IDQ’s QRNG chip is available in six models, depending on size, performance, power consumption and certifications, in order to fit various industry-specific needs. All IDQ QRNG chips have received NIST Entropy Source Validation (ESV) certification on the independently and identically distributed (IID) entropy estimation track SP 800-90B.
ID Quantique is the first company to achieve an ESV certificate with a quantum entropy source and IID estimation track. Such randomness provides the most trusted random keys for encryption. Since October 2022 it has been mandatory for cryptographic modules aiming for FIPS 140–3 certification to have an ESV validated entropy source. This ESV IID Certificate #63 will also facilitate IDQ’s customers who integrate IDQ’s Chips into their own devices to go through the NIST’s Cryptographic Module Validation Program (CMVP).
New cadets. New era. Infinite possibilities. Catch a new episode of Star Trek: Starfleet Academy every Thursday starting Jan. 15th on Paramount+.
Can quantum tunneling occur at macroscopic scales? Neil deGrasse Tyson and comedian Chuck Nice sit down with John Martinis, UCSB physicist and 2025 Nobel Prize winner in Physics, to explore superconductivity, quantum tunneling, and what this means for the future of quantum computing.
What exactly is macroscopic quantum tunneling, and why did it take decades for its importance to be recognized? We’ve had electrical circuits forever, so what did Martinis discover that no one else saw? If quantum mechanics usually governs tiny particles, why does a superconducting circuit obey the same rules? And what does superconductivity really mean at a quantum level?
How can a system cross an energy barrier it doesn’t have the energy to overcome? What is actually tunneling in a superconducting wire, and what does it mean to tunnel out of superconductivity? We break down Josephson Junctions, Cooper pairs, and other superconducting lingo. Does tunneling happen instantly, or does it take time? And what does that say about wavefunction collapse and our assumptions about instantaneous quantum effects?
Learn what a qubit is and why macroscopic quantum effects are important for quantum computing. Why don’t quantum computers instantly break all encryption? How close are we to that reality, and what replaces today’s cryptography when it happens? Is quantum supremacy a scientific milestone, a geopolitical signal, or both? Plus, we take cosmic queries from our audience: should quantum computing be regulated like nuclear energy? Will qubits ever be stable enough for everyday use? Will quantum computers live in your pocket or on the dark side of the Moon? Can quantum computing supercharge AI, accelerate discovery, or even simulate reality itself? And finally: if we live in a simulation, would it have to be quantum all the way down?
Thanks to our Patrons Fran Rew, Shawn Martin, Kyland Holmes, Samantha McCarroll-Hyne, camille wilson, Bryan, Sammi, Denis Alberti, Csharp111, stephanie woods, Mark Claassen, Joan Tarshis, Abby Powell, Zachary Koelling, JWC, Reese, Fran Ochoa, Bert Berrevoets, Barely A Float Farm, Vasant Shankarling, Michael Rodriguez, DiDTim, Ian Cochrane, Brendan, William Heissenberg Ⅲ, Carl Poole, Ryan McGee, Sean Fullard, Our Story Series, dennis van halderen, Ann Svenson, mi ti, Lawrence Cottone, 123, Patrick Avelino, Daniel Arvay, Bert ten Kate, Kristian Rahbek, Robert Wade, Raul Contreras, Thomas Pring, John, S S, SKiTz0721, Joey, Merhawi Gherezghier, Curtis Lee Zeitelhack, Linda Morris, Samantha Conte, Troy Nethery, Russ Hill, Kathy Woida, Milimber, Nathan Craver, Taylor Anderson, Deland Steedman, Emily Lennox, Daniel Lopez,., DanPeth, Gary, Tony Springer, Kathryn Rhind, jMartin, Isabella Troy Brazoban, Kevin Hobstetter, Linda Pepper, 1701cara, Isaac H, Jonathan Morton, JP, טל אחיטוב Tal Achituv, J. Andrew Medina, Erin Wasser, Evelina Airapetova, Salim Taleb, Logan Sinnett, Catherine Omeara, Andrew Shaw, Lee Senseman, Peter Mattingly, Nick Nordberg, Sam Giffin, LOWERCASEGUY, JoricGaming, Jeffrey Botkin, Ronald Hutchison, and suzie2shoez for supporting us this week.
Metastasis remains the leading cause of death in most cancers, particularly colon, breast and lung cancer. Currently, the first detectable sign of the metastatic process is the presence of circulating tumor cells in the blood or in the lymphatic system. By then, it is already too late to prevent their spread. Furthermore, while the mutations that lead to the formation of the original tumors are well understood, no single genetic alteration can explain why, in general, some cells migrate and others do not.
“The difficulty lies in being able to determine the complete molecular identity of a cell – an analysis that destroys it – while observing its function, which requires it to remain alive,” explains the senior author. “To this end, we isolated, cloned and cultured tumor cells,” adds a co-first author of the study. “These clones were then evaluated in vitro and in a mouse model to observe their ability to migrate through a real biological filter and generate metastases.”
The analysis of the expression of several hundred genes, carried out on about thirty clones from two primary colon tumors, identified gene expression gradients closely linked to their migratory potential. In this context, accurate assessment of metastatic potential does not depend on the profile of a single cell, but on the sum of interactions between related cancer cells that form a group.
