БЛОГ

Archive for the ‘encryption’ category: Page 35

Mar 23, 2018

Artist Hides Secret Code to $10,000 Worth of Cryptocurrencies in Lego Artworks

Posted by in categories: bitcoin, cryptocurrencies, encryption, information science, space

It has no inherent value and causes observers to rotate between feelings of fascination and anger. We’re talking about cryptocurrency, but also art. In a new series, artist Andy Bauch is bringing the two subjects together with works that use abstract patterns constructed in Lego bricks. Each piece visually represents the private key to a crypto-wallet, and anyone can steal that digital cash—if you can decode them.

Bauch first started playing around with cryptocurrencies in 2013 and told us in an interview that he considers himself an enthusiast but not a “rabid promoter” of the technology. “I wasn’t smart enough to buy enough to have fuck-you money,” he said. In 2016, he started to integrate his Bitcoin interest with his art practice.

His latest series of work, New Money, opens at LA’s Castelli Art Space on Friday. Bauch says that each piece in the series “is a secret key to various types of cryptocurrency.” He bought various amounts of Bitcoin, Litecoin, and other alt-coins in 2016 and put them in different digital wallets. Each wallet is encrypted with a private key that consists of a string of letters and numbers. That key was initially fed into an algorithm to generate a pattern. Then Bauch tweaked the algorithm here and there to get it to spit out an image that appealed to him. After finalizing the works, he’s rigorously tested them in reverse to ensure that they do, indeed, give you the right private key when processed through his formula.

Continue reading “Artist Hides Secret Code to $10,000 Worth of Cryptocurrencies in Lego Artworks” »

Mar 18, 2018

The power of quantum technology in 2018

Posted by in categories: computing, encryption, quantum physics

The power of quantum technology in 2018: how does this develop nowadays

Quantum technology is a new field in physics, derived from quantum physics and, especially, quantum mechanics and it transposes their principles into every day use applications such as quantum computers, quantum cryptography or quantum imaging. Ever since the study of quantum technology has been taking very seriously across the globe, a lot of new technologies and applications were developed to make our lives easier, faster and more secure.

Quantum technology still needs to be promoted.

Read more

Mar 13, 2018

What CISOs Should Know About Quantum Computing

Posted by in categories: computing, encryption, quantum physics

As quantum computing approaches real-world viability, it also poses a huge threat to today’s encryption measures.

Previous

1 of 11.

Continue reading “What CISOs Should Know About Quantum Computing” »

Feb 26, 2018

Chinese satellite uses quantum cryptography for secure video conference between continents

Posted by in categories: encryption, quantum physics, satellites

Quantum cryptography has never been possible over long distances. But the first quantum communications satellite is rewriting the record books.

    Read more

    Jan 31, 2018

    A Chinese satellite just used quantum cryptography to make an unhackable video call between Beijing and Vienna

    Posted by in categories: cybercrime/malcode, encryption, quantum physics, space

    The Chinese “Micius” satellite has successfully set up the world’s most secure video conference, using quantum cryptography to connect scientists in Europe and China for an unhackable, intercontinental chat.

    The feat marks another milestone for the satellite, officially called Quantum Experiments at Space Scale (QESS), which only last year was making headlines for transmitting an “unbreakable” quantum code to the Earth’s surface.

    Read more

    Jan 21, 2018

    In Space and Cyber, China is Closing In on the United States

    Posted by in categories: encryption, robotics/AI, satellites, security

    WASHINGTON — It should be no surprise that China is moving to challenge the United States for dominance in space, cyber, artificial intelligence and other key technologies that have wide national security applications. But the question that is still being debated is whether the United States is taking this threat seriously.

    This may not be a Sputnik moment, but the United States could soon be unpleasantly surprised as China continues to shore up its domestic capacity to produce high-end weapons, satellites and encryption technologies, a panel of analysts told the House Armed Services emerging threats and capabilities subcommittee.

    At the Tuesday hearing, Subcommittee Chairman Rep. Elise Stefanik, R-N.Y., said lawmakers are not entirely convinced that China’s dominance in many technology sectors is a “foregone conclusion.” But the committee does believe that China’s technological accomplishments should inform U.S. policies and defense investments. [The Most Dangerous Space Weapons Concepts Ever].

    Continue reading “In Space and Cyber, China is Closing In on the United States” »

    Jan 21, 2018

    .com Launches Bitcoin Cash Notary Service

    Posted by in categories: bitcoin, encryption

    Back in April of 2017 Bitcoin.com launched a notary service that was based on top of the bitcoin core (BTC) blockchain. However, due to the transaction bottleneck and extremely high fees, the notary service became unsustainable. Now Bitcoin.com has re-launched the notary using the bitcoin cash (BCH) blockchain, and anyone in the world can prove ownership for only 0.0005 BCH (about $0.97).

