ENERGY | WIRELESS | NANOTECH | MEMS | OPTICS | QUANTUM | 3D | CHIPS | ALGORITHMS

Thursday, July 23, 2020

#NEWS Hardening Java Crypto


World's First Cryptographer circa WWII

The new frontier being pursued by government, industry, and academia are automated software tools that are capable of culling vulnerabilities before releasing source code into the wild. When run on existing software, such as the open-source Apache programs managing the world's servers, these tools also are finding a surprising number of vulnerabilities in software that is decades old.
FULL TEXT

Thursday, July 09, 2020

#NEWS Towards and Unhackable Quantum Internet


Harvard University researchers claim to have uncovered the "missing link" towards an unhackable quantum Internet that one-ups the security of the DarkNet. By correcting for the signal loss in today's quantum key distribution—its Achilles heel—these researchers have demonstrated a prototype quantum repeater that allows the long-distance transmission necessary for an unhackable quantum Internet.

FULL TEXT

Monday, June 15, 2020

#NEWS #AI vs. AI

This battle of the AIs—pitting fraudster again cybersecurity—is also being fought in the trenches of fake news, fake videos, and fake audio. Thus the arms race has begun: AI versus AI.
FULL TEXT

Tuesday, April 28, 2020

#NEWS Commercial #Quantum Computing Now Possible


Quantum supremacy is best achieved by reducing the complexity of quantum computing devices to make them more affordable than today's computers, as illustrated recently by Intel's Horse Ridge chip (a single chip cast in its 22-nanometer complementary metal oxide semiconductor (CMOS).

FULL TEXT

Tuesday, March 24, 2020

#NEWS Keeping Government Out of Your Business

The U.S. Electronic Communications Privacy Act (ECPA) grants government agencies permission to surveil citizens who assume privacy in their electronic communications. Today such oversight, even by the U.S. Congress, is opaque (summarized and anonymized), and any notification of those being monitored nearly always takes place after the fact.

New Mexico State University (NMSU) researchers presented a paper at the ACM Conference on Computers, Communications and Security (CCS 2019, London) in which they claimed to be able to automate proactive oversight that prevents privacy violations before they occur, using algorithms and blockchain in the form of what they call the Enforcer software.
FULL TEXT

Friday, February 28, 2020

#NEWS Hacking Bluetooth


Bluetooth wirelessly connects (or pairs) Internet of Things (IoT) devices—usually wireless peripherals such as ear-buds, speakers, watches, health monitors and location beacons—with host wireless devices such as smartphones or tablets. The limited physical distance between hosts and peripherals, unfortunately, has resulted in their cybersecurity being lax, according to Carl Gunter, a professor in the computer science department of the University of Illinois at Urbana-Champaign.

FULL TEXT

Tuesday, January 07, 2020

#NEWS Demanding the Truth

The U.S. Senate's Select Committee on Intelligence in October released to the public a report titled Russian Active Measures Campaign and Interference in the 2016 U.S. Election, which concluded that the Internet Research Agency (IRA), a Russian group engaged in online influence operations on behalf of Russian business and political interests, had "used social media to sow disinformation and discord among the American electorate."
FULL TEXT