WILL QUANTUM BREAK BITCOIN? W/ Hunter Beast

WILL QUANTUM BREAK BITCOIN? W/ Hunter Beast

Released Tuesday, 11th March 2025
Good episode? Give it some love!
WILL QUANTUM BREAK BITCOIN? W/ Hunter Beast

WILL QUANTUM BREAK BITCOIN? W/ Hunter Beast

WILL QUANTUM BREAK BITCOIN? W/ Hunter Beast

WILL QUANTUM BREAK BITCOIN? W/ Hunter Beast

Tuesday, 11th March 2025
Good episode? Give it some love!
Rate Episode

Episode Transcript

Transcripts are displayed as originally observed. Some content, including advertisements may have changed.

Use Ctrl + F to search

0:02

On one side, there's like billions of dollars being

0:04

spent in private industry. On the

0:06

other side, the government appears to

0:08

have some concerns and they're doing

0:11

stuff. And so like, I'm

0:13

just like, well, what is Bitcoin going to do? What

0:17

Bitcoin did is brought to you by

0:20

our lead sponsor and massive legends, Iron.

0:22

The largest NASDAQ -listed Bitcoin miner using

0:24

100 % renewable energy. Iron

0:26

are not just powering the Bitcoin network.

0:28

They also provide cutting edge computing resources

0:31

for AI all backed by renewable energy.

0:33

So whether you're interested in mining Bitcoin or

0:35

harnessing AI compute power, iron is set in

0:37

the standard. Visit iron.com to

0:40

learn more, which is

0:42

IREN.com. Okay,

0:44

well, Hunter Beast, great to meet you, mate.

0:46

I'm looking forward to this one. I've

0:49

been looking forward to this as well. The

0:51

quantum thing is something I've kind of ignored for a

0:53

long time because I've never seen it as sort of

0:56

truly an imminent threat to Bitcoin. But

0:58

there's been some updates recently on

1:00

the quantum side that might be

1:02

speeding that process up. So I want to

1:04

get into everything, but I do want to frame

1:07

this. I know almost nothing about quantum. So I

1:09

want to go right back to the start and

1:11

get into it from the very basics. But

1:14

before we do that, do you want to introduce yourself

1:16

and why you're the person I'm talking to about this?

1:19

Yeah, so I'm Hunter

1:22

Beast. I have...

1:25

been working in the Bitcoin space for about the

1:27

past four years full time, mostly

1:30

on the RGB project, but

1:34

which is

1:36

still in the works. But

1:40

I've been

1:43

in the middle of

1:45

last year, I sort

1:47

of switched gears to work

1:49

on a project that I

1:51

found to be a bit

1:53

more How'd

1:57

you say like just if

1:59

it was something that that

2:01

I always felt that was a

2:04

A concern like a very legitimate

2:06

concern in Bitcoin like when people

2:09

bring up The what people called

2:11

quantum fud, you know, I'm like

2:13

well like behind every every piece

2:16

of fud is usually a kernel

2:18

of truth or you know, and

2:21

unless it's like very like pedestrian

2:23

fud, right? But no, this is

2:25

pretty potent fud. This is like,

2:28

this has some some some stick

2:30

stickiness to it. And so I

2:33

mean, I think that every Bitcoiners

2:35

should probably be just a little

2:37

concerned about the quantum through the

2:40

threat that quantum computing could pose.

2:43

And so I

2:48

started a company called Cermont Systems,

2:52

and we later realized there was no

2:54

way to... We didn't really have a

2:56

good way to monetize it, so instead

2:58

we turned it into a nonprofit. And

3:02

so now we have the Cermont Systems

3:04

Foundation, and they've

3:06

been... This has been

3:09

kind of like the

3:11

center I've been using

3:14

for organizing... a

3:16

bit and some work

3:19

towards some research we've

3:21

been doing and some

3:24

projects that kind of

3:26

help with keeping an

3:29

eye on the potential

3:32

threat. Let's just put

3:34

it that way. Yeah.

3:37

Okay, cool. And so when did you

3:39

first like go down the quantum rabbit

3:41

hole? Well, That

3:45

was like, it's only been

3:47

a year. But I

3:49

did, when I went down that rabbit hole,

3:51

I read a lot of books. Quantum

3:54

computing for everyone was one of the first

3:56

books I picked up. And

3:58

there was a couple of

4:01

other books, like programming quantum

4:03

computers and things like that.

4:05

And I just wanted to

4:08

get a good understanding of

4:10

kind of the fundamentals and

4:14

the like like what could what how

4:16

they work what they do, you know,

4:18

like kind of demystified them. And

4:21

what I can say is that

4:23

it is very different, like it's

4:25

similar but different. Technically,

4:28

everything you could do on

4:30

a classical computer, you can

4:32

do on a quantum computer,

4:34

they're just much more limited.

4:36

And at least in our

4:38

current iteration of them. But

4:40

that's starting to improve as

4:42

well. So yeah,

4:45

that's basically the takeaway

4:47

I have from there

4:50

is that their capabilities

4:52

are more of like

4:54

a superset of classical

4:56

computing. And so

4:59

it's almost like how

5:01

graphics accelerators kind of

5:03

are like the added

5:05

additional capability to a

5:07

computer. So

5:10

they're very much

5:12

like a way

5:15

to accelerate certain

5:17

kinds of computation.

5:21

Okay. So can you demystify some of this

5:23

for me? Because like I say, quantum computing

5:25

is something that I don't have a good

5:28

understanding of. So what is a quantum computer

5:30

and how is it different to a normal

5:32

computer? Yeah, so

5:34

a quantum computer will...

5:37

have the capability

5:40

to store states

5:43

as a form

5:46

of probability or

5:49

superposition. So

5:52

they can store

5:54

kind of like

5:56

intermediary states between

5:58

ones and zeros.

6:01

And because of that, they

6:03

can they can store practically

6:05

infinite states between one and

6:07

zero. And is this

6:09

because the qubits can be both one

6:11

and zero simultaneously? Correct.

6:14

Okay, so what does that actually allow

6:16

them to do? Well, it's actually they

6:19

can't be exactly one and zero at

6:21

the same time, right? It's either one

6:23

or zero, but it's a certain probability

6:25

of becoming a one or zero that

6:27

you're kind of using

6:31

in the circuits like

6:33

you're using certain quantum

6:35

gates that will adjust

6:37

the probability of something

6:39

becoming a one or

6:41

zero, depending on

6:43

other inputs. OK.

6:46

And so what's the benefit of that? Even

6:48

if it's in a limited subset, what's the

6:51

benefit of that over a normal binary computer?

6:54

Well, you can... some

6:56

real bangers on there, some real

6:58

banger algorithms. One of them is

7:00

a cultures algorithm. And

7:03

you can program in

7:05

the public key for

7:07

a Bitcoin address. And

7:11

it'll go through some

7:13

steps and use it

7:15

needs like another piece

7:18

of memory for almost

7:20

like working memory. And

7:22

then it'll turn

7:28

that number into

7:30

potential factors, factor

7:33

numbers. And so

7:35

the thing that secures

7:37

elliptic curve photography is

7:40

what's called the discrete

7:42

log problem. And it's

7:44

essentially a fancy name

7:46

for the fact that

7:48

it's difficult to factor

7:51

very large numbers. to

7:54

find the factors to

7:56

them. And so there's

7:58

kind of like this

8:00

like mix of elliptic

8:02

curve cartography and quantum

8:04

computing that like it

8:06

requires a good understanding

8:08

of both. And I

8:10

will admit I have

8:12

maybe an intermediary understanding

8:14

of both, but I

8:16

have a sense for

8:18

how it works a

8:20

little bit, you know?

8:23

And then I developed

8:25

some specifications as to

8:27

like, you know,

8:30

once I had a

8:33

decent understanding of the

8:35

problem, what we can

8:37

do to mitigate against it. Okay. And

8:40

so the big sort of problem with

8:42

quantum computing, as far as I know

8:44

it, is that they'll throw errors very

8:47

regularly. And so why is it that

8:49

a quantum computer will throw arrows where

8:51

a normal computer doesn't in the same

8:53

way? Right. So there is something that

8:56

there's noise that will interfere with the

8:58

circuits. And

9:00

it's because they're cool

9:03

to near absolute zero

9:05

in order to entangle

9:07

qubits with each other.

9:10

And for that entanglement

9:12

to remain undisturbed through

9:14

quantum computer

9:16

programmers will do is that

9:19

they'll implement error correction codes.

