Blog

Archive for the ‘internet’ category: Page 253

Jan 22, 2018

We Put The Entire Internet On The Blockchain—and You Can Too — By Erin Griffith | Wired

Posted by in category: internet

“Friday morning, David Tran, co-founder and CTO of PR-software startup Upbeat, did just that. Tran built and published a Chrome extension called On The Blockchain in around 15 minutes. Subtitle: “Everything is better on the blockchain.””

Read more

Jan 19, 2018

Real-world intercontinental quantum communications enabled by the Micius satellite

Posted by in categories: encryption, internet, mathematics, quantum physics, security, space

A joint China-Austria team has performed quantum key distribution between the quantum-science satellite Micius and multiple ground stations located in Xinglong (near Beijing), Nanshan (near Urumqi), and Graz (near Vienna). Such experiments demonstrate the secure satellite-to-ground exchange of cryptographic keys during the passage of the satellite Micius over a ground station. Using Micius as a trusted relay, a secret key was created between China and Europe at locations separated up to 7,600 km on the Earth.

Private and secure communications are fundamental for Internet use and e-commerce, and it is important to establish a secure network with global protection of data. Traditional public key cryptography usually relies on the computational intractability of certain mathematical functions. In contrast, quantum key distribution (QKD) uses individual light quanta (single photons) in quantum superposition states to guarantee unconditional security between distant parties. Previously, the quantum communication distance has been limited to a few hundred kilometers due to optical channel losses of fibers or terrestrial free space. A promising solution to this problem exploits satellite and space-based links, which can conveniently connect two remote points on the Earth with greatly reduced channel loss, as most of the photons’ propagation path is through empty space with negligible loss and decoherence.

A cross-disciplinary multi-institutional team of scientists from the Chinese Academy of Sciences, led by Professor Jian-Wei Pan, has spent more than 10 years developing a sophisticated satellite, Micius, dedicated to quantum science experiments, which was launched on August 2016 and orbits at an altitude of ~500 km. Five ground stations in China coordinate with the Micius satellite. These are located in Xinglong (near Beijing), Nanshan (near Urumqi), Delingha (37°22’44.43’‘N, 97°43’37.01” E), Lijiang (26°41’38.15’‘N, 100°1’45.55’‘E), and Ngari in Tibet (32°19’30.07’‘N, 80°1’34.18’‘E).

Continue reading “Real-world intercontinental quantum communications enabled by the Micius satellite” »

Jan 17, 2018

Philip K. Dick and the Fake Humans

Posted by in categories: finance, information science, internet, robotics/AI

Standard utopias and standard dystopias are each perfect after their own particular fashion. We live somewhere queasier—a world in which technology is developing in ways that make it increasingly hard to distinguish human beings from artificial things. The world that the Internet and social media have created is less a system than an ecology, a proliferation of unexpected niches, and entities created and adapted to exploit them in deceptive ways. Vast commercial architectures are being colonized by quasi-autonomous parasites. Scammers have built algorithms to write fake books from scratch to sell on Amazon, compiling and modifying text from other books and online sources such as Wikipedia, to fool buyers or to take advantage of loopholes in Amazon’s compensation structure. Much of the world’s financial system is made out of bots—automated systems designed to continually probe markets for fleeting arbitrage opportunities. Less sophisticated programs plague online commerce systems such as eBay and Amazon, occasionally with extraordinary consequences, as when two warring bots bid the price of a biology book up to $23,698,655.93 (plus $3.99 shipping).

In other words, we live in Philip K. Dick’s future, not George Orwell’s or Aldous Huxley’s. Dick was no better a prophet of technology than any science fiction writer, and was arguably worse than most. His imagined worlds jam together odd bits of fifties’ and sixties’ California with rocket ships, drugs, and social speculation. Dick usually wrote in a hurry and for money, and sometimes under the influence of drugs or a recent and urgent personal religious revelation.

Still, what he captured with genius was the ontological unease of a world in which the human and the abhuman, the real and the fake, blur together. As Dick described his work (in the opening essay to his 1985 collection, I Hope I Shall Arrive Soon):

Continue reading “Philip K. Dick and the Fake Humans” »

Jan 12, 2018

Could decentralized systems replace Google?

Posted by in category: internet

The internet is ruled by a small number of massive corporations. Roger McNamee, Co-founder of Elevation Partners on CNBC, says, Google, Facebook, Amazon are increasingly just super-monopolies, especially Google … The share of the markets they operate in is literally on the same scale that Standard Oil had … more than 100 years ago—with the …

Read more

Jan 11, 2018

Tougher WiFi security will keep you safe at the coffee shop

Posted by in categories: encryption, habitats, internet, security, wearables

WiFi security hasn’t changed much since WPA2 came to be in 2004, and that’s becoming increasingly apparent when public hotspots are frequently risky and glaring exploits are all too common. It’s about to get a long-due upgrade, though: the Wi-Fi Alliance plans to roll out a WPA3 standard that addresses a number of weak points. For many, the highlight will be individualized data encryption. Even if you’re on an open public network, you won’t have to worry quite so much about someone snooping on your data.

