Menu

Blog

Archive for the ‘encryption’ category: Page 54

Sep 22, 2015

Shades of ‘Star Trek’? Quantum Teleportation Sets Distance Record

Posted by in categories: encryption, internet, quantum physics

You’ve gotta love Star Trek, but there is absolutely NO WAY I’d ever set foot in a real teleportation device! (if one ever really got made, of course) Call me crazy, but I’m kinda partial to keeping my molecular cohesion as intact as possible, which kinda rules out having it ripped apart and remade on the other side.


A record-breaking distance has been achieved in the bizarre world of quantum teleportation, scientists say.

The scientists teleported photons (packets of light) across a spool of fiber optics 63 miles (102 kilometers) long, four times farther than the previous record. This research could one day lead to a “quantum Internet” that offers next-generation encryption, the scientists said.

Continue reading “Shades of ‘Star Trek’? Quantum Teleportation Sets Distance Record” »

Sep 20, 2015

Snowden says aliens could be trying to get in touch right now

Posted by in categories: alien life, encryption

Technically Incorrect: In a conversation with Neil DeGrasse Tyson, the Moscow-based NSA whistleblower offers his views on interplanetary communication. He fears their communication may be encrypted, so we’re missing it.

Read more

Sep 20, 2015

The Search for Extraterrestrial Life and Encrypted Space Communication

Posted by in categories: alien life, encryption, existential risks, information science


Neil deGrasse Tyson and Edward Snowden recently discussed the idea that encryption mechanisms with advanced extraterrestrial species and humans could theoretically render communication as indistinguishable from cosmic background radiation. With only a short period of time in a species growth where open communication is broadcast to the stars (through the sluggish and primitive nature of radio broadcasts), this could prevent us (or other species) from making contact with one another.

With the Drake Equation stating a high probability of communicative extraterrestrial civilizations and the contrasting Fermi Paradox citing lacking evidence of such, it begs the question of whether outlying reasons have an impact. In my opinion, the Drake Equation rings true in the sense that hundreds of billions of stars exist in our galaxy alone (many with their own diverse planetary bodies), setting the stage for extraterrestrial life to disavow itself as insatiable ramblings. Unlike that which is eminent in the Fermi Paradox, I believe, in this case, a conclusion based off of inductive reasoning seems to hold more water than an evidence-only approach.

Keeping in mind the discussion in The Guardian article, a flaw of the Fermi Paradox’s evidence-based perspective should become apparent: secure, encrypted communication (cloaked by design) would render the existence of extraterrestrial intelligence invisible to the prying ear. If intentional, there could be many reasons for withholding this whereabouts of a species location. An abstract theory from science fiction may itself hold a degree of truth. An example of which, is the video game series ‘Mass Effect,’ where an advanced, sentient machine-race cleanse the galaxy of advanced life every 40,000 years. The reasoning for doing so is to “bring order to chaos” and for reasons “unfathomable.” Be it for an abstract reason such as this or simply for secure communication, the encryption of the resultant transmission’s presence wouldn’t register as noticeable to any observers. As nearly all signs of outside life would be mute, it then lays in the other senses that hold the most promise of enlightenment.

Read more

Sep 16, 2015

New quantum dot could make quantum communications possible

Posted by in categories: encryption, quantum physics

Real world quantum encryption and communication may just have gotten a whole lot closer, with a new super-accurate quantum dot.

Read more

Sep 4, 2015

The 10 Algorithms That Dominate Our World

Posted by in categories: computing, encryption, information science

1. Google Search.

2. Facebook’s News Feed.

Continue reading “The 10 Algorithms That Dominate Our World” »

Aug 20, 2015

Tech’s Biggest Ideas and How They Take Hold — With Marc Andreessen and Dan Siroker | Andreessen Horowitz

Posted by in categories: augmented reality, biotech/medical, cryptocurrencies, encryption, internet, mobile phones, polls, robotics/AI, transparency, virtual reality

https://soundcloud.com/a16z/a16z-podcast-techs-big-ideas-and…andreessen

Aug 18, 2015

Cryptographers Develop Encryption Method Resistant to Future Quantum Attacks

Posted by in categories: computing, encryption, internet, quantum physics

Cryptographers are working on new encryption methods able to protect today’s Internet communications from future quantum computers that can be able to break today’s cryptography techniques. The researchers have developed upgrades to the Internet’s core encryption protocol that will prevent quantum computer users from intercepting Internet communications.

Read more

Aug 3, 2015

Microsoft Works Out How to Upgrade Online Encryption to Protect Against Quantum Computers

Posted by in categories: biotech/medical, computing, encryption, energy

Call it an abundance of caution. A Microsoft research project has upgraded the encryption protocol that secures the Web to resist attacks from quantum computers—machines that are expected to have stupendous power but have never been built.

Governments and computing giants like IBM, Microsoft, and Google are working on quantum computers because tapping subtle effects of quantum physics should let them solve in seconds some problems that a conventional machine couldn’t solve in billions of years (see “Microsoft’s Quantum Mechanics”). That might allow breakthroughs in areas such as medicine or energy. But such machines would also be able to easily break the encryption used to secure information online.

Read more

Jul 7, 2015

Passfaces: Strong authentication for the masses

Posted by in categories: big data, business, computing, encryption, finance, information science, internet

Last year, Google began experimenting with hardware-based schemes for user-authentication, while Apple added two factor authentication to iCloud and Apple ID users. They began sending a verification code to users via a mobile number registered in advance.

Security pundits know that two factor authentication is more secure than simple passwords. As a refresher, “Factors” are typically described like this:

  • Something that you know (a password — or even better, a formula)
  • Something that you have (Secure ID token or code sent to cell phone)
  • Something that you are (a biometric: fingerprint, voice, face, etc.)

The Google project may be just another method of factor #2. In fact, because it is small (easily misplaced or stolen), it simplifies but does not improve on security. I suggest a radical and reliable method of authentication. It’s not new and it’s not my idea…

password_key

Continue reading “Passfaces: Strong authentication for the masses” »

Jun 7, 2015

“Brainprints” Could Be Future Security ID — By Christopher Intagliata Scientific American

Posted by in categories: encryption, neuroscience, security

http://www.gadgetgestures.com/wp-content/uploads/2015/06/555x416xBrain-Prints-Replace-Passwords.jpg.pagespeed.ic.Lhswu3zDR3.jpg

Biometric technology was once the stuff of sci-fi—how many movies show someone having their hand or eye scanned to get entry into a secured facility? But today biometric tech can be found in millions of people’s pockets—as the fingerprint scanner on an iPhone.

Of course, fingerprint scanning isn’t foolproof. Hackers have stolen fingerprints from photos, and used fake prints to fool Apple’s touch ID. Plus, there’s always the brute force method, like the time a gang in Malaysia cut off a guy’s fingertip—with a machete—to interface with the fingerprint-recognition system on the victim’s Mercedes. Read more

Page 54 of 56First4950515253545556