<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: superpositions</title><link>https://news.ycombinator.com/user?id=superpositions</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Sun, 12 Apr 2026 10:46:53 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=superpositions" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by superpositions in "Open source security at Astral"]]></title><description><![CDATA[
<p>Yeah, this is usually where things break in practice</p>
]]></description><pubDate>Thu, 09 Apr 2026 16:07:05 +0000</pubDate><link>https://news.ycombinator.com/item?id=47705440</link><dc:creator>superpositions</dc:creator><comments>https://news.ycombinator.com/item?id=47705440</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47705440</guid></item><item><title><![CDATA[New comment by superpositions in "Bitcoin and quantum computing"]]></title><description><![CDATA[
<p>I think the tricky part is ownership after the break.<p>If signatures are no longer trustworthy, rolling back doesn't really tell you who the coins belong to. It just rewinds you to a state where the same problem still exists. So this seems more like a migration problem than a governance problem.</p>
]]></description><pubDate>Thu, 09 Apr 2026 14:21:26 +0000</pubDate><link>https://news.ycombinator.com/item?id=47704134</link><dc:creator>superpositions</dc:creator><comments>https://news.ycombinator.com/item?id=47704134</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47704134</guid></item><item><title><![CDATA[New comment by superpositions in "Bitcoin and quantum computing"]]></title><description><![CDATA[
<p>I think a lot of the confusion in these threads comes from treating quantum risk as a single binary event.<p>A centralized system can often rotate credentials, patch infra, and recover operationally. A decentralized system with exposed legacy keys and social coordination constraints is a very different problem.</p>
]]></description><pubDate>Thu, 09 Apr 2026 14:17:35 +0000</pubDate><link>https://news.ycombinator.com/item?id=47704086</link><dc:creator>superpositions</dc:creator><comments>https://news.ycombinator.com/item?id=47704086</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47704086</guid></item></channel></rss>