Toggle light / dark theme

Toward Unbreakable Quantum Encryption for Everyone

China hasn’t kept it a secret for many months now about the Chinese government desire to have an unbreakable quantum communication networks which is why they launched their Quantum Satellite (the QSS program) last month. What the real story is how QSS is enabling the military to have a leading edge through technologies such as the Quantum Radar capabilities, or using Quantum communications to prevent hacking of their systems while having the ability to hack others. And, this is what has actually been published publically to boot.


Hacked recently covered the efforts of the Chinese government to build unbreakable quantum communication networks. According to analysts, quantum communications networks are so expensive that they could have a “recentralizing effect,” enabling states to recover the ground that they have lost to decentralizing digital technologies. But what if ultra-secure quantum cryptography could be made available to everyone at low cost?

European researchers at the Institute of Photonic Sciences (ICFO), Institució Catalana de Recerca (ICREA), and other research labs, have developed a fast random number generator based on a quantum mechanical process that could deliver the world’s most secure encryption keys in a package tiny enough to use in a mobile device.

“We’ve managed to put quantum-based technology that has been used in high-profile science experiments into a package that might allow it to be used commercially,” says ICFO researcher Carlos Abellan in a press release of the Optical Society of America (OSA). “This is likely just one example of quantum technologies that will soon be available for use in real commercial products. It is a big step forward as far as integration is concerned.”

Quantum computing threatens the most sophisticated cybersecurity, says report

I am glad that more folks are beginning to start to understand the magnitude and depth of the risk & exposure that QC presents even within the next 4 to 5 years. However, what about everyone else? Folks need to understand that the transformation to QC in the infrastructure alone is a substantial investment and timeline. So, as I have highlighted many times; I hope folks have baked in QC into their future state architectures & investments because a transformation (depending on company size and complexity) could span many, many years.


The study purports there is a 50 per cent risk that many of the cybersecurity tools used by financial institutions, online retailers and government agencies will be obsolete by 2031.

September 6, 2016 by Canadian Manufacturing.com Staff.

China’s Quantum Satellite Experiments: Strategic And Military Implications – Analysis

Additional insights on QSS planned efforts; and (as with any government program) there is more to this program than these insights.


While China’s quantum science satellite (QSS) project is part of the Strategic Priority Programme on Space Science, the country’s first space exploration programme intended purely for scientific research, its experiments have significant military implications.

By Michael Raska

On August 16, 2016 China launched the world’s first quantum communications experiment satellite into orbit from the Jiuquan Satellite Launch Centre in the Gobi Desert. The small satellite, recently named Micius after an ancient Chinese philosopher, is tasked to establish a hack-proof communication line – a quantum key distribution network, while performing a series of quantum entanglement experiments in space for the first time.

Russia, China Collaborate On New eCommerce Site

This one makes me to want to dig more into the reason especially since just last week Russia announced its distrust of Chinese tech being used to hack into Russia’s governmental systems, etc. And, one thing about Russia and China is their protection and involvement in commerce and financials.


New trade routes are expanding between Russia and China. That’s according to Russia’s Far East Development Fund, which said an agreement has been made with Chinese technology company LeEco to develop an eCommerce platform focused on increasing food exportation to China.

LeLive, the name of the new platform, will broaden and increase sales of Russian agricultural items and products in the Chinese market. Facilitated by LeEco’s online platform — called “Le Ecosystem,” which has a monthly connection with more than 800 million users — the goal of the platform is to meet Chinese customers’ needs. Russian goods that will be available through the platform range from basics, like flour, butter and honey, to assorted beverages, sweets, canned meats and nuts.

China’s LeEco originally began as a digital content provider and recently acquired Vizio. Some have nicknamed LeEco the “Netflix of China.” Over time, LeEco expanded further into digital offerings, from music streaming, to mobile phones, to cloud storage, to film distribution.

Vint Cerf’s Outlook for the Internet He Helped Create

Internet pioneer Vint Cerf sees a secure future for the network of networks he helped create four decades ago as the co-developer of TCP/IP, the protocol that facilitates internet communications.

