The ongoing discourse surrounding Bitcoin and quantum computing often diverges into two distinct yet intertwined discussions.
One aspect is technical in nature: should quantum computing advance to a level where it can compromise Bitcoin’s signature protocol, the system has mechanisms in place to adapt. This includes new address formats, migration protocols, soft forks, deprecations, and key rotations. While this presents a significant engineering challenge, it remains within the realm of engineering.
The other facet is legal: if an individual utilizes a quantum computer to extract the private key from an outdated wallet and subsequently transfers those funds, what exactly occurs? Is this an act of reclaiming lost property or outright theft?
In April 2026, BIP-361 was introduced with the aim of freezing over 6.5 million $BTC held in UTXOs vulnerable to quantum attacks—this includes more than one million coins linked to Satoshi Nakamoto himself. What was once merely theoretical has now escalated into a contentious debate about ownership rights and confiscation within a framework that fundamentally recognizes only control.
I do not intend to speculate on when we might see a quantum computer capable of breaching Bitcoin’s defenses. The more pressing question is whether such an event would lead the law to view transactions involving previously dormant coins as legitimate recoveries or acts of theft.
Traditional property law provides a straightforward answer: it constitutes theft.
This conclusion may be disheartening for some proponents of Bitcoin since its framework does not enforce ownership titles like traditional courts do; instead, it emphasizes control. If you can demonstrate valid spending authority over your assets, then those transactions are accepted by the network. However, this distinction only heightens concerns regarding how legal interpretations will address these actions.
And on that note, legal principles are quite clear-cut:
Dormant coins do not become ownerless simply due to their age.
The Real Quantum Threat
A focused examination reveals that not all bitcoins face equal vulnerability concerning potential threats from quantum technology. Typically speaking, unless spent by their owners first, addresses do not disclose public keys on-chain—a crucial factor because it prevents attackers from easily extracting private keys from untouched addresses.
The genuine risk lies within specific categories of outputs; early pay-to-public-key outputs expose full public keys directly on-chain while certain older script constructions also reveal them similarly. Taproot outputs likewise commit directly rather than hashing output keys—address reuse further complicates matters by exposing public keys after spending activities leave residual funds under identical key materials; these are indeed the bitcoins most frequently referenced when discussing exposure risks.
This timeline for potential vulnerabilities has tightened considerably following research published by Google Quantum AI on March 31st 2026 indicating that breaking Bitcoin’s secp256k1 curve could require fewer than 500k physical qubits—a drastic reduction compared with earlier estimates nearing nine million qubits! Their findings also highlight another attack vector via mempool exposure during transactions where public keys remain visible for approximately ten minutes before block confirmations occur—providing adversaries ample opportunity for derivation prior confirmation!
Despite current hardware capabilities lagging behind these thresholds (Google’s Willow chip boasts just 105 qubits while IBM’s Nighthawk offers around 120), algorithmic advancements continue outstripping hardware developments at breakneck speed! NIST’s post-quantum migration roadmap mandates phasing out algorithms susceptible across federal systems by year-end twenty-thirty—and entirely prohibiting them thereafter by twenty-thirty-five—which may serve as benchmarks against which institutional stakeholders assess bitcoin preparedness even though they don’t impose direct obligations upon its ecosystem!
A substantial portion comprises older coins—including many likely lost forever or belonging deceased individuals—as well as others trapped within paper wallets long forgotten alongside antiquated storage methods—or estates still awaiting resolution! Some belong very much alive yet simply lack interest in accessing them!
This last point carries weight beyond what advocates claiming “lost coin” status typically acknowledge; externally observing dormancy reveals little about underlying circumstances surrounding each wallet—it could indicate anything ranging from death/lost access through disciplined saving habits/paranoia/multi-party setups…or perhaps even imply Satoshi prefers remaining enigmatic rather than embroiled litigiously—the blockchain offers no insight into which scenario holds true here!
This ambiguity underscores why silence alone cannot dissolve claims under property laws historically established norms!
Dormancy Does Not Equal Abandonment
The casual notion suggesting “finders keepers” often surfaces throughout these discussions but bears scant resemblance towards actual functioning principles governing property laws today!