You’ll also see safeguards even when people have terrible passwords, and a simplified security process for devices that have either a tiny display or none at all (say, wearable devices or smart home gadgets). And companies or governments that need stricter security will have access to a 192-bit security suite.

WPA3 should arrive sometime in 2018, and comes on the back of other improvements like more thorough testing to catch potential vulnerabilities before they require emergency patches. These initiatives aren’t going to guarantee airtight security when you’re at the coffee shop, but they could at least eliminate some of WiFi’s more worrying flaws.

Continue reading “Tougher WiFi security will keep you safe at the coffee shop” »

Jan 11, 2018

Consumer Electronics Show chock full of gadgets to make our lives easier, but do we need them?

Posted by in categories: biotech/medical, food, habitats, internet, robotics/AI

Today’s vision of a smart home has more to do with what’s technologically possible than what people really need.

Thus the endless parade of internet-connected wine openers, water bottles, meat thermometers and refrigerators, and a dearth of automation that would clean and fold our laundry, pick up things around the house or assist aging people as their physical strength wanes.

Not that some tinkerers aren’t trying to come up with life-changing tools. The annual Consumer Electronics Show, which opened in Las Vegas on Tuesday, is a showcase of the latest innovations from big corporations and tiny startups. Some of these inventions could soon be useful to consumers. Others look outlandishly impractical — or maybe it’s too soon to tell.

Read more

Jan 9, 2018

How ‘China’s Steve Jobs’ bit off more than he could chew and saw his tech empire collapse

Posted by in categories: internet, robotics/AI

His ultimate quest, though, was the automobile. The integration of the internet and self-driving, emission-free vehicles, he once said, would not only clean up the country’s polluted cities, it would free up millions of people to consume more of LeEco’s services on their commutes.


Visionary or reckless risk-taker? Self-made internet entrepreneur Jia Yueting once ranked among China’s richest men, but overexpansion and a funding crunch have him scrambling to save his sprawling tech empire.

Read more

Jan 7, 2018

Revenue Neutral model reduces altcoin investment risk

Posted by in categories: bitcoin, cryptocurrencies, economics, finance, geopolitics, internet

Titles are chosen by editors and not journalists or experts. I fought my editor over the above title. Yes, I address the teaser—and I explain a solid altcoin investment model. But, that comes after the break. The first part of this article should be titled “Why would anyone quote cost or value in Bitcoin?”. The subjects are highly related, so bear with me…

Today, a reader asked this question:

Some financial sites discuss value in Bitcoin terms, rather
than dollars or Euros. Why would I calculate the value of a
new car, my rent or an investment in this way? It’s hard to
understand how much money I need!

Answer: Your right! It’s difficult to estimate the value of a car or your rent in terms of Bitcoin. You are paid in dollars or Euros—and your landlord quotes rent in the same currency.

Continue reading “Revenue Neutral model reduces altcoin investment risk” »

Jan 7, 2018

8 Trends of the Internet of Things in 2018

Posted by in categories: bitcoin, computing, internet

Internet of Things trends for 2018. Our expert Ahmed Banaf reviews how this tech trend will evolve this year: dat analytics, fog computing and blockchain.

Read more

Jan 4, 2018

Nanoscale cryptography method gains robustness from stiction

Posted by in categories: encryption, internet, nanotechnology, security

Most of the cryptographic methods that keep important data secure use complex encryption software, and as a result, consume large amounts of power. As more and more electronic devices are being connected to the internet, there is a growing need for alternative low-power security methods, and this is often done by basing the security on hardware rather than software.

One of the most promising approaches to hardware-based, low-power security is to derive cryptographic keys from the randomness that inherently and uncontrollably emerges during the of nanoscale devices. These methods, called “physical unclonable functions” (PUFs), convert the random variations in the physical devices into the binary states of “0” and “1” to create unique, random cryptographic keys. These keys can then be used to encrypt data into cipher text, as well as decrypt it back into plain text, in a process that remains secure as long as the key remains private.

However, one of the biggest challenges facing PUF technology is its vulnerability to harsh environments. Since the physical randomness that forms the basis of the key usually arises from variations in electrical characteristics, and electrical characteristics are affected by external factors such as high temperatures and radiation, these devices often do not preserve their states when exposed to such conditions.

Continue reading “Nanoscale cryptography method gains robustness from stiction” »