Archive for the ‘encryption’ category: Page 49
Jul 29, 2016
China’s new quantum satellite paves the way for unhackable satellite internet
Posted by Karen Hurst in categories: cybercrime/malcode, encryption, internet, quantum physics, satellites
All that I can say is “WOW!”
CHINA is on the brink of launching a groundbreaking new satellite capable of conducting quantum experiments in space, leading some to predict it will usher in the beginning of a new space race.
The world will be watching very closely after the Chinese-led satellite launches in August. If it proves successful in carrying out the quantum experiments, China is expected to follow it with many more in a bid to create a super secure network that uses an encryption technique based on the principles of quantum communication.
Continue reading “China’s new quantum satellite paves the way for unhackable satellite internet” »
Jul 20, 2016
Here’s How Google Is Racing to Protect You From Quantum Hackers
Posted by Karen Hurst in categories: computing, encryption, quantum physics
This is a true question especially since China launches their new Quantum Satellite communications in the next few weeks. I do believe some will be protected; however, the broader majority will be a stretch.
The encryption of today will be broken by the computers of tomorrow, even retroactively.
Continue reading “Here’s How Google Is Racing to Protect You From Quantum Hackers” »
Jul 19, 2016
Post-Quantum Cryptography Aims To Fend Off Advanced Hack Attacks
Posted by Karen Hurst in categories: cybercrime/malcode, encryption, internet, quantum physics
Luv it; more believers.
Quantum computers promise to enable faster, far more complex calculations than today’s silicon chip-based computers. But they also raise the possibility that future computers could retroactively break the security of any digital communications that exist today, which is why Google is experimenting with something called “post-quantum cryptography.”
While quantum computer development remains in its early stages, some such computers are already in operation. In theory, future generations of quantum computers could “decrypt any Internet communication that was recorded today, and many types of information need to remain confidential for decades,” software engineer Matt Braithwaite wrote yesterday in a post on Google’s security blog. “Thus even the possibility of a future quantum computer is something that we should be thinking about today.”
Continue reading “Post-Quantum Cryptography Aims To Fend Off Advanced Hack Attacks” »
Jul 14, 2016
Transhumanist Terminology
Posted by Shailesh Prasad in categories: bioengineering, computing, cryonics, cyborgs, encryption, existential risks, food, genetics, information science, life extension, nanotechnology, neuroscience, quantum physics, robotics/AI, singularity, transhumanism
Transhuman Terminology.
ADHOCRACY
AEONOMICS
A-LIFE
AGORIC SYSTEM
AI-COMPLETE ALEPH ALGERNON AMORTALIST ARACHNIOGRAPHY ARCH-ANARCHY ARCOLOGY ARROW IMPOSSIBILITY THEOREM ARTILECT ASEX ASIMORT ASIMOV ASSEMBLER ATHANASIA ATHANOPHY ATHEOSIS AUGMENT AUTOEVOLUTIONIST AUTOMATED ENGINEERING AUTOMORPHISM AUTOPOTENT AUTOSCIENT BABY UNIVERSE BASEMENT UNIVERSE BEAN DIP CATASTROPHE BEANSTALK BEKENSTEIN BOUND BERSERKER BETELGEUSE-BRAIN BIG CRUNCH BINERATOR BIOCHAUVINISM BIOLOGICAL FUNDAMENTALISM BIONICS BIONOMICS BIOPHILIAC BIOSTASIS B-LIFE BLIGHT BLIND UPLOADING BLUE GOO BOGOSITY FILTER BORGANISM BREAKEVEN POINT BROADCATCHING BRUTE FORCE UPLOADING BUSH ROBOT CALCUTTA SYNDROME CALM TECHNOLOGY CALORIE RESTRICTION CASIMIR EFFECT CEREBROSTHESIS CHINESE ROOM CHRONONAUTS CHURCH-TURING THESIS COBOTS COMPUFORM COMPUTRONIUM CONCENTRATED INTELLIGENCE CONSILIENCE CONNECTIONISM CONTELLIGENCE CONTINUITY IDENTITY THEORY COSMYTHOLOGY CRYOBIOLOGY CRYOCRASTINATE CRYOGENICS CRYONICS CRYONIC SUSPENSION CRYPTO ANARCHY CRYPTOCOSMOLOGY CYBERCIDE CYBERFICTION CYBERGNOSTICISM CYBERIAN CYBERNATE/CYBERNIZE CYBERSPACE/CYBERMATRIX CYBRARIAN CYPHERPUNK DEANIMALIZE DEATH FORWARD DEATHISM DEEP ANARCHY DEFLESH DIGITAL PSEUDONYM DIAMONDOID DISASSEMBLER DISASTERBATION DISTRIBUTED INTELLIGENCE DIVERGENT TRACK HYPOTHESIS DIVERSITY IQ DIVIDUALS DOOMSDAY ARGUMENT DOWNLOAD DRYWARE DUBIFIER DYSON SPHERE ECOCALYPSE ECTOGENESIS
EMBRYOMEME
EMULATION
ENHANCED REALITY
ENVIROCAPITALISM
EPHEMERALISTS
E-PRIME
ESCALATORLOGY
THE ETERNAL LIFE POSTULATE
EUPSYCHIA
EUTHENICS
EVOLUTIONARILY STABLE STRATEGY (ESS)
EVOLUTURE
EXCONOMICS
EXES
EXFORMATION
EXISTENTIAL TECHNOLOGY
EXOPHOBIA
EXOSELF
EXTROPIAN
EXTROPIATE
EXTROPIC
EXTROPOLIS
EXTROPY
FACULTATIVE ANAGOROBE
FAR EDGE PARTY
THE FERMI PARADOX
FEMTOTECHNOLOGY
FLATLANDER
FLUIDENTITY
FOGLET
FORK
FREDKIN’S PARADOX
FUNCTIONAL SOUP
FUTIQUE
FUTURE SHOCK
GALAXY BRAIN
GAUSSIAN
GENEGENEERING
GENETIC ALGORITHM
GENIE
GREEN GOO
GÖDEL’S THEOREM
GOLDEN GOO
GREAT FILTER, THE
GREY GOO
GUY FAWKES SCENARIO
HALLUCINOMEMIC
HIVE COMPUTING
HOMORPH
HPLD
HYPERTEXT
HYPONEIRIA
HYPOTECH
Jul 13, 2016
Quantum is Coming
Posted by Karen Hurst in categories: computing, encryption, quantum physics
Google to run Chrome Canary experimentally for the next two years to address post-quantum cryptography.
