Goto

Collaborating Authors

 encryption


Quantum computers could usher in a crisis worse than Y2K

New Scientist

Quantum computers could cause a global security crisis that makes the once-feared millennium bug, or Y2K, look quaint. This infamous computer risk was averted through the persistent behind-the-scenes work of engineers across the world, but whether the new threat will be tackled similarly is an urgent yet unresolved question. Most digital communications and transactions are protected by cryptography based on mathematical problems that are unsolvable by conventional computers but are solvable by a sufficiently capable quantum computer. Researchers have understood this since the late 1990s, but the day when this capable-enough quantum computer comes online - or Q-Day - was thought to be very far in the future. Working quantum computers are now a reality, and recent leaps in how to use them are bringing Q-Day ever closer.


The first quantum computer to break encryption is now shockingly close

New Scientist

A quantum computer capable of breaking the encryption that secures the internet now seems to be just around the corner. Stunning revelations from two research teams outline how it could happen, with one suggesting that the current largest quantum machine is already more than halfway towards the size needed. The two studies concern an encryption technique built around the elliptic curve discrete logarithm problem (ECDLP). The particulars of how this mathematical problem is solved made it a good candidate for encrypting data and led to its widespread adoption for securing lots of internet communication, including bank transactions, and nearly every major cryptocurrency, including bitcoin. It is extremely difficult for conventional computers to crack ECDLP-based encryption, but since the 1990s researchers have known that quantum computers wouldn't have the same trouble.


How to Organize Safely in the Age of Surveillance

WIRED

From threat modeling to encrypted collaboration apps, we've collected experts' tips and tools for safely and effectively building a group--even while being targeted and tracked by the powerful. Rarely in modern US history have so many Americans opposed the actions of the federal government with so little hope for a top-down political solution. That's left millions of people seeking a bottom-up approach to resistance: grassroots organizing. Yet as Americans assemble their own movements to protect and support immigrants, push back against the Department of Homeland Security's dangerous incursions into cities, and protest for civil rights and policy changes, they face a federal government that possesses vast surveillance powers and sweeping cooperation from the Silicon Valley companies that hold Americans' data. That means political, social, and economic organizing presents a risky dilemma. How do you bring people of all ages, backgrounds, and technical abilities into a mass movement without exposing them to monitoring and targeting by a government--and in particular Immigration and Customs Enforcement and Customs and Border Protection, agencies with paramilitary ambitions, a tendency to break the law, and more funding than some countries' militaries. Organizing safely in an age of surveillance increasingly requires not only technical security know-how, but also a tricky balance between secrecy and openness, says Eva Galperin, the director of cybersecurity at the Electronic Frontier Foundation, a nonprofit focused on digital civil liberties.