Toggle light / dark theme

Interesting Question to ask.


The battle between the FBI and Apple over the unlocking of a terrorist’s iPhone will likely require Congress to create new legislation. That’s because there really aren’t any existing laws which encompass technologies such as these. The battle is between security and privacy, with Silicon Valley fighting for privacy. The debates in Congress will be ugly, uninformed, and emotional. Lawmakers won’t know which side to pick and will flip flop between what lobbyists ask and the public’s fear du jour. And because there is no consensus on what is right or wrong, any decision they make today will likely be changed tomorrow.

This is a prelude of things to come, not only with encryption technologies, but everything from artificial intelligence to drones, robotics, and synthetic biology. Technology is moving faster than our ability to understand it, and there is no consensus on what is ethical. It isn’t just the lawmakers who are not well-informed, the originators of the technologies themselves don’t understand the full ramifications of what they are creating. They may take strong positions today based on their emotions and financial interests, but as they learn more, they too will change their views.

Imagine if there was a terror attack in Silicon Valley — at the headquarters of Facebook or Apple. Do you think that Tim Cook or Mark Zuckerberg would continue to put privacy ahead of national security?

Something for everyone to keep a closer eye on in the coming year/s — And, they are indeed well on their way with Quantum and their partnership with Australia. Australia (as we recall) has been the one country outside the US and Canada that has made incredible progress in Quantum Computing especially introducing in Nov 2015 their discovery in developing a machine language for the Quantum platform.


BEIJING (AP) — China’s government has highlighted big data, encryption technology and “core technologies” such as semiconductors as the key elements of its push to grow into a tech powerhouse, according to a new five-year plan released Saturday that envisages the Internet as a major source of growth as well as a potential risk.

Read more

Replacing traditional encryption schemes.


What are the prime factors, or multipliers, for the number 15? Most grade school students know the answer — 3 and 5 — by memory. A larger number, such as 91, may take some pen and paper. An even larger number, say with 232 digits, can (and has) taken scientists two years to factor, using hundreds of classical computers operating in parallel.

Read more

Glad to see this article get published because it echoes many of the concerns established around China and Russia governments and their hackers having their infrastructures on Quantum before US, Europe, and Canada. Computer scientists at MIT and the University of Innsbruck say they’ve assembled the first five quantum bits (qubits) of a quantum computer that could someday factor any number, and thereby crack the security of traditional encryption schemes.


Shor’s algorithm performed in a system less than half the size experts expected.

Read more

“For the third time in less than a year, security researchers have found a method to attack encrypted Web communications, a direct result of weaknesses that were mandated two decades ago by the U.S. government”

This could have more than just security gap ripple effects; it could actually be a loophole for any claims/ lawsuits that consumers and others have with various organizations.


For the third time in under a year, security researchers have found a method to attack encrypted Web communications, a direct result of weaknesses that were mandated two decades ago by the U.S. government.

Read more