9:22

Or in the latest

9:24

Microsoft announcement, they actually

9:26

are using sort of

9:28

like a quasi particle

9:30

to simulate a new

9:32

state of matter called

9:34

a Myrona fermion. And

9:37

Myrona fermions are

9:39

much more isolated

9:42

against noise. while

9:45

still being able to maintain

9:47

quantum states, entangled states.

9:50

And so that's, they

9:53

need like far fewer

9:55

of them to perform

9:57

computation, whereas like at

10:00

the Google Willow processor,

10:02

they found, they

10:04

made a major breakthrough as well,

10:07

but it took them about seven

10:09

times seven, like, array

10:12

of cubits of physical cubits

10:14

to become one logical cubit.

10:17

So, with like

10:19

105 cubits, they're only

10:21

able to come up

10:23

with like two logical

10:25

cubits. And then with

10:28

the Microsoft Myrona 1

10:30

announcement, they have eight

10:32

top of logical cubits,

10:34

which are essentially the

10:36

kind that makes use

10:38

of Myrona fermions. This

10:41

episode is brought to you by Ankerwatch. The thing

10:43

that keeps me up at night is the idea

10:45

of a critical era with my Bitcoin cold storage.

10:47

This is where Ankerwatch comes in. With

10:50

Ankerwatch, you're protected by their time -locked

10:52

multi -sig vault and with your own

10:54

A -plus rated Lloyds of London backed

10:56

insurance policy. You get to hold

10:58

your keys, Ankerwatch holds the risk. Whether

11:00

you're worried about inheritance planning, wrench attacks,

11:03

natural disasters, or your own mistakes, you're

11:05

protected by Ankerwatch. Rates for

11:07

fully insured custody start as low as

11:09

0 .55 % and are available for

11:11

individual and commercial customers located in the

11:14

US. Speak to AnkerWatch for

11:16

a quote and for more details about your

11:18

security options and coverage. Visit AnkerWatch.com

11:20

today, which is AnkerWatch.com. This episode

11:22

is brought to you by River,

11:24

the best place for Bitcoiners and

11:26

businesses to buy Bitcoin. With

11:29

River, you can set up zero fee

11:31

recurring buys, making stacking sats effortless. And

11:33

while you're waiting for the perfect buying opportunity,

11:36

River lets you earn daily interest on your

11:38

cash balance paid in Bitcoin. which outperforms most

11:40

high -yield savings accounts. What

11:42

really sets River apart is their unmatched dedication

11:45

to security. You have peace

11:47

of mind knowing that River has monthly proof of

11:49

reserves and holds all Bitcoin in multi -sig cold

11:51

storage. And with US -based phone

11:53

support, you'll always have someone ready to help. To

11:56

open an account, go to river.com/WBD and

11:58

earn up to $100 in Bitcoin when

12:00

you buy. That's R

12:03

-I -V -E -r.com/WBD.

12:06

Okay, so I think you'll need to

12:08

explain to me what's the difference between

12:10

a physical qubit and a logical qubit?

12:13

Yeah, so a logical qubit

12:15

essentially is a collection of

12:18

physical qubits that are arranged

12:20

in such a way that

12:23

they implement quantum error correction.

12:26

So that's just reducing the noise

12:28

that you get from the qubits?

12:31

Correct. And so it allows

12:33

the circuit to be more stable and provide

12:38

like a better answer. Okay.

12:41

And so where are we actually at

12:43

with quantum computers? Because as far as

12:45

I understand it, they're pretty tiny at

12:47

the moment. They're not actually in the

12:49

state that they're kind of usable. Are

12:52

these breakthroughs from Microsoft and Google,

12:54

are they really substantial? Well,

12:58

they're fundamental. And

13:00

what's interesting is that They've been

13:03

working on this problem for over

13:05

20 years, like in a real

13:07

way. Like, of

13:09

course, you know, they didn't start out

13:11

pouring billions into quantum computing, but they

13:13

are now. And

13:15

so it definitely

13:18

feels like there's

13:20

like a, like,

13:23

like the efforts building.

13:26

It's like, like, I'm

13:29

forgetting the analogy, but basically it's

13:33

It's starting to really look like they're

13:35

making real progress in that field. When

13:37

it comes to Bitcoin and breaking encryption, which

13:39

is obviously what this conversation is about, is

13:42

this like a five -year problem, a 10 -year problem, a

13:45

50 -year problem? Where are we on that kind of trajectory?

13:48

Yeah, I mean, I hope we have at least

13:50

five years. Five years would

13:53

be really good. Like

13:57

Matthew Corallo on the mailing list, he

13:59

was like, no, it would be really

14:01

great if we even had like 10

14:04

or 20 years to develop like the

14:06

very best post -chronum photography for Bitcoin.

14:08

And that would be like one single

14:10

algorithm that does all the things we

14:13

want from it as developers that, you

14:15

know, like we've been able to do

14:17

with. elliptic

14:20

curve cartography and snore

14:22

signatures and having signature

14:24

aggregation that doesn't increase

14:26

the size of the

14:28

signature and elliptic curve

14:30

Diffie Hellman, things

14:32

like that. If we could

14:34

have something like that for post

14:36

quantum cartography, that would be really

14:39

cool. If we could prove that

14:41

lattice cartography is a

14:44

valid way to secure against quantum computers.

14:46

That's also that would also be important.

14:51

And like coming up with

14:53

like just like harder hash

14:55

algorithms, making sure that the

14:58

hash algorithms are more resistant

15:00

against other algorithms that quantum

15:02

computers can run like Grover's

15:04

algorithm. And so

15:07

which is Grover's algorithm is

15:09

for So like

15:12

algorithm is for factoring large

15:14

numbers, whereas Grover's algorithm

15:16

is more like reversing, like

15:18

getting the inputs to a

15:20

black box function based on

15:22

its output. And so you

15:24

can essentially reverse a hash

15:26

that way. Whereas with Schroeder's

15:28

algorithm, you can reverse a

15:31

elliptic curve signature. Well,

15:34

publicly. Well, with the

15:36

quantum computers we have today, How

15:38

many logical qubits do they

15:40

have operationally running? Well,

15:47

IBM has a quantum computer

15:50

that has about 150 qubits.

15:52

They've had that for

15:54

a little while. They

15:58

actually give out free credits

16:00

week and you can run

16:03

like limited quantum computing programs on

16:05

there, or if you want to

16:07

run more involved quantum circuits, you

16:10

can pay them $1 .60 a

16:12

second. And works out to

16:15

be like $5 ,000 an hour for running

16:17

on one of their machines. And

16:19

also, I'm not even sure

16:22

they're even breaking even on

16:24

that. Like their machines are

16:26

so expensive that like even

16:28

that is might be, I

16:31

don't know. So,

16:34

uh, and so like really

16:36

we're in like maybe the

16:38

like low hundreds, uh, at

16:40

best and that that's for

16:43

physical uncorrected, uh, qubits, but,

16:45

um, so you like, you

16:47

could implement quantum error correction codes with those

16:49

qubits, but you wouldn't get much with them.

16:51

You get maybe like two or three basically.

16:54

And that was a two or three

16:56

logical qubits. Yeah, exactly.

16:59

Okay. And if. We get to the point

17:01

where these are powerful enough to break encryption.

17:04

How many logical qubits do they need to

17:06

get to? About 1 ,500.

17:09

Okay, so that obviously seems a long way off,

17:12

but do you think with these advancements that they've

17:14

had, that's closer than we think? They

17:17

have made some very fundamental

17:19

improvements in the approach that

17:22

they're taking. Microsoft

17:24

sounds pretty confident, and hopefully the

17:26

confidence is warranted. I would hate

17:28

for them to be. lying to

17:30

their shareholders, right? Like, so

17:33

there's that. And

17:36

that said, many physicists are very

17:39

skeptical. At least something

17:41

I've heard is that there are physicists who

17:43

are skeptical of what they've put together. And

17:46

so there's a lot of skepticism

17:48

going around, you know, and there's

17:51

also a lot of bold claims,

17:53

right? So, like, It

17:55

can be very difficult to figure out

17:58

exactly where we're at. Even

18:01

if you're in the thick of it,

18:03

just reading every announcement and looking into

18:05

them and listening to what other people

18:07

are saying. I

18:12

feel like we're in a quantum superposition

18:14

already. One

18:19

of the things that I'm unsure of is if they do

18:21

manage to get to the point where they can break encryption.

