Menu

Blog

Archive for the ‘security’ category: Page 47

Nov 16, 2022

Reservations for new community of 3D homes in Georgetown to open in 2023

Posted by in categories: habitats, internet, security, solar power, sustainability

The community will offer eight different floor plans, ranging from three to four bedrooms and two to three bathrooms. Homes will be powered by rooftop solar panels, include a Ring Video Doorbell Pro, Schlage Encode Smart WiFi deadbolt, a Honeywell Home T6 Pro WiFi smart thermostat and a Wolf Ranch security package.

RELATED: The Georgetown gem that gleams rich with history: Southwestern University

Continue reading “Reservations for new community of 3D homes in Georgetown to open in 2023” »

Nov 14, 2022

Ukraine War: Russia gave Iran cash and captured UK & US weapons for drones

Posted by in categories: drones, security

A security source has told Sky News that Russia flew €140m in cash to Tehran in exchange for dozens of deadly “suicide drones”.

Moscow also included Western weapons it had captured in Ukraine in the shipment.

Continue reading “Ukraine War: Russia gave Iran cash and captured UK & US weapons for drones” »

Nov 13, 2022

Uganda’s New Satellite Contains Equipment to 3D Print Human Tissue in Orbit

Posted by in categories: 3D printing, bioprinting, biotech/medical, food, security

With the help of NASA and Japan, Uganda has officially become a spacefaring nation — and its newly-launched PearlAfricaSat-1 craft has some pretty nifty tech onboard.

As the Uganda-based Nile Post reports, the satellite launched out of NASA’s Mid-Atlantic Regional Spaceport facility in Virginia on the morning of November 7 will not only provide important agricultural and security monitoring features for the developing nation, but will also conduct experiments involving the 3D printing of human tissue.

Per the Ugandan news site, the tissues printed on PearlAfricaSat-1 will be used in research into the effects microgravity has on ovary function — and as Quartz notes in its write-up of the NASA and Japan-supported mission, the microgravity aspect of the experiments is key because “bioprinting” human organs is difficult to achieve with Earth’s gravity.

Nov 11, 2022

Watch a virus in the moments right before it attacks

Posted by in categories: biotech/medical, security

When Courtney “CJ” Johnson pulls up footage from her Ph.D. dissertation, it’s like she’s watching an attempted break-in on a home security camera.

The intruder cases its target without setting a foot inside, looking for a point of entry. But this intruder is not your typical burglar. It’s a virus.

Continue reading “Watch a virus in the moments right before it attacks” »

Nov 9, 2022

Cryptography’s Future Will Be Quantum-Safe. Here’s How It Will Work

Posted by in categories: computing, encryption, mathematics, quantum physics, security, space

In 1994, the computer scientist Peter Shor discovered that if quantum computers were ever invented, they would decimate much of the infrastructure used to protect information shared online. That frightening possibility has had researchers scrambling to produce new, “post-quantum” encryption schemes, to save as much information as they could from falling into the hands of quantum hackers.

Earlier this year, the National Institute of Standards and Technology revealed four finalists in its search for a post-quantum cryptography standard. Three of them use “lattice cryptography” — a scheme inspired by lattices, regular arrangements of dots in space.

Lattice cryptography and other post-quantum possibilities differ from current standards in crucial ways. But they all rely on mathematical asymmetry. The security of many current cryptography systems is based on multiplication and factoring: Any computer can quickly multiply two numbers, but it could take centuries to factor a cryptographically large number into its prime constituents. That asymmetry makes secrets easy to encode but hard to decode.

Nov 9, 2022

Paving the Way for Satellite Quantum Communications

Posted by in categories: computing, encryption, quantum physics, satellites, security

A series of demonstrations by Micius—a low-orbit satellite with quantum capabilities—lays the groundwork for a satellite-based quantum communication network.

Few things have captured the scientific imagination quite like the vastness of space and the promise of quantum technology. Micius—the Chinese Academy of Science’s quantum communications satellite launched in 2016—has connected these two inspiring domains, producing a string of exciting first demonstrations in quantum space communications. Reviewing the efforts leading up to the satellite launch and the major outcomes of the mission, Jian-Wei Pan and colleagues at the University of Science and Technology of China provide a perspective on what the future of quantum space communications may look like [1]. The success of this quantum-satellite mission proves the viability of several space-based quantum communications protocols, providing a solid foundation for future improvements that may lead to an Earth-spanning quantum communications network (Fig. 1).

