{"id":34198,"date":"2017-02-05T12:04:32","date_gmt":"2017-02-05T20:04:32","guid":{"rendered":"http:\/\/lifeboat.com\/blog\/2017\/02\/clues-to-protect-quantum-computing-networks-from-hack-attacks-uncovered"},"modified":"2017-04-24T18:53:42","modified_gmt":"2017-04-25T01:53:42","slug":"clues-to-protect-quantum-computing-networks-from-hack-attacks-uncovered","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2017\/02\/clues-to-protect-quantum-computing-networks-from-hack-attacks-uncovered","title":{"rendered":"Clues to protect quantum computing networks from hack attacks uncovered"},"content":{"rendered":"<p><\/p>\n<p><iframe style=\"display: block; margin: 0 auto; width: 100%; aspect-ratio: 4\/3; object-fit: contain;\" src=\"https:\/\/www.youtube.com\/embed\/k1pHnKvuX54?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; encrypted-media; gyroscope;\n   picture-in-picture\" allowfullscreen><\/iframe><\/p>\n<p>I truly don\u2019t mean to be so blunt about this article and the researchers involved. 1st of all this is a bogus report trying to make a team and their work get noticed. 2nd, anyone who sets up their QC this sloppy as this team did to prove hacking I would hope would never be hired into my organization as an admin or security officer.<\/p>\n<p>The reality is that real QC environments in the real world with a qualified CSO\/ CISO would never leave so many back doors open in reality.<\/p>\n<p>So, this is a simulated version purposely set up with many holes and back doors in the prototype. So, readers be cautious is my suggestion.<\/p>\n<hr>\n<p>Quantum computing, where bits of information can simultaneously hold multiple states, is also vulnerable to hacking. \u2014 Clues to protect quantum computing networks from hack attacks uncovered.<\/p>\n<p><!-- Link: <a href=\"http:\/\/www.bgr.in\/news\/clues-to-protect-quantum-computing-networks-from-hack-attacks-uncovered\/\">http:\/\/www.bgr.in\/news\/clues-to-protect-quantum-computing-ne...uncovered\/<\/a> --><\/p>\n","protected":false},"excerpt":{"rendered":"<p>I truly don\u2019t mean to be so blunt about this article and the researchers involved. 1st of all this is a bogus report trying to make a team and their work get noticed. 2nd, anyone who sets up their QC this sloppy as this team did to prove hacking I would hope would never be [\u2026]<\/p>\n","protected":false},"author":395,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34,1617],"tags":[],"class_list":["post-34198","post","type-post","status-publish","format-standard","hentry","category-cybercrime-malcode","category-quantum-physics"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/34198","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/395"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=34198"}],"version-history":[{"count":3,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/34198\/revisions"}],"predecessor-version":[{"id":49049,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/34198\/revisions\/49049"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=34198"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=34198"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=34198"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}