Tuesday, April 13, 2021

Democratizing Facial Recognition

Intel demonstrated facial authentication solutions which the company said are as accurate as Apple's Face ID for iPhone, claiming one false positive in a million identifications. Intel's similarly named RealSense ID technology performs face authentication for any device running the Windows, Linux, or Android operating systems. FULL TEXT

Wednesday, March 24, 2021

DARPA's Subterranean Challenge UPDATE

The U.S. Defense Department's DARPA Subterranean Challenge aims to develop innovative technologies that would augment operations underground. Credit: Team Cerberus FULL TEXT

Thursday, July 23, 2020

#NEWS Hardening Java Crypto

World's First Cryptographer circa WWII

The new frontier being pursued by government, industry, and academia are automated software tools that are capable of culling vulnerabilities before releasing source code into the wild. When run on existing software, such as the open-source Apache programs managing the world's servers, these tools also are finding a surprising number of vulnerabilities in software that is decades old.

Thursday, July 09, 2020

#NEWS Towards and Unhackable Quantum Internet

Harvard University researchers claim to have uncovered the "missing link" towards an unhackable quantum Internet that one-ups the security of the DarkNet. By correcting for the signal loss in today's quantum key distribution—its Achilles heel—these researchers have demonstrated a prototype quantum repeater that allows the long-distance transmission necessary for an unhackable quantum Internet.


Monday, June 15, 2020

#NEWS #AI vs. AI

This battle of the AIs—pitting fraudster again cybersecurity—is also being fought in the trenches of fake news, fake videos, and fake audio. Thus the arms race has begun: AI versus AI.

Tuesday, April 28, 2020

#NEWS Commercial #Quantum Computing Now Possible

Quantum supremacy is best achieved by reducing the complexity of quantum computing devices to make them more affordable than today's computers, as illustrated recently by Intel's Horse Ridge chip (a single chip cast in its 22-nanometer complementary metal oxide semiconductor (CMOS).


Tuesday, March 24, 2020

#NEWS Keeping Government Out of Your Business

The U.S. Electronic Communications Privacy Act (ECPA) grants government agencies permission to surveil citizens who assume privacy in their electronic communications. Today such oversight, even by the U.S. Congress, is opaque (summarized and anonymized), and any notification of those being monitored nearly always takes place after the fact.

New Mexico State University (NMSU) researchers presented a paper at the ACM Conference on Computers, Communications and Security (CCS 2019, London) in which they claimed to be able to automate proactive oversight that prevents privacy violations before they occur, using algorithms and blockchain in the form of what they call the Enforcer software.

Friday, February 28, 2020

#NEWS Hacking Bluetooth

Bluetooth wirelessly connects (or pairs) Internet of Things (IoT) devices—usually wireless peripherals such as ear-buds, speakers, watches, health monitors and location beacons—with host wireless devices such as smartphones or tablets. The limited physical distance between hosts and peripherals, unfortunately, has resulted in their cybersecurity being lax, according to Carl Gunter, a professor in the computer science department of the University of Illinois at Urbana-Champaign.