Toggle light / dark theme

This is so exciting.


The transfer of data using quantum communications is considered impenetrable due to a particle phenomenon known as quantum entanglement, with eavesdroppers unable to monitor the transfer without altering the quantum state and thereby being detected. In theory, two parties can communicate in secret by sharing an encryption key encoded in a string of photons.

China’s big-spending quantum research initiative, part of Beijing’s broader multi-billion dollar strategy to overtake the West in science and space research, is being closely watched in global scientific research and security circles, with groups from Canada, Japan, Singapore and Europe also planning their own quantum space experiments.

Read more

Like this article; there is 2 more pieces missing from the roadmap for 2010 & beyond and that is Biocomputing & Singularity. Biocomputing will provide the financial industry (banks, trading firms, accounting & audit firms, bond insurers, etc.) the ability to expand information/ data storage and transmission capacities like we have never see before just look at what Microsoft, Google, Amazon, etc. have done with DNA storage. And, the much loved Singularity enables boosting of knowledge and insights as well as more mobility and access to information as they need it. BTW — Biometrics is NOT the same as Biocomputing; biocomputing goes well beyond security/ identity management.


The influential non-profit rates these technologies alongside the PC, the internet, and smartphones in terms of their potential to transform financial…

Read more

Got visitors coming in 2 days to check out your IT operations and need a data center popped up quickly to show off in front of the potential customers; well, now you can do it in 29 hours.


Defense team sets up AI-based security for the Cyber Grand Challenge.

The US Defense Advanced Research Projects Agency (DARPA) has knocked up a small, liquid cooled data center in just 29 hours ahead of the Cyber Grand Challenge (CGC).

Taking place on August 4, CGC aims to test the possibility of using artificial intelligence security systems that can find and patch security holes without human intervention.

Read more

Article repeats a lot of the knowns on QC such as bit v. Qubit; and finally provides some good info on pros and cons of Bitcoin and Lamport signatures technique with QC. However, the author didn’t seem to mention any of the work that D-Wave for example is doing with Block chaining. Also, I saw no mention of the work by Oxford on the logic gate which improve both the information processing performance and the security of information transmissions.


In a classical computer bits are used that can either be 0 or 1. In a quantum computer these bits are replaced with Qubits (quantum bits). These Qubits can be 0 or 1, or both at the same time. This is caused by a phenomenon in the quantum realm called superposition. At scales the size of an atom and small molecules, the spin of particles is not determined until it is observed. A pair of Qubits can be in any quantum superposition of 4 states, and three Qubits in any superposition of 8 states. In general, a quantum computer with n Qubits can be in a superposition of up to 2^n different states simultaneously (this compares to a normal computer that can only be in one of these 2^n states at any one time). Because of this, a quantum computer is able to perform computations at the same time, while classical computers perform computations one at a time.

This effectively means that the computing power grows exponentially for each Qubit you add to the system. A quantum computer will be able to make really difficult calculations all the classical computers in the world together would not be able to do before the end of times, in a relatively short amount of time. This opens to world of computing to be able to perform amazingly complex calculations, such as weather or large scale quantum mechanics, with extremely high precision. Unfortunatly, it will also be great at cracking certain types of cryptography.

Read more

LAS VEGAS, Nev. — Mayhem ruled the day when seven AIs clashed here last week — a bot named Mayhem that, along with its competitors, proved that machines can now quickly find many types of security vulnerabilities hiding in vast amounts of code.

Sponsored by the Defense Advanced Research Projects Agency, or DARPA, the first-of-its-kind contest sought to explore how artificial intelligence and automation might help find security and design flaws that bad actors use to penetrate computer networks and steal data.

Mayhem, built by the For All Secure team out of Carnegie Mellon University, so outclassed its competition that it won even though it was inoperable for about half of the contest’s 96 270-second rounds. Mayhem pivoted between two autonomous methods of finding bugs and developing ways to exploit them.

Read more

I will like to see how this stacks against China’s Quantum net, QC platform, AI, and hackers in the future. Not sold at this point until we truly have a QC infrastructure in place.


At DARPA’s Cyber Grand Challenge, bots showed off their ability to help a world wallowing in vulnerable code.

LAS VEGAS, Nev. — Mayhem ruled the day when seven AIs clashed here last week — a bot named Mayhem that, along with its competitors, proved that machines can now quickly find many types of security vulnerabilities hiding in vast amounts of code.

Sponsored by the Defense Advanced Research Projects Agency, or DARPA, the first-of-its-kind contest sought to explore how artificial intelligence and automation might help find security and design flaws that bad actors use to penetrate computer networks and steal data.

Read more

The ultimate test of wits in computer security occurs through open competition on the global Capture the Flag (CTF) tournament circuit. In CTF contests, experts reverse engineer software, probe its weaknesses, search for deeply hidden flaws, and create securely patched replacements.

On August 4, 2016, DARPA will hold the Cyber Grand Challenge, the world’s first all-computer CTF tournament. It will take place live on stage co-located with the DEF CON conference in Las Vegas. The public is invited to attend and observe as automated systems take the first steps towards a defensible, connected future.

Learn more about the Cyber Grand Challenge at: http://www.cybergrandchallenge.com/.

#DARPACGC

Read more

If human beings are ever to colonise other planets – which might become necessary for the survival of the species, given how far we have degraded this one – they will almost certainly have to use generation ships: spaceships that will support not just those who set out on them, but also their descendants. The vast distances between Earth and the nearest habitable planets, combined with the fact that we are unlikely ever to invent a way of travelling that exceeds the speed of light, ensures that many generations will be born, raised and die on board such a ship before it arrives at its destination.

A generation ship would have to be a whole society in microcosm, with hospitals and schools, living quarters and perhaps entertainment districts, a security force, maybe even a judiciary. It would need to be able to provide food for its crew, and that might require agriculture or aquaculture, perhaps even domestic animals (which might also be needed for the colonisation effort). Its design therefore presents a major challenge: not just to engineers but also to social scientists. How should the crew be selected and the environment structured to minimise interpersonal conflict? What size of population is optimal for it to remain committed to the single overarching project of colonising a new planet without too much of a risk of self-destructive boredom or excessive narrowing of the gene pool? Does mental health require that a quasi-natural environment be recreated within the ship (with trees, grass and perhaps undomesticated birds and small animals)?

As well as the technological and social challenges confronting the designers of such ships, there are fascinating philosophical and ethical issues that arise. The issue I want to focus on concerns the ethics of a project that locks the next generation into a form of living, the inauguration of which they had no say over, and that ensures their options are extremely limited.

Read more

Could this help on the whole IoT security challenge — TBD.


A $9.4 million grant from the Defense Advanced Research Projects Agency (DARPA) could lead to development of a new technique for wirelessly monitoring Internet of Things (IoT) devices for malicious software – without affecting the operation of the ubiquitous but low-power equipment.

The technique will rely on receiving and analyzing side-channel signals, electromagnetic emissions that are produced unintentionally by the electronic devices as they execute programs. These signals are produced by semiconductors, capacitors, power supplies and other components, and can currently be measured up to a half-meter away from operating IoT devices.

By comparing these unintended side-channel emissions to a database of what the devices should be doing when they are operating normally, researchers can tell if malicious software has been installed.

Read more