter Beast 01:27 - BIP 360 and Quantum Resistance Hunter Beast introduces BIP 360, aimed at making Bitcoin resistant to quantum computing threats, a hot topic due to predictions of advanced quantum computers potentially breaking ECDSA signatures. 02:19 - Defining Bitcoin's Quantum Threat Quantum computing is institutional, not accessible to average Bitcoiners, making verification difficult. The threat is existential but not immediate, though warnings suggest proximity. 03:58 - U.S. Government Warnings U.S. government and institutions are preparing for quantum resistance by 2030, urging upgrades to protect against potential cryptographic breaks. 05:53 - Consensus Challenges Hard forks ensure UTXO migration but face consensus issues; soft forks are preferred, but coins must move to quantum-resistant addresses to avoid vulnerabilities. 06:38 - Bitcoin’s Quantum Vulnerabilities Taproot, reused addresses, mempool-published data, and exposed public keys are vulnerable. ~90% of reused address coins are active, reducing concern, but Taproot needs upgrades. 09:41 - BIP 360 Solution for Taproot BIP 360 focuses narrowly on fixing Taproot’s vulnerability to long-exposure attacks, enabling wallets to commit to multiple scripts, including quantum-resistant ones like SLHDSA. 13:07 - Signature Schemes ECDSA is Bitcoin’s weak point. Lamport and Winternitz signatures are flawed (one-time use), but SLHDSA (using a hypertree of Winternitz signatures) allows secure address reuse. 17:10 - User Experience Impact BIP 360 minimizes changes to user experience, offering opt-in quantum-resistant scripts. Wallets could include security dials, but defaults remain familiar. 20:14 - Transaction Size and Costs Post-quantum signatures are larger (4-8k bytes), but address commitments are minimal (~34 bytes). Block size increases aren’t necessary; solutions like Bitzip could scale transactions. 22:27 – Sideshift.ai 23:17 - Drivechains and Layer Two Labs Drivechains offer secure sidechain solutions, decentralizing custody and scaling Bitcoin. Testing is available on Signet, with Litecoin considering implementation. 29:48 - Bitcoin Ossification Debate Ossification (resistance to change) vs. necessary upgrades debated. Quantum threats may force changes as Bitcoin secures more value, despite opposition. 36:36 - Conspiracy Theory Counter Concerns about government-driven fear dismissed; BIP 360 is opt-in, only used if quantum threats emerge, preserving user choice. 54:26 - Quantum Computing Progress IBM’s Condor has 1,121 qubits; breaking ECDSA needs ~20M qubits. With quantum advancements outpacing Moore’s Law, upgrades are prudent within a decade. 59:58 - Sponsor Plugs Citrea (ZK rollup for Bitcoin financial apps) and Edge Wallet (duress mode, multi-coin support) highlighted. 01:02:30 - BIP 360 Number Selection BIP 360 assigned by reviewers, not chosen by Hunterbeast, reserved for quantum-related proposals. 01:06:04 - BIP 360 Reception from Core Devs Mixed feedback from reviewers like Ava Chow (called it “stupid” but provided useful critique). Still in draft at bip360.org, open for review. 01:11:29 - Unintended Consequences BIP 360 is minimal, unlikely to cause surprises like Taproot’s ordinal inscriptions, as it enhances existing functionality. 01:12:42 - Is Quantum Resistance Perishable and Needs Updates? BIP 360 isn’t definitive; periodic updates may be needed as quantum computers advance, requiring a proactive Bitcoin culture. 01:19:12 - NoOnes, Bitcoin.com, 01:21:46 - Best Practices for Quantum Safety Avoid address reuse, use native SegWit (BC1Q) addresses, don’t expose Xpubs, and consider private mempools like MARA Slipstream for large transactions. 01:24:27 - Closing Remarks Gratitude to Hunter Beast for discussing BIP 360 and quantum threats, wishing success for the proposal.
…
continue reading
297 episodes
MP3•Episode home
Manage episode 496298371 series 2537320
Content provided by Vlad Costea. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Vlad Costea or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.
