Toggle light / dark theme

The Computational Unconscious: How Information Theory Reframes Psychoanalytic Depth

Read “” by Myk Eff on Medium.


When Freud first mapped the territories of the unconscious, he could only speak in the metaphors available to him — hydraulic pressures, economic systems, topographical layers. Yet the phenomena he described possess a striking affinity with concepts that would not emerge until decades later, when Claude Shannon formalized information theory and computing science revealed the architecture of data itself. What if the mechanisms Freud, Jung, and their successors laboriously documented are, at their foundation, information processing operations? What if repression is encryption, condensation is compression, and the deepest strata of the psyche represent not mystical depths but maximal data density?

The proposition is not merely metaphorical. Consider Freud’s description of repression in Repression (1915): the mechanism whereby the ego refuses admittance to consciousness of ideational content that threatens its equilibrium. Freud wrote that repression lies simply in turning something away, and keeping it at a distance, from the conscious (p. 147). Yet this keeping at a distance operates through a curious transformation. The repressed content does not vanish; it persists, inaccessible yet influential, distorting thought and behavior through its very concealment.

This is precisely analogous to encrypted data. Encryption transforms information into a form that resists interpretation without the proper key, yet the information remains fully present, its structure intact but rendered opaque. The encrypted file occupies space, exerts influence on system resources, and can corrupt or destabilize processes that attempt to access it incorrectly. Similarly, repressed material occupies psychic space and generates symptoms — failed decryption attempts, as it were — when consciousness approaches without the therapeutic key.

Scientists Uncover Hidden Weakness in Quantum Encryption

Quantum key distribution (QKD) is a next generation method for protecting digital communications by drawing on the fundamental behavior of quantum particles. Instead of relying on mathematical complexity alone, QKD allows two users to establish a shared secret key in a way that is inherently resistant to interception, even if the communication channel itself is not private.

When an unauthorized observer attempts to extract information, the quantum states carrying the data are unavoidably altered, creating telltale disturbances that signal a potential security breach.

The real-world performance of QKD systems, however, depends on precise control of the physical link between sender and receiver. One of the most influential factors is pointing error, which occurs when the transmitted beam does not perfectly align with the receiving device.

Solving quantum computing’s longstanding ‘no cloning’ problem with an encryption workaround

A team of researchers at the University of Waterloo have made a breakthrough in quantum computing that elegantly bypasses the fundamental “no cloning” problem. The research, “Encrypted Qubits can be Cloned,” appears in Physical Review Letters.

Quantum computing is an exciting technological frontier, where information is stored and processed in tiny units—called qubits. Qubits can be stored, for example, in individual electrons, photons (particles of light), atoms, ions or tiny currents.

Universities, industry, and governments around the world are spending billions of dollars to perfect the technology for controlling these qubits so that they can be combined into large, reliable quantum computers. This technology will have powerful applications, including in cybersecurity, materials science, medical research and optimization.

Romanian energy provider hit by Gentlemen ransomware attack

A ransomware attack hit Oltenia Energy Complex (Complexul Energetic Oltenia), Romania’s largest coal-based energy producer, on the second day of Christmas, taking down its IT infrastructure.

The 40-year-old Romanian energy provider employs over 19,000 people, operates four power plants with an installed production capacity of 3,900 MWh, and provides about 30% of Romania’s electricity.

“As a result of the attack, some documents and files were encrypted, and several computer applications became temporarily unavailable, including ERP systems, document management applications, the company’s email service, and website,” it said over the weekend.

Quantum global race: “The word ‘secret’ no longer exists”

Please see this news story on a remarkable new technological cybersecurity breakthrough for mitigating the threats of Q-Day and AI:

#cybersecurity #quantum #tech


The next leap in technology: a quantum computer unlike anything humanity has seen, capable of breaking all encryption and challenging the most crucial national security defenses.
Tal Shenhav from i24NEWS Hebrew channel has the story.

Technological Disruption: Strategic Inflection Points From 2026

By Chuck Brooks


Quantum Computing and the Dismantling of Cryptographic Foundations Quantum technology may be the most transformative long-term influence on the horizon. Although large-scale, fault-tolerant quantum computers may remain years from realization, their expected influence is already transforming cybersecurity strategies. As quantum technology advances, the risk of “harvest now, decrypt later” assaults suggests that today’s encrypted sensitive data could become vulnerable in the future.

From 2026 to 2030, enterprises will increasingly recognize that cryptographic agility is vital. The move to post-quantum cryptography standards means that old systems, especially those in critical infrastructure, financial services, and government networks, need to be fully inventoried, evaluated, and upgraded.

Microsoft rolls out hardware-accelerated BitLocker in Windows 11

Microsoft is rolling out hardware-accelerated BitLocker in Windows 11 to address growing performance and security concerns by leveraging the capabilities of system-on-a-chip and CPU.

BitLocker is the native full-disk encryption feature in Windows that protects data from being readable without proper authentication. During normal device boot, it relies on the Trusted Platform Module (TPM) to securely manage encryption keys and automatically unlock the drive.

Microsoft states that as non-volatile memory express (NVMe) storage has become more performant, BitLocker’s cryptographic operations have a more noticeable performance impact for gaming and video editing activities.

Introducing TinyAleph: Revolutionizing How Computers Understand Meaning with Primes and Oscillators

Imagine if meaning — the elusive essence of language and thought — could be broken down into mathematical building blocks as fundamental as prime numbers. What if computers could “reason” by synchronizing oscillators, much like neurons firing in harmony in our brains?

That’s the bold idea behind TinyAleph, a new framework and library I’ve developed for semantic computing. Unlike today’s AI models that gobble up massive datasets to mimic understanding, TinyAleph grounds meaning in pure math: primes, hypercomplex algebra, and dynamic oscillators.

In this article, I’ll walk you through the core ideas of TinyAleph, stripping away the academic jargon to show why this could be a game-changer for AI, cryptography, and even quantum-inspired simulations. No PhD required — just an open mind.

The Hidden Risk in Virtualization: Why Hypervisors are a Ransomware Magnet

Ransomware groups are targeting hypervisors to maximize impact, allowing a single breach to encrypt dozens of virtual machines at once. Drawing on real-world incident data, Huntress explains how attackers exploit visibility gaps at the hypervisor layer and outlines steps orgs can take to harden virtualization infrastructure.

/* */