Menu

Blog

Archive for the ‘encryption’ category: Page 52

Mar 9, 2016

Apple Says the NSA Should Hack San Bernardino Terrorist’s iPhone

Posted by in categories: business, cybercrime/malcode, electronics, encryption, government, law, mobile phones, privacy

Let’s just hypothesize a little on this topic: let’s say Apple goes ahead and gives in to the US Government and enables government to access the phone’s info. Does Apple have any protection in the future from lawsuits from it’s customers in situations where their own customers information is hacked by criminals and published to the world or used for illegal activities? Because I do see in the future more lawsuits coming at the tech companies for not ensuring their platforms and devices are un-hackable. So, if the government has its way; what protections does tech have now with any future lawsuits by consumers and other businesses?


His comments come during the ongoing legal battle over an iPhone used by Syed Farook, one of the individuals responsible for the San Bernardino, Calif. mass shooting December 2. “I don’t think requiring backdoors with encryption is either going to be an effective way to increase security or is really the right thing to do for just the direction that the world is going to”.

This is because First Amendment treats computer code as speech and according to Apple, meeting the demands of the government would be equivalent to “compelled speech and viewpoint discrimination”.

Continue reading “Apple Says the NSA Should Hack San Bernardino Terrorist’s iPhone” »

Mar 7, 2016

MIT’s new 5-atom quantum computer could make today’s encryption obsolete

Posted by in categories: computing, encryption, quantum physics, security

Much of the encryption world today depends on the challenge of factoring large numbers, but scientists now say they’ve created the first five-atom quantum computer with the potential to crack the security of traditional encryption schemes.

In traditional computing, numbers are represented by either 0s or 1s, but quantum computing relies on atomic-scale units, or “qubits,” that can be simultaneously 0 and 1 — a state known as a superposition that’s far more efficient. It typically takes about 12 qubits to factor the number 15, but researchers at MIT and the University of Innsbruck in Austria have found a way to pare that down to five qubits, each represented by a single atom, they said this week.

Using laser pulses to keep the quantum system stable by holding the atoms in an ion trap, the new system promises scalability as well, as more atoms and lasers can be added to build a bigger and faster quantum computer able to factor much larger numbers. That, in turn, presents new risks for factorization-based methods such as RSA, used for protecting credit cards, state secrets and other confidential data.

Continue reading “MIT’s new 5-atom quantum computer could make today’s encryption obsolete” »

Mar 7, 2016

The quantum computer that could ‘spell the end of encryption’: Device uses lasers on atoms to quickly crack ‘impossible’ codes

Posted by in categories: computing, encryption, government, internet, quantum physics

Much of the Quantum Internet technology has been in testing at Los Alamos. And, China has stepped up it’s own efforts in Quantum Internet and Computing in order to replace their whole infrastructure before the US and anyone else does due to both the opportunity as well as the threat of not being on Quantum.
first.

The next 5 years will prove for US and it’s allies a critical period. And, their real challenge is how quickly the US can mature the technology & how soon they can onboard everyone that are high targets for less friendly government backed hackers.


The researchers from Massachusetts Institute of Technology (MIT) call their scalable quantum computer ‘the beginning of the end for encryption schemes’.

Continue reading “The quantum computer that could ‘spell the end of encryption’: Device uses lasers on atoms to quickly crack ‘impossible’ codes” »

Mar 5, 2016

As Technology Barrels Ahead—Will Ethics Get Left in the Dust?

Posted by in categories: bioengineering, biological, drones, encryption, ethics, finance, robotics/AI, security

Interesting Question to ask.


The battle between the FBI and Apple over the unlocking of a terrorist’s iPhone will likely require Congress to create new legislation. That’s because there really aren’t any existing laws which encompass technologies such as these. The battle is between security and privacy, with Silicon Valley fighting for privacy. The debates in Congress will be ugly, uninformed, and emotional. Lawmakers won’t know which side to pick and will flip flop between what lobbyists ask and the public’s fear du jour. And because there is no consensus on what is right or wrong, any decision they make today will likely be changed tomorrow.

This is a prelude of things to come, not only with encryption technologies, but everything from artificial intelligence to drones, robotics, and synthetic biology. Technology is moving faster than our ability to understand it, and there is no consensus on what is ethical. It isn’t just the lawmakers who are not well-informed, the originators of the technologies themselves don’t understand the full ramifications of what they are creating. They may take strong positions today based on their emotions and financial interests, but as they learn more, they too will change their views.

Continue reading “As Technology Barrels Ahead—Will Ethics Get Left in the Dust?” »

Mar 5, 2016

China looks to ramp up Internet growth, and its controls

Posted by in categories: computing, encryption, government, internet, quantum physics

Something for everyone to keep a closer eye on in the coming year/s — And, they are indeed well on their way with Quantum and their partnership with Australia. Australia (as we recall) has been the one country outside the US and Canada that has made incredible progress in Quantum Computing especially introducing in Nov 2015 their discovery in developing a machine language for the Quantum platform.


BEIJING (AP) — China’s government has highlighted big data, encryption technology and “core technologies” such as semiconductors as the key elements of its push to grow into a tech powerhouse, according to a new five-year plan released Saturday that envisages the Internet as a major source of growth as well as a potential risk.

Read more

Mar 4, 2016

The beginning of the end for encryption schemes? New quantum computer, based on five atoms, factors numbers in a scalable way

Posted by in categories: computing, education, encryption, nanotechnology, quantum physics

Replacing traditional encryption schemes.


What are the prime factors, or multipliers, for the number 15? Most grade school students know the answer — 3 and 5 — by memory. A larger number, such as 91, may take some pen and paper. An even larger number, say with 232 digits, can (and has) taken scientists two years to factor, using hundreds of classical computers operating in parallel.

Read more

Mar 4, 2016

Quantum Computer Comes Closer to Cracking RSA Encryption

Posted by in categories: computing, encryption, information science, quantum physics, security

Glad to see this article get published because it echoes many of the concerns established around China and Russia governments and their hackers having their infrastructures on Quantum before US, Europe, and Canada. Computer scientists at MIT and the University of Innsbruck say they’ve assembled the first five quantum bits (qubits) of a quantum computer that could someday factor any number, and thereby crack the security of traditional encryption schemes.


Shor’s algorithm performed in a system less than half the size experts expected.

Read more

Mar 4, 2016

China’s Quantum Satellite Could Change Cryptography Forever

Posted by in categories: encryption, government, military, quantum physics

Like we have been saying things are getting more and more tricky now with Quantum. China’s government supported hackers are going to love this as well as their own military intel.


Quess could hold the key TO uncrackable communications

By Jeffrey Lin and P.W. Singer

Continue reading “China’s Quantum Satellite Could Change Cryptography Forever” »

Mar 4, 2016

Truly Random Number Generator Promises Stronger Encryption Across All Devices, Cloud

Posted by in categories: encryption, information science, internet, quantum physics

So long pseudo-random number generator. Quantum mechanics brought us true randomness to power our crypto algorithms, and is strengthening encryption in the cloud, the datacenter, and the Internet of Things.

Read more

Mar 4, 2016

What Is Quantum Cryptography?

Posted by in categories: encryption, quantum physics

Nice fundamental article describing Quantum Cryptography.


And can it make codes truly unbreakable?

Read more

Page 52 of 57First4950515253545556Last