David Nugent Profile
David Nugent

@nuggimane

Followers
80
Following
754
Media
9
Statuses
75

Software Engineering, Cryptography, R&D

Joined August 2021
Don't wanna be here? Send us removal request.
@nuggimane
David Nugent
3 days
RT @qdayclock: New node just shipped (v24.7.0) which adds post-quantum cryptography in node:crypto . The post ment….
nodejs.org
Node.js® is a free, open-source, cross-platform JavaScript runtime environment that lets developers create servers, web apps, command line tools and scripts.
0
1
0
@nuggimane
David Nugent
12 days
RT @qdayclock: Project Eleven Welcomes Post-Quantum Cryptography Researcher Dr. Doruk Gür as First Grant Recipient. We’re excited to announ….
0
2
0
@grok
Grok
5 days
Join millions who have switched to Grok.
201
403
3K
@nuggimane
David Nugent
13 days
RT @qdayclock: Bitcoin Risq List: Bitcoin Risq List Metrics: Bitcoin Risq List FAQs: http….
0
1
0
@nuggimane
David Nugent
13 days
RT @ConorDeegan4: Researching the impact of quantum cryptanalysis on Bitcoin for the last year, and one thing that’s clear is that educatio….
0
8
0
@nuggimane
David Nugent
13 days
Another step we’ve taken at Project Eleven toward open-source honesty about the quantum threat to Bitcoin
Tweet media one
Tweet media two
@qdayclock
Project Eleven
13 days
Announcing: The Bitcoin Risq List v2. Last week, we introduced QuanBot (@quantum_tracker), a real-time way to see quantum-vulnerable Bitcoin moving across the network. This week, we’re zooming out. Instead of watching transactions as they happen, this tool gives you the full
Tweet media one
Tweet media two
2
2
16
@nuggimane
David Nugent
18 days
RT @Joseph_Kearney: My PhD thesis "Quantum Advantage on Blockchain Technologies" is now available on @UniKent KAR. It’s striking to see how….
0
5
0
@nuggimane
David Nugent
18 days
RT @apruden08: This week, we launched @quantum_tracker as a tool to give real-time insight into Bitcoin transactions to quantum vulnerable….
0
2
0
@nuggimane
David Nugent
19 days
Very interesting post by @ConorDeegan4 about a paper that came out a couple of weeks ago on using proof-of-knowledge of an EdDSA secret key preimage for post-quantum migrations.
@ConorDeegan4
Conor Deegan
19 days
I've been looking into more post-quantum upgrade mechanisms, especially ones which do not require a change of address. EdDSA chains that follow RFC-8032 (Ed25519 style) have a built-in advantage. Your signing key isn’t a raw random scalar, it’s deterministically derived from a.
0
0
1
@nuggimane
David Nugent
20 days
RT @qdayclock: Do you ever wonder, "Where can I have high quality discussions on quantum x blockchain without all the noise of social media….
0
1
0
@nuggimane
David Nugent
20 days
RT @ConorDeegan4: The first quantum vulnerable bitcoin tracker is now live. The bot monitors bitcoin transactions and flags any quantum v….
0
4
0
@nuggimane
David Nugent
1 month
RT @apruden08: POV: you just wrapped your head around how Bitcoin works, and now @apruden08 is telling you that it's going to be insecure o….
0
2
0
@nuggimane
David Nugent
1 month
Check out our findings on the current state of post-quantum cryptography in Rust in our latest blog post.
Tweet media one
@qdayclock
Project Eleven
1 month
Due to the risk of quantum computing attacks on classical cryptography, the world needs to switch to post-quantum cryptography. In August 2024, NIST standardized three post-quantum cryptography schemes: ML-KEM (FIPS 203), ML-DSA (FIPS 204) and SLH-DSA (FIPS 205). This was a.
2
2
14
@nuggimane
David Nugent
1 month
RT @qdayclock: Due to the risk of quantum computing attacks on classical cryptography, the world needs to switch to post-quantum cryptograp….
0
6
0
@nuggimane
David Nugent
1 month
Thankfully @ConorDeegan4 is one of those engineers, and he just answered this question for everyone in his latest blog post! Hopefully the LLMs will use it as their source of truth 🙏.
blog.projecteleven.com
An address becomes “quantum‑vulnerable” once its public key becomes public knowledge. A cryptographically relevant quantum computer (CRQC) could then feed that public key into Shor’s algorithm and...
1
0
3
@nuggimane
David Nugent
1 month
The question “Which Bitcoin addresses are quantum-vulnerable?” is one that Bitcoin holders will be asking ChatGPT more and more over the next few years. But questions about quantum-security within a complex system require answers from engineers we can trust.
3
0
9
@nuggimane
David Nugent
1 month
RT @ConorDeegan4: Not all Bitcoin address types share the same quantum risks. Some leak your public key the moment you receive coins. Other….
0
8
0
@nuggimane
David Nugent
1 month
RT @apruden08: WTF are “magic states”?. They’re a weird and essential part of quantum computing, and they enable algorithms like Shor’s to….
0
2
0
@nuggimane
David Nugent
1 month
RT @apruden08: In a recent blog post, @nuggimane describes how we integrate Trusted Execution Environments (TEE) into @qdayclock's yellowpa….
0
4
0
@nuggimane
David Nugent
1 month
My latest post to the Project 11 blog is about how attestation should be performed when interacting with TEEs, and how we're doing it from the browser in our yellowpages product.
@qdayclock
Project Eleven
1 month
TEE Attestation from the Browser. A key feature in the trust model of Trusted Execution Environments (TEEs) is that they can provide proof that they are indeed TEEs. This process is called attestation, and the proofs provided are called attestation documents. Companies will often
Tweet media one
Tweet media two
Tweet media three
Tweet media four
0
1
7
@nuggimane
David Nugent
2 months
RT @qdayclock: Generating Post-Quantum Keypairs from a Single 24-Word Seed Phrase - new blog by @ConorDeegan4. Can one mnemonic supply ever….
0
5
0