Menu

Blog

Archive for the ‘encryption’ category: Page 30

May 18, 2016

Chief Scientist at Security Innovation Presents on Quantum Safety at Fourth International Cryptographic Module Conference

Posted by in categories: cybercrime/malcode, encryption, information science, quantum physics

I am glad that D. Whyte recognizes “If quantum computers are developed faster than anticipated, certification would mandate insecure modules, given the time to approve and implement new quantum resistant algorithms. Worse, it is conceivable that data encrypted by a certified module is more vulnerable than data encrypted by a non-certified module that has the option of using a quantum-safe encryption algorithm.”

Because many of us who are researching and developing in this space have seen the development pace accelerated this year and what was looking like we’re 10 years away is now looking like we’re less than 7 years.


Dr. William Whyte, Chief Scientist for Security Innovation, a cybersecurity provider and leader in the 2015 Gartner Magic Quadrant for Security Awareness Training, will be presenting at the Fourth International Cryptographic Module Conference in Ottawa, Ontario.

Continue reading “Chief Scientist at Security Innovation Presents on Quantum Safety at Fourth International Cryptographic Module Conference” »

May 18, 2016

A hacker is reportedly selling the stolen emails and passwords of 117 million LinkedIn users

Posted by in categories: bitcoin, cybercrime/malcode, encryption, humor, internet

Privacy is practically a joke anymore.


A hacker known as “Peace” is selling what is reportedly account information from 117 million LinkedIn users. The stolen data is said to include email addresses and passwords, which a malicious party could use to gain access to other websites and accounts for which people used the same password.

LinkedIn says it has about 433 million members worldwide, so this data could represent 27% of its user base.

Continue reading “A hacker is reportedly selling the stolen emails and passwords of 117 million LinkedIn users” »

May 14, 2016

Nanotechnology To Make Holographic Applications More Secure And Efficient

Posted by in categories: biotech/medical, encryption, nanotechnology, security

Making Holographic Apps more secured and efficient.


Since its birth, holograms have been extensively used to serve security systems and related purposes. The making of a hologram, dissecting it to pieces and again rejoining the blocks involves a steady orientation of lenses which encodes the information with depth perception that could be deciphered later according to requirement.

It’s hard to imagine a 21st century city running smooth without an immense use of holograms, small or big sized 2D cards with 3D engraved pictures that are present in credit cards, grocery objects, books, biomedical devices and in other objects requiring retrievable information to be stored.

Continue reading “Nanotechnology To Make Holographic Applications More Secure And Efficient” »

May 7, 2016

Can Bitcoin be defeated by legislation?

Posted by in categories: bitcoin, business, cryptocurrencies, economics, encryption, geopolitics, government, internet, policy

The question breaks down into two parts:

  1. For what public benefit? —and—
  2. No, it cannot be achieved in this way

Governments are in the business of regulating certain activities—hopefully in an effort to serve the public good. In the case of business methods and activities, their goal is to maintain an orderly marketplace; one that is fair, safe and conducive to economic growth.

But regulation that lacks a clear purpose or a reasonable detection and enforcement mechanism is folly. Such regulation risks making government seem arbitrary, punitive or ineffective.

QR Code_CRYPSA-001«— This is money. It is not a promissory note, a metaphor, an analogy or an abstract representation of money in some account. It is the money itself. Unlike your national currency, it does not require an underlying asset or redemption guarantee.

Continue reading “Can Bitcoin be defeated by legislation?” »

May 6, 2016

Bitcoin Pundicy: A Lifeboat Perspective

Posted by in categories: bitcoin, cryptocurrencies, economics, encryption, government, internet

Here in the Lifeboat Blog, I have the luxury of pontificating on existential, scientific and technical topics that beg for an audience—and sometimes—a pithy opinion. Regular Lifeboat readers know that I was recently named most viewed Bitcoin writer at Quora under a Nom de Plume.

Quora is not a typical Blog. It is an educational site. Questions and numerous answers form the basis of a crowd-sourced popularity contest. Readers can direct questions to specific experts or armchair analysts. A voting algorithm leads to the emergence of some very knowledgeable answers, even among laypersons and ‘armchair’ experts.

During the past few weeks, Quora readers asked me a litany of queries about Bitcoin and the blockchain, and so I am sharing selected Q&A here at Lifeboat. This is my professional field—and so, just as with Mr. Trump, I must resist an urge to be verbose or bombastic. My answers are not the shortest, but they are compact. Some employ metaphors, but they explain complex ideas across a broad audience.

