Menu

Blog

Archive for the ‘computing’ category: Page 261

Jan 18, 2023

IBM: Quantum computing poses an ‘existential threat’ to data encryption

Posted by in categories: business, computing, encryption, existential risks, quantum physics, security

Check out all the on-demand sessions from the Intelligent Security Summit here.

For years, encryption has played a core role in securing enterprise data. However, as quantum computers become more advanced, traditional encryption solutions and public-key cryptography (PKC) standards, which enterprise and consumer vendors rely on to secure their products, are at serious risk of decryption.

Today, IBM Institute for Business Value issued a new report titled Security in the Quantum Era, examining the reality of quantum risk and the need for enterprise adoption of quantum-safe capabilities to safeguard the integrity of critical applications and infrastructure as the risk of decryption increases.

Jan 18, 2023

What Is Our Universe Expanding Into?

Posted by in categories: computing, cosmology, mapping

One question for Paul Sutter, author of “The Remarkable Emptiness of Existence,” an article in Nautilus this month. Sutter is a theoretical cosmologist at the Institute for Advanced Computational Science at Stony Brook University, where he studies cosmic voids, maps the leftover light from the big bang, and develops new techniques for finding the first stars to appear in the cosmos.

What is our universe expanding into?

That’s a great question. The answer, though, is that it’s not a great question. It’s a little tricky, so let me walk you through it. Yes, our universe is expanding. Our universe has no center and no edge. The Big Bang didn’t happen in one location in space. The Big Bang happened everywhere in the cosmos simultaneously. The Big Bang was not a point in space. It was a point in time. It exists in all of our paths.

Jan 17, 2023

Lab develops new method for on-chip generation of single photon

Posted by in categories: computing, particle physics, quantum physics

As buzz grows ever louder over the future of quantum, researchers everywhere are working overtime to discover how best to unlock the promise of super-positioned, entangled, tunneling or otherwise ready-for-primetime quantum particles, the ability of which to occur in two states at once could vastly expand power and efficiency in many applications.

Developmentally, however, quantum devices today are “about where the computer was in the 1950s,” which it is to say, the very beginning. That’s according to Kamyar Parto, a sixth-year Ph.D. student in the UC Santa Barbara lab of Galan Moody, an expert in quantum photonics and an assistant professor of electrical and computer engineering.

Parto is co-lead author of a paper published in the journal Nano Letters, describing a key advance: the development of a kind of on-chip “factory” for producing a steady, fast stream of single photons, essential to enabling photonic-based quantum technologies.

Jan 17, 2023

Humans plunder the periodic table while turning blind eye to the risks of doing so, say researchers

Posted by in categories: biological, chemistry, computing, food, health, mobile phones

For millions of years, nature has basically been getting by with just a few elements from the periodic table. Carbon, calcium, oxygen, hydrogen, nitrogen, phosphorus, silicon, sulfur, magnesium and potassium are the building blocks of almost all life on our planet (tree trunks, leaves, hairs, teeth, etc). However, to build the world of humans—including cities, health care products, railways, airplanes and their engines, computers, smartphones, and more—many more chemical elements are needed.

A recent article, published in Trends in Ecology and Evolution and written by researchers from CREAF, the Universitat Autònoma de Barcelona (UAB) and the Spanish National Research Council (CSIC), warns that the range of chemical elements humans need (something scientifically known as the human elementome) is increasingly diverging from that which nature requires (the biological elementome).

In 1900, approximately 80% of the elements humans used came from biomass (wood, plants, food, etc.). That figure had fallen to 32% by 2005, and is expected to stand at approximately 22% in 2050. We are heading for a situation in which 80% of the elements we use are from non-biological sources.

Jan 16, 2023

Examining the influence of defects on 2D integrated electronic circuits

Posted by in categories: computing, nanotechnology

For decades, transistors—the heart of computer chips—have been getting smaller and smaller. As a result, the electronic components in many devices can be made even more compact, faster and also more powerful. But is this development coming to a natural halt? The smaller the components, the greater the danger that individual defects in the atomic structure will significantly change the behavior of the component. This applies to the established silicon technology and novel nanotechnologies based on 2D materials.