The gene expression signatures obtained were integrated into an artificial intelligence model developed by the team. “The great novelty of our tool, called ‘Mangrove Gene Signatures (MangroveGS)’, is that it exploits dozens, even hundreds, of gene signatures. This makes it particularly resistant to individual variations,” explains another co-first author of the study. After training, the model achieved an accuracy of nearly 80% in predicting the occurrence of metastases and recurrence of colon cancer, a result far superior to existing tools. In addition, signatures derived from colon cancer can also predict the metastatic potential of other cancers, such as stomach, lung and breast cancer.
After training, the model achieved an accuracy of nearly 80% in predicting the occurrence of metastases and recurrence of colon cancer, a result far superior to existing tools. In addition, signatures derived from colon cancer can also predict the metastatic potential of other cancers, such as stomach, lung and breast cancer.
Thanks to MangroveGS, tumor samples are sufficient: cells can be analysed and their RNA sequenced at the hospital, then the metastatic risk score quickly transmitted to oncologists and patients via an encrypted Mangrove portal that has analysed the anonymised data.
“This information will prevent the overtreatment of low-risk patients, thereby limiting side effects and unnecessary costs, while intensifying the monitoring and treatment of those at high risk,” adds the senior author. “It also offers the possibility of optimising the selection of participants in clinical trials, reducing the number of volunteers required, increasing the statistical power of studies, and providing therapeutic benefits to the patients who need it most.” ScienceMission sciencenewshighlights.
When Freud first mapped the territories of the unconscious, he could only speak in the metaphors available to him — hydraulic pressures, economic systems, topographical layers. Yet the phenomena he described possess a striking affinity with concepts that would not emerge until decades later, when Claude Shannon formalized information theory and computing science revealed the architecture of data itself. What if the mechanisms Freud, Jung, and their successors laboriously documented are, at their foundation, information processing operations? What if repression is encryption, condensation is compression, and the deepest strata of the psyche represent not mystical depths but maximal data density?
The proposition is not merely metaphorical. Consider Freud’s description of repression in Repression (1915): the mechanism whereby the ego refuses admittance to consciousness of ideational content that threatens its equilibrium. Freud wrote that repression lies simply in turning something away, and keeping it at a distance, from the conscious (p. 147). Yet this keeping at a distance operates through a curious transformation. The repressed content does not vanish; it persists, inaccessible yet influential, distorting thought and behavior through its very concealment.
This is precisely analogous to encrypted data. Encryption transforms information into a form that resists interpretation without the proper key, yet the information remains fully present, its structure intact but rendered opaque. The encrypted file occupies space, exerts influence on system resources, and can corrupt or destabilize processes that attempt to access it incorrectly. Similarly, repressed material occupies psychic space and generates symptoms — failed decryption attempts, as it were — when consciousness approaches without the therapeutic key.
Quantum key distribution (QKD) is a next generation method for protecting digital communications by drawing on the fundamental behavior of quantum particles. Instead of relying on mathematical complexity alone, QKD allows two users to establish a shared secret key in a way that is inherently resistant to interception, even if the communication channel itself is not private.
When an unauthorized observer attempts to extract information, the quantum states carrying the data are unavoidably altered, creating telltale disturbances that signal a potential security breach.
The real-world performance of QKD systems, however, depends on precise control of the physical link between sender and receiver. One of the most influential factors is pointing error, which occurs when the transmitted beam does not perfectly align with the receiving device.
A team of researchers at the University of Waterloo have made a breakthrough in quantum computing that elegantly bypasses the fundamental “no cloning” problem. The research, “Encrypted Qubits can be Cloned,” appears in Physical Review Letters.
Quantum computing is an exciting technological frontier, where information is stored and processed in tiny units—called qubits. Qubits can be stored, for example, in individual electrons, photons (particles of light), atoms, ions or tiny currents.
Universities, industry, and governments around the world are spending billions of dollars to perfect the technology for controlling these qubits so that they can be combined into large, reliable quantum computers. This technology will have powerful applications, including in cybersecurity, materials science, medical research and optimization.
A ransomware attack hit Oltenia Energy Complex (Complexul Energetic Oltenia), Romania’s largest coal-based energy producer, on the second day of Christmas, taking down its IT infrastructure.
The 40-year-old Romanian energy provider employs over 19,000 people, operates four power plants with an installed production capacity of 3,900 MWh, and provides about 30% of Romania’s electricity.
“As a result of the attack, some documents and files were encrypted, and several computer applications became temporarily unavailable, including ERP systems, document management applications, the company’s email service, and website,” it said over the weekend.
Please see this news story on a remarkable new technological cybersecurity breakthrough for mitigating the threats of Q-Day and AI:
#cybersecurity #quantum #tech
The next leap in technology: a quantum computer unlike anything humanity has seen, capable of breaking all encryption and challenging the most crucial national security defenses. Tal Shenhav from i24NEWS Hebrew channel has the story.
Quantum Computing and the Dismantling of Cryptographic Foundations Quantum technology may be the most transformative long-term influence on the horizon. Although large-scale, fault-tolerant quantum computers may remain years from realization, their expected influence is already transforming cybersecurity strategies. As quantum technology advances, the risk of “harvest now, decrypt later” assaults suggests that today’s encrypted sensitive data could become vulnerable in the future.
From 2026 to 2030, enterprises will increasingly recognize that cryptographic agility is vital. The move to post-quantum cryptography standards means that old systems, especially those in critical infrastructure, financial services, and government networks, need to be fully inventoried, evaluated, and upgraded.