Toggle light / dark theme

Quantum communication and cryptography are the future of high-security communication. But many challenges lie ahead before a worldwide quantum network can be set up, including propagating the quantum signal over long distances. One of the major challenges is to create memories with the capacity to store quantum information carried by light. Researchers at the University of Geneva (UNIGE), Switzerland, in partnership with CNRS, France, have discovered a new material in which an element, ytterbium, can store and protect the fragile quantum information even while operating at high frequencies. This makes ytterbium an ideal candidate for future quantum networks, where the aim is to propagate the signal over long distances by acting as repeaters. These results are published in the journal Nature Materials.

Quantum cryptography today uses optical fibre over several hundred kilometres and is marked by its high degree of security: it is impossible to copy or intercept information without making it disappear.

However, the fact that it is impossible to copy the signal also prevents scientists from amplifying it to diffuse it over long distances, as is the case with the Wi-Fi network.

Read more

Not long ago, getting a virus was about the worst thing computer users could expect in terms of system vulnerability. But in our current age of hyper-connectedness and the emerging Internet of Things, that’s no longer the case. With connectivity, a new principle has emerged, one of universal concern to those who work in the area of systems control, like João Hespanha, a professor in the departments of Electrical and Computer Engineering, and Mechanical Engineering at UC Santa Barbara. That law says, essentially, that the more complex and connected a system is, the more susceptible it is to disruptive cyber-attacks.

“It is about something much different than your regular computer virus,” Hespanha said. “It is more about cyber physical systems—systems in which computers are connected to physical elements. That could be robots, drones, smart appliances, or infrastructure systems such as those used to distribute energy and water.”

In a paper titled “Distributed Estimation of Power System Oscillation Modes under Attacks on GPS Clocks,” published this month in the journal IEEE Transactions on Instrumentation and Measurement, Hespanha and co-author Yongqiang Wang (a former UCSB postdoctoral research and now a faculty member at Clemson University) suggest a new method for protecting the increasingly complex and connected power grid from attack.

Read more

Though more router manufacturers are making routers easier to set up and configure—even via handy little apps instead of annoying web-based interfaces—most people probably don’t tweak many options after purchasing a new router. They log in, change the name and passwords for their wifi networks, and call it a day.

While that gets you up and running with (hopefully) speedy wireless connectivity, and the odds are decent that your neighbor or some random evil Internet person isn’t trying to hack into your router, there’s still a lot more you can do to boost the security of your router (and home network).

Read more

Biologist Dan Gibson edits and programs DNA, just like coders program a computer. But his “code” creates life, giving scientists the power to convert digital information into biological material like proteins and vaccines. Now he’s on to a new project: “biological transportation,” which holds the promise of beaming new medicines across the globe over the internet. Learn more about how this technology could change the way we respond to disease outbreaks and enable us to download personalized prescriptions in our homes.

Read more

A team of Japanese researchers from Waseda University, Osaka University, and Shizuoka University designed and successfully developed a high-power, silicon-nanowire thermoelectric generator which, at a thermal difference of only 5 degrees C, could drive various IoT devices autonomously in the near future.

Objects in our daily lives, such as speakers, refrigerators, and even cars, are becoming “smarter” day by day as they connect to the internet and exchange data, creating the Internet of Things (IoT), a network among the objects themselves. Toward an IoT-based society, a miniaturized is anticipated to charge these objects, especially for those that are portable and wearable.

Due to advantages such as its relatively low thermal conductance but high electric conductance, have emerged as a promising thermoelectric material. Silicon-based thermoelectric generators conventionally employed long, nanowires of about 10–100 nanometers, which were suspended on a cavity to cutoff the bypass of the heat current and secure the temperature difference across the silicon nanowires. However, the cavity structure weakened the mechanical strength of the devices and increased the fabrication cost.

Read more

China is on the rise when it comes to the number of massive tech companies in the country.


China is nearly even with the U.S. when it comes to who’s home to the most giant tech companies.

It’s got nine of the world’s top 20 tech giants, while the U.S. has got the other 11, according to this chart from Kleiner Perkins Caufield & Byers partner Mary Meeker’s annual report on internet trends.

Read more

Is your internet moving a little slower than usual? Are you seeing hints of devices you don’t recognize in Windows Explorer, or when you cast media to your TV? If you suspect a neighbor is stealing your Wi-Fi, here’s how to check (and boot them off).

“So someone’s watching Netflix on my internet,” you may say. “What’s the big deal?” Even if you have a little bandwidth to spare, you probably don’t want other people on your network, especially if it’s unsecured. If someone has access to your network, they have access to all the computers on that network, and that’s dangerous. They could access files you’re unknowingly sharing, they could infect you with malware, and in certain situations they could even steal your passwords and other personal information.

As a result, you should take care to make sure each device connected to your network is one you can trust. Thankfully, there are free tools that’ll help you see everyone on your Wi-Fi right now.

Read more

In terms of moral, social, and philosophical uprightness, isn’t it striking to have the technology to provide a free education to all the world’s people (i.e. the Internet and cheap computers) and not do it? Isn’t it classist and backward to have the ability to teach the world yet still deny millions of people that opportunity due to location and finances? Isn’t that immoral? Isn’t it patently unjust? Should it not be a universal human goal to enable everyone to learn whatever they want, as much as they want, whenever they want, entirely for free if our technology permits it? These questions become particularly deep if we consider teaching, learning, and education to be sacred enterprises.


