Lev Stambler (@stamblerlev) 's Twitter Profile
Lev Stambler

@stamblerlev

PhD student at @UofMaryland and @JointQuICS

Focus on q-crypto and theory of AI

Researcher at @nvrlcl team

lev.zip

ID: 1473700043874091020

calendar_today22-12-2021 17:01:01

18 Tweet

131 Followers

87 Following

NeverLocal (@nvrlcl) 's Twitter Profile Photo

An underestimated aspect of quantum risk is the possibility of brittle failure, where public key crypto is broken without warning. Some quantum tech is designed to quickly scale from zero to hero. Big players have facilities ready for mass fabrication. Readiness is paramount.

Lev Stambler (@stamblerlev) 's Twitter Profile Photo

My talk from NapulETH 🇮🇹🌋 is up! TLDR: quantum networks + trusted hardware can do some very interesting and novel protocols! (E.g. single round sealed auctions) youtu.be/Rb_9sZB2S4o

Stefano Gogioso (@stefanogogioso) 's Twitter Profile Photo

This was a whole-team effort for us at NeverLocal: Lev Stambler ideated the cryptographic protocol, FRG implemented it in TEE-Rust, Nicola Pinzani and I took care of quantum hardware design and assembly, gaudenzio.eth advised how to present it for maximum effect. ⚛️🚀

Gil Kalai (@gilkalai) 's Twitter Profile Photo

After 78 years, an exponential improvement for Ramsey numbers were found by Jie Ma, Wujie Shen, and Shengjie Xie. gilkalai.wordpress.com/2025/07/23/ama…

Miden's intern 🥷 (@phklive) 's Twitter Profile Photo

Goodbye, today marks the end of an era. Grateful for an incredible 2 years with Bobbin Threadbare, Dominik Schmid, azeem, and the entire Miden team - thank you ❤️ Next: going all-in on building my own company Unlink ! A thread 🧵

Goodbye, today marks the end of an era.

Grateful for an incredible 2 years with <a href="/bobbinth/">Bobbin Threadbare</a>, <a href="/schmiddominik1/">Dominik Schmid</a>, <a href="/azeemk_/">azeem</a>, and the entire <a href="/0xMiden/">Miden</a> team - thank you ❤️

Next: going all-in on building my own company <a href="/unlink_xyz/">Unlink</a> !

A thread 🧵
philogy (@real_philogy) 's Twitter Profile Photo

I dream of an EVM language that: - has generics - has linear types - has variant types - let's you build safe abstractions over low-level optimizations - doesn't give bullshit errors - has good FV tooling - generates good bytecode Is that too much to ask?

Chris Olah (@ch402) 's Twitter Profile Photo

I believe in the rule of law. I believe in freedom of speech. I am against political violence. (I almost feel silly posting this, but it seems good to reinforce common knowledge that many still hold the basic pre-political commitments of liberal democracy.)

Lev Stambler (@stamblerlev) 's Twitter Profile Photo

Kind of crazy. Seems like the solution isn't out of this world (i.e. writing a simple brute force search program would yield a counter-example). But still, presumably no code was written nor deep (human) thinking done to solve this problem.

NeverLocal (@nvrlcl) 's Twitter Profile Photo

🛰 The future of cryptography might not be noise-free, but rather built from it. At QCrypt 2025 in Sanya, our very own Lev Stambler showed how imperfections in quantum hardware could be used to implement information-theoretic one-time programs, turning a bug into a feature.

🛰 The future of cryptography might not be noise-free, but rather built from it.

At QCrypt 2025 in Sanya, our very own <a href="/StamblerLev/">Lev Stambler</a> showed how imperfections in quantum hardware could be used to implement information-theoretic one-time programs, turning a bug into a feature.
Lev Stambler (@stamblerlev) 's Twitter Profile Photo

Paper with Sam Tan is published in Quantum! TLDR: we show that single-ancilla syndrome extraction circuits preserve effective distance for high dimensional hyper-graph product codes and weight reduced codes quantum-journal.org/papers/q-2025-…

Yannik Schrade (☂️) (@yrschrade) 's Twitter Profile Photo

🚨 TEEs are AGAIN compromised! 🚨 This time it's even bigger! TL;DR - 3 weeks ago: Intel SGX exploit (DDR4) - Today: Exploit affecting the latest State-Of-The-Art TEEs by Intel, AMD and Nvidia (DDR5) TEEs don't bring privacy or security in crypto. All you need to know 👇🧵

🚨 TEEs are AGAIN compromised! 🚨

This time it's even bigger!

TL;DR
-  3 weeks ago: Intel SGX exploit (DDR4)
-  Today: Exploit affecting the latest State-Of-The-Art TEEs by Intel, AMD and Nvidia (DDR5)

TEEs don't bring privacy or security in crypto.

All you need to know 👇🧵
Lev Stambler (@stamblerlev) 's Twitter Profile Photo

My new favorite way to integrate Claude Code into my workflow is leaving a comment TODO: Claude please do... in specific files and then telling Claude to look at said file

Bartosz Naskręcki (@nasqret) 's Twitter Profile Photo

I have personally crossed a line, and I am a bit in awe. This is my first fully automated, LLM-generated and auto-formalized proof of a new mathematical theorem. Let me set up the problem: we have three rotating circles with six positions each, all three intersecting in a total

I have personally crossed a line, and I am a bit in awe.

This is my first fully automated, LLM-generated and auto-formalized proof of a new mathematical theorem.

Let me set up the problem: we have three rotating circles with six positions each, all three intersecting in a total
Lev Stambler (@stamblerlev) 's Twitter Profile Photo

My new context for these LLMs: I prefer honesty and constructive criticism more than sycophancy. Please be honest and give real criticism. (Reviewer 2 will give me real criticism)

NeverLocal (@nvrlcl) 's Twitter Profile Photo

🚀 New Quantum Internet Applications via Verifiable One-Time Programs We’re back with a brand-new episode of Quantum x Crypto Live! Join us as we explore the frontier of quantum tech with: Lev Stambler, Scientist at NeverLocal gaudenzio.eth, PR & Communications at NeverLocal