Toggle light / dark theme

Before delving into the prospects of the Fifth Industrial Revolution, let’s reflect on the legacy of its predecessor. The Fourth Industrial Revolution, characterised by the fusion of digital, physical, and biological systems, has already transformed the way we live and work. It brought us AI, blockchain, the Internet of Things, and more. However, it also raised concerns about automation’s impact on employment and privacy, leaving us with a mixed legacy.

The promise of the Fifth Industrial Revolution.

The Fifth Industrial Revolution represents a quantum leap forward. At its core, it combines AI, advanced biotechnology, nanotechnology, and quantum computing to usher in a new era of possibilities. One of its most compelling promises is the extension of human life. With breakthroughs in genetic engineering, regenerative medicine, and AI-driven healthcare, we are inching closer to not just treating diseases but preventing them altogether. It’s a vision where aging is not an inevitability, but a challenge to overcome.

When the theoretical physicist Leonard Susskind encountered a head-scratching paradox about black holes, he turned to an unexpected place: computer science. In nature, most self-contained systems eventually reach thermodynamic equilibrium… but not black holes. The interior volume of a black hole appears to forever expand without limit. But why? Susskind had a suspicion that a concept called computational complexity, which underpins everything from cryptography to quantum computing to the blockchain and AI, might provide an explanation.

He and his colleagues believe that the complexity of quantum entanglement continues to evolve inside a black hole long past the point of what’s called “heat death.” Now Susskind and his collaborator, Adam Brown, have used this insight to propose a new law of physics: the second law of quantum complexity, a quantum analogue of the second law of thermodynamics.

Also appearing in the video: Xie Chen of CalTech, Adam Bouland of Stanford and Umesh Vazirani of UC Berkeley.

00:00 Intro to a second law of quantum complexity.
01:16 Entropy drives most closed systems to thermal equilibrium. Why are black holes different?
03:34 History of the concept of “entropy” and “heat death“
05:01 Quantum complexity and entanglement might explain black holes.
07:32 A turn to computational circuit complexity to describe black holes.
08:47 Using a block cipher and cryptography to test the theory.
10:16 A new law of physics is proposed.
11:23 Embracing a quantum universe leads to new insights.
12:20 When quantum complexity reaches an end…the universe begins again.

Thumbnail / title card image designed by Olena Shmahalo.

- VISIT our Website: https://www.quantamagazine.org.

Google and Twitter ads are promoting sites containing a cryptocurrency drainer named ‘MS Drainer’ that has already stolen $59 million from 63,210 victims over the past nine months.

According to blockchain threat analysts at ScamSniffer, they discovered over ten thousand phishing websites using the drainer from March 2023 to today, with spikes in the activity observed in May, June, and November.

A drainer is a malicious smart contract or, in this case, a complete phishing suite designed to drain funds from a user’s cryptocurrency wallet without their consent.

Zero-knowledge proof (ZKP) is a cryptographic tool that allows for the verification of validity between mutually untrusted parties without disclosing additional information. Non-interactive zero-knowledge proof (NIZKP) is a variant of ZKP with the feature of not requiring multiple information exchanges. Therefore, NIZKP is widely used in the fields of digital signature, blockchain, and identity authentication.

Since it is difficult to implement a true random number generator, deterministic pseudorandom number algorithms are often used as a substitute. However, this method has potential security vulnerabilities. Therefore, how to obtain true random numbers has become the key to improving the security of NIZKP.

In a study published in PNAS, a research team led by Prof. Pan Jianwei and Prof. Zhang Qiang from the University of Science and Technology of China (USTC) of the Chinese Academy of Sciences, and the collaborators, realized a set of random number beacon public services with device-independent quantum as entropy sources and post-quantum cryptography as identity authentication.

This video explores the future of the world from 2030 to 10,000 A.D. and beyond…Watch this next video about the Technological Singularity: https://youtu.be/yHEnKwSUzAE.
🎁 5 Free ChatGPT Prompts To Become a Superhuman: https://bit.ly/3Oka9FM
🤖 AI for Business Leaders (Udacity Program): https://bit.ly/3Qjxkmu.
☕ My Patreon: https://www.patreon.com/futurebusinesstech.
➡️ Official Discord Server: https://discord.gg/R8cYEWpCzK

0:00 2030
12:40 2050
39:11 2060
49:57 2070
01:04:58 2080
01:16:39 2090
01:28:38 2100
01:49:03 2200
02:05:48 2300
02:20:31 3000
02:28:18 10,000 A.D.
02:35:29 1 Million Years.
02:43:16 1 Billion Years.

