Сборщик RSS-лент
Неизвестные напали на дом руководителя подразделения Binance
Мэтт Хоуган: Крипторынок копит силы для выхода из медвежьего тренда
Bitcoin Developers Kick Off Quantum-Safety Track With BIP-360
Bitcoin’s quantum-security discussion just gained a concrete new artifact in the code-and-spec pipeline: an updated draft of BIP-360 has been merged into the official Bitcoin Improvement Proposals repository, proposing a Taproot-adjacent output type designed to limit exposure to future quantum key-recovery attacks.
The change matters less because it “solves” quantum risk today, and more because it formalizes a specific, opt-in path that preserves Taproot’s script-tree functionality while removing the spending route considered most problematic under a quantum-threat model.
Bitcoin Devs Make First Formal Quantum-Resistance MoveAnduro, a research-focused platform incubated by Marathon Digital (MARA), said on X that the merged update “introduces Pay-to-Merkle-Root (P2MR), a proposed new output type that omits Taproot’s quantum-vulnerable key-path spend while preserving compatibility with Tapscript and script trees.”
In BIP terms, the proposal is scoped as “Consensus (soft fork)” and defines P2MR as a new SegWit v2 output that commits directly to the Merkle root of a script tree, rather than to a tweaked public key as in Pay-to-Taproot (P2TR). The practical implication is straightforward: P2MR outputs can only be spent via script-path logic; the key-path spend is removed entirely.
The BIP’s abstract frames the goal in terms of minimizing changes while providing an option set for users who want additional protection:
“This document proposes a new output type: Pay-to-Merkle-Root (P2MR), via a soft fork. P2MR outputs operate with nearly the same functionality as P2TR (Pay-to-Taproot) outputs, but with the key path spend removed.” It adds that the intended protection is against “long exposure attacks by Cryptographically Relevant Quantum Computers (CRQCs),” as well as “future cryptanalytic approaches that may compromise the elliptic curve cryptography (ECC) used by Bitcoin.”
A key element of the BIP is definitional discipline: it distinguishes “long exposure” attacks (where public keys are available on-chain for extended periods) from “short exposure” attacks, which would target public keys revealed briefly in the mempool during an unconfirmed spend.
The document is explicit that P2MR is not a complete quantum shield. “It is worth noting that proposed P2MR outputs are only resistant to ‘long exposure attacks’ on elliptic curve cryptography; that is, attacks on keys exposed for time periods longer than needed to confirm a spending transaction,” the BIP states.
“Protection against more sophisticated quantum attacks, including protection against private key recovery from public keys exposed in the mempool while a transaction is waiting to be confirmed (a.k.a. ‘short exposure attacks’), may require the introduction of post-quantum signatures in Bitcoin.” The authors add they “intend to offer a separate proposal for this purpose upon further research.”
That split is also why the proposal emphasizes tapscript compatibility. It positions P2MR as a script-tree output type that could, if Bitcoin ever adopts post-quantum signature opcodes, provide a cleaner upgrade runway than older script mechanisms that don’t support tapscript’s evolution path.
Anduro highlighted that the change is designed as a soft fork and “does not affect existing Taproot outputs.” P2MR would be a new output type (with bech32m addresses starting with bc1z) rather than a retrofit of existing bc1p Taproot UTXOs.
The proposal also doesn’t pretend the swap is free. By removing key-path spends, P2MR gives up Taproot’s most compact witness path (a single Schnorr signature). The BIP estimates that a minimal P2MR spend witness is 37 bytes larger than a Taproot key-path spend, though it can be smaller than an equivalent Taproot script-path spend because P2MR’s control block omits an internal public key.
Privacy shifts too. Because every spend is script-path, P2MR users necessarily reveal they are spending from a script tree—something Taproot key-path spends can avoid signaling.
Anduro said the update also “addresses criticism about Bitcoin devs not taking the quantum threat seriously,” and noted the addition of Isabel Foxen Duke as co-author to make the BIP clearer “to the general public, not just the Bitcoin developer community.”
BIP-360 remains in “Draft” status. But its merge into the canonical repository is still a meaningful process marker: it moves the quantum-safety conversation from abstract worry and mailing-list hypotheticals toward a specific consensus change proposal that wallets, libraries, and reviewers can now analyze line-by-line.