18:24

Where does like Bitcoin fall on the list? Like

18:26

what are the first things that are going to

18:28

break? Well,

18:32

that would be the signatures. So

18:35

like the basically the address is

18:37

when you go to sign actions

18:39

action for like for coins sent

18:42

to an address, you have to

18:44

create a cryptographic signature and reveal

18:47

your public key for that to

18:49

be validated. And so for that,

18:51

that spend to be validated. And

18:54

so by other nodes and on

18:56

the network. And so, yeah, the

18:58

low hanging fruit is definitely signatures.

19:02

Are we going to see national security

19:04

encryption get broken and planes falling out

19:06

the sky and bank encryption get broken?

19:09

Or is Bitcoin going to be kind

19:11

of top of the list because there's

19:13

potentially such a big honeypot there? Well,

19:16

the problem with the other

19:19

systems is that If

19:21

you break them, it's only going to

19:23

be temporary. They can

19:25

repair them, right? They can upgrade

19:28

them. They can reverse the ledger

19:30

if they wanted to. They can

19:32

track down people who still funds

19:34

through the existing financial system, right?

19:37

So it really is

19:40

like, how would you

19:42

say, just

19:44

prohibitive, I would say,

19:46

in terms of your

19:49

rewards from if

19:51

you were to target the

19:53

existing system with if you're

19:55

like an your financially motivated

19:58

attacker. I see. Okay. So

20:00

that makes sense. So in

20:02

if it's the public private

20:04

key pair that's like the

20:06

kind of low hanging fruit,

20:09

I guess Satoshi's keys are going to be like

20:11

the canary in the coal mine for this. They

20:14

could be, but like. The

20:16

thing about Satoshi's coins is

20:19

that they are spread out

20:21

amongst tens of thousands of

20:23

public keys. And so

20:26

they're about 50 Bitcoin each. So

20:28

it's not like one big address

20:30

honeypot, right? And

20:33

the 50 Bitcoin is because that

20:35

was the epoch one block reward,

20:37

right? The

20:39

bigger honeypot is probably

20:41

actually maybe the

20:44

Binance or Kraken cold wallets, because

20:46

those have been spent from, we

20:48

have the public key for that

20:50

on chain. And

20:52

that's the other problems. Generally,

20:57

there are three vulnerable

21:00

address types. There

21:02

are paid to public key,

21:04

which is what Satoshi's coins

21:06

were in. There's

21:09

reused addresses. So

21:12

basically an address that you've any

21:14

address type that you've received funds

21:17

and then spread from and then

21:19

finally tap root addresses. So.

21:22

Okay. So can we go through them? Cause.

21:24

So Satoshi's coins are paid to public key,

21:26

which was like the only address type then

21:28

as far as I understand it, which means

21:30

when he was signing a transaction, the public

21:32

key actually goes on chain. So why is

21:34

that the easiest one to attack? Because.

21:38

Well, I mean, they're all

21:40

kind of the same amount

21:43

of difficulty. It's just like,

21:45

like, all of them can

21:47

give you a 65 by

21:49

public key, right? Or 64

21:52

by public key, in terms

21:54

of the math of things.

21:57

But if

22:00

you, yeah,

22:02

so like, it's really

22:04

all about like, the amount and

22:06

also how much you think you

22:08

can get away with and like

22:10

you know maybe there's some like

22:12

imitation game type theory where you'll

22:14

try to take something maybe not

22:16

the big the big kraken and

22:19

binance cold wallets you'll take something

22:21

like smaller like that people necessarily

22:23

watching so so closely and maybe

22:26

try to take that first and

22:28

maximize your your earnings. uh,

22:30

and then of course you'll

22:33

like dump into something like

22:35

fiat which you know you

22:37

can then depend on even

22:40

if there is like our

22:42

corner computers attacking the system

22:44

you could depend on the

22:47

authorities to you know protect

22:49

that kind of uh activity

22:51

and so um it uh

22:55

And there's also certain

22:58

ways you can use

23:00

Bitcoin for it to

23:03

behave in sort of

23:05

like a quantum aware

23:08

way. If you're aware

23:10

of the quantum threat,

23:13

you can design certain

23:15

protocols for working with

23:18

addresses and spends and

23:20

just trying to avoid...

23:23

spend time avoiding certain doing certain

23:25

things to make it more difficult

23:27

for a quantum attacker to take

23:29

those funds and that's something I've

23:32

also been researching but regardless and

23:34

that does not require a soft

23:36

fork but that said The best

23:38

solution in my opinion would be

23:40

a soft fork that introduces a

23:42

new kind of cryptography that's resistant

23:44

to quantum computers OK, so

23:46

let's get into how a quantum computer would actually

23:48

derive a private key from a public key. Is

23:50

it just a case of it's more powerful so

23:52

it can brute force it or how does that

23:55

work? Well, the

23:57

way the Google Willow

23:59

white paper described it

24:01

was they observed like

24:04

a such a high

24:06

degree of efficiency that

24:08

it's not really thermodynamically

24:10

possible to perform that

24:13

much computation. unless

24:16

it has doing

24:18

work in parallel

24:21

universes. What

24:24

does that mean? Well,

24:26

when matter becomes entangled,

24:28

like when you have

24:30

a particle that's entangled

24:32

with another particle, it

24:35

really does seem like that's

24:37

your window into another universe.

24:40

Okay. I don't

24:42

understand that though. You're gonna have to explain that

24:44

to me more. Yeah, so

24:47

like quantum entanglement is tricky

24:49

and weird and I'll admit

24:52

I don't fully understand it

24:54

other than just that like

24:57

that's what it's looking like.

25:00

And also humanity doesn't really

25:03

quite understand parallel universes that

25:05

well either. So it's possible

25:08

that through this technology we

25:10

will discover more about, like,

25:13

what that actually means. But

25:16

that's, I mean, I can send

25:18

you a snippet of the Willow

25:20

White Paper that's really kind of

25:22

juicy. It's like, I'm sorry, the

25:24

what? You know? Like,

25:28

I feel you. Like, I feel you. I want

25:30

to double click on that too. I think just

25:32

about everybody does. Like, we just don't know. Like,

25:34

in some ways, we don't know. We only have

25:36

theories as to why these computers are so much

25:38

more powerful than. classical

25:41

computers. But

25:43

I mean, yeah, that that blows my

25:45

mind. I need to know more about

25:47

that. But but we know for a

25:49

fact that it will break ECD ECDSA.

25:53

If you have enough qubits

25:56

that are air corrected, we

25:58

know exactly the circuit that

26:00

you would build to take

26:02

a public key, load it

26:04

in, and then turn that

26:07

into a private key. Now,

26:09

the devil's always in the

26:11

details, but that's essentially like,

26:14

you know, the

26:17

threat model. So,

26:20

okay, so we know that all private keys

26:22

are potentially compromised in this scenario then. No,

26:26

actually, let's not

26:28

jump to that conclusion. This

26:31

technique is a little... So,

26:33

anytime a public key is

26:35

revealed, that would

26:38

be when... vulnerable. But

26:41

yeah, okay. Right. But

26:43

like all private keys, like,

26:46

uh, private keys, when they're turned

26:48

into public keys, the public key

26:50

can be hashed, right? And so

26:52

essentially, um, like

26:54

if you hash your public key

26:56

and you put the hash of

26:58

that public key on chain, that's

27:00

safe. And so any address that

27:02

starts with BC1Q, that's like a

27:04

native sacred address, that's going to

27:06

be fine. Any address that starts

27:08

with the number one. that's going

27:10

to be fine. So long as

27:12

you don't reuse that address, you

27:14

receive funds to it, but then

27:17

you spent like you spent from

27:19

that again, then you've reused it

27:21

and and like, you know, it's

27:23

it's it's you've already revealed the

27:25

public key for that. So it's

27:27

not safe. But if you're before

27:29

if you're using a HD wallet,

27:31

a proper HD wallet, like a

27:33

hierarchical deterministic wallet, and you

27:36

are like that's bit 32 compatible,

27:38

right? Like a bit 32 wallet.

