Toggle light / dark theme

Chinese researchers report that they’ve set a new distance record for quantum teleportation through space, the phenomenon that Albert Einstein once scoffed at as “spooky action at a distance.”

The technology isn’t yet ready for prime time, but eventually it could open the way for a new type of unbreakable encryption scheme based on the weirdness of quantum physics.

Read more

Confidential details of a top-secret encryption-breaking supercomputer were left completely exposed on an unsecured computer server belonging to New York University (NYU), according to a new report.

While it’s not uncommon for even critical-level infrastructure to suffer potentially catastrophic security breaches, what makes this event different is that there was seemingly no foul-play or attempts to hack into NYU’s systems.

Instead, it looks like somebody may have just forgotten to secure their classified data properly, exposing hundreds of pages of information on a covert code-breaking machine co-administered by the Department of Defence, IBM, and NYU.

Read more

Someone may have finally cracked a form of DVD encryption believed to be impenetrable. Potentially, this could mean it’s now possible to download 4K Blu-Ray movies online, though you shouldn’t get too excited yet.

According to TorrentFreak, an allegedly cracked copy of The Smurfs 2 — why that one, of all films, is a mystery — surfaced on HD Bit Torrent community UltraHDClub. There are no other details at the moment.

We’ve teamed up with Product Hunt to offer you the chance to win an all expense paid trip to TNW Conference 2017!

Read more

After conducting a statistical analysis of the text, Russian experts believe it’s encrypted in the following way: vowels and spaces are removed from the text. The collection of symbols is united in a new text, bestrewed with spaces beforehand. They estimate that about 60 percent of the text is written in English or German, and the other part in one of the Romance languages – possibly Italian or Spanish, or even Latin.


Experts previously thought it impossible to decipher the medieval text.

Read more

Abstract: In this paper we present a method which allows attackers to covertly leak data from isolated, air-gapped computers. Our method utilizes the hard disk drive (HDD) activity LED which exists in most of today’s desktop PCs, laptops and servers. We show that a malware can indirectly control the HDD LED, turning it on and off rapidly (up to 5800 blinks per second) — a rate that exceeds the visual perception capabilities of humans. Sensitive information can be encoded and leaked over the LED signals, which can then be received remotely by different kinds of cameras and light sensors. Compared to other LED methods, our method is unique, because it is also covert — the HDD activity LED routinely flickers frequently, and therefore the user may not be suspicious to changes in its activity. We discuss attack scenarios and present the necessary technical background regarding the HDD LED and its hardware control. We also present various data modulation methods and describe the implementation of a user-level malware, that doesn’t require a kernel component. During the evaluation, we examine the physical characteristics of different colored HDD LEDs (red, blue, and white) and tested different types of receivers: remote cameras, extreme cameras, security cameras, smartphone cameras, drone cameras, and optical sensors. Finally, we discuss hardware and software countermeasures for such a threat. Our experiment shows that sensitive data can be successfully leaked from air-gapped computers via the HDD LED at a maximum bit rate of 4000 bits per second, depending on the type of receiver and its distance from the transmitter. Notably, this speed is 10 times faster than the existing optical covert channels for air-gapped computers. These rates allow fast exfiltration of encryption keys, keystroke logging, and text and binary files.

Read more

The encryption codes that safeguard internet data today won’t be secure forever.

Future quantum computers may have the and algorithms to crack them.

Nathan Hamlin, instructor and director of the WSU Math Learning Center, is helping to prepare for this eventuality.

Read more

Published: 2012/11/01 | ISBN: 311027325X | PDF | 349 pages | 12.06 MB

The subject of this book is theory of quantum system presented from information science perspective. The central role is played by the concept of quantum channel and its entropic and information characteristics. Quantum information theory gives a key to understanding elusive phenomena of quantum world and provides a background for development of experimental techniques that enable measuring and manipulation of individual quantum systems. This is important for the new efficient applications such as quantum computing, communication and cryptography. Research in the field of quantum informatics, including quantum information theory, is in progress in leading scientific centers throughout the world. This book gives an accessible, albeit mathematically rigorous and self-contained introduction to quantum information theory, starting from primary structures and leading to fundamental results and to exiting open problems.

Read more

Cybercrime & Cybersecurity 0 20

There is a reason why they’re not in the private sector developing QC. Noticed all represented no one developing and delivering QC commercially. There is a reason why folks like this become nay sayers as it is hard when you’re not able to deliver and not hireable by the private sector to deliver QC. With such a huge demand for QC experts and in security; you have to wonder why these folks have not been employed in a QC Tech company especially when you see tech grabbing every professor they can to develop QC and especially cyber security. Also, I still never saw any bases or details scientifically for their argument why specifically where and how QC will not block hacking just a bunch of professors throwing out words and high level speculations.


SAN FRANCISCO—Cryptographers said at the RSA Conference Tuesday they’re skeptical that advances in quantum computing and artificial intelligence will profoundly transform computer security.

“I’m skeptical there will be much of an impact,” Ron Rivest, a MIT professor and inventor of several symmetric key encryption algorithms, said early at the annual Cryptographers’ Panel here.

Susan Landau, a professor who specializes in cybersecurity policy and computer science at Worcester Polytechnic Institute, said that while artificial intelligence can be helpful when it comes to processing lots of data effectively, she doesn’t think it will be useful in fingering out series attacks or anomalous situations.

Read more

I actually had a person recently state quantum was a fad; boy were they ever wrong.


During the next ten years, quantum technologies will become part of and revolutionize our everyday lives in the form of computers, sensors, encryption, and much more—and in a way that can be difficult for us to comprehend.

Businesses will also boost both their research and development activities in this area.

“As from 2018, EU’s future flagship project, which is backed by EUR 1 billion, will focus on quantum technology, and several European countries are investing massively in the area. Innovation Fund Denmark has contributed DKK 80 million, and over the next couple of years, more funds are likely to be allocated to quantum research,” explains Ulrik Lund Andersen, Professor at DTU Physics.

Read more