Toggle light / dark theme

Scientists Have Figured Out What We Need to Achieve Secure Quantum Teleportation

Researchers have demonstrated the requirements for secure quantum teleportation using quantum steering.

An international collaboration of researcher from China, Europe, and Australia have demonstrated the precise requirements needed to secure quantum teleportation, a concept that is essential to the future of a quantum internet that lets information to be transmitted securely.

Of course, quantum teleportation doesn’t mean that it’s possible for a person to instantly pop from New York to London, but they can instantly transport information through a bizarre quantum mechanics property called entanglement.

Quick Pro Quo: Software Writes Text 3x Faster Than Any Human Can

Researchers have discovered that voice recognition software Deep Speech 2 has improved to a point that it has become significantly faster and more accurate at producing text on a mobile device than humans are at typing on a keyboard.

Earlier this year, we watched a world-renowned Go mastermind get pummeled in a complex game by an artificial intelligence (AI). Now, humans are about to lose in yet another battle with the machines—and this time, it’s over typing.

There is a speech recognition software that has improved to the point that it is faster and more accurate at producing text than human typists. That’s according to researchers from Stanford University and the University of Washington, which ran a study on a new program developed by Chinese internet giant, Baidu.

Statement by Vice-President Ansip and Commissioner Oettinger welcoming guidelines on EU net neutrality rules by the Body of European Regulators for Electronic Communications (BEREC)

European Commission Vice -President Andrus Ansip, responsible for the Digital Single Market, and Commissioner Günther H. Oettinger, in charge of the Digital Economy and Society, welcome today’s publication of guidelines on EU net neutrality rules by the Body of European Regulators for Electronic Communications (BEREC). The publication of these guidelines was foreseen in the Regulation on the first EU-wide net neutrality rules which was agreed by the European Parliament and Council last year (press release) and which has applied in all EU Member States since 30 April 2016. The Commission has worked closely with BEREC on the preparation of the guidelines.

Vice-President Ansip and Commissioner Oettinger said:

“Today’s guidelines provide detailed guidance for the consistent application of our net neutrality rules by national regulators across the EU. They do not alter the content of the rules in place which guarantee the freedom of the internet by protecting the right of every European to access internet content, applications and services without unjustified interference or discrimination. Our rules, and today’s guidelines, avoid fragmentation in the single market, create legal certainty for businesses and make it easier for them to work across border. They also ensure that the internet remains an engine for innovation and that advanced technologies and Internet of Things services like connected vehicles as well as 5G applications are developed today, and will flourish in the future. We are pleased with the intensive engagement with stakeholders in the preparation of the guidelines, which contributed to their quality.

WebTorrent: 250K Downloads & Strong With Zero Revenue

The desktop variant of innovative torrent client WebTorrent has now clocked up an impressive 250,000 downloads, its founder reports. In a market where competing clients are often closed source or commercial ventures, WebTorrent promises to be transparent and non-commercial, forever. And that’s despite Netflix knocking at the door.

Stanford University graduate Feross Aboukhadijeh is passionate about P2P technology. The founder of P2P-assisted content delivery network PeerCDN (sold to Yahoo in 2013), Feross is also the inventor of WebTorrent.

In its classic form, WebTorrent is a BitTorrent client for the web. No external clients are needed for people to share files since everything is done in the user’s web browser with Javascript. No browser plugins or extensions need to be installed, nothing needs to be configured.

“Interscatter” Tech Converts Bluetooth For WiFi-Connected Implants

Nice.


Engineers at the University of Washington (UW) have devised a new method of wireless communication that converts Bluetooth transmission from mobile devices into Wi-Fi signals. Using this “interscatter” communications technology allows medical devices and implants with limited power sources to gain the ability to send data using low-power Wi-Fi signals to smartphones and smartwatches.

The UW team previously described the technique of “backscattering” ambient RF signals — repurposing existing RF signals in the environment — to enable device-to-device communication without the need for onboard power sources. Now, the team builds on that prior research to introduce “interscattering,” the inter-technology, over-the-air conversion of Bluetooth signals to create Wi-Fi transmissions.

The researchers wrote in a paper that novel medical devices, such as smart contact lenses and neural implants, currently have power constraints that limit their ability to generate Wi-Fi, Bluetooth, or ZigBee transmissions to communicate with smartphones, watches, and tablets. To overcome this, the researchers suggest an interscaterring communication system.

The NSA Plans for a Post-Quantum World

Hope they’re working with QC researchers in Los Alamos and DARPA; it is the US Government which is known for its silos and multi-layer bureaucracies.


Quantum computing is a novel way to build computers — one that takes advantage of the quantum properties of particles to perform operations on data in a very different way than traditional computers. In some cases, the algorithm speedups are extraordinary.

Specifically, a quantum computer using something called Shor’s algorithm can efficiently factor numbers, breaking RSA. A variant can break Diffie-Hellman and other discrete log-based cryptosystems, including those that use elliptic curves. This could potentially render all modern public-key algorithms insecure. Before you panic, note that the largest number to date that has been factored by a quantum computer is 143. So while a practical quantum computer is still science fiction, it’s not stupid science fiction.

(Note that this is completely different from quantum cryptography, which is a way of passing bits between two parties that relies on physical quantum properties for security. The only thing quantum computation and quantum cryptography have to do with each other is their first words. It is also completely different from the NSA’s QUANTUM program, which is its code name for a packet-injection system that works directly in the Internet backbone.)