Titles persist until transferred relinquished extinguished legally displaced via applicable doctrines—not merely vanishing due solely inactivity time passage value itself doesn’t suffice either!! So should anyone argue dormant bitcoins constitute fair game—they usually hinge arguments upon abandonment assertions wherein premises suggest prolonged inactivity implies loss thus abandonment ensues…yet such reasoning fails miserably under scrutiny!!! Pursuant strict standards requiring intent alongside demonstrable action reflecting said intention—forfeiture necessitates both desire relinquish ownership coupled with corresponding behavior showcasing willingness thereof mere failure engage asset long-term proves insufficient especially considering inherent value involved!! That isn’t some pedantic technicality…it represents core tenets foundationally underpinning all aspects pertaining toward Property Law itself!!! If nonuse sufficed obliterate title—we’d open floodgates inviting looting anything whose proprietor remained silent too long!! Such rules don’t apply land houses stock certificates buried cash heirlooms nor does apply bitcoin either!!! Ponder hypothetical edge case example illustrating clearer picture here—if someone deliberately transmits currency towards burn address devoid usable private key—that begins resemble abandonment since evident act signals intent clearly manifested however counterintuitively illustrates opposite position desired amongst raiders demonstrating precisely what relinquishment appears like when person truly intends same whereas most dormant wallets fail reflect any semblance thereof !! Pursuing better interpretation suggests ordinary understanding prevails: old coins remain old irrespective circumstance present ! Some undoubtedly lost others inaccessible forgotten slumbering none convert status ownerless possessions regardless context involved !! Recent legislative efforts have begun formalizing similar instincts seen UK’s Property (Digital Assets etc) Act passed December second twenty-twenty-five establishing third category personal properties explicitly encompassing crypto tokens whilst UCC Article twelve adopted across thirty states plus District Columbia recognizing controllable electronic records distinctly classified legal categories neither regime regards dormancy indicative relinquishment thereby raising bar significantly arguing old currencies inherently possess default unclaimed status !
Mortal Existence Doesn’t Erase Ownership Rights
/h3/>The next argument tends shift focus away from notions related abandonments mortality implications fine perhaps currencies weren’t abandoned surely numerous early holders deceased doesn’t alter analysis?!/BUT NOT IN WAYS RAIDER WOULD PREFER TO SEE THINGS PLAY OUT!!()Some vintage wallets invite Schrödinger-style heir dilemmas wherein owners confidently declared dead whenever raider seeks claim otherwise treated notionally available whenever burdens succession come looming near enough.Property Law won’t indulge superposition scenarios either way.()Upon passing individual dies title disappears passes onto heirs devisees absent both state assumes possession through escheat process.Law never shrugs off responsibility declaring open season preserves continuity despite messy inconvenient situations arising along lines practical exercise ownership rights.Analogies drawn comparing physical properties almost insultingly simplistic if man dies owning ranch first trespasser cutting lock doesn’t automatically assume new rightful possessor based initiative optimism estate handles succession matters accordingly should there exist no heirs sovereign retains claim valuable holdings don’t transform unowned simply because original proprietor departed us.BITCOIN IS NO DIFFERENT ON THIS FRONT LOST KEYS DON’T TRANSFER TITLE INACCESSIBILITY DOESN’T CONVEY OWNERSHIP A STRANGER DERIVING PRIVATE KEY LATER BETTER TOOLING HASN’T UNCOVERED OWNERLESS TREASURE RATHER ACQUIRED PRACTICAL ABILITY MOVE PROPERTY STILL BELONGING SOMEONE ELSE OR THEIR ESTATE HENCE MATTERS MOST SIGNIFICANTLY REGARDING LARGEST BLOCK OLD VULNERABLE COINS SAHASHIS WHETHER ALIVE DEAD PERMANENTLY OFF GRID CHANGES LEGAL CLASSIFICATION THOSE COINS BELONG EITHER SAHASHI OR HIS ESTATE THEY DON’T BECOME BOUNTY FIRST ACTOR ARRIVES WITH QUANTUM CROWBAR !CUSTODIAL LAW WON’T RESCUE THEORY Some individuals presume dormant BTC might fall under unclaimed property statutes understandable confusion misses operational mechanics underlying those regulations . Unclaimed assets generally run through holders banks brokers exchanges custodians owe obligations respective owners should disappear sufficiently lengthy periods government intervenes mandating reporting remittance subject right reclaim later built intermediaries . This framework works adequately exchange balances custodial wallets businesses ordered surrender assets however operates differently self-custodied BTC lacks intermediary presence hence creates challenges governmental reach custodian cannot command network requires user produce valid spend alone . Consequently governments often seize custodial crypto but self-custodied presents harder limits saying who owns versus conjuring private key necessary transfer ultimately poses dilemma defeating dressed-up versions arguments based UCC article twelve similarly although attacker gaining control practically still lacks legitimate title burglar finding safe combination gains entry inside without rightful claim whatsoever .