    Also read: Lots of Optimism at the Miami Bitcoin Conference This Week

    This week Bitcoin.com has re-launched the blockchain-based notary service that was once tethered to the bitcoin core blockchain. Unfortunately, the service did not work correctly because of transaction backlog, and high network fees to verify documents. Now the infrastructure is tied to the bitcoin cash blockchain making document verification extremely cheap, and fees are practically non-existent. Right now a user can upload a document for only 0.0005 BCH ($0.97), and the network transaction fee is less than a penny. (It’s important to note that records don’t actually “exist” on the chain per say, it is merely timestamped encrypted data that is tied to the file that’s processed into a valid BCH transaction.) Not only that but the proof will be verified in less than ten minutes, and you can rest assure the notarization service will be validated.

    Continue reading “.com Launches Bitcoin Cash Notary Service” »

    Jan 19, 2018

    Real-world intercontinental quantum communications enabled by the Micius satellite

    Posted by in categories: encryption, internet, mathematics, quantum physics, security, space

    A joint China-Austria team has performed quantum key distribution between the quantum-science satellite Micius and multiple ground stations located in Xinglong (near Beijing), Nanshan (near Urumqi), and Graz (near Vienna). Such experiments demonstrate the secure satellite-to-ground exchange of cryptographic keys during the passage of the satellite Micius over a ground station. Using Micius as a trusted relay, a secret key was created between China and Europe at locations separated up to 7,600 km on the Earth.

    Private and secure communications are fundamental for Internet use and e-commerce, and it is important to establish a secure network with global protection of data. Traditional public key cryptography usually relies on the computational intractability of certain mathematical functions. In contrast, quantum key distribution (QKD) uses individual light quanta (single photons) in quantum superposition states to guarantee unconditional security between distant parties. Previously, the quantum communication distance has been limited to a few hundred kilometers due to optical channel losses of fibers or terrestrial free space. A promising solution to this problem exploits satellite and space-based links, which can conveniently connect two remote points on the Earth with greatly reduced channel loss, as most of the photons’ propagation path is through empty space with negligible loss and decoherence.

    A cross-disciplinary multi-institutional team of scientists from the Chinese Academy of Sciences, led by Professor Jian-Wei Pan, has spent more than 10 years developing a sophisticated satellite, Micius, dedicated to quantum science experiments, which was launched on August 2016 and orbits at an altitude of ~500 km. Five ground stations in China coordinate with the Micius satellite. These are located in Xinglong (near Beijing), Nanshan (near Urumqi), Delingha (37°22’44.43’‘N, 97°43’37.01” E), Lijiang (26°41’38.15’‘N, 100°1’45.55’‘E), and Ngari in Tibet (32°19’30.07’‘N, 80°1’34.18’‘E).

    Continue reading “Real-world intercontinental quantum communications enabled by the Micius satellite” »

    Jan 12, 2018

    The Future of Military IT: Gait Biometrics, Software Nets, and Photon Communicators

    Posted by in categories: encryption, military, privacy

    DISA director Lt. Gen. Alan Lynn talks about the tech he’s eyeing, some of which is barely out of the theoretical realm.

    Tomorrow’s soldiers will wield encrypted devices that unlock to their voices, or even their particular way of walking, and communicate via ad-hoc, software-defined networks that use not radio waves but light according to Lt. Gen. Alan Lynn, who leads the Defense Information Systems Agency, the U.S. military’s IT provider. On Tuesday, Lynn talked about next-generation technologies that DISA is looking into, some of which are barely experimental today.

    Here are few of the key areas:

    Continue reading “The Future of Military IT: Gait Biometrics, Software Nets, and Photon Communicators” »

    Jan 11, 2018

    Tougher WiFi security will keep you safe at the coffee shop

    Posted by in categories: encryption, habitats, internet, security, wearables

    WiFi security hasn’t changed much since WPA2 came to be in 2004, and that’s becoming increasingly apparent when public hotspots are frequently risky and glaring exploits are all too common. It’s about to get a long-due upgrade, though: the Wi-Fi Alliance plans to roll out a WPA3 standard that addresses a number of weak points. For many, the highlight will be individualized data encryption. Even if you’re on an open public network, you won’t have to worry quite so much about someone snooping on your data.

    You’ll also see safeguards even when people have terrible passwords, and a simplified security process for devices that have either a tiny display or none at all (say, wearable devices or smart home gadgets). And companies or governments that need stricter security will have access to a 192-bit security suite.

    WPA3 should arrive sometime in 2018, and comes on the back of other improvements like more thorough testing to catch potential vulnerabilities before they require emergency patches. These initiatives aren’t going to guarantee airtight security when you’re at the coffee shop, but they could at least eliminate some of WiFi’s more worrying flaws.

    Continue reading “Tougher WiFi security will keep you safe at the coffee shop” »

    Page 35 of 54First3233343536373839Last