TL;DR:
- Bitcoin is analyzing a proposal called BIP-361 that seeks to freeze 6.9 million coins in old wallets to resist quantum attacks.
- The three-phase plan includes disabling legacy signatures and could render unmigrated funds permanently unusable after a deadline.
- The community rejects the proposal, arguing that freezing other users’ funds violates the fundamental principle of sovereignty over one’s own assets.
The world ofĀ BitcoinĀ developmentĀ is in the midst of one of its most delicate debates in years. In April 2026, a group of developers led by cypherpunkĀ Jameson LoppĀ presented proposalĀ BIP-361, an upgrade scheme designed toĀ protect the network against the threat posed by quantum computers. The underlying problem: approximatelyĀ 34%Ā of Bitcoin’s total supply, aroundĀ 6.9 million coins, remains inĀ legacy addresses vulnerableĀ to this type of attack, including wallets attributed toĀ Satoshi Nakamoto.
The proposal builds on previously introduced work,Ā BIP-360, which introduced a more secure address type calledĀ Pay-to-Merkle-RootĀ (P2MR),Ā comparable to Taproot but withĀ greater cryptographic resistance. Developers present it as a soft fork thatĀ does not alter the network’s current functionality.
The Three-Phase Plan Divides the Bitcoin Community
The scheme envisions aĀ gradual transition. In a first stage,Ā sending new funds to legacy addresses would be prohibited. Five years after activation, those signatures could beĀ fully disabled, leaving unmigrated funds permanently inaccessible. A third phase contemplates aĀ recovery mechanism based onĀ zero-knowledge proofsĀ for users who still hold their keys.
Supporters of the plan argue thatĀ freezing inactive coins works as an upgrade incentive. They also contend that if a quantum computer managed to break legacy addresses and steal funds on a massive scale,Ā the damage to confidence in Bitcoin would be irreparable.
Outside the BIP-361 debate, developerĀ Olaoluwa OsuntokunĀ presented an independent prototype that allows users toĀ recover funds using zk-STARK proofsĀ without exposing private keys. The system runs in approximatelyĀ 50 secondsĀ on a conventional computer, uses 12 GB of RAM and generates a 1.7 MB proof file.
Financial Sovereignty Against Protocol Protection
The Bitcoin community’s response was immediate andĀ largely critical. The central argument is thatĀ no developer or group should have the ability to lock another user’s funds. The “not your keys, not your coins” principle implies, according to critics, that whoever controls their keysĀ retains their coins without conditions or deadlines.
Phil Geiger, fromĀ Metaplanet, summed up the contradiction precisely: “We have to steal people’s money to prevent it from being stolen.” The underlying concern is that establishing a precedent for freezing opens the door to future interventions under different justifications. BIP-361 remains a proposal with no active implementation.






