@SuccinctJT Justin ThalerJustin Thaler posts on X about core, quantum computing, faster, key the most. They currently have [------] followers and [--] posts still getting attention that total [-----] engagements in the last [--] hours.
Social category influence finance cryptocurrencies vc firms products
Social topic influence core, quantum computing, faster, key, execution, talk, shor, thread, in 2, layerzero
Top assets mentioned Layerzero (ZRO) Bitcoin (BTC)
Top posts by engagements in the last [--] hours
"In my latest blog post on SNARKs I identify and try to clear up a variety of misconceptions that have been hindering progress and causing confusion. I hope this leads to more informed and accurate discourse surrounding this transformative technology"
X Link 2023-07-12T18:46Z [----] followers, 112.4K engagements
"Introducing Lasso and Jolt two new works that I hope will change how SNARKs are designed and built. You can read about them here: (1/6)"
X Link 2023-08-10T15:19Z [----] followers, 222.4K engagements
"I enjoyed getting into the weeds of Lasso+Jolt in this Study Club Session and fielding tons of thoughtful questions It should be a useful resource for anyone looking to learn more about these tools"
X Link 2023-08-27T18:27Z [----] followers, [----] engagements
"Yes I was referring to Lasso/Jolt which avoid the need for the prover to commit to large field elements thereby speeding up MSM-based techniques by an order of magnitude or more. My views are further elaborated upon in recent tweets: This is a topic that will be debated for some time and I'll continue to share my views as the state of the art evolves"
X Link 2023-09-04T18:50Z [----] followers, [----] engagements
"Check out my two posts and as well as Ben and Jim's post for a hardware-centric angle on these developments: (4/4)"
X Link 2023-11-20T17:42Z [----] followers, [----] engagements
"None of the above should be taken as investment advice; please see for more information"
X Link 2023-11-20T17:42Z [----] followers, [----] engagements
"1/ We're excited to share the initial release of Jolt a new approach to zkVM design. Early benchmarks indicate it outperforms RISC Zero by 6x and SP1 by up to 2x. Major optimizations are still in the pipeline"
X Link 2024-04-09T16:04Z [----] followers, 329.6K engagements
"1/ In the short video + blog post below we give an update on Jolt covering progress since release and our roadmap for the months ahead"
X Link 2024-11-12T20:20Z [----] followers, 15.5K engagements
"1/ Todays zkVMs are likely riddled with bugs. We should stop pretending otherwise. My latest blog post outlines our roadmap toward a bug-free Jolt"
X Link 2024-11-20T20:04Z [----] followers, 29.7K engagements
"2/ It will be a long journey. We are confident Jolt is the simplest and most promising path to a verified zkVM but achieving full assurance will take yearsand success isnt guaranteed"
X Link 2024-11-20T20:04Z [----] followers, [----] engagements
"5/ zkVMs today are massive with codebases reaching hundreds of thousands of lines and almost certainly contain critical flaws. The rush to deploy them worries me. This informs Jolts focus on simplicity in addition to performance"
X Link 2024-11-20T20:04Z [----] followers, [----] engagements
"6/ Read more about our journey toward a verified zkVM here and stay tuned for more updates: https://a16zcrypto.com/posts/article/getting-bugs-out-of-snarks/ https://a16zcrypto.com/posts/article/getting-bugs-out-of-snarks/"
X Link 2024-11-20T20:04Z [----] followers, [----] engagements
"1/ We just unveiled Twist and Shout two new memory-checking arguments designed to supercharge the Jolt zkVM. Expect 3x end-to-end prover speedups (on top of 2x improvements that are already in progress) plus shorter proofs. Full post: https://a16zcrypto.com/posts/article/introducing-twist-and-shout/ https://a16zcrypto.com/posts/article/introducing-twist-and-shout/"
X Link 2025-01-23T14:30Z [----] followers, 24.6K engagements
"8/ Bottom line: Twist & Shout validate our big design bets in Jolt and as a bonus give much faster SNARKs outside of the zkVM context too. See the post and paper for details and stay tuned for more updates as the Jolt implementation matures. https://a16zcrypto.com/posts/article/introducing-twist-and-shout/ https://a16zcrypto.com/posts/article/introducing-twist-and-shout/"
X Link 2025-01-23T14:30Z [----] followers, [---] engagements
"1/ Beware the hype: while SNARKs and zkVMs show immense promise theyre not ready for complex high-stakes deployments. Bugs are everywhere formal verification is nascent and proofs can be hundreds of thousands of times slower than native execution"