“We’re much more conscious of the need to make the system more secure than it has been,” Cerf, Google’s chief internet evangelist, says in an interview with Information Security Media Group. “And there’s a lot going on in the Internet Engineering Task Force [an international community of network designers, operators, vendors and researchers] to achieve that objective. And I anticipate in the course of the next decade or so that we will actually see a lot more mechanisms in place in order to enhance security and privacy and safety.”

But if internet security isn’t improved, Cerf says, “people will decide it’s not an environment they find worthy of trust, in which case they’ll look for something else. Maybe, something will replace the internet that’s more secure than it is today.”

Brain hi-jacking could become a reality soon, warn researchers

A very old story and one that myself and others have raised many times. However, worth repeating due to the current advancements in BMI.


A vulnerability of brain implants to cyber-security attacks could make “brainjacking”, which has been discussed in science fiction for decades, a reality, say researchers from the University of Oxford. Writing in The Conversation, an Australia-based non-profit media, Laurie Pycroft discussed brain implants as a new frontier of security threat.

The most common type of brain implant is the deep brain stimulation (DBS) system. It consists of implanted electrodes positioned deep inside the brain connected to wires running under the skin, which carry signals from an implanted stimulator.

The stimulator consists of a battery, a small processor, and a wireless communication antenna that allows doctors to programme it. In essence, it functions much like a cardiac pacemaker, with the main distinction being that it directly interfaces with the brain, Pycroft explained.

Letter: U.S. lags far behind China in quantum computing technology

The Wall Street Journal on Aug. 16 reported that China sent the world’s first quantum communications satellite into orbit. The newspaper also stated that China spent $101 billion in 2015 on quantum research and technology development. The satellite has the ability to greatly expand China’s ability to expand their unhackable communications.

Now we in the U.S. read almost daily about some U.S. computer system that has been hacked. Our current technology cannot be considered secure. So what is our government investing in?

According to the GAO, the U.S. spent over $10 billion on global climate change science and technology in 2014. Gave $400 million to Iran for who knows what, and spent about $200 million on quantum technology.

How quantum computers will change the world of hacking

There is a computing revolution coming, although nobody knows exactly when. What are known as “quantum computers” will be substantially more powerful than the devices we use today, capable of performing many types of computation that are impossible on modern machines.

But while faster computers are usually welcome, there are some computing operations that we currently rely on being hard (or slow) to perform.

Specifically, we rely on the fact that there are some codes that computers can’t break – or at least it would take them too long to break to be practical. Encryption algorithms scramble data into a form that renders it unintelligible to anyone that does not possess the necessary decryption key (normally a long string of random numbers).

China Sets New Tone in Drafting Cybersecurity Rules

I have been seeing this for the recent weeks; I find it interesting and another step in China’s own move to be a global leader of tech. Could be either good or bad in the longer term.


China is taking a more inclusive tack in instituting cybersecurity standards for foreign technology companies, allowing them to join a key government committee in an effort to ease foreign concerns over the controls.

The committee under the government’s powerful cyberspace administration is in charge of defining cybersecurity standards. For the first time, the body earlier this year allowed select foreign companies— Microsoft Corp. MSFT −0.39 %, Intel Corp. INTC 0.43 %, Cisco Systems Inc. CSCO 0.14 % and International Business Machines Corp.—to take an active part in drafting rules, rather than participating simply as observers, said people familiar with the discussions.

How much influence the foreign companies will have over committee deliberations remains to be seen, these people said. Over the past few months, the committee’s seven working groups—which focus on encryption, big data and other cybersecurity issues—have each met at least once.

Financial Networking Company Prepares for?Post-Quantum World

Interesting read on IPC Systems Inc. is partnering with U.K. startup Post-Quantum to (in their own words) “offer its clients encryption, biometric authentication and a distributed-ledger record-keeping system that the software company says is designed to resist hacking — even by a quantum computer.” — I will be researching this more.


(Bloomberg) — When it comes to cybersecurity, no one can accuse IPC Systems Inc., the New Jersey-based company that builds communications networks for trading firms and financial markets, of preparing to fight the last war.