Continue reading “Bitcoin Pundicy: A Lifeboat Perspective” »

May 5, 2016

This Astrophysicist Posed an Alien Challenge and the Internet Is Racing to Solve It

Posted by in categories: alien life, encryption, internet

If aliens sent you an encrypted binary message, could you answer? René Heller, an astrophysicist at the Max Planck Institute for Solar System Research, wants to hear from you.

Last month, Heller posed a hypothetical question as part of the #SETIDecryptChallenge: “Suppose a telescope on Earth receives a series of pulses from a fixed, unresolved source beyond the solar system,” he wrote. “It turns out the pulses carry a message.”

The encrypted message is a vast sea of 0’s and 1’s. You can see it here, but here’s a GIF for your convenience.

Continue reading “This Astrophysicist Posed an Alien Challenge and the Internet Is Racing to Solve It” »

May 5, 2016

IBM Brings Quantum Computing to the Masses

Posted by in categories: computing, encryption, quantum physics

My verdict will continue to be out on this version. Unless we truly see a QC environment where the full testing of Cryptography, infrastructure, etc. is tested then at best we’re only looking at a pseudo version of QC. Real QC is reached when the infrastructure fully can take advantage of QC not just one server or one platform means we have arrived on QC. So, I caution folks from over-hyping things because the backlash will be extremely costly and detrimental to many.


IBM has taken its quantum computing technology to the cloud to enable users to run experiments on an IBM quantum processor.

Big Blue has come a long way, baby. IBM announced it is making quantum computing available on the IBM Cloud to accelerate innovation in the field and find new applications for the technology.

Continue reading “IBM Brings Quantum Computing to the Masses” »

May 2, 2016

Could Aluminum Nitride Be Engineered to Produce Quantum Bits?

Posted by in categories: encryption, quantum physics, supercomputing

Interesting insight on Aluminum Nitride used to create Qubits.

http:///articles/could-aluminum-nitride-be-engineered-to-pro…nteresting insight.


Newswise — Quantum computers have the potential to break common cryptography techniques, search huge datasets and simulate quantum systems in a fraction of the time it would take today’s computers. But before this can happen, engineers need to be able to harness the properties of quantum bits or qubits.

Continue reading “Could Aluminum Nitride Be Engineered to Produce Quantum Bits?” »

Apr 30, 2016

Russia’s NDS Uses Blockchain For E-Proxy Voting

Posted by in categories: bitcoin, encryption

Recently the Russia’s National Settlement Depository (NDS), an organization that provides settlement and depository services, began testing blockchain technology as a potential solution for a corporate e-proxy voting system. The results will not shock you but the origin of praise for the system just might.

NDS began looking into solutions for e-proxy voting in August of 2014. The prototype they recently tested is based on the NXT platform. The system also adheres to the ISO 20022 standard for messaging. NDS worked with the UK based DSX Technologies to develop the e-proxy voting system. The recent testing was conducted during a bondholder meeting.

With this e-proxy voting system, cascade messaging is enabled through a chain of nominee accounts. This chain is from the issuer to the voter and then back. In this configuration, NSD manages the database for the chain in order to ultimately oversee that all voting protocol was followed during the process. All of the information that is on the blockchain is then encrypted and able to be viewed by participants. The digital signatures embedded in the blockchain provide verification that the voting is within the time constraints allotted, all votes are accounted for, and that the process is transparent.

Continue reading “Russia’s NDS Uses Blockchain For E-Proxy Voting” »

Apr 29, 2016

Futuristic ‘post-quantum’ cryptography is subject of UWT symposium

Posted by in categories: cybercrime/malcode, encryption, information science, quantum physics, supercomputing

Post-quantum cryptography discussion in Tacoma WA on May 5th discussing hacking by QC hackers and leveraging Cryptography algorithms to offset the attacks; may be of interest to sit in and even join in the debates. I will try attend if I can because it would be interesting to see the arguments raised and see the responses.


The University of Washington Tacoma Institute of Technology will present a discussion about the esoteric field of post-quantum cryptography at the Northwest Cybersecurity Symposium on May 5.

“I’ve been researching post-quantum cryptography for years, finding ways to protect against a threat that doesn’t yet exist,” said Anderson Nascimento, assistant professor of computer science at the institute, in a release.

Continue reading “Futuristic ‘post-quantum’ cryptography is subject of UWT symposium” »

Page 30 of 37First2728293031323334Last