X Link 2025-03-11T14:13Z [----] followers, 46.6K engagements
"6/ So yes zkVMs and SNARKs hold enormous potential but we flirt with disaster if we pretend theyre ready for prime time. Ill be using these stages to track zkVM progress in the coming yearsand hope others will too. Check out my post here: https://a16zcrypto.com/posts/article/secure-efficient-zkvms-progress/ https://a16zcrypto.com/posts/article/secure-efficient-zkvms-progress/"
X Link 2025-03-11T14:13Z [----] followers, [----] engagements
"7/ c) RISC-V is a SNARK-friendly ISA. In Jolt every RISC-V primitive instruction can be computed with a single invocation of the Shout batch-evaluation argument"
X Link 2025-08-14T17:32Z [----] followers, [---] engagements
"8/ Jolt isnt just faster than alternatives. Its not even the same kind of thing. Jolt avoids the usual stack: ✘ Recursion ✘ Quotient polynomials ✘ Byte decomposition ✘ Grand product arguments ✘ Permutation checks and sorting ✘ Complicated circuits"
X Link 2025-08-14T17:32Z [----] followers, [----] engagements
"Interesting I still think Option [--] of Pippenger is optimal for the parameter regime we consider. The parameter p from the DJB paper you linked to is our number of variables (what Lasso calls log N where N is big-table size) and the parameter q is sparsity (what Lasso calls m). It seems Pippenger showed that about pq/log(pq) mults are necessary for evaluating all m monomials with non-zero coefficients (in some parameter regimes anyway). Let me translate to Lasso's notation. Suppose N=mc and c is not too big (say a constant like [--] or perhaps even something slightly superconstant). Then DJB's"
X Link 2023-08-20T17:51Z [----] followers, [---] engagements
"1/ New post: Jolt now proves RISC-V programs with 64-bit registers (RV64IMAC) at speeds exceeding those we previously reported for 32-bit. 1.5M cycles/sec on a 32-core CPU 500k cycles/sec on a MacBook. Heres why this matters 🧵"
X Link 2025-10-15T17:49Z [----] followers, 21.2K engagements
"2/ Why care about 64-bit proving Two reasons: 🔹 Performance: many apps need fewer cycles with 64-bit regs. Example: a 256-bit multiply takes [--] fewer cycles. 🔹 Language support: some languages (like Go) dont compile to RV32 so RV64 is needed to prove programs like Geth"
X Link 2025-10-15T17:49Z [----] followers, [----] engagements
"1/ New survey: Sum-check is all you need. Just posted a survey on the design principles behind Jolt and fast-prover SNARKs more broadly. It's arguably the first time the core ideas have all been written down in one place"
X Link 2025-11-06T14:05Z [----] followers, 36.2K engagements
"2/ Whats the sum-check protocol Its the backbone of todays fastest SNARKs. An interactive proof that checks a huge sum with minimal overhead. In SNARKs it lets provers commit to far less data. Most of the work becomes simple additions and multiplications"
X Link 2025-11-06T14:05Z [----] followers, [----] engagements
"3/ But not all uses of sum-check are equal. The fastest SNARKs use it intelligently exploiting repeated structure to minimize prover work. Key techniques: Batch evaluation arguments Memory checking Virtual polynomials Sparse sum-checks Small-value preservation"
X Link 2025-11-06T14:05Z [----] followers, [----] engagements
"4/ These techniques lead to the best SNARK provers across the boardfrom simple to complex statements from phones to servers. Now is the time to understand the techniques that will power SNARKs for the long haul. More updates soon. Find the survey here: https://eprint.iacr.org/2025/2041 https://eprint.iacr.org/2025/2041"
X Link 2025-11-06T14:05Z [----] followers, [----] engagements
"@rhackett Wait til you learn about sum-check for matrix multiplication"
X Link 2025-11-06T14:41Z [----] followers, [---] engagements
"@rhackett https://people.cs.georgetown.edu/jthaler/blogpost.pdf https://people.cs.georgetown.edu/jthaler/blogpost.pdf"
X Link 2025-11-06T14:42Z [----] followers, [---] engagements
"2/ A cryptographically relevant quantum computer (CRQC) in the 2020s is highly unlikely. Even mid-2030s is ambitious. Systems w/ 1000+ qubits exist but raw qubit counts are misleading: we need thousands of error-corrected logical qubits and huge T-gate budgetsfar beyond today"
X Link 2025-12-05T19:48Z [----] followers, [----] engagements
"3/ A major source of confusion: companies calling qubits "error-corrected logical qubits" when they don't support non-Clifford operations or in some egregious cases can't even correct errors. This has seriously misled even sophisticated observers about how close we are to CRQC"
