Toggle light / dark theme

QC in the mainstream is definitely viable less than 7 yrs. and possible within 5 yrs. However, I have a friend who even believes we’re looking at 3 years.


Internet security, once considered to be strictly in the domain of the wonkiest tech experts, has become central to public discourse over the past year. Besides the attacks on the DNC, even tech savvy business like Snapchat, Oracle and Verizon Enterprise Solutions have had significant breaches in the last year.

For the most part, these attacks were preventable. Often, hackers use a technique called social engineering, to trick people into allowing them into a system. Other times, they exploit a vulnerability in software to give them access to confidential data. In most cases, more stringent procedures can prevent attacks.

However, there is a more serious crisis coming. In five to ten years, we are likely to see quantum computers that are so powerful that they are able to break even the strongest encryption in use today. That means that soon, even our most vital and well protected data will be at risk. So if you want to protect your businesses, you should start preparing now.

Has anyone besides NSA, NIST, DARPA, IARPA, etc. realize and thought about what type of cyber warfare will exist in a QC world? The skillsets alone will be so far advance than the techies that we have seen in most companies today as well as in most government agencies. Granted we’re simplifying things with the platform; however, skillsets will still need to be more advance than what we have seen with the standard techie.


Members of the cryptography community have expressed interest in the National Institute of Standards and Technology’s (NIST) recent call for an algorithm less susceptible to hacks from a computer that does not exist yet.

NIST announced a call for proposals for post-quantum cryptography standardization on Dec. 20. One or more of the proposed algorithms will ultimately replace some of NIST’s cryptographic standards that are most vulnerable to quantum computers. According to Dustin Moody, a mathematician at NIST, 40 people have joined the agency’s online cryptography forum since the call was announced two weeks ago. The forum had about 200 members before the call went out. Moody said that many people were anticipating the announcement, as cryptography enthusiasts tend to run in the same circles.

“Most people who are interested in the field already knew about it,” Moody said. “The call wasn’t a surprise.”

Federal agencies of the US government are expanding their calls for quantum computing resistant encryption methods. In effect, the National Institute of Standards (NIST) recently announced a request for public-key post-quantum algorithms. This action follows warnings from the National Security Agency (NSA) about the risks of potential quantum-based cyberattacks and the NSA’s appeal for developing post-quantum algorithms.

Also read: New Developments in Quantum Computing Impact Bitcoin

Moreover, in the near future, it might possible for anyone to manipulate the awesome power of quantum computing. The astronomical price of a quantum computer would not be a limitation because, for example, IBM is offering to the general public quantum computing via the cloud.

Read more

During an interview with Larry King Friday, cybersecurity expert John McAfee debunked the new FBI report alleging Russian hacking in election 2016.

(WASHINGTON, DC) Following the release of an FBI report outlining Russia’s alleged role in hacking the 2016 election, Larry King sat down to talk with tech pioneer John McAfee to discuss the current state of cybersecurity.

McAfee is no stranger to cybersecurity. As the developer of the first commercial antivirus program, he has been a major player in the industry for the past 50 years. He is also the CEO of MGT Capital Investments, and an outspoken former presidential candidate for the Libertarian Party.

Read more

Breaches, hacking, ransomware, cyber threats, weaponized AI, smart toothbrushes are but a few examples of scary tech out there to make your day less than fantastic.

Weapons systems that think on its own are in production, with governments racing to catch up on how to regulate these fast-paced advancements.

Police and military already use drones and robots to eliminate threats, but (as far as we know) it’s hardware controlled by humans.

Read more

Hmmm.


Technological and human rights implications for the world

China adopted the highly controversial cyber security law on 7th November 2016. The legislation which will take effect in June 2017 was passed by its largely rubber – stamp parliament emphasizing the ‘objective need’ of China as a major internet power. The stated objective of the law is to counter the growing threats such as hacking and terrorism. Overseas critics of the law are not amused as it has already triggered concerns among foreign business and rights groups that the law threatens to shut foreign technology companies out of various sectors which China deems as ‘critical’. The legislation also incorporates contentious requirements for security reviews and for data to be stored on servers in China.

China recognizes that cyberspace profoundly impacts many aspects of national security; it is a national space; a space for military action, important economic action, criminal action and for espionage. So it controls Internet through the world’s most sophisticated online censorship mechanism infamously known outside China as the Great Firewall. The human rights advocates contend that the law will further tighten restrictions on Internet which is already stifled by highly regulated governmental control. The legislation was in drawing board stage for long. Beijing released the draft Cyber Security Law in July 2015 to make all key network infrastructure and information systems ‘secure and controllable’.

Russian Quantum Center (RQC) said that it is ready to collaborate with India and offer its quantum technology that will prevent hackers from breaking into bank accounts. RQC plans to offer ‘quantum cryptography’ that could propel India to the forefront of hack proof communication in sectors such as banking and national and homeland security.

“We are ready to work with Indian colleagues. It (the technology) can’t be bought from the United States as it deals with the government and security,” said Ruslan Yunusov, chief executive at RQC, in an interview.

Established by Russia’s largest global technology hub, Skolkovo in 2010, RQC conducts scientific research that could lead to a new class of technologies. These include developing ‘unbreakable cryptography’ for the banks and the government organisations. It also involves research in areas such as materials with superior properties and new systems for ultrasensitive imaging of the brain. The research is mostly funded by the government money.

Read more

Bob Gourley

Our report on Naturally Better Security dove deep into ways quantum effects can be leveraged to enhance real world cybersecurity. It was our most popular post in November 2016 and the feedback we received was taken as a signal that we should produce more on what CTOs should know about the quantum world. With this post we are kicking off a series of five pieces that will dive into quantum effects. This first post tackles some foundational background that puts the science into a historical context. The second one will discuss the current revolution in quantum computing. The third focuses on security concerns. The forth dives into quantum key distribution. The fifth hits on the “so-what” of the current revolution in terms of security.

So first, foundational background on quantum mechanics.

Read more

QC and Formula 1 another opportunity and believer.


In the latest of our occasional series of interviews with interesting players behind the scenes in Formula 1 we meet a Russian scientist, who is keeping the Toro Rosso safe from cyber attacks and who has big plans for using quantum computers to create new F1 materials.

Acronis is a data support and protection business that was founded in 2003. It reportedly has five million personal consumers and 500,000 businesses using its technology in over 145 countries and offers services such as cloud security, data back up and recovery support.

Here James Allen interviews Acronis CEO Serguei Beloussov, who has a PhD in physics and sits on the board of directors at the Russian Quantum Center and Centre for Quantum Technologies in Singapore, about why Acronis has decided to spend its money on F1.