27:41

And if it generates a new

27:43

address for you each time you

27:45

use one, then or even each

27:48

time you request one, then you're

27:50

going to be okay. It's

27:52

just it's it's when you reuse

27:54

addresses, or if you're using taproot,

27:57

I think that would be another

27:59

pitfall that that viewers might actually

28:01

be thinking about. Okay, so if

28:03

we know that the segway addresses

28:05

are safe, then why do we

28:07

need to move to a quantum

28:09

resistant algorithm? Well,

28:12

because when you spend from

28:14

them, an

28:17

attacker with a sufficiently powerful quantum

28:19

computer could take your transaction in

28:21

the mempool. I see. Yeah,

28:24

so like anytime you

28:26

spend your coins, you

28:29

have to reveal your public key

28:31

at that point. And when you

28:34

put in the mempool and like

28:36

everybody can see it then because

28:38

it's on all the notes, then

28:40

that's when the attacker could go

28:42

ahead and do the thing before

28:45

the transaction is mined. And if

28:47

if if it even if it

28:49

is mined, sometimes they're like reorgs

28:51

and orphan blocks and and those

28:53

public keys are then available and

28:56

and the transaction might not technically

28:58

have been mined. So There's definitely

29:00

like a lot of considerations when

29:02

you're thinking about a potential quantum

29:04

threat model. Okay.

29:07

And so this is just in the

29:09

crop top then. And this isn't like

29:11

a long term solution for everyone, but

29:13

theoretically in a world where we have

29:16

quantum computers that can do this, if

29:18

you were using segue addresses and sending

29:20

transactions out like out of band directly

29:22

to miners, would that get around this

29:25

issue? Well, yeah,

29:27

except it doesn't solve

29:29

for the problem of

29:31

orphan blocks. But yeah,

29:33

that's one that definitely

29:35

increases your security substantially.

29:40

The only problem is that it kind

29:42

of sucks, right? Because you don't have

29:44

a free mempool anymore. And

29:46

it's not the ideal solution.

29:54

There's definitely like services out there like slipstream,

29:56

for example, that you could use like if

29:58

you were to just create the transaction hex

30:00

and say blue wallet and then copy that

30:03

and then put it in a slipstream instead

30:05

that and make sure you have a high

30:07

enough fee rate for it to be selected

30:09

for in the next block. Then then you

30:12

that's that's a much better, much safer thing

30:14

to do than just publishing the transaction to

30:16

the network. But then but

30:18

it's a shame solution. It

30:21

really It's

30:23

not fair. It's not like a

30:26

fair market, right? And so, in

30:28

order for us to preserve the

30:30

free market of the mempool, we

30:33

need to essentially come up with

30:35

a better one. Yeah,

30:37

that makes sense. Okay, before we get

30:39

into the solutions that you've put forward

30:41

for this, what would it mean for

30:43

mining? So, mining

30:46

is a little different. It

30:52

depends on like I

30:54

haven't seen a lot

30:56

of academic literature on

30:58

how like shot 256

31:01

and in particular how

31:03

the how actually like

31:05

like Bitcoin mining based

31:07

on the difficulty right

31:10

is Could potentially be

31:12

compromised by a quantum

31:14

computer. We believe it

31:16

can be I

31:19

just, I'm not aware of the exact algorithm

31:21

that you would use other than just that

31:24

it would probably be based on Grover's algorithm.

31:26

It would be using Grover's algorithm, but it

31:28

would be an implementation of it that was

31:31

specific for the purpose of Bitcoin mining. And

31:33

when you say compromise, does that mean

31:35

that the quantum computers will be able to

31:38

outcompete the ASICs that we have right

31:40

now, or is it something different? I've

31:43

heard some people say, they

31:46

might, I've heard some people say

31:48

like they might substantially, they might

31:50

just be competitive. It's

31:53

hard to say. Like,

31:56

if there might be like kind

31:58

of a middle ground where they're

32:00

very good, but like, you know,

32:03

like one quantum computer that costs

32:05

a million dollars could replace, you

32:08

know, 10 ,000 ASX, right? Like

32:10

then, you know, like work. We're

32:12

still in good shape because then

32:15

everybody was just updated to quantum

32:17

miners. Okay. So you've

32:19

proposed BIP 360. Do

32:22

you want to explain what that

32:24

is? Yeah. So BIP 360, Bitcoin

32:26

Improvement Proposal, there are

32:28

gaps in between them. By the way,

32:31

I can't say it's the 360th one.

32:33

It's just BIP 360. That's what it's

32:36

called. It

32:39

is specifying a

32:41

new address format

32:43

call or what

32:45

they call output

32:47

type actually is

32:49

the technical term

32:51

for it is

32:53

that starts with

32:55

BC1R and it

32:57

will essentially be

32:59

a hash of

33:01

a public key

33:03

that comes from

33:06

a post

33:08

-quantum cartography signature algorithm.

33:11

And so post -quantum cartography or

33:13

PQC allows you to, basically, the

33:17

way it works is it

33:19

presents, it's just the whole

33:21

idea behind post -quantum cartography

33:23

is just to make it

33:26

substantially harder for a signature

33:28

or public key to, for

33:31

quantum computer to do anything useful

33:33

over it, essentially. And

33:36

also, to be clear, hash

33:39

algorithms are much harder for

33:42

quantum computers to work over

33:44

than signature algorithms. And

33:47

so Grover's algorithm, as

33:49

I mentioned earlier, works

33:51

over hashes. It scales

33:53

in a way that

33:55

is not as efficient.

34:03

public key elliptic curve cryptography.

34:06

Okay, so like the one of

34:08

the big benefits with elliptic curve

34:10

cryptography and Schnur signatures is that

34:12

they're very old algorithms that we

34:14

we've seen like tested for a

34:16

very long time. Are these post

34:18

quantum algorithms new? Yeah,

34:21

so one thing is, uh,

34:23

well, yes or no. So

34:26

for example, the psychp256k1 was

34:28

specified. in

34:30

2000 and we've had it for

34:33

25 years now and it's worked

34:35

pretty well so far. There

34:40

are a couple, like

34:42

post quantum algorithms that use

34:45

hashes, they're hash based, post

34:47

quantum cartography, signature algorithms. There

34:50

are a couple that are even

34:52

older than that though. One is

34:54

from 1977, Leslie Lampert came up

34:56

with the Lampert signature. Uh,

34:59

that uses hashes. It's very,

35:01

uh, large, uh, signature

35:03

size and public key size. Uh,

35:06

total would be like 80 kilobytes.

35:09

Um, but they are known to be secure

35:11

and those have been around for a very

35:13

long time. Similarly, uh,

35:15

there's also another, uh, there's also

35:17

another one called Widternits OTS, one

35:19

time signature that, uh, came out

35:22

a few years after that in

35:24

the 80s and, uh, that also.

35:26

is slightly smaller, but has its

35:28

own limitations. In

35:30

fact, one of the limitations is that if

35:32

you were to ever reuse it, people could

35:34

come up with a private key for it.

35:36

So that's why it's called a one -time

35:38

signature. So anyway, things like that. And

35:40

this might be a stupid question, but how do we

35:43

actually know they're quantum secure? So

35:45

it's their belief to be

35:47

quantum secure. Their belief to

35:49

be hard problems for quantum

35:52

computers to solve. For

35:54

example, if it uses a hash algorithm,

35:57

we know that hash algorithms

35:59

are difficult for quantum computers

36:02

to solve, and that they're

36:04

more difficult than elliptic curve

36:06

cryptography or factoring large numbers

36:09

like RSA or an ECC.

36:12

The hash algorithms are

36:14

kind of like a

36:16

level above, like quite

36:18

a bit harder. for

36:20

quantum computers to solve,

36:22

but they're not impossible.

36:25

And so there's also been

36:27

work put towards what's called

36:29

lattice cryptography. And

36:32

that is essentially

36:34

doing signatures in

36:36

higher dimensions. And

36:39

so we believe that by

36:41

increasing the dimensionality of the

36:44

problem, we can make it

36:46

more difficult for quantum computers

36:48

to parallelize. This

36:50

episode is also brought to you by Ledger.

36:53

If you're serious about protecting your Bitcoin, Ledger

36:55

has the solution you need. Their

36:57

hardware wallets give you complete control over your

36:59

private keys, ensuring that your Bitcoin stays safe

37:02

from hacks, phishing, and malware. With Ledger's easy

37:04

-to -use devices and the Ledger Live app,

37:06

managing your Bitcoin has never been more convenient.

37:09

Whether you're a long -time holder or new to the world

37:11

of Bitcoin, Ledger makes it simple to

37:13

keep your assets protected. If you

37:16

want to find out more, visit ledger.com

37:18

and secure your Bitcoin today. that's L

37:20

-E -D -G -E -R dot com.