SOURCES:
https://www.futuretimeline.net.
• The Singularity Is Near: When Humans Transcend Biology (Ray Kurzweil): https://amzn.to/3ftOhXI
• The Future of Humanity (Michio Kaku): https://amzn.to/3Gz8ffA
• AI 2041: 10 Visions of Our Future (Kai-Fu Lee & Chen Qiufan): https://amzn.to/3bxWat6
• Tim Ferriss Podcast [Chris Dixon and Naval Ravikant — The Wonders of Web3, How to Pick the Right Hill to Climb, Finding the Right Amount of Crypto Regulation, Friends with Benefits, and the Untapped Potential of NFTs (542)]: https://tim.blog/2021/10/28/chris-dixon-naval-ravikant/
https://2050.earth/
https://research.aimultiple.com/artificial-general-intellige…ty-timing/
https://mars.nasa.gov/mars2020/spacecraft/rover/communications/
https://www.forbes.com/sites/tomtaulli/2020/08/14/quantum-co…3acd9f3b4c.
https://cointelegraph.com/news/tales-from-2050-a-look-into-a-world-built-on-nfts.
https://medium.com/theblockchainu/a-day-in-life-of-a-cryptoc…a07649f14d.
https://botland.store/blog/story-of-the-internet-from-web-1&…b-4-0/
https://www.analyticsinsight.net/light-based-computer-chips-…h-photons/
https://www.wired.com/story/chip-ai-works-using-light-not-electrons/
https://www.science.org/content/article/light-based-memory-c…store-data.

💡 Future Business Tech explores the future of technology and the world.

Examples of topics I cover include:
• Artificial Intelligence & Robotics.
• Virtual and Augmented Reality.
• Brain-Computer Interfaces.
• Transhumanism.
• Genetic Engineering.

SUBSCRIBE: https://bit.ly/3geLDGO

As part of pioneering the security of satellite communication in space, NASA is funding a groundbreaking project at the University of Miami’s Frost Institute for Data Science and Computing (IDSC) which will enable augmenting traditional large satellites with nanosatellites or constellations of nanosatellites.

These nanosatellites are designed to accomplish diverse goals, ranging from communication and weather prediction to Earth science research and observational data gathering. Technical innovation is a hallmark of NASA, a global leader in the development of novel technologies that enable US space missions and translate to a wide variety of applications from Space and Earth science to consumer goods and to national and homeland security.

With advances in satellite technology and reduced cost of deployment and operation, nanosatellites also come with significant challenges for the protection of their communication networks. Specifically, small satellites are owned and operated by a wide variety of public and private sector organizations, expanding the attack surface for cyber exploitation. The scenario is similar to Wi-Fi network vulnerabilities. These systems provide an opportunity for adversaries to threaten national security as well as raise economic concerns for satellite companies, operators, and users.

One of the most high-profile blockchain systems in traditional banking has added a new feature that lets companies shift cash automatically.

JPMorgan Chase & Co’s JPM Coin now allows clients to program their accounts by plugging in a set of key conditions, enabling them to move funds to cover overdue payments and margin calls. Further down the line, it may help them seize on differences in exchange rates.

Germany’s Siemens AG used the system this week, configuring its accounts to transfer money to fill potential shortfalls, Naveen Mallela, head of Coin Systems at JPMorgan’s blockchain division Onyx, said in an interview.

The development arrives days after Elastic Security Labs disclosed the Lazarus Group’s use of a new macOS malware called KANDYKORN to target blockchain engineers.

Also linked to the threat actor is a macOS malware referred to as RustBucket, an AppleScript-based backdoor that’s designed to retrieve a second-stage payload from an attacker-controlled server.

In these attacks, prospective targets are lured under the pretext of offering them investment advice or a job, only to kick-start the infection chain by means of a decoy document.

It’s strange times we’re living in when a blockchain billionaire, not the usual Big Tech suspects, is the one supplying the compute capacity needed to develop generative AI.

It was revealed yesterday that Jed McCaleb, the co-founder of blockchain startups Stellar, Ripple and Mt Gox and aerospace company Vast, launched a 501©(3) nonprofit that purchased 24,000 Nvidia H100 GPUs to build data centers that’ll lease capacity to AI projects.

Already, the cluster of GPUs — worth an estimated half a billion dollars and among the largest in the world — is being used by startups Imbue and Character.ai for AI model experimentation, claims Eric Park, the CEO of a newly formed organization, Voltage Park, that’s charged with running and managing the data centers.

‘Etherhiding’ Blockchain Technique Hides Malicious Code in WordPress Sites: https://informatech.co/3S3tw


A threat actor has been abusing proprietary blockchain technology to hide malicious code in a campaign that uses fake browser updates to spread various malware, including the infostealers RedLine, Amadey, and Lumma.

While abuse of blockchain is typically seen in attacks aimed at stealing cryptocurrency — as the security technology is best known for protecting these transactions — EtherHiding demonstrates how attackers can leverage it for other types of malicious activity.

Researchers from Guardio have been tracking a campaign dubbed ClearFake over the last two months in which users are misled into downloading malicious fake browser updates from at least 30 highjacked WordPress sites.