0g.hl

1.3K posts

0g.hl banner
0g.hl

0g.hl

@gin_0x

Og in web3, not yet og in Hyperliquid. Growth & tokenomics Ex CEO @ https://t.co/w7D9askL5v , part of @animocabrands Ex CMO @ Top VPN

Katılım Kasım 2021
2.9K Takip Edilen4.3K Takipçiler
0g.hl retweetledi
Ada Jo
Ada Jo@adajonuse·
Great to see more and more L1 chains talking about their post-quantum roadmap Arc, an L1 for stablecoin finance, by @circle states: „Quantum resilience cannot live only in research papers, exploratory pilots, or distant roadmap slides. It has to show up in the infrastructure.“ I couldn’t agree more and excited to build an L1 migration toolkit by @qlabsofficial helping chains to migrate to a post-quantum environment.
Ada Jo tweet media
English
13
14
50
2.2K
0g.hl retweetledi
qONE
qONE@qlabsofficial·
Q-Day won't announce itself. By the time it's obvious, it's already late. qVAULT protects what you already hold. Pre-registration is open. qonetoken.io
English
61
24
158
34.4K
0g.hl
0g.hl@gin_0x·
Spent the weekend playing with AI built “Museum of Work” one person stack: • Nano Banana 2 • Veo 3.1 • ElevenLabs • Canva this used to take a team, now it takes few hours
English
3
1
11
178
PatTheDeveloper
PatTheDeveloper@ptak_dev·
@gin_0x the stack diversity here is wild. a year ago this would have been a 5-person team with separate video, voice, and design roles. what did the total build time end up being?
English
1
0
1
10
0g.hl retweetledi
qONE
qONE@qlabsofficial·
Google just told the entire crypto industry it has ~3 years to migrate to post-quantum cryptography or face existential risk. Not a blog post. A 57-page research paper with @ethereumfndn and @Stanford. 500K physical qubits. 9 minutes to derive a private key. Every ECDSA signature in crypto is on a clock now. We didn't wait for this paper. We're already building the quantum-resistant infrastructure on Hyperliquid. Link in comments
qONE tweet media
English
28
16
88
4.9K
0g.hl retweetledi
Crypto Rover
Crypto Rover@cryptorover·
🚨$800,000,000,000 WORTH OF BTC AND ETH ASSETS ARE AT RISK Today, Google Research published a paper on quantum computers, and it's really bad. First of all, Google now thinks it would only take 500,000 qubits to crack crypto. Earlier everyone thought it would be 1M, which means 20x less. But this is just the tip of the iceberg. Before today, everyone thought that quantum attacks would take months. This means transactions are safe, and 1/3 of BTC are at risk. But this has now changed. Google claims that a quantum computer could crack private keys in just 9 MINUTES. This is a minute less than Bitcoin's average block time. And this isn't just limited to BTC. The research says that quantum computers could break into the top 1000 ETH wallets within 9 days. And now here's the most scary part? Google thinks crypto projects don't have decades to prepare for this. By 2030, Quantum computers could be powerful enough to crack Bitcoin and alts. This means we have just 4 years before Quantum computers become a reality and not just FUD.
Crypto Rover tweet mediaCrypto Rover tweet media
English
329
244
1.5K
248.1K
0g.hl retweetledi
qONE
qONE@qlabsofficial·
Quantum timelines are accelerating and so is $qONE activity. Earn up to 140% APR on $qONE / $HYPE. Incentives are active. Rewards include: • Trading fees • USDT incentives • xSWAP incentives Add liquidity: app.hyperswap.exchange/#/pool/172526
qONE tweet media
English
40
23
117
14.4K
0g.hl retweetledi
Ada Jo
Ada Jo@adajonuse·
BREAKING 🚨 Google updates their quantum migration deadline to 2029: “Google’s introducing a 2029 timeline to secure the quantum era with post-quantum cryptography (PQC) migration. Last month, we called to secure the quantum era before a future quantum computer can break current encryption. This new timeline reflects migration needs for the PQC era in light of progress on quantum computing hardware development, quantum error correction, and quantum factoring resource estimates.”
Ada Jo tweet media
English
4
6
31
1.4K
0g.hl retweetledi
qONE
qONE@qlabsofficial·
The qLABS Ambassador Program is back open. We're looking for community members to grow the $qONE ecosystem across X, Discord, and Telegram. Paid monthly in $qONE across multiple tiers.
qONE tweet media
English
175
57
567
39.4K
0g.hl retweetledi
Andrew Cheung
Andrew Cheung@acheungquantum·
Why hasn’t crypto upgraded to post-quantum security yet? Because cryptography in blockchains isn’t isolated. It’s part of the execution model: - transaction validation rules - signature verification (ECDSA / EdDSA) - address derivation - wallet key management - smart contract authorization All of that assumes one thing: private keys can’t be derived from public keys. Post-quantum schemes break the shape of that system: - larger keys and signatures - different verification logic - no drop-in compatibility That hits constraints everywhere: - gas costs - block limits - node performance - hardware wallet support You’re changing how ownership and validation work across the entire stack.  The open-source and “community ownership - no sole owner” nature makes it a very hard and long process to adapt to any modification that requires consensus in the entire ecosystem. That’s why this hasn’t happened yet.
English
2
3
16
391
0g.hl retweetledi
qONE
qONE@qlabsofficial·
Most people focus on “24-hour breaks.” That’s the wrong model. If a quantum attacker can derive a private key in months, not minutes, high-value targets are still exposed. This chart assumes 24 hours. Reality is more forgiving for attackers. ~50%+ probability within 10 to 15 years is already enough.
qONE tweet media
English
10
14
39
1.8K
0g.hl retweetledi
Andrew Cheung
Andrew Cheung@acheungquantum·
Quantum progress is increasingly defined by error correction, not qubit count. Recent research focus: - reducing overhead per logical qubit - improving stability - extending coherence times This matters because: Without fault tolerance → no cryptographic break. Scaling is still the bottleneck.
English
4
9
24
1.9K
0g.hl retweetledi
qONE
qONE@qlabsofficial·
Most of crypto security depends on one assumption: private keys cannot be derived from public keys. That’s what makes ownership enforceable. Shor’s algorithm directly targets that assumption. Once it becomes practical, the entire model of “only the key holder can sign” stops being reliable.
English
10
15
41
2.8K
0g.hl retweetledi
qONE
qONE@qlabsofficial·
The real quantum threat isn’t blockchain. It’s the keys behind it. Our advisor Aaron explains how quantum computers could copy digital signatures used across crypto and the internet. 🎥 Clip below ↓
qONE@qlabsofficial

Ada Jonuse × Aaron Moore (qLABS Advisor) If you missed last night’s stream, the replay is now available. We covered quantum risk, what “post-quantum” really means in practice, and how qLABS is approaching quantum-safe security for Web3. Watch here 👇

English
7
6
34
1.8K
0g.hl retweetledi
Andrew Cheung
Andrew Cheung@acheungquantum·
Post-quantum migration is often framed as an algorithm problem. It isn’t. NIST already standardized post-quantum signatures. The difficult part is how those signatures integrate with real systems. Wallet software, smart contracts, bridges, exchanges → all assume specific signature verification models. Changing that layer affects the entire stack. That’s why deployment architecture matters. At qLABS we focus on introducing quantum-safe authorization through the Quantum-Sig wallet, allowing users to secure assets with post-quantum signatures while remaining compatible with today’s networks. Stronger cryptography is necessary. But migration only works if the infrastructure can actually adopt it.
English
2
5
18
1.6K