When we as a global community confront the truly difficult question of considering what is really worth devoting our limited time and resources to in an era marked by global catastrophe, I always find my mind returning to what the Internet hasn’t really been used for yet — and what was rumored from its inception that it should ultimately provide — an utterly and entirely free education for all the world’s people.

In regard to such a concept, Bill Gates said in 2010:

“On the web for free you’ll be able to find the best lectures in the world […] It will be better than any single university […] No matter how you came about your knowledge, you should get credit for it. Whether it’s an MIT degree or if you got everything you know from lectures on the web, there needs to be a way to highlight that.”

Read more

I get this question a lot. Today, I was asked to write an answer at Quora.com, a Q&A web site at which I am the local cryptocurrency expert. It’s time to address this issue here at Lifeboat.

Question

I have many PCs laying around my home and office.
Some are current models with fast Intel CPUs. Can
I mine Bitcoin to make a little money on the side?

Answer

Other answers focus on the cost of electricity, the number of hashes or teraflops achieved by a computer CPU or the size of the current Bitcoin reward. But, you needn’t dig into any of these details to understand this answer.

You can find the mining software to mine Bitcoin or any other coin on any equipment. Even a phone or wristwatch. But, don’t expect to make money. Mining Bitcoin with an x86 CPU (Core or Pentium equivalent) is never cost effective—not even when Bitcoin was trading at nearly $20,000. A computer with a fast $1500 graphics card will bring you closer to profitability, but not by much.

The problem isn’t that an Intel or AMD processor is too weak to mine for Bitcoin. It’s just as powerful as it was in the early days of Bitcoin. Rather, the problem is that the mining game is a constantly evolving competition. Miners with the fastest hardware and the cheapest power are chasing a shrinking pool of rewards.

The problem arises from a combination of things:

  1. There is a fixed rate of rewards available to all miners—and yet, over the past 2 years, hundreds of thousands of new CPUs have been added to the task. You are competing with all of them.
  2. Despite a large drop in the Bitcoin exchange rate (from $19,783.21 on Dec. 17, 2017), we know that it is generally a rising commodity, because both speculation and gradual grassroots adoption outpaces the very gradual increase in supply. The rising value of Bitcoin attracts even more individuals and organizations into the game of mining. They are all fighting for a pie that is shrinking in overall size. Here’s why…
  3. The math (a built-in mechanism) halves the size of rewards every 4 years. We are currently between two halving events, the next one will occur in May 2020. This halving forces miners to be even more efficient to eke out any reward.
  4. In the past few years, we have seen a race among miners and mining pools to acquire the best hardware for the task. At first, it was any CPU that could crunch away at the math. Then, miners quickly discovered that an nVidia graphics processor was better suited to the task. Then ASICS became popular, and now; specialized, large-scale integrated circuits that were designed specifically for mining.
  5. Advanced mining pools have the capacity to instantly switch between mining for Bitcoin, Ethereum classic, Litecoin, Bitcoin Cash and dozens of other coins depending upon conditions that change minute-by-minute. Although you can find software that does the same thing, it is unlikely that you can outsmart the big boys at this game, because they have super-fast internet connections and constant software maintenance.
  6. Some areas of the world have a surplus of wind, water or solar energy. In fact, there are regions where electricity is free.* Although regional governments would rather that this surplus be used to power homes and businesses (benefiting the local economy), electricity is fungible! And so, local entrepreneurs often “rent” out their cheap electricity by offering shelf space to miners from around the world. Individuals with free or cheap electricity (and some, with a cold climate to keep equipment cool) split this energy savings with the miner. This further stacks the deck against the guy with a fast PC in New York or Houston.

Of course, with Bitcoin generally rising in value (over the long term), this provides continued incentive to mine. It is the only thing that makes this game worthwhile to the individuals who participate.

So, while it is not impossible to profit by mining on a personal computer, if you don’t have very cheap power, the very latest specialized mining rigs, and the skills to constantly tweak your configuration—then your best bet is to join a reputable mining pool. Take your fraction of the mining rewards and let them take a small cut. Cash out frequently, so that you are not locked into their ability to resist hacking or remain solvent.

Related: Largest US operation mines 0.4% of daily Bitcoin rewards. Listen to the owner describe the effiiency of his ASIC processors and the enormous capacity he is adding. This will not produce more Bitcoin. The total reward rate is fixed and falling every 4 years. His build out will consume a massive amount of electricity, but it will only grab share from other miners—and encourage them to increase consuption just to keep up.


* Several readers have pointed out that they have access to “free power” in their office — or more typically, in a college dormitory. While this may be ‘free’ to the student or employee, it is most certainly not free. In the United States, even the most efficient mining, results in a 20 or 30% return on electric cost—and with the added cost of constant equipment updates. This is not the case for personal computers. They are sorely unprofitable…

So, for example, if you have 20 Intel computers cooking for 24 hours each day, you might receive $115 rewards at the end of a year, along with an electric bill for $3500. Long before this happens, you will have tripped the circuit breaker in your dorm room or received an unpleasant memo from your boss’s boss.


Bitcoin mining farms

  • Professional mining pool (above photo and top row below)
  • Amateur mining rigs (bottom row below)

This is what you are up against. Even the amateur mining operations depicted in the bottom row require access to very cheap electricity, the latest processors and the skill to expertly maintain hardware, software and the real-time, mining decision-process.


Philip Raymond co-chairs CRYPSA, hosts the New York Bitcoin Event and is keynote speaker at Cryptocurrency Conferences. He sits on the New Money Systems board of Lifeboat Foundation. Book a presentation or consulting engagement.