Audio player loading… One of the potential encryption algorithms that was a serious candidate to be used in the quantum computing world has been defeated worryingly simply. The algorithm in question is called SIKE (Supersingular Isogeny Key Encapsulation), and made it through the encryption algorithm competition set up by the US Department of Commerce’s National Institute of Standards and Technology (NIST). In other words, it came quite close to becoming the standard encryption algorithm in a quantum computing world. However, it took researchers roughly an hour to break through it and steal encryption keys, using nothing but a single-core PC, and the power of mathematics. Attacking the math Even though SIKE did quite well during the government’s analysis, researchers with the Computer Security and Industrial Cryptography group (CSIS) at KU Leuven needed roughly an hour to obtain the encryption key. The report says that they did not try to find a flaw in … [Read more...] about The next generation of encryption may not be quite as secure as we’d hoped
Post quantum encryption algorithms
Scientists challenge Google’s quantum supremacy claims using 512 GPUs
Why it matters: In 2019, a paper leaked claiming physicists at Google used their quantum computer, Sycamore, to run a calculation that would overwhelm the world's most powerful supercomputer. Chinese scientists recently challenged that claim by successfully running the identical computation in a matter of hours using the computing power of today's GPUs. Their results prove a supercomputer using today's technology could likely beat Sycamore's previous record. Google's quantum computing researchers originally ran the complex calculation in 200 seconds (just over three minutes), a feat they claimed would have taken the fastest supercomputer upwards of 10,000 years. Based on this result, the team claimed they had reached a significant milestone known as quantum supremacy . Quantum supremacy is the point at which a quantum device can solve problems that otherwise cannot be solved by classical technology in any reasonable amount of time. Not everyone was a believer in Google's … [Read more...] about Scientists challenge Google’s quantum supremacy claims using 512 GPUs
Scientists say they’ve debunked Google’s quantum supremacy claims once and for all
Audio player loading… A team of scientists in China claim to have replicated the performance of Google’s Sycamore quantum computer using traditional hardware, thereby undermining the suggestion the company has achieved quantum supremacy. As reported by Science magazine, the scientists used a system comprised of 512 GPUs to complete the same calculation developed by Google to demonstrate it had passed the quantum supremacy milestone back in 2019. The endeavor was led by statistical physicist Pan Zhang, who said his team’s supercomputer performed the calculation 10 billion times faster than Google had thought possible. Quest for quantum supremacy Quantum supremacy (or quantum advantage) can be defined as the point at which quantum computers can outstrip the maximum potential performance of classical supercomputers in a particular discipline. Three years ago, Google announced it had achieved this feat with Sycamore, which it said took just 200 seconds … [Read more...] about Scientists say they’ve debunked Google’s quantum supremacy claims once and for all
Amid backlash from privacy advocates, Meta expands end-to-end encryption trial
Meta is ever so slowly expanding its trial of end-to-end encryption in a bid to protect users from snoops and law enforcement. End-to-end encryption, often abbreviated as E2EE, uses strong cryptography to encrypt messages with a key that is unique to each user. Because the key is in the sole possession of each user, E2EE prevents everyone else—including the app maker, ISP or carrier, and three-letter agencies—from reading a message. Meta first rolled out E2EE in 2016 in its WhatsApp and Messenger apps, with the former providing it by default and the latter offering it as an opt-in feature. The company said it expects to make E2EE the default setting in Messenger by sometime next year. The Instagram messenger, meanwhile, doesn’t offer E2EE at all. Starting this week, the social media behemoth will begin testing a secure online storage feature for Messenger communication. For now, it’s available only to select users who connect using either an iOS or Android device. Users who are … [Read more...] about Amid backlash from privacy advocates, Meta expands end-to-end encryption trial
5g: Post-auction spectrum harmonisation process completed, here’s what Telecom Minister has to say
Within days of conducting 5G auctions, the government has completed the spectrum 'harmonisation' process, paving the way for players' holdings to be streamlined within a particular band for greater efficiency, Telecom Minister Ashwini Vaishnaw has said. The spectrum harmonisation process, critical for 5G services, brings together a bunch of radio wave holdings within a band into one contiguous block with the consensus of all telecom service providers. , Vaishnaw said that the government is on course for the timely allocation of radiowaves bought by players (in the auction) by August 12. The process of approvals from the Committee of Secretaries has also been completed. "In one single day, we have completed the spectrum harmonisation process, which happens after every auction," the minister said. Also Read Telco industry ARPU to rise 15-25% in next 12-18 months as operators likely to price 5G higher than 4G: Fitch Tech companies have to wait a … [Read more...] about 5g: Post-auction spectrum harmonisation process completed, here’s what Telecom Minister has to say
oneplus: Explained: How OnePlus has made 150W fast charging safer ensuring battery health in the longer run
Fast charging, a term which has become one of the core features in most modern smartphones and is also one of the sought-after features when buying a new smartphone. OnePlus has recently introduced its latest OnePlus 10T 5G smartphone globally. While it brings a slew of new features such as Qualcomm’s flagship chip, 16GB RAM and more. The 150W SuperVooC Endurance Edition charging and all the technologies associated with it caught our attention. For those who are not aware, fast charging speed comes at a cost and its own set of risks. For instance, charging a battery with that speed could deplete its life faster than imaginable. Also, there’s a risk of something going seriously wrong with it. However, OnePlus has managed to iron them out with its 150W SuperVooC Endurance Edition. , At the keynote OnePlus thoroughly explained what precautions and features they have included in the OnePlus 10T to make 150W fast charging a safe bet while ensuring that the battery would last … [Read more...] about oneplus: Explained: How OnePlus has made 150W fast charging safer ensuring battery health in the longer run
What Is Metadata?
