Blog

Archive for the ‘security’ category: Page 71

Jun 18, 2021

Photonic transistor and router using a single quantum-dot-confined spin in a single-sided optical microcavity

Posted by in categories: computing, internet, particle physics, quantum physics, security

Circa 2017


The future Internet is very likely the mixture of all-optical Internet with low power consumption and quantum Internet with absolute security. The optical regular Internet would be used by default, but switched over to quantum Internet when sensitive data need to be transmitted. PT and and its counterpart in the quantum limit SPT would be the core components for both OIP and QIP in future Internet. Compared with electronic transistors, PTs/SPTs potentially have higher speed, lower power consumption and compatibility with fibre-optic communication systems.

Several schemes for PT6,7,8,9,10 and SPT11,12,13,14,15,16,17 have been proposed or even proof-of-principle demonstrated. All these prototypes exploit optical nonlinearities, i.e., photon-photon interactions18. However, photons do not interact with each other intrinsically, so indirect photon-photon interactions via electromagnetically induced transparency (EIT)19, photon blockade20 and Rydberg blockade21 were intensively investigated in this context over last two decades in either natural atoms22,23 or artificial atoms including superconducting boxes24,25 and semiconductor quantum dots (QDs)12,13. PT can seldom work in the quantum limit as SPT with the gain greater than 1 because of two big challenges, i.e., the difficulty to achieve the optical nonlinearities at single-photon levels and the distortion of single-photon pulse shape and inevitable noise produced by these nonlinearities26. The QD-cavity QED system is a promising solid-state platform for information and communication technology (ICT) due to their inherent scalability and matured semiconductor technology. But the photon blockade resulting from the anharmonicity of Jaynes-Cummings energy ladder27 is hard to achieve due to the small ratio of the QD-cavity coupling strength to the system dissipation rates12,13,28,29,30,31,32 and the strong QD saturation33. Moreover, the gain of this type of SPT based on the photon blockade is quite limited and only 2.2 is expected for In(Ga)As QDs12,13.

Continue reading “Photonic transistor and router using a single quantum-dot-confined spin in a single-sided optical microcavity” »

Jun 11, 2021

Portable technology offers boost for nuclear security, arms control

Posted by in categories: engineering, physics, security

About five years ago, Areg Danagoulian, associate professor in the MIT Department of Nuclear Science and Engineering (NSE), became intrigued by a technique developed by researchers at Los Alamos National Laboratory that uses a neutron beam to identify unknown materials.

“They could look into a black box containing uranium and say what kind and how much,” says Danagoulian, who directs MIT’s Laboratory of Applied Nuclear Physics (LANPh). “I was thinking about the problem of verifying in warheads, and it just dawned on me, this amazing technology could be applied to what we’re working on.”

But there was a problem: This method, called resonance transmission analysis (NRTA), requires an enormous, expensive apparatus, limiting its utility for the kind of on-site nuclear material applications Danagoulian and his research colleagues focus on. To leapfrog this obstacle, they determined to make NRTA technology portable.

Jun 9, 2021

Quantum computing is inevitable, cryptography prepares for the future

Posted by in categories: chemistry, encryption, mathematics, quantum physics, robotics/AI, security

Quantum computing began in the early 1980s. It operates on principles of quantum physics rather than the limitations of circuits and electricity which is why it is capable of processing highly complex mathematical problems so efficiently. Quantum computing could one day achieve things that classical computing simply cannot. The evolution of quantum computers has been slow, but things are accelerating, thanks to the efforts of academic institutions such as Oxford, MIT, and the University of Waterloo, as well as companies like IBM, Microsoft, Google, and Honeywell.

IBM has held a leadership role in this innovation push and has named optimization as the most likely application for consumers and organizations alike.

Honeywell expects to release what it calls the “world’s most powerful quantum computer” for applications like fraud detection, optimization for trading strategies, security, machine learning, and chemistry and materials science.

Jun 9, 2021

Hackers can mess with HTTPS connections

Posted by in categories: encryption, security

Typically abbreviated as TLS, Transport Layer Security uses strong encryption to prove that an end user is connected to an authentic server belonging to a specific service (such as Google or Bank of America) and not an impostor masquerading as that service. TLS also encrypts data as it travels between an end user and a server to ensure that people who can monitor the connection can’t read or tamper with the contents. With millions of servers relying on it, TLS is a cornerstone of online security.

In a research paper published on Wednesday, Brinkmann and seven other researchers investigated the feasibility of using what they call cross-protocol attacks to bypass TLS protections. The technique involves an MitM attacker redirecting cross-origin HTTP requests to servers that communicate over SMTP, IMAP, POP3, or FTP, or another communication protocol.

The main components of the attack are the client application used by the targeted end user, denoted as C; the server the target intended to visit, denoted as Sint; and the substitute server, a machine that connects using SMTP, FTP, or another protocol that’s different from the one serverint uses but with the same domain listed in its TLS certificate.

