Blog

Archive for the ‘encryption’ category: Page 52

Sep 20, 2015

The Search for Extraterrestrial Life and Encrypted Space Communication

Posted by in categories: alien life, encryption, existential risks, information science


Neil deGrasse Tyson and Edward Snowden recently discussed the idea that encryption mechanisms with advanced extraterrestrial species and humans could theoretically render communication as indistinguishable from cosmic background radiation. With only a short period of time in a species growth where open communication is broadcast to the stars (through the sluggish and primitive nature of radio broadcasts), this could prevent us (or other species) from making contact with one another.

With the Drake Equation stating a high probability of communicative extraterrestrial civilizations and the contrasting Fermi Paradox citing lacking evidence of such, it begs the question of whether outlying reasons have an impact. In my opinion, the Drake Equation rings true in the sense that hundreds of billions of stars exist in our galaxy alone (many with their own diverse planetary bodies), setting the stage for extraterrestrial life to disavow itself as insatiable ramblings. Unlike that which is eminent in the Fermi Paradox, I believe, in this case, a conclusion based off of inductive reasoning seems to hold more water than an evidence-only approach.

Keeping in mind the discussion in The Guardian article, a flaw of the Fermi Paradox’s evidence-based perspective should become apparent: secure, encrypted communication (cloaked by design) would render the existence of extraterrestrial intelligence invisible to the prying ear. If intentional, there could be many reasons for withholding this whereabouts of a species location. An abstract theory from science fiction may itself hold a degree of truth. An example of which, is the video game series ‘Mass Effect,’ where an advanced, sentient machine-race cleanse the galaxy of advanced life every 40,000 years. The reasoning for doing so is to “bring order to chaos” and for reasons “unfathomable.” Be it for an abstract reason such as this or simply for secure communication, the encryption of the resultant transmission’s presence wouldn’t register as noticeable to any observers. As nearly all signs of outside life would be mute, it then lays in the other senses that hold the most promise of enlightenment.

Read more

Sep 16, 2015

New quantum dot could make quantum communications possible

Posted by in categories: encryption, quantum physics

Real world quantum encryption and communication may just have gotten a whole lot closer, with a new super-accurate quantum dot.

Read more

Sep 4, 2015

The 10 Algorithms That Dominate Our World

Posted by in categories: computing, encryption, information science

1. Google Search.

2. Facebook’s News Feed.

Continue reading “The 10 Algorithms That Dominate Our World” »

Aug 20, 2015

Tech’s Biggest Ideas and How They Take Hold — With Marc Andreessen and Dan Siroker | Andreessen Horowitz

Posted by in categories: augmented reality, biotech/medical, cryptocurrencies, encryption, internet, mobile phones, polls, robotics/AI, transparency, virtual reality

Aug 18, 2015

Cryptographers Develop Encryption Method Resistant to Future Quantum Attacks

Posted by in categories: computing, encryption, internet, quantum physics

Cryptographers are working on new encryption methods able to protect today’s Internet communications from future quantum computers that can be able to break today’s cryptography techniques. The researchers have developed upgrades to the Internet’s core encryption protocol that will prevent quantum computer users from intercepting Internet communications.

Read more

Aug 3, 2015

Microsoft Works Out How to Upgrade Online Encryption to Protect Against Quantum Computers

Posted by in categories: biotech/medical, computing, encryption, energy

Call it an abundance of caution. A Microsoft research project has upgraded the encryption protocol that secures the Web to resist attacks from quantum computers—machines that are expected to have stupendous power but have never been built.

Governments and computing giants like IBM, Microsoft, and Google are working on quantum computers because tapping subtle effects of quantum physics should let them solve in seconds some problems that a conventional machine couldn’t solve in billions of years (see “Microsoft’s Quantum Mechanics”). That might allow breakthroughs in areas such as medicine or energy. But such machines would also be able to easily break the encryption used to secure information online.