Hunter Beast is the author of BIP 360: a proposal that seeks to provide quantum resistance to Bitcoin, to prevent powerful computer builders from brute forcing arbitrary addresses to steal the funds. But is the quantum threat real? Does the number of qubits really make a difference when the quantum computer is general purpose? Shouldn't other industries outside of Bitcoin, especially governments and banks, be worried about the fragility of elliptic curve cryptography? In this episode, we'll try to answer some of these questions and also refer to Hunter Beast's previous experience with building RGB for Bitcoin tokens. ––––––––––––––––––––––––––– Time stamps: 01:08 - Introducing Hunter Beast 01:27 - BIP 360 and Quantum Resistance Hunter Beast introduces BIP 360, aimed at making Bitcoin resistant to quantum computing threats, a hot topic due to predictions of advanced quantum computers potentially breaking ECDSA signatures. 02:19 - Defining Bitcoin's Quantum Threat Quantum computing is institutional, not accessible to average Bitcoiners, making verification difficult. The threat is existential but not immediate, though warnings suggest proximity. 03:58 - U.S. Government Warnings U.S. government and institutions are preparing for quantum resistance by 2030, urging upgrades to protect against potential cryptographic breaks. 05:53 - Consensus Challenges Hard forks ensure UTXO migration but face consensus issues; soft forks are preferred, but coins must move to quantum-resistant addresses to avoid vulnerabilities. 06:38 - Bitcoin’s Quantum Vulnerabilities Taproot, reused addresses, mempool-published data, and exposed public keys are vulnerable. ~90% of reused address coins are active, reducing concern, but Taproot needs upgrades. 09:41 - BIP 360 Solution for Taproot BIP 360 focuses narrowly on fixing Taproot’s vulnerability to long-exposure attacks, enabling wallets to commit to multiple scripts, including quantum-resistant ones like SLHDSA. 13:07 - Signature Schemes ECDSA is Bitcoin’s weak point. Lamport and Winternitz signatures are flawed (one-time use), but SLHDSA (using a hypertree of Winternitz signatures) allows secure address reuse. 17:10 - User Experience Impact BIP 360 minimizes changes to user experience, offering opt-in quantum-resistant scripts. Wallets could include security dials, but defaults remain familiar. 20:14 - Transaction Size and Costs Post-quantum signatures are larger (4-8k bytes), but address commitments are minimal (~34 bytes). Block size increases aren’t necessary; solutions like Bitzip could scale transactions. 22:27 – Sideshift.ai 23:17 - Drivechains and Layer Two Labs Drivechains offer secure sidechain solutions, decentralizing custody and scaling Bitcoin. Testing is available on Signet, with Litecoin considering implementation. 29:48 - Bitcoin Ossification Debate Ossification (resistance to change) vs. necessary upgrades debated. Quantum threats may force changes as Bitcoin secures more value, despite opposition. 36:36 - Conspiracy Theory Counter Concerns about government-driven fear dismissed; BIP 360 is opt-in, only used if quantum threats emerge, preserving user choice. 54:26 - Quantum Computing Progress IBM’s Condor has 1,121 qubits; breaking ECDSA needs ~20M qubits. With quantum advancements outpacing Moore’s Law, upgrades are prudent within a decade. 59:58 - Sponsor Plugs Citrea (ZK rollup for Bitcoin financial apps) and Edge Wallet (duress mode, multi-coin support) highlighted. 01:02:30 - BIP 360 Number Selection BIP 360 assigned by reviewers, not chosen by Hunterbeast, reserved for quantum-related proposals. 01:06:04 - BIP 360 Reception from Core Devs Mixed feedback from reviewers like Ava Chow (called it “stupid” but provided useful critique). Still in draft at bip360.org, open for review. 01:11:29 - Unintended Consequences BIP 360 is minimal, unlikely to cause surprises like Taproot’s ordinal inscriptions, as it enhances existing functionality. 01:12:42 - Is Quantum Resistance Perishable and Needs Updates? BIP 360 isn’t definitive; periodic updates may be needed as quantum computers advance, requiring a proactive Bitcoin culture. 01:19:12 - NoOnes, Bitcoin.com, 01:21:46 - Best Practices for Quantum Safety Avoid address reuse, use native SegWit (BC1Q) addresses, don’t expose Xpubs, and consider private mempools like MARA Slipstream for large transactions. 01:24:27 - Closing Remarks Gratitude to Hunter Beast for discussing BIP 360 and quantum threats, wishing success for the proposal.
…
continue reading
297 episodes
All episodes
×Welcome to Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.