Toggle light / dark theme

Another article just came out today providing additional content on the Quantum Computing threat and it did reference the article that I had published. Glad that folks are working on this.


The NSA is worried about quantum computers. It warns that it “must act now” to ensure that encryption systems can’t be broken wide open by the new super-fast hardware.

In a document outlining common concerns about the effects that quantum computing may have on national security and encryption of sensitive data, the NSA warns that “public-key algorithms… are all vulnerable to attack by a sufficiently large quantum computer.”

Quantum computers can, theoretically, be so much faster because they take advantage of a quirk in quantum mechanics. While classical computers use bits in 0 or 1, quantum computers use “qubits” that can exist in 0, 1 or a superposition of the two. In turn, that allows it to work through possible solutions more quickly meaning they could crack encryption that normal computers can’t.

NSA states it must act now against the “Quantum Computing Threat” due to hackers can possess the technology. I wrote about this on Jan 10th. Glad someone finally is taking action.


The National Security Agency is worried that quantum computers will neutralize our best encryption – but doesn’t yet know what to do about that problem.

Read more

Rob Joyce, Chief, Tailored Access Operations, National Security Agency.

From his role as the Chief of NSA’s Tailored Access Operation, home of the hackers at NSA, Mr. Joyce will talk about the security practices and capabilities that most effectively frustrate people seeking to exploit networks.

Sign up to find out more about Enigma conferences:
https://www.usenix.org/conference/enigma2016#signup

Watch all Enigma 2016 videos at:

Scalpers offered contact lenses guaranteed to fool any ocular-based biometric ticketing technology.

He was right, of course, which explains all those people arriving at the stadium in all the usual ways. Some came by autonomous cars that dropped them off a mile or more from the stadium, their fitness wearables synced to their car software, both programmed to make their owner walk whenever the day’s calories consumed exceeded the day’s calories burned. Others turned up on the transcontinental Hyperloop, gliding at 760 miles per hour on a cushion of air through a low-pressure pipeline, as if each passenger was an enormous bank slip tucked into a pneumatic tube at a drive-through teller window in 1967. That was the year the first Super Bowl was played, midway through the first season of Star Trek, set in a space-age future that now looks insufficiently imagined.

And so hours before Super Bowl 100 kicked off—we persist in using that phrase, long after the NFL abandoned the actual practice—the pregame scene offered all the Rockwellian tableaux of the timeless tailgate: children running pass patterns on their hoverboards—they still don’t quite hover, dammit—dads printing out the family’s pregame snacks, grandfathers relaxing in lawn chairs with their marijuana pipes.

Read more

Ex-NSA boss says FBI director is wrong on encryption

encryption

Encryption protects everyone’s communications, including terrorists. The FBI director wants to undermine that. The ex-NSA director says that’s a terrible idea.

The FBI director wants the keys to your private conversations on your smartphone to keep terrorists from plotting secret attacks.

But on Tuesday, the former head of the U.S. National Security Agency…

Read the full article at CNN Money
http://money.cnn.com/2016/01/13/technology/nsa-michael-hayden-encryption/

The Pentagon has quietly put out a call for vendors to bid on a contract to develop, execute and manage its new cyber weaponry and defense program. The scope of this nearly half-billion-dollar “help wanted” work order includes counterhacking, as well as developing and deploying lethal cyberattacks — sanctioned hacking expected to cause real-life destruction and loss of human life.

In June 2016, work begins under the Cyberspace Operations Support Services contract (pdf) under CYBERCOM (United States Cyber Command). The $460 million project recently came to light and details the Pentagon’s plan to hand over its IT defense and the planning, development, execution, management, integration with the NSA, and various support functions of the U.S. military’s cyberattacks to one vendor.

While not heavily publicized, it’s a surprisingly public move for the Pentagon to advertise that it’s going full-on into a space that has historically been kept behind closed doors. Only this past June, the Department of Defense Law of War Manual (pdf) was published for the first time ever and included Cyber Operations under its own section — and, controversially, a section indicating that cyber-weapons with lethal outcomes are sanctioned by Pentagon doctrine.

Read more

Think the Google Glass camera glasses are funny looking? Check out the 3RDi. Pronounced “third eye,” it’s a new camera that lets you capture your life while you’re enjoying the moment by placing a camera smack dab in the center of your forehead, making you look like a camera cyclops.

The camera is the brainchild of a Montreal, Quebec-based startup called 3RDiTEK. Style-wise, it looks like a bright white headband with a small black camera built into the forehead section.

complet+noir+a

Read more

with its amazing HD camera, the 3RDi captures videos & photos just like an action camera.

3RDiTEK
capture your life.
Buy one on Indiegogo: http://igg.me/at/3rditek
Visit us on the web — http://www.3RDiTEK.com
Like Us on Facebook — https://goo.gl/evk3qQ
Join us on Google+ — https://goo.gl/5FQ6xb
Follow Us on Twitter — https://goo.gl/cxPMP9

Read more