Menu

Blog

Archive for the ‘security’ category: Page 100

Dec 7, 2018

Multichannel vectorial holographic display and encryption

Posted by in categories: encryption, holograms, nanotechnology, security

Holography is a powerful tool that can reconstruct wavefronts of light and combine the fundamental wave properties of amplitude, phase, polarization, wave vector and frequency. Smart multiplexing techniques (multiple signal integration) together with metasurface designs are currently in high demand to explore the capacity to engineer information storage systems and enhance optical encryption security using such metasurface holograms.

Holography based on metasurfaces is a promising candidate for applications in optical displays/storage with enormous information bearing capacity alongside a large field of view compared to traditional methods. To practically realize holograms, holographic profiles should be encoded on ultrathin nanostructures that possess strong light-matter interactions (plasmonic interactions) in an ultrashort distance. Metasurfaces can control light and acoustic waves in a manner not seen in nature to provide a flexible and compact platform and realize a variety of vectorial holograms, with high dimensional information that surpass the limits of liquid crystals or optical photoresists.

Among the existing techniques employed to achieve highly desired optical properties, polarization multiplexing (multiple signal integration) is an attractive method. The strong cross-talk associated with such platforms can, however, be prevented with birefringent metasurfaces (two-dimensional surfaces with two different refractive indices) composed of a single meta-atom per unit-cell for optimized multiplexing.

Continue reading “Multichannel vectorial holographic display and encryption” »

Dec 7, 2018

First look at Tesla’s new Enhanced Anti-Theft system

Posted by in categories: security, sustainability, transportation

Tesla launched a new ‘Enhanced Anti-theft’ system as an aftermarket product last month and we now take a first look at one of the very first installations on a Model X.

There have been strings of Tesla thefts earlier this year that prompt the automaker to offer several new security features.

We reported on several Tesla vehicle thefts through relay attacks in Europe earlier this year.

Read more

Dec 5, 2018

Quantum computers put blockchain security at risk

Posted by in categories: bitcoin, computing, cryptocurrencies, encryption, finance, government, health, internet, quantum physics, security

The longer-term answer is to develop and scale up the quantum communication network and, subsequently, the quantum internet. This will take major investments from governments. However, countries will benefit from the greater security offered13. For example, Canada keeps its census data secret for 92 years, a term that only quantum cryptography can assure. Government agencies could use quantum-secured blockchain platforms to protect citizens’ personal financial and health data. Countries leading major research efforts in quantum technologies, such as China, the United States and members of the European Union, will be among the early adopters. They should invest immediately in research. Blockchains should be a case study for Europe’s Quantum Key Distribution Testbed programme, for example.


Bitcoin and other cryptocurrencies will founder unless they integrate quantum technologies, warn Aleksey K. Fedorov, Evgeniy O. Kiktenko and Alexander I. Lvovsky. Bitcoin and other cryptocurrencies will founder unless they integrate quantum technologies, warn Aleksey K. Fedorov, Evgeniy O. Kiktenko and Alexander I. Lvovsky.

Read more

Dec 1, 2018

The Hidden Danger of Cleaning Up Our Space Junk

Posted by in categories: law, policy, satellites, security

As an international relations scholar who studies space law and policy, I have come to realize what most people do not fully appreciate: Dealing with space debris is as much a national security issue as it is a technical one.

Considering the debris circling the Earth as just an obstacle in the path of human missions is naive. As outer space activities are deeply rooted in the geopolitics down on Earth, the hidden challenge posed by the debris is the militarization of space technologies meant to clean it up.

To be clear, space debris poses considerable risks; however, to understand those risks, I should explain what it is and how it is formed. The term “space debris” refers to defunct human-made objects, relics left over from activities dating back to the early days of the space age. Over time that definition has expanded to include big and small things like discarded boosters, retired satellites, leftover bits and pieces from spacecraft, screwdrivers, tools, nuts and bolts, shards, lost gloves, and even flecks of paint.

Continue reading “The Hidden Danger of Cleaning Up Our Space Junk” »

Nov 26, 2018

China Is Building a $9 Billion Rival to the American-Run GPS

Posted by in categories: computing, government, mobile phones, satellites, security

Location data beamed from GPS satellites are used by smartphones, car navigation systems, the microchip in your dog’s neck and guided missiles — and all those satellites are controlled by the U.S. Air Force. That makes the Chinese government uncomfortable, so it’s developing an alternative that a U.S. security analyst calls one of the largest space programs the country has undertaken.


The Beidou Navigation System will be accessible worldwide by 2020.

Read more

Nov 19, 2018

Transhumanism Becoming the ‘Relentless Drumbeat’ Shaping Our Future – Advocate

Posted by in categories: bioengineering, cryptocurrencies, economics, geopolitics, security, surveillance, transhumanism

Following recent trends in state-of-the-art developments, from cryptocurrencies and universal basic income to biohacking and the surveillance state, transhumanism has been moved into the limelight of political discourse to reshape humanity’s future.

Andrew Vladimirov, Information security specialist, biohacker and one of the original members of the Transhumanist Party UK, spoke in-depth with Sputnik about the rise of transhumanism and its implications.

Read more

Nov 10, 2018

Scientists to create ‘truly unhackable’ network based on quantum physics

Posted by in categories: computing, internet, quantum physics, security

Scientists are planning to create a network in the Chicago area tapping the principles of quantum physics. The idea is to prove that quantum physics could provide the basis for an unhackable internet.

This, they say, could have wide-ranging impact on communications, computing and national security.

The quantum network development, supported by the US Department of Energy (DOE), will stretch between the DOE’s Argonne National Laboratory and Fermi National Acceleratory Laboratory, a connection that is said will be the longest in the world to send secure information using quantum physics.

Continue reading “Scientists to create ‘truly unhackable’ network based on quantum physics” »

Oct 29, 2018

T-Mobile becomes 1st U.S. wireless company to carry the new 6T ‘superphone’ from China’s OnePlus

Posted by in categories: computing, mobile phones, security

T-Mobile will carry the new OnePlus 6T, the first time a phone from the popular Chinese manufacturer has been offered by a U.S. wireless provider.

The 6T launches exclusively on T-Mobile starting Thursday, the company said during an unveiling event in New York City. But the company is offering an early sale at its Times Square store in New York City starting at 5 p.m. Eastern today.

Continue reading “T-Mobile becomes 1st U.S. wireless company to carry the new 6T ‘superphone’ from China’s OnePlus” »

Oct 25, 2018

China: facial recognition and state control | The Economist

Posted by in categories: government, privacy, robotics/AI, security, surveillance, transportation

Whether it’s left there or right here… the tactics and destination look pretty much the same to me…


China is the world leader in facial recognition technology. Discover how the country is using it to develop a vast hyper-surveillance system able to monitor and target its ethnic minorities, including the Muslim Uighur population.

Continue reading “China: facial recognition and state control | The Economist” »

Oct 24, 2018

New CRISPR tool opens up more of the genome for editing

Posted by in categories: biotech/medical, food, security

The genome editing system CRISPR has become a hugely important tool in medical research, and could ultimately have a significant impact in fields such as agriculture, bioenergy, and food security.

Read more

Page 100 of 146First979899100101102103104Last