Menu

Blog

Archive for the ‘security’ category: Page 61

Jan 27, 2022

Meta Is Making a Monster AI Supercomputer for the Metaverse

Posted by in categories: encryption, information science, internet, robotics/AI, security, supercomputing

Though Meta didn’t give numbers on RSC’s current top speed, in terms of raw processing power it appears comparable to the Perlmutter supercomputer, ranked fifth fastest in the world. At the moment, RSC runs on 6,800 NVIDIA A100 graphics processing units (GPUs), a specialized chip once limited to gaming but now used more widely, especially in AI. Already, the machine is processing computer vision workflows 20 times faster and large language models (like, GPT-3) 3 times faster. The more quickly a company can train models, the more it can complete and further improve in any given year.

In addition to pure speed, RSC will give Meta the ability to train algorithms on its massive hoard of user data. In a blog post, the company said that they previously trained AI on public, open-source datasets, but RSC will use real-world, user-generated data from Meta’s production servers. This detail may make more than a few people blanch, given the numerous privacy and security controversies Meta has faced in recent years. In the post, the company took pains to note the data will be carefully anonymized and encrypted end-to-end. And, they said, RSC won’t have any direct connection to the larger internet.

To accommodate Meta’s enormous training data sets and further increase training speed, the installation will grow to include 16,000 GPUs and an exabyte of storage—equivalent to 36,000 years of high-quality video—later this year. Once complete, Meta says RSC will serve training data at 16 terabytes per second and operate at a top speed of 5 exaflops.

Jan 25, 2022

Twin-field quantum key distribution (QKD) across an 830-km fibre

Posted by in categories: computing, encryption, internet, quantum physics, security

By using quantum key distribution (QKD), quantum cryptographers can share information via theoretic secure keys between remote peers through physics-based protocols. The laws of quantum physics dictate that photons carrying signals cannot be amplified or relayed through classical optical methods to maintain quantum security. The resulting transmission loss of the channel can limit its achievable distance to form a huge barrier to build large-scale quantum secure networks. In a new report now published in Nature Photonics, Shuang Wang and a research team in quantum information, cryptology and quantum physics in China developed an experimental QKD system to tolerate a channel loss beyond 140 dB across a secure distance of 833.8 km to set a new record for fiber-based quantum key distribution. Using the optimized four-phase twin-field protocol and high quality setup, they achieved secure key rates that were more than two orders of magnitude greater than previous records across similar distances. The results form a breakthrough to build reliable and terrestrial quantum networks across a scale of 1,000 km.

Quantum cryptography and twin-field quantum key distribution (QKD)

Quantum key distribution is based on fundamental laws of physics to distribute secret bits for information-theoretic secure communication, regardless of the unlimited computational power of a potential eavesdropper. The process has attracted widespread attention in the past three decades relative to the development of a global quantum internet, and matured to real-world deployment through optical-fiber networks. Despite this, wider applications of QKD are limited due to channel loss, limiting increase in the key rate and range of QKD. For example, photons are carriers of quantum keys in a QKD setup, and they can be prepared at the single-photon level to be scattered and absorbed by the transmission channel. The photons, however, cannot be amplified, and therefore the receiver can only detect them with very low probability. When transmitted via a direct fiber-based link from the transmitter to the receiver, the key rate can therefore decrease with transmission distance.

Jan 21, 2022

Meat-based vs Plant-based Diet for Longevity | David Sinclair and Lex Fridman

Posted by in categories: genetics, life extension, security

Lex Fridman Podcast full episode: https://www.youtube.com/watch?v=jhKZIq3SlYE
Please support this podcast by checking out our sponsors:
- Onnit: https://lexfridman.com/onnit to get up to 10% off.
- Clear: https://clearme.com/lexpod and use code LexPod to get 2 months free.
- National Instruments (NI): https://www.ni.com/perspectives.
- SimpliSafe: https://simplisafe.com/lex and use code LEX to get a free security camera.
- Linode: https://linode.com/lex to get $100 free credit.

GUEST BIO:
David Sinclair is a geneticist at Harvard and author of Lifespan.

Continue reading “Meat-based vs Plant-based Diet for Longevity | David Sinclair and Lex Fridman” »

Jan 21, 2022

Research demonstrates a new technique for improving long-distance quantum key distribution in a real-world field

Posted by in categories: particle physics, quantum physics, security

An experiment, performed by Istituto Nazionale di Ricerca Metrologica (INRIM) on 200 km of the Italian Quantum Backbone, in collaboration with Toshiba Europe, shows that coherent laser interferometry considerably improves the performances of quantum key distribution protocols in long-distance, real-world networks. The study has been published in Nature Communications.

Quantum Key Distribution (QKD) protocols enable cryptographic keys to be shared between distant parties with an intrinsic security guaranteed by the laws of quantum mechanics. This is made possible by the transmission of single photons, the elementary particles of which light is made of.

The interest for this subject extends well beyond the scientific community, and has now a strong strategic and commercial relevance. The European Commission, within the “European Quantum Communication Infrastructure” intitative, aims at integrating quantum key distribution technologies into specific services throughout the European Union within the next 10 years, and INRIM will take part in the design of this infrastructure with the OQTAVO project.

Jan 21, 2022

Cisco Issues Patch for Critical RCE Vulnerability in RCM for StarOS Software

Posted by in category: security

Cisco Systems has rolled out fixes for a critical security flaw affecting Redundancy Configuration Manager (RCM) for Cisco StarOS Software.


Google researchers detail two zero-day vulnerabilities reported in Zoom client software and MMR servers.

Jan 20, 2022

Android users can now disable 2G to block Stingray attacks

Posted by in categories: mobile phones, security

Google has finally rolled out an option on Android allowing users to disable 2G connections, which come with a host of privacy and security problems exploited by cell-site simulators.

