HomeMiningBitcoin devs merge new plan to limit "quantum" exposure risk but there's...

Bitcoin devs merge new plan to limit “quantum” exposure risk but there’s a fee and privacy tradeoff

-


Bitcoin developer contributors just cleared a documentation hurdle that crypto Twitter treated like an emergency quantum patch. It wasn’t.

On Feb. 11, a proposal for a new output type, Pay-to-Merkle-Root (BIP-0360), was merged into the official Bitcoin Improvement Proposals repository. No nodes upgraded. No activation timeline exists.

The BIPs repository itself warns that publication doesn’t imply consensus, adoption, or that the idea is even good. What actually happened is that a draft specification met the threshold for in-scope, formally documented status.

Yet the framing around P2MR reveals something more interesting than the merge itself: Bitcoin’s developer community is wrestling with a migration problem that can’t be solved by clever cryptography alone.

The real story is that Bitcoin’s upgrade path is slow, coordination is hard, and preparing for low-probability, high-consequence risks requires starting years before anyone agrees the threat is real.

Differences of current Taproot and P2MR
Diagram comparing Taproot’s two spending options with P2MR’s single script-path option that removes the quantum-vulnerable key-path spend.

Taproot without the key-path door

P2MR is easier to understand if you think of it as Taproot with one piece removed.

Taproot outputs today (P2TR) commit to a tweaked public key. When spending from a Taproot output, users have two options: use the key-path (a simple signature that looks like any other Bitcoin signature) or the script-path (reveal one script from a Merkle tree of possible scripts and prove it was part of the commitment).

Most Taproot spends use the key path because it’s smaller and cheaper, and it reveals nothing about what other spending conditions might have existed.

P2MR strips out the key-path entirely. The output commits directly to the script-tree Merkle root, with no internal key and no key-spend option.

Every spend must reveal a script and provide a Merkle proof. That makes P2MR spend more (a minimum of 103 bytes versus 66 bytes for a Taproot key-path witness) and be more expensive.

The tradeoff is deliberate: P2MR removes the always-available attack surface that a public key creates.

P2TR key spendsP2TR key spends
Chart showing Taproot key-path spends dominate at roughly 60-80% of all P2TR transactions, with script-path usage spiking during specific periods.

Long-exposure vs. short-exposure

BIP-0360 frames quantum risk through two attack models, and this distinction matters because the defenses differ.

A long-exposure attack targets data that’s already visible on-chain, such as a public key in an unspent output, which has been exposed for months or years. An attacker with a future quantum computer can work on breaking that key offline, with no time pressure.

They don’t need to win a mempool race, but need to build a quantum system capable of recovering the private key from the public key.

Short-exposure attacks are tighter. The attacker must recover a private key while a transaction is unconfirmed, typically within minutes or seconds.

BIP-0360 argues that short-exposure attacks will require more advanced quantum systems and frames post-quantum signatures as defenses against that window.

P2MR doesn’t solve short exposure, but eliminates the long-exposure surface for Taproot-style functionality.

Migration lead time is the real constraint

If quantum computers capable of breaking elliptic curve cryptography are still years or decades away, why file this proposal now?

The answer has more to do with Bitcoin’s upgrade velocity than with quantum timelines. Even if the risk is uncertain, the safe transition path requires multiple sequential phases: specification, implementation, review, activation debate, wallet and exchange support, user education, and gradual migration.

Each phase takes months or years. Starting early creates optionality, as waiting for certainty means starting too late.

BIP-0360’s tone is “prepared, not scared.”

The proposal doesn’t argue that quantum computers will break Bitcoin in 2027 or 2030. It argues that Bitcoin should adopt a low-risk, tapscript-native output type to avoid extended exposure before post-quantum signatures are ready.

The logic is forward-looking: Taproot and tapscript are the modern scripting languages for advanced Bitcoin protocols.

If you believe those tools will matter for Lightning, covenants, or other smart contract use cases, then having a version of that functionality without the long-exposure risk is a useful building block.

The timing also reflects a shift in how quantum risk is discussed in Bitcoin circles.

BIP-0360 explicitly addresses criticism that Bitcoin developers weren’t taking the quantum threat seriously.

Adding Isabel Foxen Duke as co-author, someone focused on making the proposal understandable to a general audience, not just core developers, signals an intent to make quantum preparedness legible and accessible.

Recent academic work has also made discussions of quantum risk more concrete. Papers on hybrid post-quantum signatures and benchmarking elliptic curve cryptanalysis on quantum systems provide quantitative resource estimates rather than vague warnings.

Science is advancing, even if the timelines remain uncertain.

Opt-in migration, not automatic protection

If P2MR ever activates, and that’s a significant “if” given that activation requires broad consensus and a successful soft fork deployment, the changes are opt-in, not mandatory.

Wallets would add support for a new address type, starting with bc1z, corresponding to SegWit version 2. Users who want to reduce long-exposure risk can generate P2MR addresses and move funds by sending them to those addresses.

CryptoSlate Daily Brief

Daily signals, zero noise.

Market-moving headlines and context delivered every morning in one tight read.