Understanding the Vulnerability: p2pk vs. p2pkh

The core of the vulnerability lies not in the Bitcoin protocol as a whole, but in the evolution of its address architectures. Early Bitcoins—including the estimated 1.1 million coins mined by Satoshi Nakamoto—were primarily secured using Pay-to-Public-Key (p2pk) scripts.

+-----------------------------------------------------------------+
|                       Address Comparison                        |
+-----------------------------------------------------------------+
|  p2pk (Vulnerable): Exposes the raw Public Key directly on the  |
|                     blockchain ledger.                          |
+-----------------------------------------------------------------+
|  p2pkh (Secure):    Hides the Public Key behind a double hash   |
|                     (SHA-256 + RIPEMD-160) until spent.         |
+-----------------------------------------------------------------+

In p2pk transactions, the raw unhashed elliptic curve public key is explicitly visible on the ledger. If a quantum computer utilizing Shor’s Algorithm reaches sufficient qubit capacity, it can derive a private key from an exposed public key in a matter of minutes. Modern address types like Pay-to-Public-Key-Hash (p2pkh) and Bech32 obscure the public key behind double-hashing algorithms until the moment a transaction is broadcasted, rendering them functionally immune until a transaction occurs.

[Private Key] ──> [Public Key (Exposed in p2pk)] ──> [Shor's Algorithm Attack Vector]
                        │
                        └───> [SHA-256 + RIPEMD-160] ──> [p2pkh Address (Secure)]

The Inactive Coin Problem

The critical issue highlighted by Glassnode is that the "unsafe" 10% consists largely of dormant wallets, lost keys, and foundational coins that haven't moved in over a decade. For active users, mitigating the risk is as simple as migrating funds to modern Native SegWit or Taproot addresses. However, for coins where the private keys are permanently lost, there is no owner to initiate a defensive migration.

The Developer Frontier: BIP-360 and Hard Forks

To neutralize this ticking financial time bomb, Core developers are debating systemic protocol upgrades:

  1. BIP-360 Implementations: Introducing post-quantum cryptography (PQC) signature schemes such as Lamport or lattice-based signatures into the consensus layer.

  2. The "Burn or Freeze" Consensus: A highly controversial fallback proposal involves setting a protocol deadline. After this block height, any unmigrated, exposed p2pk output would be frozen or burned by consensus to prevent malicious quantum actors from suddenly dumping millions of dormant coins onto the open market.