Even if you’ve never heard the term metadata, you’re definitely familiar with it — you probably use it every single day without even realizing it. Metadata is one of those essential things that manages to hide in plain sight. What Is Metadata? Metadata sounds like an intimidating term, but it isn’t — metadata is just data that describes other data. In many ways, metadata is a lot like a driver’s license or another kind of ID you’re familiar with. An official ID will usually have your date of birth, height, eye color, a picture, and other information about you. Metadata fulfills a similar role for digital files found on computers. Metadata will usually describe when a file or folder was created, when it was last modified , and other important attributes about it. RELATED: How to Easily View Recently Modified Files in Windows Different kinds of files will often have different metadata. Here are some specific examples of metadata that you might find attached to common … [Read more...] about What Is Metadata?
Google Meet is getting a serious security upgrade
Audio player loading… Keeping your Google Workspace data safe is set to get a little easier after the platform announced one of its most-used tools is getting a significant security boost. Google Meet will now get client-side encryption, giving an extra layer of security to safeguard your video calls and the content shared within. The change should mean that users of the video conferencing service will get "direct control" of their data, and the encryption keys used to keep this safe - with not even Google itself getting access. Google Meet encryption Google says that Meet already encrypts all user data while at rest and whilst in transit between its facilities, with client-side encryption going a step beyond in letting users have direct control of their encryption keys and the identity service that they choose to authenticate for those keys. The tool could potentially be useful for those calls that need an extra level of confidentiality, the … [Read more...] about Google Meet is getting a serious security upgrade
How to protect your business from data theft
Audio player loading… When it comes to business, protecting data and confidential information is key in the online space (opens in new tab) . The pandemic has made its own adjustments, all those who were not represented online at the very beginning were forced to urgently transfer their business to digital. The issue of protecting businesses from data theft has always been relevant, but now in a post-pandemic world, due to the ever-increasing need for the use of digital public infrastructure, it is in the spotlight. SSL Encryption One of the most common and basic measures that a business can take to secure its online channels is the use of an SSL certificate. This digital signature provides an encrypted connection between the user and the site. With the help of this certificate, the authenticity of the site is confirmed - the user can check which company the resource actually belongs to, and the client-server requests themselves are encrypted. This certificate … [Read more...] about How to protect your business from data theft
Lawsuits: OnlyFans bribed Instagram to put creators on “terrorist blacklist” [Updated]
( Update, 5:27 pm ET: A GIFCT spokesperson clarified how the “blacklist”—or more accurately, in its terms, its terrorist content database—works to log terrorist activity between different online platforms. She says only videos and images are currently hashed, and nothing gets automatically removed from other platforms. Instead, once content is hashed, each platform considers things like the type of terrorist entity it is or the severity of the content and then weighs those measurements against its own policies to decide if it qualifies for removal or content advisory labels. The GIFCT spokesperson also noted that Instagram accounts are not hashed, only Instagram images and videos, and there is no “blacklist” of users, although GIFCT analyzes who produces the content the organization hashes. The database records hashes to signal terrorist entities or terrorism content based on the United Nations sanctions list of terrorist entities from the UN Security Council. And all that content … [Read more...] about Lawsuits: OnlyFans bribed Instagram to put creators on “terrorist blacklist” [Updated]