Read more

Jul 7, 2015

Passfaces: Strong authentication for the masses

Posted by in categories: big data, business, computing, encryption, finance, information science, internet

Last year, Google began experimenting with hardware-based schemes for user-authentication, while Apple added two factor authentication to iCloud and Apple ID users. They began sending a verification code to users via a mobile number registered in advance.

Security pundits know that two factor authentication is more secure than simple passwords. As a refresher, “Factors” are typically described like this:

  • Something that you know (a password — or even better, a formula)
  • Something that you have (Secure ID token or code sent to cell phone)
  • Something that you are (a biometric: fingerprint, voice, face, etc.)

The Google project may be just another method of factor #2. In fact, because it is small (easily misplaced or stolen), it simplifies but does not improve on security. I suggest a radical and reliable method of authentication. It’s not new and it’s not my idea…

password_key

Continue reading “Passfaces: Strong authentication for the masses” »

Jun 7, 2015

“Brainprints” Could Be Future Security ID — By Christopher Intagliata Scientific American

Posted by in categories: encryption, neuroscience, security

http://www.gadgetgestures.com/wp-content/uploads/2015/06/555x416xBrain-Prints-Replace-Passwords.jpg.pagespeed.ic.Lhswu3zDR3.jpg

Biometric technology was once the stuff of sci-fi—how many movies show someone having their hand or eye scanned to get entry into a secured facility? But today biometric tech can be found in millions of people’s pockets—as the fingerprint scanner on an iPhone.

Of course, fingerprint scanning isn’t foolproof. Hackers have stolen fingerprints from photos, and used fake prints to fool Apple’s touch ID. Plus, there’s always the brute force method, like the time a gang in Malaysia cut off a guy’s fingertip—with a machete—to interface with the fingerprint-recognition system on the victim’s Mercedes. Read more

Jun 3, 2015

Quantum Entanglement: EPR Paradox

Posted by in categories: encryption, general relativity, physics, quantum physics, science

When I was a freshman at Cornell University some decades ago, I had a memorable teaching assistant for CS100, the entry level computer programming course taken by nearly every student in Engineering or Arts & Sciences. Gilles Brassard, a French Canadian, is now a chaired math professor at Université de Montréal and a preeminent cryptographer. He has also been inducted into the Royal Order of Canada. I am told that this is a bit like being knighted. In fact, this highest of civilian honors was established by Queen Elizabeth.

The author with Gilles Brassard in 2014

The author with Gilles Brassard in 2014

Gilles was a graduate student at Cornell in the mid ’70s. Back then, public key encryption was a radical concept. Named for three MIT professors who described it, RSA is now it is at the heart of every secure Internet transaction. Yet, the new generation of cryptographers refers to RSA as “classical cryptography”. The radicals have moved on to Quantum Cryptography. Gilles and his collaborator, Charles Bennett, are the pioneers and leaders in this burgeoning field. No one else is even pretender to the throne.

In its simplest terms, quantum cryptography achieves a secure communication channel because it relies on a stream of individual particles or “quanta” to convey information. If information is sent without any fat at all—just the minimum physics that can support the entropy—then any eavesdropping or rerouting of a message can be detected by the recipient. Voila! Perfect authentication, fidelity and security. Communication is secure because any attack can be detected.

Continue reading “Quantum Entanglement: EPR Paradox” »

Jun 3, 2015

How the Tech Behind Bitcoin Could Stop the Next Snowden — Klint Finley Wired

Posted by in categories: bitcoin, encryption, government, hacking, information science, privacy, security

The National Security Agency knows Edward Snowden disclosed many of its innermost secrets when he revealed how aggressive its surveillance tactics are. What it doesn’t know is just how much information the whistleblower took with him when he left.

For all of its ability to track our telecommunications, the NSA seemingly has little clue exactly what documents, or even how many documents, Snowden gave to the media. Like most large organizations, the NSA had tools in place to track who accessed what data and when. But Snowden, a system administrator, apparently was able to cover his tracks by deleting or modifying the log files that tracked that access. Read more

Page 52 of 54First4748495051525354