Toggle light / dark theme

As the world is wary about cyber hackers in China, the next big thing for it is launching an experimental quantum communication satellite in July that was designed by the Chinese Academy of Sciences (CAS), making it first of its kind.

Since quantum communications assure the highest level of security being hard to replicate or separate. Nor can it be reverse engineered as it involves a complex process employing quantum entanglement. Once it is successful, China can be sure that no one can crack into its security networks, making it impossible for any world power to snoop around.

Developed over the last five years, the quantum satellite will be launched from the Jiuquan Satellite Launch Center with four ground stations to track and facilitate communication. Moreover, it will have one space quantum teleportation experiment station, said a report prepared by CAS.

Read more

The recent Google I/O developer conference at which the company reveals its new products and directions brought with it several surprising announcements that mark significant changes for the way the company approaches its online business.

The first was the admission by Google chief executive, Sundar Pichai, that Amazon had taken the lead in voice-activated devices when it launched Echo last year when he announced the company’s own Google Home, a similar table-top, voice-controlled AI assistant. These devices have been made possible by the rapid improvement of voice-recognition technology and AI fast enough to respond in real time to questions and answers. But under the surface, the devices are deeply integrated with the cloud, and in the case of Echo, Amazon’s online marketplace.

This is significant because Echo now boasts more than 400 different “skills” and connected suppliers through which users can order food, look up calendar appointments, pay credit card bills, search for information and many other things – just by asking with their voice. The ecosystem of companion products around these intelligent assistants is growing too: just by asking, you can switch on the lights in any room, control the thermosat, security system and fire detectors, automate perimeter doors or fences.

Read more

Awesome.


What once took months by some of the world’s leading scientists can now be done in seconds by undergraduate students thanks to software developed at the University of Waterloo’s Institute for Quantum Computing, paving the way for fast, secure quantum communication.

Researchers at the Institute for Quantum Computing (IQC) at the University of Waterloo developed the first available software to evaluate the security of any protocol for Quantum Key Distribution (QKD).

QKD allows two parties, Alice and Bob, to establish a shared secret key by exchanging photons. Photons behave according to the laws of quantum mechanics, and the laws state that you cannot measure a without disturbing it. So if an eavesdropper, Eve, intercepts and measures the photons, she will cause a disturbance that is detectable by Alice and Bob. On the other hand, if there is no disturbance, Alice and Bob can guarantee the security of their shared key.

Read more

Making Holographic Apps more secured and efficient.


Since its birth, holograms have been extensively used to serve security systems and related purposes. The making of a hologram, dissecting it to pieces and again rejoining the blocks involves a steady orientation of lenses which encodes the information with depth perception that could be deciphered later according to requirement.

It’s hard to imagine a 21st century city running smooth without an immense use of holograms, small or big sized 2D cards with 3D engraved pictures that are present in credit cards, grocery objects, books, biomedical devices and in other objects requiring retrievable information to be stored.

In terms of concealing product information, these sticker based fancy stuffs were up to the mark, until technology escalated beyond imagination. Even a previously measured safe encryption suffered from threat and these tools became fragile. Researchers initialized various approaches to hit the safest and complex path, among which nanotechnology had an answer in store for them. A research team from the Harvard John A. Paulson School of Engineering and Applied Sciences had recently forced polarization to concise holograms, comprising of tiny light-polarization sensitive nanostructures to generate numerous ones depending upon the polarization configuration of light.

Read more

NSA meets with Silicon Valley execs to voice their concerns over legacy systems being hacked by Quantum technology. Glad they’re talking about it because with the recent advancements in Quantum means it will be available in devices, communications, and platforms a lot sooner than originally projected.


The National Security Telecommunications Advisory Committee (NSTAC) brought together Silicon Valley executives with federal officials at the advisory committee’s annual meeting on Wednesday in Santa Clara, California.

U.S. military and intelligence officials, including Department of Defense Secretary Ash Carter, Department of Homeland Security Secretary Jeh Johnson, and Department of Commerce Secretary Penny Pritzker, attended the advisory committee.

“Today’s era relies on technological innovation in our field such as speed and agility,” said Defense Secretary Carter at the meeting. During his presentation, he introduced Raj Shah, CEO/co-founder of Morta Security, Air Force Reservist, and former F-16 pilot, to lead the Defense Department’s Defense Innovation Unit Experimental (DIUX) initiative. The DoD is restructuring the DIUX program, a Silicon Valley outreach initiative, with Carter calling the revised program “DIUX 2.0.” Shah’s security firm, Morta Security, was acquired by Palo Alto Networks in March 2014.