The addition of the option was spotted by EFF (Electronic Frontier Foundation), which calls the development a victory for privacy protection.

Jan 19, 2022

Elon Musk says social-media accounts that track his travel movements are ‘becoming a security issue’

Posted by in categories: Elon Musk, security

Tesla CEO Elon Musk responded to a tweet on Monday discussing the risk posed to him and his family by publishing details about his travel plans.

Jan 19, 2022

AI is the key to fixing identity security, ForgeRock CEO says

Posted by in categories: business, information science, robotics/AI, security

For enterprises that are looking to bring a zero trust approach as a way to better secure identities and permissions, leveraging advanced AI is now essential in order to achieve accuracy and scalability, ForgeRock CEO Fran Rosch told VentureBeat.

While traditionally, zero trust decision-making has relied mostly upon rules–for instance, rejecting a user request based on an impossible geographic location– ForgeRock adds in AI algorithms that enable far greater accuracy, Rosch said. This accuracy equates to dramatically enhanced security, he said–citing an example of a recent customer that increased its entitlement rejections by 300% after deploying ForgeRock.

“Because it was previously all done by these rules, and people were rubber-stamping these entitlement requests, they were letting these things go that they should never have approved,” Rosch said in a recent interview. “That was increasing the risk to the company. Because there were people who had no business accessing HR data, and no business accessing sales data, that were getting that information. So by leveraging the AI, a 300% increase in request rejections really tightened up the security of the organization.”

Jan 18, 2022

Chinese Property Giant Said Its Employee of The Year Was Not a Human, But an AI Program

Posted by in categories: economics, robotics/AI, security

At first glance, Cui is depicted as a beautiful young professional in her 20s who joined Vanke’s accounting department in February 2021 and is the recipient of the company’s Best Newcomer Award. Cui has a 91.44 percent success rate in collecting overdue payments. In December 2021, Baixin Bank launched its first virtual employee named AIYA, and Jiangnan Rural Commercial Bank launched its VTM digital employees. Earlier in April 2019, Shanghai Pudong Development Bank introduced its first AI-powered digital employee named Xiaopu, capable of serving its bank users at different posts Notably, China’s first “meta-human” AYAYI made its debut on Chinese e-commerce platform Xiaohongshuin in May 2021. The hyper-realistic digital human garnered three million views on its first post.

According to a 2019 report compiled by Deloitte, a global professional services network, experts predict that using AI at a larger scale will add as much as $15.7 trillion to the global economy by 2030.Deloitte’s report shows that from 2015 to 2020, the average annual compound growth rate of the global artificial intelligence market was 26.2 percent, while the growth rate of the Chinese AI market during the same period was 44.5 percent. Another report by Deloitte suggests that in 2025 the scale of China’s artificial intelligence industry will exceed $85 billion.

Presently, there are about 2,600 artificial intelligence companies in China. Most located in Beijing’s Haidian District technology hub, The Center for Security and Emerging Technology (CSET), a U.S. think tank, estimated the CCP’s total R&D investment in artificial intelligence in 2018 was between $2 billion and $8.4 billion.

Continue reading “Chinese Property Giant Said Its Employee of The Year Was Not a Human, But an AI Program” »

Jan 18, 2022

Free-Space Optical Communication

Posted by in categories: internet, security, space

FSO communication systems are where free space acts as a communication channel between transceivers that are line-of-sight (LOS) for successful transmission of optical signals. The channel can be atmosphere, space, or vacuum, whose characteristics determine the transmission and reception of optical signals for designing reliable and efficient communication systems. Using FSO technology data is transmitted by propagation of light through atmospheric or space communication channels, allowing optical connectivity. FSO communication offers a high data rate to meet the tremendous increasing demand of broadband traffic mostly driven by Internet access and HDTV broadcasting services. Compared to fiber optics technology, FSO offers much more flexibility in designing optical network architectures at very high speeds, at tens and hundreds of Gbit/s rates. However, FSO communication is affected by atmospheric effects, which limits sensitivity and achievable data rates with acceptable BER. Some of these degradations are turbulence, absorption, and scattering, and various mitigation techniques exist for reliable and efficient data transmission [1] and to increase the communication performance. Both point-to-point, point-to-multipoint, multipoint-to-point, and multipoint-to-multipoint FSO communications are possible, depending on the different scenarios of establishing optical links. FSO communication is the most practical alternative to solve the bottleneck broadband connectivity problem. The data rates provided by FSO links continue to increase in both long-and short-range applications. FSO will be one of the most unique and powerful tools to address connectivity bottlenecks that have been created in high-speed networks during the past decade due to the tremendous success and continued acceptance of the Internet. The next generation of Internet connectivity will push the limits of existing infrastructure with high-bandwidth applications such as videoconferencing, streaming multimedia content, and network-enabled portable devices. Clearing these bottlenecks is crucial for the future growth and success of the contemporary Internet society. The bandwidth of optical communications access and edge networks will be needed to satisfy these demands. Communication systems are concerned with the transmission of information from a source to a user. The purpose of a communication system is therefore to transfer information. A very basic block diagram of any communication system (optical or radiofrequency (RF)) is shown in Fig. 4.1.

Fig. 4.1 shows a single point-to-point system, whereas in a multiplexed system there may be multiple input and output message sources and users (also called destinations). Fig. 4.2 shows other possible configurations and links for multipoint connections.

OWC is the next frontier for high-speed broadband connection and offers the following unique features and advantages: high bandwidth/capacity, ease of deployment, compact size, low power, and improved channel security. OWC can transmit and exchange voice and video communication data through the atmosphere/free-space at the rates of tens of Gbit/s and much more.

Page 61 of 146First5859606162636465Last