Photons, the quanta of light, are wonderful carriers of quantum information because they are easy to manipulate and travel extremely fast. They can be created in a desired quantum state or as the output of some quantum sensor or quantum computer. Quantum entanglement between multiple photons—the nonclassical correlation between their quantum states—can be amazingly useful in quantum communications protocols such as quantum key distribution (QKD), a cryptography approach that can theoretically guarantee absolute information security. QKD schemes have been demonstrated on distances of a few hundreds of kilometers—sufficient to cover communications networks between cities. But increasing their range, eventually to the global scale, is a formidable challenge.

Nov 8, 2022

Quantum materials enable next-generation photonics and mobile networks in the terahertz regime

Posted by in categories: quantum physics, security

Terahertz light, radiation in the far-infrared part of the emission spectrum, is currently not fully exploited in technology, although it shows great potential for many applications in sensing, homeland security screening, and future (sixth generation) mobile networks.

Indeed, this radiation is harmless due to its small photon energy, but it can penetrate many materials (such as skin, packaging, etc.). In the last decade, a number of research groups have focused their attention on identifying techniques and materials to efficiently generate THz electromagnetic waves: among them is the wonder material graphene, which, however, does not provide the desired results. In particular, the generated terahertz output power is limited.

Better performance has now been achieved by topological insulators (TIs)—quantum materials that behave as insulators in the bulk while exhibiting conductive properties on the surface—according to a paper recently published in Light: Science & Applications.

Nov 7, 2022

Quantum Cryptography Is Unbreakable. So Is Human Ingenuity

Posted by in categories: business, computing, encryption, government, internet, mathematics, privacy, quantum physics, security

face_with_colon_three circa 2016.


Two basic types of encryption schemes are used on the internet today. One, known as symmetric-key cryptography, follows the same pattern that people have been using to send secret messages for thousands of years. If Alice wants to send Bob a secret message, they start by getting together somewhere they can’t be overheard and agree on a secret key; later, when they are separated, they can use this key to send messages that Eve the eavesdropper can’t understand even if she overhears them. This is the sort of encryption used when you set up an online account with your neighborhood bank; you and your bank already know private information about each other, and use that information to set up a secret password to protect your messages.

The second scheme is called public-key cryptography, and it was invented only in the 1970s. As the name suggests, these are systems where Alice and Bob agree on their key, or part of it, by exchanging only public information. This is incredibly useful in modern electronic commerce: if you want to send your credit card number safely over the internet to Amazon, for instance, you don’t want to have to drive to their headquarters to have a secret meeting first. Public-key systems rely on the fact that some mathematical processes seem to be easy to do, but difficult to undo. For example, for Alice to take two large whole numbers and multiply them is relatively easy; for Eve to take the result and recover the original numbers seems much harder.

Continue reading “Quantum Cryptography Is Unbreakable. So Is Human Ingenuity” »

Nov 7, 2022

New camera system taps into terahertz wavelengths for better imaging

Posted by in categories: materials, security

A team of engineers has developed a new type of camera that can detect radiation in terahertz (THz) wavelengths. This new imaging system can see through certain materials in high detail, which could make it useful for security scanners and other sensors.

Terahertz radiation is that which has wavelengths between microwaves and visible light, and these frequencies show promise in a new class of imaging systems. They can penetrate many materials and capture new levels of detail, and importantly the radiation is non-ionizing, meaning it’s safer than X-rays when used on humans.

The problem is that detectors that pick up THz wavelengths can be bulky, slow, expensive, difficult to run under practical conditions, or some combination of these. But in a new study, researchers at MIT, Samsung and the University of Minnesota have developed a system that can detect THz pulses quickly, precisely and at regular room temperature and pressure.

Nov 7, 2022

A startup building software to encrypt messaging tools such as Slack just raised $11 million from Molten Ventures. Check out the 17-slide pitch deck Worldr used to secure the round

Posted by in categories: encryption, security

The company gives its customers full control over their data and claims to increase security, with a focus on compliance and auditing.

Page 47 of 148First4445464748495051Last