37:22

This episode is brought to you by

37:24

CASA, the leading Bitcoin self -custody solution.

37:27

I've been using CASA since 2019 and I

37:29

can't recommend them enough. CASA have

37:31

options for all Bitcoiners from a two of

37:33

three multi -sig to a three of five

37:35

and a private client option for absolute best

37:37

in class security. CASA also

37:39

do inheritance which I very recently set up

37:42

and it really couldn't be easier. My inheritance

37:44

plan has gone from a vague treasure map

37:46

for my wife to a rock solid security

37:48

plan that I have total confidence in. To

37:50

find out more about CASA, go to CASA

37:53

.IO, which is C -A -S -A .IO.

37:56

Okay, and we're getting to exactly what

37:58

this means for Bitcoin, but if we

38:00

were to implement something like this, is

38:02

it a like one time thing that

38:05

fixes it forever or is this going

38:07

to be like an ongoing thing? Well...

38:12

If we had the perfect algorithm

38:14

like Matt Cruella wanted on the

38:16

Bitcoin Dev Smelling List, then

38:18

of course, we'd just upgrade to that

38:21

and that would be fine. But unfortunately,

38:23

we don't have that. We're not anywhere

38:25

near that. We need like a good

38:28

10 or 20 more years of post

38:30

-chronography research to get us like the

38:32

perfect thing. And so

38:35

that's why in Bit360, we actually

38:37

specify three different algorithms because we

38:39

don't know which

38:42

of them will ever

38:44

prove to be, uh,

38:47

unreliable. And, uh, so, so like

38:49

if one breaks or two breaks,

38:52

you at least have a third,

38:54

right? And so it, uh, it's,

38:57

um, it really is just like the best

38:59

of what we have now. And

39:02

it's, uh, essentially

39:05

like, like 5360, it's not perfect,

39:07

but it's the best of what

39:09

we have. And it's it's

39:11

the best solution we have now. And

39:13

so I just want this out there

39:16

and us to have the software for

39:18

it. We're actually going to build it.

39:21

And we're hoping we're hoping

39:23

actually to have a working

39:25

implementation by the end of

39:27

the year. The intention ultimately

39:29

is that we're not scrambling.

39:31

We're not like we have

39:33

like, you know, look like

39:36

if there is a every

39:38

Q day, right? Like. There's

39:40

a, like we come to

39:42

realize that Bitcoin has been

39:44

compromised by quantum computers. Then

39:47

if we ever see that,

39:49

if that ever occurs, then

39:51

we have a way to

39:53

potentially mitigate against that. And

39:56

so this is good for

39:58

Q -Day. This is also

40:00

good for also if we

40:02

just get a general sense

40:04

that, you know, like this

40:06

is where quantum computers are

40:08

going and there's a growing

40:10

consensus that quantum computers could

40:12

be a very real concern

40:15

more than just like an

40:17

8 -bit experimental quasi -particle,

40:19

you know, setup, right? Like,

40:21

if Microsoft suddenly has, you

40:23

know, 1 ,000 or 2

40:25

,000 myron -affirmion qubits, right,

40:27

topological qubits, then, like, that

40:29

would be like, okay, guys,

40:32

like... might need to think

40:34

a little bit more seriously

40:36

about this. Yeah, exactly. So

40:39

in terms of your goal for this,

40:41

in the ideal scenario, is it that

40:44

we wait 10, 20 years, however long

40:46

it needs to find the perfect quantum

40:48

resistant algorithm? Or

40:51

do you think we need to move forward

40:53

with 360 sooner than that? What

40:55

I guess the question is, is this you

40:57

trying to open the conversation and start something

40:59

happening rather than you thinking this is the

41:01

right solution? Well, I

41:04

mean, I think this is the

41:06

right solution for right now if

41:08

we're ever needed. It's just like

41:10

it really is like anyone's guess

41:13

whether we have 10 or 20

41:15

or maybe it's a complete boondobble,

41:17

right? Maybe it's a complete like

41:20

Who knows what like it's you

41:22

know, it's We really just don't

41:24

know and the fact that we

41:26

don't know is essentially a source

41:29

of fear and I think One

41:31

of the best ways to hand

41:33

like address that fear is to

41:36

have a solution waiting in the

41:38

wings and like, you know, basically

41:40

ready to go if we ever

41:42

need it and. Like

41:46

is has actual real code and

41:48

a real spec and real implement,

41:50

you know, just like and is

41:53

able to see how it works.

41:55

We're able to see, you know.

41:58

And if there's any impact

42:00

on block verification time, right?

42:03

Or how a node

42:05

scales through regular usage,

42:08

if there's like things like that. I

42:10

want to see that scaled on test.

42:12

I want to run this on a

42:14

testnet and see how this actually works

42:16

with real money, yeah. And so what

42:18

are the effects on Bitcoin from this

42:20

upgrade? Is it that keys are way

42:22

bigger and blocks take longer to validate?

42:26

Yeah, so blocks are bigger

42:28

to validate and they are

42:31

also can potentially in certain

42:33

configurations of the signature algorithms

42:35

take a good amount time

42:38

longer to verify. Maybe

42:40

not. Actually, it's I wouldn't say

42:42

good amount. It's actually like roughly

42:45

equivalent, but like it's it's it

42:47

would be something like two to

42:49

four times slower, which is not

42:52

terrible compared to like, you know,

42:55

One signature algorithm we evaluated

42:57

actually made things 15 ,000

42:59

times slower. And

43:02

the reason why we evaluated it

43:04

was because it produced substantially shorter,

43:06

like smaller public keys and signature

43:08

sizes to the point where like

43:10

we might not even need to

43:13

like do anything special about, say,

43:15

increasing a discount or increasing a

43:17

block size, right? But

43:20

the problem is... the the block like if

43:22

a block took a second to verify normally

43:25

it would take four hours to verify if

43:27

it was full of that kind of signature

43:29

algorithm so like things like that like you

43:31

aren't completely obvious at first and and then

43:34

you just sort of like dig into it

43:36

a little bit more and you're like oh

43:38

no this actually won't work and so uh

43:40

things like that i want to kind of

43:43

like i want to make sure there there

43:45

aren't any obvious pitfalls and that's why i

43:47

want to actually just write the code and

43:50

then get it out there and see how

43:52

it works. And

43:54

then we'll have a better idea

43:56

of like if this is, you

43:58

know, a good design or not. And

44:01

if it is, then we'll have potentially

44:03

like a solution. And for those who

44:06

are, you know, concerned or fear mongering

44:08

or saying Bitcoin is going to die

44:10

due to quantum computers, well, we can

44:12

just point that to vid 360 and

44:15

say, well, no, we have a plan.

44:18

You mentioned block size there. Do you have an

44:21

idea of what this will do to block sizes?

44:24

Well, so that's, and just to

44:27

be clear, bit 360 is a soft

44:29

fork. So it's not like a wholesale

44:31

increase in block size. It is essentially

44:33

adding a new field to the transaction

44:35

similar to the witness. We call it

44:37

an attestation. It's just a synonym for

44:39

a witness, but it's a different, it

44:42

has different rules. And so we

44:44

just need a different name for

44:46

it. And so Yeah,

44:50

the attestation,

44:53

yeah, if you stuff it full of like,

44:55

so it depends. It depends. Like,

44:58

so first of all, the

45:00

attestation is a much stricter

45:03

rule set, only valid public

45:05

and public keys and signatures,

45:08

only valid public key and

45:10

signatures can go into the

45:12

attestation, so they have to

45:14

sign for the transaction. And

45:17

then also they have to

45:20

be committed to in advance.

45:22

And although you can do

45:24

like a threshold signature and

45:27

you can like kind of

45:29

like put a hash there

45:31

instead and you will always

45:34

still need to provide a

45:36

valid public gain signature. And

45:38

so that's that that really

45:41

just dramatically reduces the amount

45:43

of shenanigans that can be

45:45

had with a attestation versus

45:48

like a witness. And so

45:50

there's that. And if we

45:52

were to provide, say, a

45:55

16x discount versus the 4x

45:57

discount that Segwit provided, in

46:01

the software we call it

46:03

Qubit with a capital B,

46:05

a Qubit discount of 16x

46:07

would result in worst case

46:09

scenarios, 16 megabyte blocks. uh,

46:12

when they're serialized on disk,

46:14

they're not, you know, like

46:16

it's not raising the one

46:18

million, uh, um,

46:22

the one million V byte,

46:24

right? Like, like, uh, uh,

46:28

cap. It's, it's just, uh, um,

46:31

it's just fudging the math

46:33

on how we account for

46:36

the, um, the size

46:38

of the block, the weight of the

46:40

block, what they call, with these terminology

46:43

that they came up with in the

46:45

Segwit days that we've been wrestling with

46:47

ever since. But

46:50

yeah, if we just like quadruple

46:52

that discount, then that should be

46:54

relatively sufficient for us to maintain

46:57

roughly the same amount of throughput.