At Vienna University of Technology (TU Wien), intensive work has been done on the physical description of this problem at the transistor level. Now the researchers are going a step further and looking at the influence of defects at the level of electronic circuits, which sometimes consist of several—sometimes even billions—of transistors. In some cases, individual transistors can operate outside the desired specification, but still perform well as part of a circuit consisting of several transistors. With this new approach at the circuit level, significant advances in miniaturization are still possible.

The study is published in the journal Advanced Materials.

Jan 16, 2023

Michael Greve | Longevity Investing @ Vision Weekend France 2022

Posted by in categories: biotech/medical, computing, life extension, nanotechnology

This video was recorded at the Foresight Vision Weekend 2022 at Château du Feÿ in France.

Michael Greve | Longevity Investing.

Continue reading “Michael Greve | Longevity Investing @ Vision Weekend France 2022” »

Jan 15, 2023

Uploading and Branching Identity

Posted by in categories: biological, computing, neuroscience

If a brain is uploaded into a computer, will consciousness continue in digital form or will it end forever when the brain is destroyed? Philosophers have long debated such dilemmas and classify them as questions about personal identity. There are currently three main theories of personal identity: biological, psychological, and closest continuer theories. None of these theories can successfully address the questions posed by the possibility of uploading. I will argue that uploading requires us to adopt a new theory of identity, psychological branching identity. Psychological branching identity states that consciousness will continue as long as there is continuity in psychological structure. What differentiates this from psychological identity is that it allows identity to continue in multiple selves.

Jan 15, 2023

Paralyzed patients effectively control computer in a historic trial

Posted by in categories: biotech/medical, computing, cyborgs, neuroscience

All four participants were able to send out neural signals.

Medical technology company Synchron published in a press release on Monday the results of a clinical study that saw paralyzed patients effectively send out neural signals via an implantable brain-computer interface.

The study highlighted the long-term safety results from a clinical study in which four patients with severe paralysis implanted with Synchron’s first-generation Stentrode, a neuroprosthesis device, were able to control a computer.

Jan 14, 2023

Using cosmic rays to generate and distribute random numbers and boost security for local devices and networks

Posted by in categories: computing, encryption, military, quantum physics

State-of-the-art methods of information security are likely to be compromised by emerging technologies such as quantum computers. One of the reasons they are vulnerable is that both encrypted messages and the keys to decrypt them must be sent from sender to receiver.

A new method—called COSMOCAT—is proposed and demonstrated, which removes the need to send a since cosmic rays transport it for us, meaning that even if messages are intercepted, they could not be read using any theorized approach. COSMOCAT could be useful in localized various bandwidth applications, as there are limitations to the effective distance between sender and receiver.

In the field of information communication technology, there is a perpetual arms race to find ever more secure ways to transfer data, and ever more sophisticated ways to break them. Even the first modern computers were essentially code-breaking machines used by the U.S. and European Allies during World War II. And this is about to enter a new regime with the advent of quantum computers, capable of breaking current forms of security with ease. Even security methods which use quantum computers themselves might be susceptible to other quantum attacks.

Jan 14, 2023

Critical zero day vulnerability in Linux Kernel Allows DoS Attack

Posted by in categories: computing, mobile phones, security, space

This flaw, which has been identified that affects the ksmbd NTLMv2 authentication in the Linux kernel, is known to quickly cause the operating system on Linux-based computers to crash. Namjae Jeon is the developer of KSMBD, which is an open-source In-kernel CIFS/SMB3 server designed for the Linux Kernel. It is an implementation of the SMB/CIFS protocol in the kernel space that allows for the sharing of IPC services and files over a network.

In order to take advantage of the vulnerability, you will need to transmit corrupted packets to the server, personal computer, tablet, or smartphone that you are targeting. The attack causes what is known as “a memory overflow flaw in ksmbd decodentlmssp auth blob,” which states that nt len may be less than CIFS ENCPWD SIZE in some circumstances. Because of this, the blen parameter that is sent to ksmbd authntlmv2, which runs memcpy using blen on memory that was allocated by kmalloc(blen + CIFS CRYPTO KEY SIZE), is now negative. It is important to take note that the CIFS ENCPWD SIZE value is 16, and the CIFS CRYPTO KEY SIZE value is 8. As the heap overflow happens when blen is in the range [-8,-1], we think that the only possible outcome of this problem is a remote denial of service and not a privilege escalation or a remote code execution.

Continue reading “Critical zero day vulnerability in Linux Kernel Allows DoS Attack” »