If the debate has a next phase, it’s likely to center on whether “prepared not scared” opt-ins like P2MR are sufficient groundwork or whether Bitcoin will eventually need to grapple directly with post-quantum signatures and the operational realities of migrating value at scale.
At press time, BTC traded at $66,558.
Техасских майнеров обяжут отчитаться о потраченной воде
Убытки Coinbase двукратно превысили прошлогоднюю прибыль
Основателя рухнувшего проекта Zerebro заподозрили в повторной инсценировке самоубийства
Создатель биткоин-пирамиды на $200 млн получил 20 лет тюрьмы
Биткоин вплотную приблизился к зоне недооцененности — CryptoQuant
Пол Аткинс не смог объяснить приостановку дела против основателя Tron
В Нидерландах ввели налог на хранение криптоактивов
Полиция Сеула потеряла 22 конфискованных биткоина
XRP Ledger Activates Token Escrow: Here’s What XLS-85 Unlocks
The XRP Ledger has activated Token Escrow (XLS-85) on mainnet on Feb.12, extending the network’s native escrow mechanics beyond XRP to Trustline-based tokens (IOUs) and Multi-Purpose Tokens (MPTs). The amendment was enabled today with 88% consensus (30/34 validators) and was introduced in rippled v2.5.0 under the XLS-85 specification.
Escrow, But For Every Asset On XRP LedgerRippleX framed the change as a broadening of XRPL’s settlement primitives from one native asset to the wider token stack via X:
“Token Escrow (XLS-85) is now live on XRPL Mainnet! This feature extends native escrow functionality beyond XRP to all Trustline-based tokens (IOUs) and Multi-Purpose Tokens (MPTs). From stablecoins like RLUSD to Real World Assets, the XRPL now supports secure, conditional, onchain settlement for all assets.” It added: “The toolbox for Institutional DeFi just got bigger.”
Token Escrow (XLS-85) is now live on XRPL Mainnet!
This feature extends native escrow functionality beyond XRP to all Trustline-based tokens (IOUs) and Multi-Purpose Tokens (MPTs).
From stablecoins like RLUSD to Real World Assets, the XRPL now supports secure, conditional,… pic.twitter.com/DNCJxZsoK2
— RippleX (@RippleXDev) February 12, 2026
XRPL.org describes escrow in familiar terms, then emphasizes what the ledger automates: “Traditionally, an escrow is a contract between two parties to facilitate financial transactions… The XRP Ledger takes escrow a step further, replacing the third party with an automated system built into the ledger.” With the TokenEscrow amendment, that same approach now applies to fungible tokens, not just XRP.
For Trust Line Tokens, the issuing account must enable the Allow Trust Line Locking flag so the issued token can be escrowed. For MPTs, the issuer must set Can Escrow and Can Transfer flags at issuance so those tokens can both be held in escrow and transferred when released. One notable constraint: issuers cannot create escrows using their own issued tokens, though they can receive escrowed tokens as recipients.
Authorization gating also matters. If a token requires authorization, the sender must be pre-authorized by the issuer before creating an escrow, and must be authorized to receive the tokens back if an expired escrow is canceled—regardless of who submits the cancellation. Separately, the recipient must be pre-authorized before an escrow can be finished.
XRPL supports time-based, conditional, and combination escrows. The flow is anchored around EscrowCreate to lock funds, EscrowFinish to release them when conditions are met, and EscrowCancel to return funds once an escrow expires. For token escrows specifically, an expiration time is mandatory.
The feature is not free. XRPL.org flags that escrow “requires two transactions” and that Crypto-Conditions increase fees. While the ledger supports Crypto-Conditions, it currently only supports PREIMAGE-SHA-256, and fulfillment verification raises EscrowFinish costs. The documentation gives a concrete minimum: an EscrowFinish with a fulfillment requires at least 330 drops of XRP plus an additional amount based on fulfillment size, with the formula scaling if fee settings change.
RippleX highlighted use cases spanning vesting and grants, conditional payments and OTC-style swaps, treasury workflows like legal holds and collateral, and tokenized rights and RWA-style unlocks. The common thread is a native, on-ledger “lock until X” mechanism now available to the token layer, useful for structured settlement, compliance-shaped flows, and predictable release conditions without relying on a third-party custodian or purely off-chain coordination.
At press time, XRP traded at $1.35.
