Menu

Blog

Archive for the ‘encryption’ category: Page 8

Nov 24, 2023

What Is Quantum Advantage? A Quantum Computing Scientist Explains An Approaching Milestone Marking The Arrival Of Extremely Powerful Computers

Posted by in categories: computing, encryption, information science, quantum physics

Quantum advantage is the milestone the field of quantum computing is fervently working toward, where a quantum computer can solve problems that are beyond the reach of the most powerful non-quantum, or classical, computers.

Quantum refers to the scale of atoms and molecules where the laws of physics as we experience them break down and a different, counterintuitive set of laws apply. Quantum computers take advantage of these strange behaviors to solve problems.

Continue reading “What Is Quantum Advantage? A Quantum Computing Scientist Explains An Approaching Milestone Marking The Arrival Of Extremely Powerful Computers” »

Nov 21, 2023

Q&A: Professor discusses new approaches for the implementation of the quantum internet

Posted by in categories: computing, encryption, internet, quantum physics

Researchers around the world are working on a network which could connect quantum computers with one another over long distances. Andreas Reiserer, Professor of Quantum Networks at the Technical University of Munich (TUM), explains the challenges which have to be mastered and how atoms captured in crystals can help.

The idea is the same: We use today’s to connect computers with one another, while the lets quantum computers communicate with one another. But in technical terms the quantum internet is much more complex. That’s why only smaller networks have been realized as yet.

There are two main applications: First of all, networking quantum computers makes it possible to increase their computing power; second, a quantum network will make absolutely interception-proof encryption of communication possible. But there are other applications as well, for example networking telescopes to achieve a previously impossible resolution in order to look into the depths of the universe, or the possibility of synchronizing around the world extremely precisely, making it possible to investigate completely new physical questions.

Nov 21, 2023

A scientist explains an approaching milestone marking the arrival of quantum computers

Posted by in categories: computing, encryption, information science, quantum physics

Quantum advantage is the milestone the field of quantum computing is fervently working toward, where a quantum computer can solve problems that are beyond the reach of the most powerful non-quantum, or classical, computers.

Quantum refers to the scale of atoms and molecules where the laws of physics as we experience them break down and a different, counterintuitive set of laws apply. Quantum computers take advantage of these strange behaviors to solve problems.

Continue reading “A scientist explains an approaching milestone marking the arrival of quantum computers” »

Nov 20, 2023

7 A-Rated Quantum Computing Stocks to Buy in November

Posted by in categories: encryption, finance, quantum physics, robotics/AI

Investors are always looking for the next great breakthrough in technology. As computers are indispensable tools for managing everything from finance to healthcare and smart cities, it only makes sense to look at the next stage of development and A-rated quantum computing stocks.

Quantum computing is still in its early stages, but companies are already making inroads. Zapata surveyed executives at 300 companies with revenues of $250 million and computing budgets over $1 million. Of those, over two-thirds spent more than $1 million annually to develop quantum computing applications.

Quantum computer stocks represent companies trying to revolutionize cryptography, optimization, drug discovery and artificial intelligence. It holds promise for solving complex problems currently infeasible for classical computers due to their exponential time requirements.

Nov 5, 2023

Scientist Claims Quantum RSA-2048 Encryption Cracking Breakthrough

Posted by in categories: encryption, mobile phones, quantum physics

The most secure RSA encryption can now be cracked using a smartphone or PC, according to a new highly-contested scientific paper.

Nov 2, 2023

Optical fiber–based, single-photon light source at room temperature for next-generation quantum processing

Posted by in categories: computing, encryption, quantum physics

Quantum-based systems promise faster computing and stronger encryption for computation and communication systems. These systems can be built on fiber networks involving interconnected nodes which consist of qubits and single-photon generators that create entangled photon pairs.

In this regard, rare-earth (RE) atoms and ions in are highly promising as generators. These materials are compatible with fiber networks and emit photons across a broad range of wavelengths. Due to their wide spectral range, optical fibers doped with these RE elements could find use in various applications, such as free-space telecommunication, fiber-based telecommunications, quantum random number generation, and high-resolution image analysis. However, so far, single-photon light sources have been developed using RE-doped crystalline materials at cryogenic temperatures, which limits the practical applications of quantum networks based on them.