46:59

It might be a little reduced

47:01

if every transaction is a post

47:03

-quantum -retail transaction. it'll

47:07

be somewhere between uh so like

47:09

also one thing to understand is

47:12

that because we're providing three different

47:14

signature algorithms we can also uh

47:16

like users will choose how many

47:19

they want to put on their

47:21

uh transaction or their address really

47:23

to encumber their address with it's

47:26

almost like it's almost like a

47:28

multi -sig but for in a

47:30

quantum perspective and so like You're

47:33

having like, you're basically tripling, you

47:36

could potentially triple the number

47:38

of signatures you put on

47:40

ordinary transaction. If you

47:43

were, like using all

47:45

three different algorithms, if you

47:47

were particularly paranoid about, you

47:50

know, when you want to go

47:52

spend these coins. So like, if

47:54

you are cracking or Binance

47:57

or Bitfinex or Coinbase, or

47:59

micro strategy, right? Like if you're one of these

48:01

big institutional players with a large amount of coins

48:04

that you want to secure, then

48:06

you'd probably want to increase

48:08

the number of signatures you

48:10

include in your transaction. And

48:13

so that would be

48:15

something like no more

48:17

than 20x, larger if

48:20

you use all three.

48:22

So it's somewhere between two and 20, depending

48:25

on like how badly you want to secure

48:27

your coins, like how how

48:29

much value you want to secure. And

48:32

in a way that also leads to kind

48:34

of like an MEV kind of behavior and

48:36

that like some of the really high value

48:38

transactions will pay more, not only in fee

48:40

rate, but also in for these signatures. And

48:43

also in that way, it kind

48:46

of also addresses the security budget

48:48

concern because, you know, like some

48:50

people have proposed reducing the block

48:52

size and I'm like, well, why

48:54

not just make transactions bigger? So

48:58

just to try and put that into layman

49:00

terms so I understand, does that mean that

49:02

instead of having whatever we have now, 4

49:04

,000 transactions in the block, it might be

49:06

1 ,000 transactions in the block? Yeah,

49:09

maybe more like 3

49:11

,000, one to 3

49:13

,000, still in the

49:15

thousands. Okay,

49:18

so it's not the biggest reduction in the

49:20

world. So what have

49:22

the general reception of this been

49:24

like in dev circles? Well,

49:30

um, the developers. So

49:33

it's definitely like, um,

49:36

like pretty much every core

49:38

dev I've talked to or

49:40

anybody who's like a long

49:42

standing, uh, uh, like

49:45

contributor to Bitcoin is

49:48

just entirely skeptical that

49:50

like, you know, we're

49:53

going to see any, we have any concern.

49:55

And. Like

49:58

Peter Woolley, right? He

50:00

was the one who, actually,

50:03

can you help me with the pronunciation of his

50:05

name? You know, you would know. Well, I thought

50:07

it was Peter Woolley, yeah. I

50:09

think you got it. Well, okay,

50:11

great. So, awesome. Well,

50:14

if I'm getting that from a European,

50:16

then actually not European. You're Australian. That's

50:18

different. Well, I'm English, but I live

50:20

in Australia. Oh, okay,

50:23

cool. Yeah. yeah, I thought was

50:25

Peter Woolley. Okay, will it

50:27

okay. So Peter will it

50:29

He's he's the guy who

50:31

who basically for those who

50:33

don't know he implemented taproot

50:35

Really just kind of like

50:37

pushed it through along with

50:39

Jeremy Rubin, but and his

50:41

contributions to that but He

50:43

and he was also one

50:45

of the contributors or like

50:47

kind of like he's the

50:49

lead maintainer of the secp

50:51

256k one implementation used by

50:53

Bitcoin And legendary

50:56

dev. Oh, yeah. Amazing

50:59

guy. Uh, like legendary

51:01

dev. Exactly. Oh, gee. Uh,

51:04

very talented and he's answered so many

51:06

questions. I've, I've asked them like Bitcoin

51:08

said exchange him and merge, right? Legends,

51:11

right? Um, so

51:14

Peter will, uh, he's, uh,

51:16

um. He's

51:18

he, he acknowledges like this is

51:20

a potential threat model. But he

51:22

also is still skeptical that it

51:24

will ever happen. And

51:27

he also has recommended

51:30

that we potentially confiscate

51:32

vulnerable coins because it

51:35

could definitely... According to

51:37

him, he says that

51:39

it would... Of course,

51:42

we have to do

51:44

this. And I'm like,

51:46

wait, of course not. I don't think so.

51:48

I don't think, of course, we need to

51:51

confiscate all the vulnerable coins. You know, it's,

51:53

it's, it's a, that's a

51:55

different line of discussion altogether. But

51:57

I think that's a really interesting line of

52:00

discussion. So I very briefly spoke about the

52:02

quantum stuff with Alex Leachman when he was

52:04

on the show. And one of the things

52:06

he brought up was this idea that in

52:08

like a post quantum world, all those old

52:11

coins that are vulnerable, like Stochie's coins being

52:13

a perfect example, like they've never moved. We

52:15

assume they're never going to move. And in

52:17

a post quantum world, something has to happen

52:19

with them either. Satoshi moves them, which

52:22

I don't think is likely, they

52:24

get confiscated, like you say,

52:26

or they get stolen. And

52:29

I feel like there's a kind of

52:31

an analogy to the Ethereum Dow hack,

52:33

where it's like, it's a very kind

52:35

of critical moment where we have to

52:37

be really careful about what we do.

52:39

And I don't think confiscation is a

52:41

viable solution at all. Yeah,

52:43

I think it's a terrible idea, in

52:45

my opinion, that's like kind of breaking

52:48

one of the original promises of freedom

52:50

of money, right? like censorship resistance. And

52:53

so there's that.

52:56

There's also like, you know, the,

53:00

there is one potential compromise

53:02

I've heard that, you know,

53:04

might like be a good

53:07

like, you know, middle

53:10

ground between the confiscators

53:13

and the liquidators, right?

53:15

And that is to

53:17

restrict the spending of

53:20

pay to public key addresses To

53:23

one per block and so even

53:25

if quantum computers are going at

53:27

it at that point Like before

53:30

before Qt a Like one per

53:32

block like we hardly ever see

53:34

him anyway So like you'll be

53:37

able to get it through just

53:39

fine after Qt a it'll be

53:41

a free -for -all and instead

53:43

of like, you know, they're being

53:46

like, you know a bunch of

53:48

like transactions

53:51

going into a block, it going

53:53

straight to Coinbase and it's like

53:55

a sudden exit rush of liquidity,

53:58

right? Instead of doing that,

54:01

we could just like kind

54:03

of throttle that bandwidth down

54:05

and to like just, according

54:08

to consensus rules, miners can

54:10

only include in a valid

54:12

block one paid to public

54:15

key spend. spend transaction. And

54:17

so if they were to

54:19

do that, then

54:21

they would smooth

54:24

out basically that

54:27

potential exit. And

54:30

there's like about 34 ,000

54:32

paid to public keys. And

54:35

so it would take like basically, it

54:37

would lengthen it over the course of

54:40

a year or so, because there's about

54:42

50 ,000 blocks in a year. So

54:44

you're saying that the general pushback from

54:46

the dev community is that this is

54:49

just not important. And this is something

54:51

you hear a lot in Bitcoin. A

54:54

lot of Bitcoiners just assume that this isn't

54:56

a real threat. We don't have to worry

54:58

about it. I hope they're right. In many

55:00

ways, I hope they're right. Well, I hope

55:02

they're right, too. But what

55:04

is it that you're seeing that makes

55:06

you think they're not right? Well,

55:09

just that. OK. Yeah. So that was

55:11

a great question. So there are... know,

55:14

multiple billions of dollars being

55:16

poured into these programs, these

55:20

quantum computing programs,

55:22

there are companies

55:24

like Microsoft, Amazon,

55:26

Intel, Google, IBM,

55:31

they all have big quantum computing

55:34

programs, very well funded. Uh, they

55:36

also have, uh, there's also like

55:38

small startups like SideQuantum, Rigeti, INQ

55:40

that are also looking into this.