X Link 2025-12-05T19:48Z [----] followers, [----] engagements
"4/ A common mistake when discussing quantum threats: treating all cryptographic primitives the same. Encryption signatures and SNARKs face very different risk profiles"
X Link 2025-12-05T19:48Z [----] followers, [----] engagements
"5/ The clearest near-term risk is Harvest-Now-Decrypt-Later (HNDL): adversaries record encrypted traffic now to decrypt when a CRQC exists"
X Link 2025-12-05T19:48Z [----] followers, [----] engagements
"6/ That's why post-quantum (PQ) encryption must ship now despite costs/risks. Chrome+Cloudflare deployed hybrid (PQ+classical) schemes for TLS; iMessage and Signal for messaging. HNDL leaves no choice for data needing long-term confidentiality even if quantum is decades out"
X Link 2025-12-05T19:48Z [----] followers, [----] engagements
"8/ Blockchains today use signatures for authorization not encryption. Without HNDL exposure we can be deliberate about PQ signature migration"
X Link 2025-12-05T19:48Z [----] followers, [----] engagements
"9/ Today's PQ signatures leave a lot to be desired: ML-DSA 2.44.6 KB Falcon [---] B1.3 KB (but tricky to implement correctly) SPHINCS+ [--] KB+. For comparison ECDSA is just [--] bytes. Bigger/slower/more complex higher bug risk"
X Link 2025-12-05T19:48Z [----] followers, [----] engagements
"10/ Caution is warranted: Rainbow (MQ-based) and SIKE/SIDH (isogeny-based) were broken classically during NIST's process. Premature deployment can backfire"
X Link 2025-12-05T19:48Z [----] followers, [----] engagements
"11/ The web PKI is pursuing encryption-first signatures-later for exactly these reasons. Blockchains should follow suit"
X Link 2025-12-05T19:48Z [----] followers, [----] engagements
"12/ zkSNARKs Good news: even non-PQ SNARKs have post-quantum zero-knowledge. Nothing about the witness is revealed even to quantum adversaries. What becomes vulnerable post-CRQC is soundness (forging new false proofs) not confidentiality or soundness of past proofs"
X Link 2025-12-05T19:48Z [----] followers, [----] engagements
"13/ A key point: for years to come bugs and implementation attacks (side-channels fault injection) will be larger risks than CRQCs. This applies to SNARKs signature aggregation schemes and even signatures themselves. Invest in audits fuzzing and formal methods"
X Link 2025-12-05T19:48Z [----] followers, [----] engagements
"14/ Bitcoin's special challenges: slow governance no passive migration and a non-trivial abandoned supply at high-value quantum-vulnerable addresses"
X Link 2025-12-05T19:48Z [----] followers, [----] engagements
"15/ There's no easy solution. Bitcoin has to take the threat seriously not because CRQCs are coming before [----] but because addressing these mainly non-technical issues requires years of coordination"
X Link 2025-12-05T19:48Z [----] followers, [----] engagements
"1/ Quantum computing predictions lately range from "public key cryptography will be broken in [--] years" to "it's a century away." Both are wrong. My latest post explains what publicly known progress actually supports and what blockchains should do about it. Thread below 🧵"
X Link 2025-12-05T19:48Z 11K followers, 99.3K engagements
"19/ Bottom line: match urgency to actual threats. Encryption: urgent (HNDL). Signatures: deliberate. SNARKs: ZK property stays secure; soundness vulnerable post-CRQC. And above all bugs remain the bigger near-term risk"
X Link 2025-12-05T19:49Z 11K followers, [----] engagements
"20/ Full post: https://a16zcrypto.com/posts/article/quantum-computing-misconceptions-realities-blockchains-planning-migrations/ https://a16zcrypto.com/posts/article/quantum-computing-misconceptions-realities-blockchains-planning-migrations/"
X Link 2025-12-05T19:49Z 11K followers, [----] engagements
"This rebuttal to my post attacks positions that I did not take and presents technical developments without appropriate context. 1) My post does not say that signatures/blockchains are less vulnerable than encryption. The same algorithms that break one break the other. It says that a post-quantum transition for encryption is more urgent due to HNDL attacks. This cannot be in dispute: anyone who transitions to PQ signatures before a cryptographically relevant quantum computer (CRQC) arrives cannot be attacked but this is not the case for encryption due to HNDL. 2) My post does not argue that"
X Link 2025-12-08T14:08Z 11K followers, 26.5K engagements
"In March I laid out performance stages for zkVMs. By the end of [----] we should hit Stage 2: 10000x prover overhead relative to native execution. And that's when things get interesting for applications beyond blockchains"
