БЛОГ

Archive for the ‘encryption’ category: Page 56

Oct 5, 2015

A quantum logic gate in silicon built for the for the first time (w/video)

Posted by in categories: computing, encryption, quantum physics, supercomputing

A Game Changer in Quantum Computing:
The ingredients for superfast computers could be nearly in place. For the first time, researchers have demonstrated that two silicon transistors acting as quantum bits can perform a tiny calculation.

The advance represents the final physical component needed to realise the promise of super-powerful silicon quantum computers, which harness the science of the very small — the strange behaviour of subatomic particles — to solve computing challenges that are beyond the reach of even today’s fastest supercomputers. Potentially transforming fields like encryption and the search for new pharmaceuticals.

Continue reading “A quantum logic gate in silicon built for the for the first time (w/video)” »

Oct 1, 2015

A Greater Giving Potential: Introducing Micro-Donations in Bytecoin

Posted by in categories: cryptocurrencies, disruptive technology, economics, encryption

Suggests a mechanism to be adopted for any
cryptocurrency that would alter the fee layer to
help fund a new public good.

From ABIS concept

In 2013, following a period of reflection and visioning, I imagined the possibility of completely altering the financial system as we know it. This vision, known as ABIS, will now see its first-ever implementation.

The implementation is now being issued in BCN’s GUI Wallet with the release of v. 1.0.8, where the transaction has been re-envisioned to allow the user new ways to explore the possibilities of transactions and realize greater giving potential, initially through two use cases involving unique forms of donations:

Continue reading “A Greater Giving Potential: Introducing Micro-Donations in Bytecoin” »

Sep 23, 2015

Scientists shatter distance record for teleporting quantum data

Posted by in categories: computing, encryption, internet, quantum physics

Quantum teleportation, the act of reconstructing quantum data somewhere else, is impressive just by itself. However, scientists at the US’ National Institute of Standards and Technology have managed to one-up that feat. They’ve broken the distance record for quantum teleportation by transferring the information from one photon to another across 63 miles of optical fiber. That may not sound like much, but it’s an achievement just to beam that data in the first place — 99 percent of photons would never make the complete trip. It was only possible thanks to newer detectors that could pick up the faint signal of the lone light particle.

You’d clearly need to send much more information before this teleportation becomes practical, but the achievement does open the door to many possibilities in quantum computing. You could use unbreakable quantum encryption at inter-city distances, for instance. The biggest challenge may simply be to extend the range to the point where quantum data transfers work on the scale of the internet, where there are occasionally thousands of miles between connections.

[Image credit: Getty Images/iStockphoto].

Read more

Sep 22, 2015

Shades of ‘Star Trek’? Quantum Teleportation Sets Distance Record

Posted by in categories: encryption, internet, quantum physics

You’ve gotta love Star Trek, but there is absolutely NO WAY I’d ever set foot in a real teleportation device! (if one ever really got made, of course) Call me crazy, but I’m kinda partial to keeping my molecular cohesion as intact as possible, which kinda rules out having it ripped apart and remade on the other side.


A record-breaking distance has been achieved in the bizarre world of quantum teleportation, scientists say.

The scientists teleported photons (packets of light) across a spool of fiber optics 63 miles (102 kilometers) long, four times farther than the previous record. This research could one day lead to a “quantum Internet” that offers next-generation encryption, the scientists said.

Continue reading “Shades of ‘Star Trek’? Quantum Teleportation Sets Distance Record” »

Sep 20, 2015

Snowden says aliens could be trying to get in touch right now

Posted by in categories: alien life, encryption

Technically Incorrect: In a conversation with Neil DeGrasse Tyson, the Moscow-based NSA whistleblower offers his views on interplanetary communication. He fears their communication may be encrypted, so we’re missing it.

Read more

Sep 20, 2015

The Search for Extraterrestrial Life and Encrypted Space Communication

Posted by in categories: alien life, encryption, existential risks, information science


Neil deGrasse Tyson and Edward Snowden recently discussed the idea that encryption mechanisms with advanced extraterrestrial species and humans could theoretically render communication as indistinguishable from cosmic background radiation. With only a short period of time in a species growth where open communication is broadcast to the stars (through the sluggish and primitive nature of radio broadcasts), this could prevent us (or other species) from making contact with one another.

With the Drake Equation stating a high probability of communicative extraterrestrial civilizations and the contrasting Fermi Paradox citing lacking evidence of such, it begs the question of whether outlying reasons have an impact. In my opinion, the Drake Equation rings true in the sense that hundreds of billions of stars exist in our galaxy alone (many with their own diverse planetary bodies), setting the stage for extraterrestrial life to disavow itself as insatiable ramblings. Unlike that which is eminent in the Fermi Paradox, I believe, in this case, a conclusion based off of inductive reasoning seems to hold more water than an evidence-only approach.

Keeping in mind the discussion in The Guardian article, a flaw of the Fermi Paradox’s evidence-based perspective should become apparent: secure, encrypted communication (cloaked by design) would render the existence of extraterrestrial intelligence invisible to the prying ear. If intentional, there could be many reasons for withholding this whereabouts of a species location. An abstract theory from science fiction may itself hold a degree of truth. An example of which, is the video game series ‘Mass Effect,’ where an advanced, sentient machine-race cleanse the galaxy of advanced life every 40,000 years. The reasoning for doing so is to “bring order to chaos” and for reasons “unfathomable.” Be it for an abstract reason such as this or simply for secure communication, the encryption of the resultant transmission’s presence wouldn’t register as noticeable to any observers. As nearly all signs of outside life would be mute, it then lays in the other senses that hold the most promise of enlightenment.

Read more

Sep 16, 2015

New quantum dot could make quantum communications possible

Posted by in categories: encryption, quantum physics

Real world quantum encryption and communication may just have gotten a whole lot closer, with a new super-accurate quantum dot.

Read more

Sep 4, 2015

The 10 Algorithms That Dominate Our World

Posted by in categories: computing, encryption, information science

1. Google Search.

2. Facebook’s News Feed.

Continue reading “The 10 Algorithms That Dominate Our World” »

Aug 20, 2015

Tech’s Biggest Ideas and How They Take Hold — With Marc Andreessen and Dan Siroker | Andreessen Horowitz

Posted by in categories: augmented reality, biotech/medical, cryptocurrencies, encryption, internet, mobile phones, polls, robotics/AI, transparency, virtual reality

https://soundcloud.com/a16z/a16z-podcast-techs-big-ideas-and…andreessen

Aug 18, 2015

Cryptographers Develop Encryption Method Resistant to Future Quantum Attacks

Posted by in categories: computing, encryption, internet, quantum physics

Cryptographers are working on new encryption methods able to protect today’s Internet communications from future quantum computers that can be able to break today’s cryptography techniques. The researchers have developed upgrades to the Internet’s core encryption protocol that will prevent quantum computer users from intercepting Internet communications.

Read more

Page 56 of 58First5152535455565758