55:43

And then, uh, there's also defense

55:45

contractors like Honeywell and Raytheon. And,

55:47

uh, there's also a, uh, company

55:49

the U .S. has. It's a

55:52

really interesting company. It's called Incutel.

55:54

It's apparently a, uh, yeah.

55:57

So, uh, they, they,

56:00

so we have no idea also just

56:02

to be clear. if somebody even has

56:05

a good enough quantum computer because there

56:07

have been some real, some real spooks,

56:09

you know, like going at this for

56:11

even a longer time than even private

56:14

industry has been. Interesting.

56:16

So can we put our tinfoil hat on for

56:18

a second? Because one of the questions that I

56:20

have is that like, Bitcoin is

56:23

obviously one part of this, but if

56:25

all encryption breaks, there's no secrets anywhere,

56:27

right? And so if

56:29

we, if like, All government secrets

56:31

were now out in the open.

56:33

That's obviously a mask off moment

56:35

in a way that we can't

56:37

even imagine. If we use

56:40

the like they, I don't know who they are,

56:42

but do you think they will let quantum computing

56:44

get to that point? Oh,

56:46

yeah. I mean, like, it's

56:49

arguable that they already have that

56:51

capability and they're just like kind

56:53

of, you know, like,

56:57

uh, churning through records in their

56:59

Utah facility already, right? Like that

57:01

could be the case. Um, there's

57:04

also, uh, like, like, I'm not,

57:06

I'm not sure I understand your

57:08

question. Like you're saying, like, like,

57:10

will the authorities Like, do the

57:12

three -letter agencies let this happen

57:15

because then all their secrets are

57:17

out? Okay. So, the federal government

57:19

has a, uh, guideline for this.

57:21

It's called the CNSA 2 .0.

57:24

And... It's basically

57:26

there like roadmap for how

57:28

we handle the potential threat

57:30

of quantum computers. And

57:33

they're basically saying that we need

57:35

to stop using elliptic curve photography

57:37

in new systems by the year

57:39

2030. That's only five years away.

57:42

And by the year 2035, we

57:44

need to have completely sunset our

57:46

use of elliptic curve photography in

57:48

government systems. So they're preparing for

57:51

this? They are preparing for

57:53

this. So like there's on one side,

57:55

there's like billions of dollars being spent

57:57

in private industry. On the other side,

57:59

the government is appears to have some

58:01

concerns and they're doing stuff. And so

58:04

like, I'm just like, well,

58:06

what is Bitcoin going to do? Because

58:08

like, it's not like we can just

58:10

roll back the ledger, you know, like,

58:12

like, I mean, I guess we could,

58:14

but that would fucking suck. And also

58:16

just to be clear, also, Ethereum, which

58:18

is a lot more centralized governance than

58:20

than Bitcoin has and regularly hard forks.

58:23

They had this big

58:25

hack and they were

58:27

not able to get

58:30

their governance structure in

58:32

a way that would

58:34

reverse that flow. And

58:36

it's arguable that they

58:39

couldn't have because now

58:41

there's like tether. And

58:43

you talking about the Bybit hack here? Yeah,

58:45

the Bybit hack, exactly. And they moved it

58:47

all into tether. And so

58:50

like the tether bridge isn't going

58:52

to want to like read readjust,

58:54

you know, and so, like, there's

58:56

like, there's a limited amount of

58:58

time that you could roll by

59:00

rollback a chain as significant economic

59:02

activity occurs on it. And at

59:04

which point, like, you know, it

59:06

might just be too late when

59:08

we realize that, you know, there

59:10

has been a a hack that

59:12

can be somehow attributed to being

59:14

a due to a quantum computer,

59:16

even though that's very difficult to

59:18

prove. So What's

59:20

your goal with this now? Because

59:23

if the devs aren't really on board with this,

59:25

is it now just an education thing for you

59:27

where you need to get out and explain what

59:29

you're doing and why you're doing it? That's

59:33

essentially one of the things

59:35

I'm doing. Yeah, I'm going

59:38

out to different conferences and

59:40

advocating for this bit and

59:42

trying to establish support and

59:45

consensus in addition to Actually

59:48

implementing it and so I I

59:50

hope that this is like taking

59:52

seriously as a potential solution and

59:54

Maybe there are better ones. I'd

59:56

like to see people work on

59:59

better ones because you know like

1:00:01

I mean I've I I've only

1:00:03

been working in Bitcoin full -time

1:00:05

for four years So I have

1:00:08

you know my limitations and my

1:00:10

understandings of Bitcoin even still like

1:00:12

you could work on Bitcoin for

1:00:14

10 years and you could still

1:00:16

there are still things you could

1:00:19

probably not know about it. And

1:00:21

so it's, yeah, like it's, there's

1:00:23

a joke that like people will

1:00:25

start with Bitcoin before going into

1:00:27

other cryptocurrencies to learn about them.

1:00:30

And then they just never stop

1:00:32

learning about Bitcoin because there's too

1:00:34

much to know. The

1:00:37

interesting thing here is down to like consensus,

1:00:39

right? Like we know that with things like

1:00:42

CTV, which I would love to see in

1:00:44

Bitcoin. That's like getting that

1:00:46

implemented is going to be hard

1:00:48

because it's not urgent. What

1:00:51

do you think? Like if this gets

1:00:53

to a point where it does become urgent, do you

1:00:55

think there's going to be it's going to be easy

1:00:57

to gain consensus? Or do you think that's still going

1:00:59

to be a big push? It

1:01:02

should always be a big push,

1:01:04

right? Like it always should be

1:01:06

a minor mental undertaking to ever

1:01:08

want to change Bitcoin. I

1:01:11

am very much in the Asafires camp

1:01:13

just because like this is a one

1:01:15

to two trillion dollar asset class, you

1:01:18

know, like I would hate to break

1:01:20

it. We have to be

1:01:22

very rigorous and make a very

1:01:24

good case, a very well -reasoned

1:01:26

obvious case for it to be

1:01:28

a no -brainer to upgrade to

1:01:30

it, right? Otherwise,

1:01:33

it would compromise the

1:01:35

very reason why we're

1:01:37

here, right? So...

1:01:41

I mean, as much as I love Jeremy

1:01:43

Moirvan's work in CTV and as cool as

1:01:45

that is and CSFS, I hope that part

1:01:47

of me is like, I hope we get

1:01:49

that because that looks really cool. But then

1:01:51

the other part of me is like, well,

1:01:53

but also there's like $2 trillion that we're

1:01:55

securing here. And so we also need to

1:01:57

be really careful. That's interesting to

1:01:59

hear you say you're in the ossifier camp because

1:02:01

I would have assumed with the work that you're

1:02:03

doing, you'd be like a strong push for these

1:02:05

new upgrades. I mean,

1:02:07

I understand them very well.

1:02:09

I've worked very closely with

1:02:11

a lot of people who

1:02:14

are in that field, and

1:02:16

it would be very cool

1:02:18

if we have that. And

1:02:23

I wouldn't say I'm a complete

1:02:25

100 % ossifier. In fact, a

1:02:28

lot of people who call themselves

1:02:30

ossifiers probably would make an exception

1:02:32

if Bitcoin or security were completely

1:02:35

compromised, right? Definitely. It

1:02:37

has to be a very good

1:02:39

reason for us to upgrade, in

1:02:42

my opinion. The

1:02:44

kind of argument, of course, is

1:02:47

that Bitcoin could be a $10

1:02:49

trillion asset class only if we

1:02:51

had confidence, something like that. I'd

1:02:53

be like, well, maybe that could

1:02:55

also be the case for quantum

1:02:57

resistance. Maybe that's what's holding us

1:03:00

back. It's

1:03:04

really hard to say. It's hard to

1:03:06

predict the future. There's a lot of

1:03:08

unknowns and like the work we're doing

1:03:10

is to de -risk that. I

1:03:13

don't know if like CTV or

1:03:15

CSFS can be de -risked more

1:03:18

than they already have been just

1:03:20

because they've been around for so

1:03:22

long. Whereas Bit360 has only

1:03:24

been around for like maybe at most, if

1:03:26

I'm being generous, like at most maybe about

1:03:28

a year. And so

1:03:31

it definitely needs some more

1:03:33

time in the oven needs

1:03:35

more tweaks needs more like

1:03:37

just love and hopefully, you

1:03:39

know, we'll follow its evolution.