ADVERSE POSSESSION DOES NOT FIT AND SALVAGE IS WORSE Two analogies surface dragged forth whenever attempts dignify quantums thievery veneer doctrine adverse possession salvage neither withstands factual scrutiny development land conditions make sense disputes must be openly notorious enough allowing true proprietors fair chance notice contest adverse claims sweeping fresh addresses accomplish nothing visible chain movement signifies meaningful notice legally pseudonymous transfers ledgers inform asserting titles basis forum challenges policy rationale collapses adverse possession helps resolve stale disputes quiet titles reward visible use neglected realty none structural problems existent blockchain already records chains custody salvaging worse rewards parties rescuing perilous properties whereas quantums exploit perils themselves calling exploits salvage akin labeling pirates lifeguards arriving boats euphemism masquerading legal theory !
WHAT BIP-361 REALLY FIGHTS ABOUT THIS WHY BIP-361 MATTERS FIRST SERIOUS PROPOSAL FORCE ISSUE CONSENSUS LEVEL RATHER THAN WAIT COURTS COMMENTATORS ARGUE WRECKAGE AFTERWARDS broadly strokes proposal rollout phases initially users barred sending newly minted btc vulnerable types allowed migrate existing funds safer destinations legacy signatures vulnerable utxos cease being valid purposes spending practical terms remaining unmigrated freeze recovery mechanism proposed using zero knowledge proofs tied bip39 seed possession though portion remains aspirational incomplete critically recovery path works generated mnemonics earlier formats including pay-to-public-key associated sahashis possess realistic routes back current proposals limitation incidental means phase c designed preserve recent adopters’ rights permanently extinguishing earliest ones effectively statute limitations imposed legislature protocol change attraction proposal obvious network knows category likely loot whoever reaches first refuse bless looting substance defense ownership against purely technological shortcuts treats actors thieves denies prize half story other half vanishes protocol designers prefer observe proposals create second problem harder wave away phase b disables actual owners fail unable migrate time matters because law asks rule good motive examines effects owner calling theft imprecise bips doesn reassign developers miners new claimant enrich freezer ordinary thief enriches himself instead analogy conversion adjacent closer resembles scenario rule states had yesterday none tomorrow transferred title abandoned court extinguished claim decided dangerous remain spendable intentionally disabled practical exercise some rights makes freeze awkward supporters defend lesser evil rightly so yet lesser evil equates legality cleanliness rule permanently prevents accessing own begins appear forced dispossession consensus strongest objections hardest cases timelocked utxos cleanest examples user created deliberately maturing after freeze date didn neglect abandon affirmatively structured unspendable future arrives protocol freezes before ever comes creating similar problems eventual paths depend possessing estates tension form gone vanished passed somewhere freezing eliminates underlying claims merely unwillingness honor them therefore description phase b anti-theft abstract confiscatory defense mechanism justified necessary albeit effectually confiscatory select classes choose favor one another treating losses disfavored price securing system does render unlawful straightforward courtroom-ready sense changes aren state action takings analogy imperfect unless government enters picture directly matter reasoning conversion lands harder rhetoric intact while destroying practical controls symmetry center debate letting attacker sweep dormant looks like freezing soft fork lesser evil costlessly morally certain instances begin resemble confiscation classic politics classical property won bless deriving clever lawful recoveries dormancies equate abandonments deaths transfer dissolves reach custodians self custody maps pseudonymous salvage joke derived move derive virtually calls certainty call returns highly probable thus conclude utilizing computers derive extraction leads systems deem nearly certainly label actions thief demonstrate evidence consensus choice between protecting privileged few against attackers impeding broad swath interests seeking assertive justice protect intended equity valued equally perceived perspectives surround broader dynamics ecosystem players grapple maintain balance competing interests conflicting objectives navigate complexities realms innovation evolution define future paradigms ensure continued relevance integrity stability growth evolving landscapes provide unique opportunities partnerships collaborations flourish foster environments thrive together succeed collectively paving ways prosperity shared visions aspirations boundless possibilities ahead awaiting exploration discovery unfold!
This article originally appeared at Bitcoin Magazine written Colin Crossman opinions expressed entirely own necessarily reflect those $BTC Inc or Magazine.