
PANews May 1 news, Nic Carter, a partner at Castle Island Ventures, published a long article on the X platform pointing out that the quantum computing "canary warning" mechanism cannot provide sufficient buffer time for BTC. Classical computers can currently crack about 117 to 130 bits of the Elliptic Curve Discrete Logarithm Problem (ECDLP), while the results of quantum computing below this threshold are often questioned for having "classical cheating" or pre-set answers, thus failing to form an effective signal.
Nic Carter believes that once quantum computers truly break through this classical limit, the time remaining to directly attack the 256-bit secp256k1 curve used by Bitcoin may only be a few months, while the migration to post-quantum (PQ) signatures after the completion of Bitcoin would require several years. Whether it’s setting up quantum cracking bounty addresses or relying on Satoshi Nakamoto's early dormant addresses as on-chain warnings, none can guarantee early risk detection. Therefore, the truly viable approach is not to wait for a clear warning, but to immediately begin preparations for post-quantum (PQ) migration.
Previous news, BitMEX Research proposed a quantum freeze alternative: the "canary address" trigger mechanism.
免责声明:本文章仅代表作者个人观点,不代表本平台的立场和观点。本文章仅供信息分享,不构成对任何人的任何投资建议。用户与作者之间的任何争议,与本平台无关。如网页中刊载的文章或图片涉及侵权,请提供相关的权利证明和身份证明发送邮件到support@aicoin.com,本平台相关工作人员将会进行核查。