1:03:42

But yeah, that's we're working

1:03:44

hard on it. And hopefully

1:03:46

we'll have a good solution

1:03:48

for if there if it

1:03:50

ever is needed, like it

1:03:52

and you know, I mean,

1:03:55

I'm a Bitcoiner, first and foremost,

1:03:57

I'm not like, you know, fully

1:03:59

invested in this quantum thing. And

1:04:01

so, like, you know, I would

1:04:04

be perfectly happy if quantum computers

1:04:06

were just like this fool's errand,

1:04:08

and like, or, or, or,

1:04:11

or maybe they can solve,

1:04:13

you know, the things they

1:04:15

want to solve with them,

1:04:17

like, simulating fusion power, or

1:04:19

like, coming up with enzymes

1:04:21

for forever chemical, forever chemicals,

1:04:24

right? Like that would be pretty cool.

1:04:26

if they could do that without also

1:04:28

breaking Bitcoin. But that's a big if.

1:04:32

Yeah, it's really hard for me to

1:04:34

say where I stand on Bit360 because

1:04:36

I don't understand how imminent the threat

1:04:38

of quantum computers are. But

1:04:41

if it is real and if it does turn

1:04:43

into something, then I'm very glad that this conversation

1:04:45

is starting. I guess that's where I'd be. I'm

1:04:47

glad the conversation is happening, but there's obvious trade

1:04:49

-offs to Bitcoin that Unless this is a very

1:04:52

real, very imminent threat, I wouldn't be interested in.

1:04:54

Does that make sense? Oh,

1:04:56

yeah. Without a doubt. Without a doubt.

1:04:58

Yeah. I mean, like, it's, uh, it's

1:05:01

just like, uh,

1:05:03

it really is the kind of thing where, like,

1:05:05

I just want people to have in their back

1:05:07

of their minds as they're reading these FUD articles,

1:05:09

you know, coming out that, like, oh, Bitcoin's going

1:05:12

to die because now we have my arena fermions.

1:05:15

Um, like, you

1:05:17

know... Hopefully, the fact

1:05:19

that Bitpli60 exists keeps people

1:05:21

from running away from Bitcoin.

1:05:24

Yeah. Yeah, that's fair. So

1:05:27

you said in the dev community, it's kind

1:05:29

of been a bit nonchalant in terms of

1:05:31

the response to this. Outside of the dev

1:05:33

community, what has the response been? Are you

1:05:35

an attack on Bitcoin yet? Actually,

1:05:38

you know, it's so funny is

1:05:40

that although I have been called

1:05:43

an attack on Bitcoin, Whenever

1:05:46

I'm doing an in -person event, like

1:05:49

what we just had, we

1:05:52

handed out a bunch of hats. It was really

1:05:54

cool. Bit360 hats.

1:05:57

And we're going to be doing

1:05:59

a bit devs dedicated to Bit360

1:06:01

on 3 .6. At

1:06:03

least in North America, we call it

1:06:05

March 6. On 6 .3. Nope,

1:06:09

different bit. Uh, yeah. So,

1:06:12

uh, no, uh, 5360 day

1:06:14

is, uh, uh, that's,

1:06:16

that's, yeah, that's, um, uh,

1:06:19

we're, we're doing a bit of that. And then, uh,

1:06:22

uh, but regardless, even the events that

1:06:24

we had last, last week were, uh,

1:06:27

uh, people would come up to me and just thank

1:06:29

me for the work that I'm doing because, you

1:06:31

know, it is a concern that a lot

1:06:34

of clubs have, you know, like it's just

1:06:36

a lot of people who aren't devs who

1:06:38

are. are like just trying to make their

1:06:40

way into stacking sats, you

1:06:42

know, and fiat mining, right?

1:06:44

Like ordinary Bitcoiners, you know,

1:06:46

like, if there's, if that's

1:06:48

even a real term, right?

1:06:50

Or like, Bitcoiners are ordinary.

1:06:52

But, but that said, Bitcoiners,

1:06:54

right? In general, are usually

1:06:56

very grateful for the fact

1:06:59

that I'm at least giving

1:07:01

this potential concern. The

1:07:05

time that it needs to for us to

1:07:07

really fully understand and potentially mitigate or do

1:07:10

up mitigations against it. Yeah,

1:07:12

it's very cool. I mean, I'm definitely glad the work is

1:07:14

happening. I hope we never have to use your work, but

1:07:16

it looks like maybe we will. So

1:07:18

these events, have these been a

1:07:20

space Denver? Yeah.

1:07:23

How's that going? Oh,

1:07:25

it's so great. We have like, I

1:07:28

think 78 members now. And

1:07:30

next month is when in

1:07:32

April is when be

1:07:35

kind of like our one year

1:07:37

mark when we first started collecting

1:07:39

dues from members. We didn't

1:07:41

have a space back then. And

1:07:44

so we just kind of built a bit of

1:07:46

a war chest. And then we

1:07:48

got a space and then we sometimes hold

1:07:50

Bitcoin events. We're very picky about what kind

1:07:52

of events we hold. Heatpunk was

1:07:55

one of them that was very well at

1:07:57

Peter Todd and Troy Kross come to that.

1:07:59

And that was only about a week ago

1:08:01

now. And that was

1:08:04

Yeah, no, like all those events were just so

1:08:06

cool. And it's just

1:08:08

going really well. And so

1:08:11

what's interesting is that when

1:08:13

we first started the space,

1:08:15

we offered discounts to new

1:08:17

members because we didn't have

1:08:20

a space yet. And those

1:08:22

discounts will expire next month.

1:08:25

And so after next month, When those

1:08:27

dudes come come do and and all

1:08:29

the members of spacemen were all real

1:08:31

close friends. I don't think I don't

1:08:33

think anybody's gonna wash out just because

1:08:35

we raised the prices a little bit.

1:08:38

Then you know, I

1:08:41

think we will be set

1:08:43

financially for like being a

1:08:45

a sustainable co -op of

1:08:47

bitcoiners in Denver with an

1:08:49

actual place to hold events

1:08:51

and meet and work. That's

1:08:54

amazing. So this is like Denver's equivalent of Bitcoin

1:08:56

Park or the Commons or whatever. I think these

1:08:58

third spaces are so important for Bitcoin. I love

1:09:00

to see it. I'll definitely try and get out

1:09:02

to Denver some point this year. It

1:09:05

would be really cool if you did. And

1:09:07

then maybe we can do another one of these in

1:09:09

person. Yeah, for sure. Hopefully

1:09:11

the quantum threat is not anymore severe then.

1:09:14

But Hunter Beast, I appreciate the time. It's

1:09:16

been good. I've definitely learned some stuff about

1:09:18

quantum. So it's been great. Is

1:09:20

there anything you want to do and want to say before we

1:09:22

close out? Oh, just go

1:09:25

to surmount .systems. There we

1:09:27

have a link for the

1:09:29

BIP and we also have

1:09:31

some donation links for the

1:09:34

foundation. It's a nonprofit. And

1:09:36

so there's a silent payment link

1:09:39

and a bolt 12 link. And

1:09:41

that's because we don't want to

1:09:43

reuse addresses. And also

1:09:45

we don't use Nostra. We do

1:09:47

have an X where we don't

1:09:49

use Nostra specifically because all Nostra

1:09:51

NPubs are public keys. So,

1:09:55

that'll be maybe another, once

1:09:57

we have everything figured out the Bitcoin side, maybe

1:09:59

we'll try to go and figure

1:10:01

out what Nostra needs to. We

1:10:04

quantum resistant and pubs. Yes.

1:10:08

Love it. Well, thank you very much for the time. Hunter. I

1:10:10

try and get out to Denver at some point this year

1:10:12

and we can do it again. All

1:10:14

right. Thank you, Denny. I appreciate it.

Rate

Join Podchaser to...

  • Rate podcasts and episodes
  • Follow podcasts and creators
  • Create podcast and episode lists
  • & much more

Episode Tags

Do you host or manage this podcast?
Claim and edit this page to your liking.
,

Unlock more with Podchaser Pro

  • Audience Insights
  • Contact Information
  • Demographics
  • Charts
  • Sponsor History
  • and More!
Pro Features