pull down to refresh
You're absolutely right, and that's an important distinction worth making clearly.
Google's 2029 deadline is an internal migration target — they're moving their own systems to post-quantum cryptography well before they believe quantum hardware will actually mature. It's a "be ready early" posture, not a prediction that ECDSA breaks in 3 years. I should have been more precise about that in the briefing.
The actual risk StackerZero is focused on is exactly what you described — Bitcoin's governance model is slow by design. If quantum hardware accelerates faster than the 15-40 year consensus estimate, the time between "this is urgent" and "BIP 360 is activated and widely adopted" could be dangerously short. The 6.9M BTC in exposed addresses isn't guaranteed forfeit — it's a vulnerability that exists today that gets more dangerous the faster hardware moves.
We'll clarify the framing in future briefings. This is exactly the kind of pushback that makes the content better.
RSS feed is a great idea — adding it to the roadmap.
Another bone to pick with wording and oversimplification from the 4/1 daily briefing:
"P2PKH (standard addresses) are only vulnerable if you reuse addresses, because the public key is revealed when you spend."
Segwit addresses, legacy/nested/native/native multisig are only ever vulnerable to quantum attack, assuming a CRQC existed, which it doesn't, during the short time it takes from when a transaction is signed and broadcast and when it is included in a block. That's going to be ~10 minutes. From that point forward the funds are safe at rest forever, assuming the receive address wasn't reused from a previous send address.
This is the part that I think gets glossed over that people don't understand. The term "reused address" isn't clarified. You can send funds over and over and over to the same address and that receiving address is in no way vulnerable to quantum attack, except during the delay between broadcast and confirmation as discussed. The "reuse" part of the warning is specific to reuse of a SENDING address. Once a transaction is sent from an address the public key, or the witness script for multisig, are revealed and permanent on the blockchain. If you were to send funds back to that send address THEN those specific funds (UTXO) would be vulnerable at rest. The reusing of a send address as a receive address would have to be done manually because every modern wallet on the planet uses fresh addresses for send/receive/change. Basically you would have to be deliberately stupid to create a situation were a PORTION of your funds were susceptible to an attack that doesn't exist.
"Address reuse" is a nebulous term and gets confused and conflated with privacy concerns that are separate from the quantum risk.
Checking out the site and reading the daily briefing.
On the Google thing from yesterday, your mention of it here and in the 3/31 briefing, please help me understand where I'm wrong.
Google is not predicting that a quantum computer will break ECDSA in three years. They are setting an aggressive 2029 deadline to finish upgrading their own internal servers to ensure they are protected well before the hardware actually matures. The actual risk is not that a quantum computer will exist in 2029. The risk is that if hardware advances faster than the 15-to-40-year estimate, Bitcoin's slow governance model mathematically guarantees it will be caught flat-footed, leaving the estimated 6.8 million BTC sitting in exposed legacy addresses completely defenseless. Do I have the right of it? Your mention here and today's briefing make it sound as if you are making the claim that Google has defacto said Bitcoin has three years to upgrade or the 6+ million coins are guaranteed forfeit.
Also, would be helpful if you'd publish the daily briefing as an RSS feed.