Toggle light / dark theme

I am glad that more folks are beginning to start to understand the magnitude and depth of the risk & exposure that QC presents even within the next 4 to 5 years. However, what about everyone else? Folks need to understand that the transformation to QC in the infrastructure alone is a substantial investment and timeline. So, as I have highlighted many times; I hope folks have baked in QC into their future state architectures & investments because a transformation (depending on company size and complexity) could span many, many years.


The study purports there is a 50 per cent risk that many of the cybersecurity tools used by financial institutions, online retailers and government agencies will be obsolete by 2031.

September 6, 2016 by Canadian Manufacturing.com Staff.

Read more

Additional insights on QSS planned efforts; and (as with any government program) there is more to this program than these insights.


While China’s quantum science satellite (QSS) project is part of the Strategic Priority Programme on Space Science, the country’s first space exploration programme intended purely for scientific research, its experiments have significant military implications.

By Michael Raska

On August 16, 2016 China launched the world’s first quantum communications experiment satellite into orbit from the Jiuquan Satellite Launch Centre in the Gobi Desert. The small satellite, recently named Micius after an ancient Chinese philosopher, is tasked to establish a hack-proof communication line – a quantum key distribution network, while performing a series of quantum entanglement experiments in space for the first time.

Read more

This one makes me to want to dig more into the reason especially since just last week Russia announced its distrust of Chinese tech being used to hack into Russia’s governmental systems, etc. And, one thing about Russia and China is their protection and involvement in commerce and financials.


New trade routes are expanding between Russia and China. That’s according to Russia’s Far East Development Fund, which said an agreement has been made with Chinese technology company LeEco to develop an eCommerce platform focused on increasing food exportation to China.

LeLive, the name of the new platform, will broaden and increase sales of Russian agricultural items and products in the Chinese market. Facilitated by LeEco’s online platform — called “Le Ecosystem,” which has a monthly connection with more than 800 million users — the goal of the platform is to meet Chinese customers’ needs. Russian goods that will be available through the platform range from basics, like flour, butter and honey, to assorted beverages, sweets, canned meats and nuts.

China’s LeEco originally began as a digital content provider and recently acquired Vizio. Some have nicknamed LeEco the “Netflix of China.” Over time, LeEco expanded further into digital offerings, from music streaming, to mobile phones, to cloud storage, to film distribution.

Read more

Internet pioneer Vint Cerf sees a secure future for the network of networks he helped create four decades ago as the co-developer of TCP/IP, the protocol that facilitates internet communications.

“We’re much more conscious of the need to make the system more secure than it has been,” Cerf, Google’s chief internet evangelist, says in an interview with Information Security Media Group. “And there’s a lot going on in the Internet Engineering Task Force [an international community of network designers, operators, vendors and researchers] to achieve that objective. And I anticipate in the course of the next decade or so that we will actually see a lot more mechanisms in place in order to enhance security and privacy and safety.”

But if internet security isn’t improved, Cerf says, “people will decide it’s not an environment they find worthy of trust, in which case they’ll look for something else. Maybe, something will replace the internet that’s more secure than it is today.”

Read more

A very old story and one that myself and others have raised many times. However, worth repeating due to the current advancements in BMI.


A vulnerability of brain implants to cyber-security attacks could make “brainjacking”, which has been discussed in science fiction for decades, a reality, say researchers from the University of Oxford. Writing in The Conversation, an Australia-based non-profit media, Laurie Pycroft discussed brain implants as a new frontier of security threat.

The most common type of brain implant is the deep brain stimulation (DBS) system. It consists of implanted electrodes positioned deep inside the brain connected to wires running under the skin, which carry signals from an implanted stimulator.

The stimulator consists of a battery, a small processor, and a wireless communication antenna that allows doctors to programme it. In essence, it functions much like a cardiac pacemaker, with the main distinction being that it directly interfaces with the brain, Pycroft explained.

Read more

The Wall Street Journal on Aug. 16 reported that China sent the world’s first quantum communications satellite into orbit. The newspaper also stated that China spent $101 billion in 2015 on quantum research and technology development. The satellite has the ability to greatly expand China’s ability to expand their unhackable communications.

Now we in the U.S. read almost daily about some U.S. computer system that has been hacked. Our current technology cannot be considered secure. So what is our government investing in?

According to the GAO, the U.S. spent over $10 billion on global climate change science and technology in 2014. Gave $400 million to Iran for who knows what, and spent about $200 million on quantum technology.

Read more

There is a computing revolution coming, although nobody knows exactly when. What are known as “quantum computers” will be substantially more powerful than the devices we use today, capable of performing many types of computation that are impossible on modern machines.

But while faster computers are usually welcome, there are some computing operations that we currently rely on being hard (or slow) to perform.

Specifically, we rely on the fact that there are some codes that computers can’t break – or at least it would take them too long to break to be practical. Encryption algorithms scramble data into a form that renders it unintelligible to anyone that does not possess the necessary decryption key (normally a long string of random numbers).

Read more

I have been seeing this for the recent weeks; I find it interesting and another step in China’s own move to be a global leader of tech. Could be either good or bad in the longer term.


China is taking a more inclusive tack in instituting cybersecurity standards for foreign technology companies, allowing them to join a key government committee in an effort to ease foreign concerns over the controls.

The committee under the government’s powerful cyberspace administration is in charge of defining cybersecurity standards. For the first time, the body earlier this year allowed select foreign companies— Microsoft Corp. MSFT −0.39 %, Intel Corp. INTC 0.43 %, Cisco Systems Inc. CSCO 0.14 % and International Business Machines Corp.—to take an active part in drafting rules, rather than participating simply as observers, said people familiar with the discussions.

How much influence the foreign companies will have over committee deliberations remains to be seen, these people said. Over the past few months, the committee’s seven working groups—which focus on encryption, big data and other cybersecurity issues—have each met at least once.

Read more

Interesting read on IPC Systems Inc. is partnering with U.K. startup Post-Quantum to (in their own words) “offer its clients encryption, biometric authentication and a distributed-ledger record-keeping system that the software company says is designed to resist hacking — even by a quantum computer.” — I will be researching this more.


(Bloomberg) — When it comes to cybersecurity, no one can accuse IPC Systems Inc., the New Jersey-based company that builds communications networks for trading firms and financial markets, of preparing to fight the last war.

Read more

Hmmmm.


The U.S. Navy and Marine Corps should advance the way they use unmanned systems, favoring greater autonomy over remotely-controlled missions and developing multi-vehicle systems such as swarms and cascaded operations, according to a recently released report by the Defense Science Board.

The DSB report, requested by the Pentagon’s acquisition chief in November 2014, notes a variety of Pentagon-wide challenges in developing, testing, fielding and operating autonomous systems, such as operator trust, cyber security and developing a test and evaluation plan for learning systems.

Specific to the Navy, the board recommends adding greater autonomy to Navy counter-mine unmanned underwater systems as a way to save time and keep personnel even farther from potential dangers.

Read more