Toggle light / dark theme

Canadian reactor designer StarCore Nuclear has applied to the Canadian Nuclear Safety Commission (CNSC) to begin the vendor design review process for its Generation IV high temperature gas reactor (HTGR).

Montréal-based StarCore, founded in 2008, is focused on developing small modular reactors (SMRs) to provide power and potable water to remote communities in Canada. Its standard HTGR unit would produce 20 MWe (36 MWth), expandable to 100 MWe, from a unit small enough to be delivered by truck. The helium-cooled reactor uses Triso fuel — spherical particles of uranium fuel coated by carbon which effectively gives each tiny particle its own primary containment system — manufactured by BWXT Technologies. Each reactor would require refuelling at five-yearly intervals.

StarCore describes its reactor as “inherently safe”, with a steep negative thermal coefficient which eliminates the possibility of a core meltdown. The use of helium — which does not become radioactive — as a coolant means that any loss of coolant would be “inconsequential”, the company says. The reactors would be embedded 50 metres underground in concrete silos sealed with ten-tonne caps.

Read more

In the past, the United Nations has considered the threat posed by weaponized AI, but now the body is looking at a more mundane, but still important, robot invasion. A report from the latest UN Conference on Trade and Development has outlined how the increasing use of industrial automation is impacting jobs in developing countries, and what strategies may help in overcoming the problem.

Robots taking over human jobs has been a concern for decades, but those concerns generally focus on developed countries. The report points out that developing countries in Africa and Latin America may be at greater risk of having their industrialization slow down, since the increasing use of robots is eating into the low-cost labor advantage that developing countries have traditionally held. Up to two thirds of those occupations may be at risk.

Another issue is the trend of “reshoring.” Functioning as opposite of offshoring, reshoring sees companies move their labor operations back to developed countries, to be carried out by robots or automated systems. While it has the potential to disrupt developing countries from industrializing, the report notes that reshoring has so far been slow-paced, and hasn’t undermined the continued offshoring.

Read more

It seems like every television season plays host to a single show that takes over our cultural consciousness by coating modern fears in fantastical drama.

Game of Thrones taps into the cutthroat nature of modern politics, while The Walking Dead plays into our ever-present fear of a worldwide contagion. This year, with Elon Musk’s dire warnings about the dangers of artificial intelligence, Siri and Alexa permeating our personal lives, and self-driving cars threatening to run down groups of children, Westworld is posed to be that show.

Westworld is complex. It’s that complexity, interwoven with mysteries and plot twists, that produces the hours of online speculation and wild fan theories that are the hallmark of anything worth watching.

Read more

WeaRobot wants to democratize robotic exoskeletons. They want to make modular exoskeletons, so that is more affordable. The exoskeleton can boost the mobility joint by joint. Just supporting the movement of one knee or one elbow or assembling all modules for a full body exoskeleton. This is targeted at enhancing mobility and function for the growing elderly population.

WeaRobot is breaking apart robotic exoskeletons to make them more affordable and adaptable.

Robotic exoskeletons are electromechanical suits that can give paraplegic people the chance to walk again. Full body suits produce impressive results, such as teaching dormant body parts to move on their own again. But they are expensive, ranging from $40,000 to more than $100,000. Now, a Mexican robotics startup is breaking exoskeletons down into smaller pieces, with the goal of making this medical technology affordable and adaptable.

Read more

Worried about security for your bitcoin in the face of quantum computing? According to computer researchers, there’s no reason to be.

Source: https://hacked.com/breathe-easy-bitcoiners-quantum-computing…encryption

Quantum mech

Some people assume that once quantum computing comes along modern encryption technologies will be outpowered. But experts are starting to posit that hash functions and asymmetric encryption could defend not only against modern computers, but also against quantum attackers from the future.

Matthew Amy from Canada’s University of Waterloo proposes just this in a paper by the International Association of Cryptologic Research.

Amy, and researchers from Perimeter Institute for Theoretical Physics and the Canadian Institute for Advanced Research, examined attacks against SHA-2 and SHA-3 with Grover’s algorithm.

Grover’s algorithm is a quantum algorithm that finds with high probability the input to black box functions that produce particular, and predictable, output values.

Grover’s algorithm could brute-force a 128-bit symmetric cryptographic key in roughly 264iterations,” Wikipedia states, “or a 256-bit key in roughly 2128 iterations. As a result, it is sometimes suggested that symmetric key lengths be doubled to protect against future quantum attacks.”

Researchers surmise SHA-256 and SHA3-256 need 2166 “logical qubit cycles” to break, and the paper suggests quantum papers pose little threat, though classical processors will need to manage them.

The paper notes: “The main difficulty is that the coherence time of physical qubits is finite. Noise in the physical system will eventually corrupt the state of any long computation,” the paper states. “Preserving the state of a logical qubit is an active process that requires periodic evaluation of an error detection and correction routine.”

With ASICs running at a few million hashes per second, it would take Grover’s algorithm 1032 years to crack SHA-256 or SHA3-256. That is longer than the universe has existed.

As The Register adds: “Even if you didn’t care about the circuit footprint and used a billion-hash-per-second Bitcoin-mining ASIC, the calculation still seems to be in the order of 1029 years.”

SHA-2 is the set of cryptographic hash functions designed by the National Security Agency (NSA), an intelligence branch of the US government under scrutiny for ubiquitous surveillance due to revelations released by Edward Snowden. SHA stands for “Secure Hash Algorithm.”

These hash functions represent mathematical operations run by digital means Cryptographic hash functions boast collision resistance, which means attackers cannot find two different input values that result in the same hash output. The SHA-2 family is comprised of altogether six hash functions with hash values that are 224, 256, 384 or 512 bits: SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256.

SHA-256 and SHA-512 are novel hash functions computed with 32-bit and 64-bit words, respectively.