Jun 7, 2021

New tech cheaply produces lithium and H2, while desalinating seawater

Posted by in categories: chemistry, security, sustainability

With the rise of the lithium-based battery, demand for this soft, silvery-white metal – the lightest solid element in the periodic table – has exploded. With the race to zero carbon by 2050 gathering steam, forcing the electrification of transport, lithium will be an even more valuable asset in the next 30 years.

The supply of raw materials for batteries could even end up being a national security issue, too; China’s global leadership on high-volume EV production has put it ahead of the game, and while the majority of ground-based lithium reserves are in the “lithium triangle” of Chile, Bolivia and Argentina, China controls more than half’s the world’s supply simply through investments and ownership. It has shown in the past that it’s not afraid to wield commodity supplies as a weapon.

But as with other metals like uranium, land-based lithium reserves pale in comparison to what’s out there in the sea. According to researchers at Saudi Arabia’s King Abdullah University of Science and Technology (KAUST), there’s about 5000 times as much lithium in the oceans as there is in land deposits, and a newly developed technology could start extracting it cheaply enough to make the big time – while producing hydrogen gas, chorine gas and desalinated water as a bonus.

Jun 1, 2021

Siva Balu — VP / Chief Information Officer — YMCA of the U.S.A. — People, Potential, & Purpose

Posted by in categories: biotech/medical, business, food, information science, life extension, robotics/AI, security

With 2700 locations across 10000 U.S. communities, YMCA is becoming a major hub for healthy living — From vaccinations and diabetes prevention programs, to healthy aging and wellness — Siva Balu, VP/Chief Information Officer — The Y of the U.S.A.


Mr. Siva Balu is Vice President and Chief Information Officer of YMCA of the U.S. (Y-USA), where he is working to rethink and reorganize the work of the organization’s information technology strategy to meet the changing needs of Y-USA and Ys throughout the country.

Continue reading “Siva Balu — VP / Chief Information Officer — YMCA of the U.S.A. — People, Potential, & Purpose” »

May 27, 2021

Scientists recognize intruders in noise

Posted by in categories: biological, economics, mathematics, security

## MATHEMATICS • MAY 24, 2021

# *Noise is commonly discarded, but identifying patterns in noise can be very useful.*

*Generalize the Hearst exponent by adding more coefficients in order to get a more complete description of the changing data. This makes it possible to find patterns in the data that are usually considered noise and were previously impossible to analyze.*

Continue reading “Scientists recognize intruders in noise” »

May 26, 2021

Nora Super — Milken Institute — Center for the Future of Aging — Alliance to Improve Dementia Care

Posted by in categories: education, finance, life extension, neuroscience, policy, security

Senior director, milken institute center for the future of aging, milken institute; executive director, alliance to improve dementia care.


Nora Super is the Senior Director of the Milken Institute Center for the Future of Aging (CFA) (https://milkeninstitute.org/centers/center-for-the-future-of-aging) and the Executive Director of the Milken Institute Alliance to Improve Dementia Care (https://milkeninstitute.org/centers/center-for-the-future-of…tia-care).

Continue reading “Nora Super — Milken Institute — Center for the Future of Aging — Alliance to Improve Dementia Care” »

May 25, 2021

Rich people are spending millions on underground bunkers equipped with robot security and movie theaters after a year of man-made and natural threats

Posted by in categories: robotics/AI, security

Interest in such plush panic rooms is skyrocketing, he said. His firm started offering high-end shelters and the like a decade ago — of the 232 it’s built so far, 200 were commissioned in the last five years.


One $14 million panic-room project built in the San Jose Valley includes a bowling alley and indoor pool.

May 22, 2021

Misconfiguration of third party mobile apps exposes the data of 100 million users

Posted by in category: security

Despite the obvious benefits of contemporary cloud-based, mobile application development solutions—such as cloud storage, notification management, real-time databases, and analytics—many developers of these solutions fail to properly take into account the potential security risks involved when these apps are misconfigured.

Most recently, Check Point Research has discovered misconfigurations and implementation issues that have exposed the data of 100 million mobile application users. This kind of exposure places both the users as well as the at risk of reputation threats and security damage. In this instance, the developers left open notification managers, storage locations and real-time databases to access by attackers, thus leaving 100 million users vulnerable.

In terms of real-time databases, can help mobile app users sync their data to the cloud in real time. However, when developers do not correctly implement this service with authentication, any user can theoretically access that database, including all mobile customer data. In fact, researchers expressed surprise at facing no obstacles to accessing these open databases for certain apps on Google Play. Some of the aspects obtainable in this case were device locations, email addresses, passwords, private chats and user identifiers, among other attack vectors. Such vulnerabilities leave all of these users at risk for fraud and identity theft.

Page 71 of 146First6869707172737475Last