Alphabet’s forthcoming Chrome Canary browser is just the “canary” in the coalmine—quantum computing is coming faster than you might think.
Jul 8, 2016
Google Tinkers With Chrome Cryptosecurity To Fight Quantum Hacks
Posted by Karen Hurst in categories: cybercrime/malcode, encryption, privacy, quantum physics
Glad Google is doing this because next month could be a real test when China launches its Quantum Satellite.
Today’s encryption is an arms race as digital security experts try to hold off hackers’ attempts to break open user data. But there’s a new tech on the horizon that even the NSA recognizes as crucial to protect against: quantum computing, which is expected to dramatically speed up attempts to crack some commonly-used cryptographic schemes. To get ahead of the game, Google is testing new digital security setups on single-digit populations of Chrome users.
Quantum computing is such a potential threat because it can do many more simultaneous calculations than current computers. Modern binary bits can only be in two states when electric current is run through them: 0 or 1. But the ambiguous nature of the quantum state means its elemental units (known as “qubits”) could be in either state at a time, so two could potentially be in four orientations at one time: 00, 01, 10 or 11. That ambiguity is exponential, so three qubits could be in eight at a time, and so on.
Continue reading “Google Tinkers With Chrome Cryptosecurity To Fight Quantum Hacks” »
Jul 4, 2016
China to launch ‘hack-proof’ quantum satellite next month
Posted by Karen Hurst in categories: computing, encryption, quantum physics, satellites
Get ready.
China will launch the world’s first quantum satellite next month to demonstrate a series of advanced technologies such as hacker-proof communications and quantum teleportation.
Ground testing and quality checks on the satellite had finished at the Chinese Academy of Sciences, and it would depart for the Jiuquan Satellite Launch Centre in Inner Mongolia early this month for a launch aboard a Long March 2D rocket in the middle of next month, according to a report on the central government’s website posted on Friday.
Continue reading “China to launch ‘hack-proof’ quantum satellite next month” »
Jun 27, 2016
New, better way to build circuits for world’s first useful quantum computers
Posted by Karen Hurst in categories: computing, encryption, quantum physics, security
We’re on a roll with QC.
The era of quantum computers is one step closer as a result of research published in the current issue of the journal Science. The research team has devised and demonstrated a new way to pack a lot more quantum computing power into a much smaller space and with much greater control than ever before. The research advance, using a 3-dimensional array of atoms in quantum states called quantum bits—or qubits—was made by David S. Weiss, professor of physics at Penn State University, and three students on his lab team. He said “Our result is one of the many important developments that still are needed on the way to achieving quantum computers that will be useful for doing computations that are impossible to do today, with applications in cryptography for electronic data security and other computing-intensive fields.”
The new technique uses both laser light and microwaves to precisely control the switching of selected individual qubits from one quantum state to another without altering the states of the other atoms in the cubic array. The new technique demonstrates the potential use of atoms as the building blocks of circuits in future quantum computers.
Continue reading “New, better way to build circuits for world’s first useful quantum computers” »
Jun 15, 2016
Google and NSA Competing to Build World’s Most Powerful Quantum Computer
Posted by Karen Hurst in categories: computing, encryption, privacy, quantum physics, robotics/AI
Over the next 3 to 5 years you will see more and more in tech (medical/ bio, chip/ semiconductors, software, AI, services, platform, etc.) adopting QC in their nextgen products and services. We’re (as in Vern B. — D-Wave co-founder and CEO terms) in the Era of Quantum Computing. I highly urge techies to learn about QC so that you remain relevant.
Google is being driven by need to prevent the NSA from breaking into its system to access confidential personal data of its millions of users. On the other hand, the NSA is bent on cracking the tough encryption systems Google and other tech firms use to shield their information from them. Quantum computers will attain this aim for both Google and the NSA.
Google recently said it’s gotten closer to building a universal quantum computer. A team of Google researchers in California and Spain has built an experimental prototype of a quantum computer that can solve a wide range of problems and has the potential to be scaled up to larger systems.
Continue reading “Google and NSA Competing to Build World’s Most Powerful Quantum Computer” »