Blog

Archive for the ‘encryption’ category

Jun 16, 2017

China’s Micius satellite sets distance record for quantum entanglement in space

Posted by in categories: encryption, quantum physics, space

Chinese researchers report that they’ve set a new distance record for quantum teleportation through space, the phenomenon that Albert Einstein once scoffed at as “spooky action at a distance.”

The technology isn’t yet ready for prime time, but eventually it could open the way for a new type of unbreakable encryption scheme based on the weirdness of quantum physics.

Continue reading “China’s Micius satellite sets distance record for quantum entanglement in space” »

May 14, 2017

NYU Accidentally Leaked a Top-Secret Code-Breaking Supercomputer to The Entire Internet

Posted by in categories: cybercrime/malcode, encryption, internet, supercomputing

Confidential details of a top-secret encryption-breaking supercomputer were left completely exposed on an unsecured computer server belonging to New York University (NYU), according to a new report.

While it’s not uncommon for even critical-level infrastructure to suffer potentially catastrophic security breaches, what makes this event different is that there was seemingly no foul-play or attempts to hack into NYU’s systems.

Instead, it looks like somebody may have just forgotten to secure their classified data properly, exposing hundreds of pages of information on a covert code-breaking machine co-administered by the Department of Defence, IBM, and NYU.

Continue reading “NYU Accidentally Leaked a Top-Secret Code-Breaking Supercomputer to The Entire Internet” »

May 10, 2017

Pirates may have cracked the code to 4K UHD torrents

Posted by in categories: encryption, entertainment

Someone may have finally cracked a form of DVD encryption believed to be impenetrable. Potentially, this could mean it’s now possible to download 4K Blu-Ray movies online, though you shouldn’t get too excited yet.

According to TorrentFreak, an allegedly cracked copy of The Smurfs 2 — why that one, of all films, is a mystery — surfaced on HD Bit Torrent community UltraHDClub. There are no other details at the moment.

We’ve teamed up with Product Hunt to offer you the chance to win an all expense paid trip to TNW Conference 2017!

Continue reading “Pirates may have cracked the code to 4K UHD torrents” »

May 2, 2017

Russian scholars unlock the secret of the mysterious Voynich manuscript

Posted by in category: encryption

After conducting a statistical analysis of the text, Russian experts believe it’s encrypted in the following way: vowels and spaces are removed from the text. The collection of symbols is united in a new text, bestrewed with spaces beforehand. They estimate that about 60 percent of the text is written in English or German, and the other part in one of the Romance languages – possibly Italian or Spanish, or even Latin.


Experts previously thought it impossible to decipher the medieval text.

Read more

Apr 15, 2017

All coins are created equal

Posted by in categories: cryptocurrencies, encryption

Zcash is the first open, permissionless cryptocurrency that can fully protect the privacy of transactions using zero-knowledge cryptography. The Zcash client is now available for download as a command-line tool for Linux.

Get Started

Learn More

Continue reading “All coins are created equal” »

Mar 6, 2017

LED-it-GO: Leaking (a lot of) Data from Air-Gapped Computers via the (small) Hard Drive LED

Posted by in categories: cybercrime/malcode, drones, encryption, internet, mobile phones

Abstract: In this paper we present a method which allows attackers to covertly leak data from isolated, air-gapped computers. Our method utilizes the hard disk drive (HDD) activity LED which exists in most of today’s desktop PCs, laptops and servers. We show that a malware can indirectly control the HDD LED, turning it on and off rapidly (up to 5800 blinks per second) — a rate that exceeds the visual perception capabilities of humans. Sensitive information can be encoded and leaked over the LED signals, which can then be received remotely by different kinds of cameras and light sensors. Compared to other LED methods, our method is unique, because it is also covert — the HDD activity LED routinely flickers frequently, and therefore the user may not be suspicious to changes in its activity. We discuss attack scenarios and present the necessary technical background regarding the HDD LED and its hardware control. We also present various data modulation methods and describe the implementation of a user-level malware, that doesn’t require a kernel component. During the evaluation, we examine the physical characteristics of different colored HDD LEDs (red, blue, and white) and tested different types of receivers: remote cameras, extreme cameras, security cameras, smartphone cameras, drone cameras, and optical sensors. Finally, we discuss hardware and software countermeasures for such a threat. Our experiment shows that sensitive data can be successfully leaked from air-gapped computers via the HDD LED at a maximum bit rate of 4000 bits per second, depending on the type of receiver and its distance from the transmitter. Notably, this speed is 10 times faster than the existing optical covert channels for air-gapped computers. These rates allow fast exfiltration of encryption keys, keystroke logging, and text and binary files.

Read more

Mar 1, 2017

Mathematician breaks down how to defend against quantum computing attacks

Posted by in categories: computing, encryption, internet, mathematics, quantum physics

The encryption codes that safeguard internet data today won’t be secure forever.

Future quantum computers may have the and algorithms to crack them.

Nathan Hamlin, instructor and director of the WSU Math Learning Center, is helping to prepare for this eventuality.

Continue reading “Mathematician breaks down how to defend against quantum computing attacks” »

Feb 21, 2017

Quantum Systems, Channels, Information: A Mathematical Introduction [Repost]

Posted by in categories: computing, encryption, mathematics, quantum physics

Published: 2012/11/01 | ISBN: 311027325X | PDF | 349 pages | 12.06 MB

The subject of this book is theory of quantum system presented from information science perspective. The central role is played by the concept of quantum channel and its entropic and information characteristics. Quantum information theory gives a key to understanding elusive phenomena of quantum world and provides a background for development of experimental techniques that enable measuring and manipulation of individual quantum systems. This is important for the new efficient applications such as quantum computing, communication and cryptography. Research in the field of quantum informatics, including quantum information theory, is in progress in leading scientific centers throughout the world. This book gives an accessible, albeit mathematically rigorous and self-contained introduction to quantum information theory, starting from primary structures and leading to fundamental results and to exiting open problems.

Read more

Feb 14, 2017

Cryptographers Dismiss AI, Quantum Computing Threats

Posted by in categories: cybercrime/malcode, encryption, information science, policy, quantum physics, robotics/AI

Cybercrime & Cybersecurity 0 20

There is a reason why they’re not in the private sector developing QC. Noticed all represented no one developing and delivering QC commercially. There is a reason why folks like this become nay sayers as it is hard when you’re not able to deliver and not hireable by the private sector to deliver QC. With such a huge demand for QC experts and in security; you have to wonder why these folks have not been employed in a QC Tech company especially when you see tech grabbing every professor they can to develop QC and especially cyber security. Also, I still never saw any bases or details scientifically for their argument why specifically where and how QC will not block hacking just a bunch of professors throwing out words and high level speculations.


SAN FRANCISCO—Cryptographers said at the RSA Conference Tuesday they’re skeptical that advances in quantum computing and artificial intelligence will profoundly transform computer security.

Continue reading “Cryptographers Dismiss AI, Quantum Computing Threats” »

Feb 6, 2017

Collaboration Prepares DTU for Quantum Future

Posted by in categories: business, computing, encryption, quantum physics

I actually had a person recently state quantum was a fad; boy were they ever wrong.


During the next ten years, quantum technologies will become part of and revolutionize our everyday lives in the form of computers, sensors, encryption, and much more—and in a way that can be difficult for us to comprehend.

Businesses will also boost both their research and development activities in this area.

Continue reading “Collaboration Prepares DTU for Quantum Future” »

Page 1 of 1812345678Last