X Link 2025-12-11T15:42Z 11K followers, [----] engagements
"Full post on zkVM stages of development: Full post on things we're excited about for 2026: https://a16zcrypto.com/posts/article/big-ideas-things-excited-about-crypto-2026/#on-other-industries-amp-applications https://a16zcrypto.com/posts/article/secure-efficient-zkvms-progress/ https://a16zcrypto.com/posts/article/big-ideas-things-excited-about-crypto-2026/#on-other-industries-amp-applications https://a16zcrypto.com/posts/article/secure-efficient-zkvms-progress/"
X Link 2025-12-11T15:42Z 11K followers, [----] engagements
"1/ Remember: "logical qubits" in announcements and roadmaps logical qubits needed for Shor. People havent recognized how much this confusion has distorted perceptions of quantum progress. Sam Jaques addresses this in a talk worth watching"
X Link 2025-12-12T14:36Z 11K followers, 11.2K engagements
"2/ Announcements often call anything beyond a physical qubit a logical qubit even distance-2 codes that only detect errors. Roadmaps typically use logical qubit once Clifford gates work. But Shor needs massive non-Clifford (T-gate) overhead. One term three meanings"
X Link 2025-12-12T14:36Z 11K followers, [----] engagements
"3/ Sams talk is here please watch it: https://www.youtube.com/watchv=nJxENYdsB6c https://www.youtube.com/watchv=nJxENYdsB6c"
X Link 2025-12-12T14:36Z 11K followers, [----] engagements
"1/ LayerZero is launching a new blockchain and on the SNARK-proving front it's powered by Jolt. Benchmark were proud of: [---] billion 64-bit RISC-V cycles proved/sec on [--] GPUs with plenty of room for more speedups. https://x.com/a16zcrypto/status/2021348447656476841 https://t.co/aT37H26LMN https://x.com/a16zcrypto/status/2021348447656476841 https://t.co/aT37H26LMN"
X Link 2026-02-10T22:55Z 11K followers, 82K engagements
"2/ For context: a single CPU core runs at a few billion cycles/sec. So today were already in the ballpark of real-time proving for a single-core CPU execution"
X Link 2026-02-10T22:55Z 11K followers, [----] engagements
"3/ Roadmap: we're targeting [--] more throughput this year for Jolt mainly by switching from elliptic-curve commitments to lattice-based onesenabling 128-bit fields (vs 256-bit) and post-quantum security to boot"
X Link 2026-02-10T22:55Z 11K followers, [----] engagements
"1/ Jolt just got a [--] speedup. We now prove over [-------] RISC-V cycles/sec on a 32-core CPU and over [------] cycles/sec on a MacBook with proofs of about [--] KB. Heres whats new 🧵"
X Link 2025-08-14T17:32Z 11K followers, 55.3K engagements
"4/ A bit further out: I expect single-GPU real-time proving of a single CPU core"
X Link 2026-02-10T22:55Z 11K followers, [----] engagements
"5/ Near term: whether you want to scale chains with GPU proving or generate proofs on a phone Jolt has a lot more shipping soon. Stay tuned for more updates"
X Link 2026-02-10T22:55Z 11K followers, [----] engagements
"Long-term: wed potentially consider support for auto-precompiles but its not a near-term priority. Fully supporting external/custom constraint systems would add substantial complexity to Jolt and for non-algebraic workloads the speedups would likely be modest. For algebraic workloads I think we can capture a large fraction of the benefit while staying in the cycle-by-cycle VM model. Were exploring this now in the context of recursion: today we prove 2M field multiplications executed inside RISC-V (via Montgomery multiplication); soon well prove those multiplications "natively" to make"
X Link 2026-02-11T15:25Z 10.9K followers, [---] engagements
"There will eventually be a hash-based version of Jolt but I expect it to be less performant than a lattice-based Jolt: bigger proofs slower prover more prover memory. The reason is that Jolt leans heavily on certain properties of elliptic curve and lattice commitments that hash-based ones lack: "pay-per-bit" commitment costs and extremely fast evaluation proofs. https://twitter.com/i/web/status/2021608021239935401 https://twitter.com/i/web/status/2021608021239935401"
X Link 2026-02-11T15:31Z 10.9K followers, [---] engagements
"1/ LayerZero is launching a new blockchain and on the SNARK-proving front it's powered by Jolt. Benchmark were proud of: [---] billion 64-bit RISC-V cycles proved/sec on [--] GPUs with plenty of room for more speedups. https://x.com/a16zcrypto/status/2021348447656476841 https://t.co/aT37H26LMN https://x.com/a16zcrypto/status/2021348447656476841 https://t.co/aT37H26LMN"
X Link 2026-02-10T22:55Z 11K followers, 82K engagements
