encryption
Quantum computers could usher in a crisis worse than Y2K
Quantum computers could cause a global security crisis that makes the once-feared millennium bug, or Y2K, look quaint. This infamous computer risk was averted through the persistent behind-the-scenes work of engineers across the world, but whether the new threat will be tackled similarly is an urgent yet unresolved question. Most digital communications and transactions are protected by cryptography based on mathematical problems that are unsolvable by conventional computers but are solvable by a sufficiently capable quantum computer. Researchers have understood this since the late 1990s, but the day when this capable-enough quantum computer comes online - or Q-Day - was thought to be very far in the future. Working quantum computers are now a reality, and recent leaps in how to use them are bringing Q-Day ever closer.
- North America > United States (0.15)
- Europe > Ukraine > Kyiv Oblast > Chernobyl (0.05)
- Europe > United Kingdom > England > Oxfordshire > Oxford (0.05)
- Health & Medicine (1.00)
- Banking & Finance (1.00)
- Information Technology > Security & Privacy (0.69)
- Information Technology > Hardware (1.00)
- Information Technology > Communications > Social Media (1.00)
- Information Technology > Artificial Intelligence (1.00)
The first quantum computer to break encryption is now shockingly close
A quantum computer capable of breaking the encryption that secures the internet now seems to be just around the corner. Stunning revelations from two research teams outline how it could happen, with one suggesting that the current largest quantum machine is already more than halfway towards the size needed. The two studies concern an encryption technique built around the elliptic curve discrete logarithm problem (ECDLP). The particulars of how this mathematical problem is solved made it a good candidate for encrypting data and led to its widespread adoption for securing lots of internet communication, including bank transactions, and nearly every major cryptocurrency, including bitcoin. It is extremely difficult for conventional computers to crack ECDLP-based encryption, but since the 1990s researchers have known that quantum computers wouldn't have the same trouble.
- North America > United States > Texas > Travis County > Austin (0.05)
- North America > United States > Maryland (0.05)
- Europe > United Kingdom > England > Oxfordshire > Oxford (0.05)
- (2 more...)
- Information Technology > Hardware (1.00)
- Information Technology > Communications > Social Media (1.00)
- Information Technology > Artificial Intelligence (1.00)
- Information Technology > e-Commerce > Financial Technology (0.72)
How to Organize Safely in the Age of Surveillance
From threat modeling to encrypted collaboration apps, we've collected experts' tips and tools for safely and effectively building a group--even while being targeted and tracked by the powerful. Rarely in modern US history have so many Americans opposed the actions of the federal government with so little hope for a top-down political solution. That's left millions of people seeking a bottom-up approach to resistance: grassroots organizing. Yet as Americans assemble their own movements to protect and support immigrants, push back against the Department of Homeland Security's dangerous incursions into cities, and protest for civil rights and policy changes, they face a federal government that possesses vast surveillance powers and sweeping cooperation from the Silicon Valley companies that hold Americans' data. That means political, social, and economic organizing presents a risky dilemma. How do you bring people of all ages, backgrounds, and technical abilities into a mass movement without exposing them to monitoring and targeting by a government--and in particular Immigration and Customs Enforcement and Customs and Border Protection, agencies with paramilitary ambitions, a tendency to break the law, and more funding than some countries' militaries. Organizing safely in an age of surveillance increasingly requires not only technical security know-how, but also a tricky balance between secrecy and openness, says Eva Galperin, the director of cybersecurity at the Electronic Frontier Foundation, a nonprofit focused on digital civil liberties.
- North America > United States > California (0.34)
- Europe > Switzerland (0.14)
- North America > United States > Arizona (0.04)
- (4 more...)
- Information Technology > Security & Privacy (1.00)
- Information Technology > Communications > Social Media (1.00)
- Information Technology > Artificial Intelligence (1.00)
- Information Technology > Communications > Mobile (0.68)
- North America > United States (0.14)
- Asia > China > Jiangsu Province > Nanjing (0.04)
- Europe > France > Île-de-France > Paris > Paris (0.04)
- North America > United States > California > Santa Barbara County > Santa Barbara (0.04)
- North America > United States > California > Alameda County > Berkeley (0.04)
- (3 more...)
- North America > United States > Washington > King County > Redmond (0.04)
- Asia > China > Jiangsu Province > Nanjing (0.04)
- North America > United States (0.46)
- Asia > China > Shanghai > Shanghai (0.05)
- Asia > China > Zhejiang Province > Hangzhou (0.04)
- (2 more...)
- Law (1.00)
- Information Technology > Security & Privacy (1.00)
- Health & Medicine (0.93)
- Asia > South Korea > Seoul > Seoul (0.05)
- Asia > Middle East > Israel (0.04)