Read more

Soldiers wrapped up day two of an integrated cyber exercise between 4th Battalion, 23rd Infantry, 14th Brigade Engineer Battalion, 201st Expeditionary Military Intelligence Brigade, from Joint Base Lewis-McChord, Wash., supported by cyber augmentees from the 780th Military Intelligence Brigade from Fort Meade, Md., Oct. 21. Cyber information collected during the exercise enabled the Soldiers to isolate and capture a simulated high-value target in a mock village. The training integrates infantry ground units with cyber, signal and human intelligence collection capabilities, which gives units on the modern battlefield a broader capacity to search out and isolate their enemies in real time. (Photo by Capt. Meredith Mathis)

“Recently, United States Deputy Defense Secretary Robert Work publicly confirmed that the Pentagon’s Cyber Command was “dropping cyberbombs,” taking its ongoing battle against the Islamic State group into the online world. Other American officials, including President Barack Obama, have discussed offensive cyber activities, too.”

Read more

Not saying that the whole Apple situation cause this; it just odd timing.


The Federal Communications Commission and Federal Trade Commission have asked mobile phone carriers and manufacturers to explain how they release security updates amid mounting concerns over security vulnerabilities, the U.S. agencies said on Monday.

The agencies have written to Apple, AT&T and Alphabet, among others, in order “to better understand, and ultimately to improve, the security of mobile devices,” the FCC said.

The FCC sent letters to six mobile phone carriers on security issues, while the FTC ordered eight mobile device manufacturers including BlackBerry, Microsoft, LG Electronics USA and Samsung Electronics America to disclose “the factors that they consider in deciding whether to patch a vulnerability on a particular mobile device.”

Read more

My new article on how some technologies will inevitably make the government smaller:


However, there’s reason to believe that in the near future, government might dramatically shrink—not because of demands by fiscally astute Americans, but because of radical technology.

Indubitably, millions of government jobs will soon be replaced by robots. Even the US President could one day be replaced, which—strangely enough—might bring sanity to our election process.

But it’s not just robots, it’s software programs and weird new tech that will do the replacing. Consider the over 1 million firefighters, a staple part of American government that also represents the ideal of service and career to one’s country. Companies around the world are now building fireproof everything, including couches, furniture, and building materials that simply don’t burn well. And intelligent robots—which I think will be in 50 percent of American households within five years time—will all have fire and carbon monoxide detectors.

In fact, I’m certain many in-home robots will not only be loaded with numerous security alert systems (like intruder alarms, flood warnings, and the ability to detect snakes, scorpions, and spiders) but will also be able to fix problems that occur. It’s likely in just a few years time, in-home robots costing less than a $1,000 dollars will know how to put out a fire with an extinguisher, turn off a flooding bathtub, or squish a black widow.

Read more

Recognizing the importance of biofuels to energy and climate security, the U.S. Department of Energy has announced up to $90 million in project funding focused on designing, constructing and operating integrated biorefinery facilities. The production of biofuels from sustainable, non-food, domestic biomass resources is an important strategy to meet the Administration’s goals to reduce carbon emissions and our dependence on imported oil.

Project Development for Pilot and Demonstration Scale Manufacturing of Biofuels, Bioproducts, and Biopower is a funding opportunity meant to assist in the construction of bioenergy infrastructure to integrate cutting-edge pretreatment, process, and convergence technologies. Biorefineries are modeled after petroleum refineries, but use domestic biomass sources instead of crude oil, or other fossil fuels to produce biofuels, bioproducts, and biopower. They convert biomass feedstocks—the plant and algal materials used to derive fuels like ethanol, butanol, biodiesel and other hydrocarbon fuels—to another form of fuel or energy product. This funding will support efforts to improve and demonstrate processes that break down complex biomass feedstocks and convert them to gasoline, diesel and jet fuel, as well as plastics and chemicals.

“The domestic bio-industry could play an important part in the growing clean energy economy and in reducing American dependence on imported oil,” said Lynn Orr, DOE’s under secretary for science and energy. “This funding opportunity will support companies that are working to advance current technologies and help them overcome existing challenges in bioenergy so the industry can meet its full potential.”

Read more