"The key ingredient for builders: Jolt Inside Today @LayerZero_Core announced their new chain Zero that features several different technical advances including a new approach to zero knowledge proofs that decouples transaction execution from http://x.com/i/article/2021344626796531712 http://x.com/i/article/2021344626796531712"
X Link 2026-02-10T22:19Z 187.9K followers, 130.7K engagements
"4/ A bit further out: I expect single-GPU real-time proving of a single CPU core"
X Link 2026-02-10T22:55Z 11K followers, [----] engagements
"5/ Near term: whether you want to scale chains with GPU proving or generate proofs on a phone Jolt has a lot more shipping soon. Stay tuned for more updates"
X Link 2026-02-10T22:55Z 11K followers, [----] engagements
"1/ Remember: "logical qubits" in announcements and roadmaps logical qubits needed for Shor. People havent recognized how much this confusion has distorted perceptions of quantum progress. Sam Jaques addresses this in a talk worth watching"
X Link 2025-12-12T14:36Z 11K followers, 11.2K engagements
"2/ Announcements often call anything beyond a physical qubit a logical qubit even distance-2 codes that only detect errors. Roadmaps typically use logical qubit once Clifford gates work. But Shor needs massive non-Clifford (T-gate) overhead. One term three meanings"
X Link 2025-12-12T14:36Z 11K followers, [----] engagements
"3/ Sams talk is here please watch it: https://www.youtube.com/watchv=nJxENYdsB6c https://www.youtube.com/watchv=nJxENYdsB6c"
X Link 2025-12-12T14:36Z 11K followers, [----] engagements
"In March I laid out performance stages for zkVMs. By the end of [----] we should hit Stage 2: 10000x prover overhead relative to native execution. And that's when things get interesting for applications beyond blockchains"
X Link 2025-12-11T15:42Z 11K followers, [----] engagements
"Full post on zkVM stages of development: Full post on things we're excited about for 2026: https://a16zcrypto.com/posts/article/big-ideas-things-excited-about-crypto-2026/#on-other-industries-amp-applications https://a16zcrypto.com/posts/article/secure-efficient-zkvms-progress/ https://a16zcrypto.com/posts/article/big-ideas-things-excited-about-crypto-2026/#on-other-industries-amp-applications https://a16zcrypto.com/posts/article/secure-efficient-zkvms-progress/"
X Link 2025-12-11T15:42Z 11K followers, [----] engagements
"This rebuttal to my post attacks positions that I did not take and presents technical developments without appropriate context. 1) My post does not say that signatures/blockchains are less vulnerable than encryption. The same algorithms that break one break the other. It says that a post-quantum transition for encryption is more urgent due to HNDL attacks. This cannot be in dispute: anyone who transitions to PQ signatures before a cryptographically relevant quantum computer (CRQC) arrives cannot be attacked but this is not the case for encryption due to HNDL. 2) My post does not argue that"
X Link 2025-12-08T14:08Z 11K followers, 26.5K engagements
"I have great respect for @succinctJT and the a16z team. But I disagree with the argument that quantum computing is not an urgent problem for blockchains. The threat is closer the progress faster and the fix harder than how hes framing it & than most people realize. 👇 0/ 1/ Quantum computing predictions lately range from "public key cryptography will be broken in [--] years" to "it's a century away." Both are wrong. My latest post explains what publicly known progress actually supports and what blockchains should do about it. Thread below 🧵 https://t.co/jTCkqN6upB 1/ Quantum computing"
X Link 2025-12-06T23:05Z [----] followers, 109.7K engagements
"1/ Quantum computing predictions lately range from "public key cryptography will be broken in [--] years" to "it's a century away." Both are wrong. My latest post explains what publicly known progress actually supports and what blockchains should do about it. Thread below 🧵"
X Link 2025-12-05T19:48Z 11K followers, 99.3K engagements
"19/ Bottom line: match urgency to actual threats. Encryption: urgent (HNDL). Signatures: deliberate. SNARKs: ZK property stays secure; soundness vulnerable post-CRQC. And above all bugs remain the bigger near-term risk"
X Link 2025-12-05T19:49Z 11K followers, [----] engagements
"20/ Full post: https://a16zcrypto.com/posts/article/quantum-computing-misconceptions-realities-blockchains-planning-migrations/ https://a16zcrypto.com/posts/article/quantum-computing-misconceptions-realities-blockchains-planning-migrations/"
X Link 2025-12-05T19:49Z 11K followers, [----] engagements
Limited data mode. Full metrics available with subscription: lunarcrush.com/pricing