In a study published in Physical Review Applied on 16 October 2023, a team of researchers from Japan, led by Associate Professor Kaoru Sanaka from Tokyo University of Science (TUS) has successfully developed a single-photon light source consisting of doped ytterbium ions (Yb3+) in an amorphous silica at room temperature. This newly developed single-photon light source eliminates the need for expensive cooling systems and has the potential to make quantum networks more cost-effective and accessible.

Oct 31, 2023

Google Chrome now auto-upgrades to secure connections for all users

Posted by in categories: cybercrime/malcode, encryption, internet

Google has taken a significant step towards enhancing Chrome internet security by automatically upgrading insecure HTTP requests to HTTPS requests for 100% of users.

This feature is called HTTPS-Upgrades and will secure old links that utilize the http:// by automatically attempting to first connect to the URL over the encrypted https:// protocol.

A limited rollout of this feature in Google Chrome began in July, but as of October 16th, Google has now rolled it out to all users on the Stable channel.

Oct 22, 2023

Inside the Underground World of Black Market AI Chatbots

Posted by in categories: cryptocurrencies, cybercrime/malcode, encryption, law, robotics/AI

If you wanted to, you could access an “evil” version of OpenAI’s ChatGPT today—though it’s going to cost you. It also might not necessarily be legal depending on where you live.

However, getting access is a bit tricky. You’ll have to find the right web forums with the right users. One of those users might have a post marketing a private and powerful large language model (LLM). You’ll connect with them on an encrypted messaging service like Telegram where they’ll ask you for a few hundred dollars in cryptocurrency in exchange for the LLM.

Once you have access to it, though, you’ll be able to use it for all the things that ChatGPT or Google’s Bard prohibits you from doing: have conversations about any illicit or ethically dubious topic under the sun, learn how to cook meth or create pipe bombs, or even use it to fuel a cybercriminal enterprise by way of phishing schemes.

Oct 21, 2023

Windows 11 Pro’s encryption can slow down SSDs by nearly 50%

Posted by in categories: computing, encryption, security

Windows 11 Pro ships with a security feature that could severely hamper your solid-state drive’s performance. Fortunately, it is easy enough to turn off but some might not even know it is enabled by default.

BitLocker encryption in Windows 11 Pro is designed to safeguard data and ensure it is only accessible by authorized individuals, but it comes with a steep performance penalty. To find out how much of an impact it could have, Tom’s Hardware recently conducted tests under three scenarios: unencrypted (no BitLocker), software-enabled BitLocker (the Windows 11 Pro default), and hardware-based BitLocker.

The crew used a 4 TB Samsung 990 Pro SSD running Windows 11 Pro (22H2, with all patches installed) paired with an Intel Core i9-12900K and 32 GB of DDR4 RAM for testing.

Oct 20, 2023

IGF 2023 WS #356 Encryption’s Critical Role in Safeguarding Human Rights

Posted by in categories: biotech/medical, encryption, governance, information science, internet, policy

Two types of technologies could change the privacy afforded in encrypted messages, and changes to this space could impact all of us.

On October 9, I moderated a panel on encryption, privacy policy, and human rights at the United Nations’s annual Internet Governance Forum. I shared the stage with some fabulous panelists including Roger Dingledine, the director of the Tor Project; Sharon Polsky, the president of the Privacy and Access Council of Canada; and Rand Hammoud, a campaigner at Access Now, a human rights advocacy organization. All strongly believe in and champion the protection of encryption.

I want to tell you about one thing that came up in our conversation: efforts to, in some way, monitor encrypted messages.

Policy proposals have been popping up around the world (like in Australia, India, and, most recently, the UK) that call for tech companies to build in ways to gain information about encrypted messages, including through back-door access. There have also been efforts to increase moderation and safety on encrypted messaging apps, like Signal and Telegram, to try to prevent the spread of abusive content, like child sexual abuse material, criminal networking, and drug trafficking.

Continue reading “IGF 2023 WS #356 Encryption’s Critical Role in Safeguarding Human Rights” »

Page 8 of 58First56789101112Last