Page 1,149«..1020..1,1481,1491,1501,151..1,1601,170..»

Encrypted phone service ‘Encrochat’ shutdown leads to 6500 arrests, Europol says – Reuters

[1/5]EncroChat and Europol logos are seen in this illustration taken, June 27, 2023. REUTERS/Dado Ruvic/Illustration

AMSTERDAM, June 27 (Reuters) - European policing agency Europol said on Tuesday that the takedown of Encrochat, an underground company that offered criminals supposedly secure encrypted communications, led to more than 6,500 arrests and 900 million euros ($980 million) in seized assets.

The system had an estimated 60,000 users when it shut down abruptly in June 2020, and Europol revealed the following month that law enforcement officials had been intercepting users' communications for months.

In a statement on Tuesday, Europol offered its first overview of the results of the takedown, which it said had "sent shockwaves across organised crime groups in Europe and beyond".

Police have analysed more than 115 million "criminal conversations", Europol said, helping prevent "violent attacks, attempted murders, corruption and large scale drugs transports."

The agency said investigations spawned by the takedown have so far led to the seizure of 100 tonnes of cocaine, 30 million pills of "chemical drugs", nearly a thousand vehicles, hundreds of properties and dozens of boats and planes.

The police statement gave no details on whether the owners of Encrochat themselves had been arrested.

French and Dutch authorities were due to hold a press conference in Lille later on Tuesday.

Partial results of Encrochat-linked investigations have previously been announced by French, Dutch, and British police in 2020 and by German police in 2021.

Encrochat sold modified Android mobile devices for around 1,000 euros each and charged users hefty subscription fees with the promise their communications would remain encrypted and secret.

It shut down abruptly in June 2020 after its unidentified operators apparently realized they had been compromised.

Europol said the company had routed encrypted communications through servers in France.

"Eventually, it was possible to place a technical device to go beyond the encryption technique and obtain access to users correspondence," Europol said on Tuesday.

($1 = 0.9169 euros)

Reporting by Toby Sterling; Editing by Christina Fincher

Our Standards: The Thomson Reuters Trust Principles.

Visit link:
Encrypted phone service 'Encrochat' shutdown leads to 6500 arrests, Europol says - Reuters

Read More..

Apple speaks out against bill that could mandate CSAM scanning in iMessage – 9to5Mac

Apple is publicly opposing the current form of the Online Safety Bill currently being considered by Parliament in the UK. According to Apple, the proposed law risks putting UK citizens at greater risk from data breaches and digital surveillance.

The bill intends to create regulations that would force messaging services, including Apples iMessage, to scan the contents of messages for CSAM (child sexual abuse material). Apple argues that any weakening of end-to-end encryption risks putting all users at risk of security breaches.

In a statement shared with the BBC, Apple called encryption a critical capability that protects the privacy of journalists, human rights activists, and diplomats.

The company is encouraging the UK government to make changes to the proposed regulation that would not compromise end-to-end encryption:

It also helps everyday citizens defend themselves from surveillance, identity theft, fraud, and data breaches. The Online Safety Bill poses a serious threat to this protection, and could put UK citizens at greater risk.

Apple urges the government to amend the bill to protect strong end-to-end encryption for the benefit of all.

Apples on-the-record opposition to the current state of the bill could soon be met with changes, however. The BBC adds that it has learned a package of amendments is expected to be shared soon. These changes are expected to address the mandate to scan message contents for CSAM.

Notably, Apple blundered its attempt to roll out its own CSAM detection system for iCloud Photos. However, Apple has continued to release new features under the umbrella of Communication Safety in Messages. These features allow Messages to blur images that may be inappropriate while presenting resources that help prevent sharing sensitive content.

In iOS 17, Apple is expanding Communication Safety to AirDrop, the systemwide photo picker, FaceTime messages, Contact Posters in the Phone app, and thirdparty apps.

FTC: We use income earning auto affiliate links. More.

More here:
Apple speaks out against bill that could mandate CSAM scanning in iMessage - 9to5Mac

Read More..

Apple urges UK to rethink anti-encryption Online Safety Bill – AppleInsider

Apple has denounced the UK's Online Safety Bill's kneecapping of end-to-end encryption as a "serious threat" to citizens, and is trying to make the UK government think twice about the changes.

The Online Safety Bill is being considered by the UK parliament as a potential law that could force online messaging services that use encryption to scan for potential images of child abuse. As part of a wider criticism of the bill's intentions, Apple has publicly objected to the law's implementation.

The bill reasons that law enforcement is not capable of identifying child sexual abuse material being shared across online messaging services like iMessage, due to the implementation of end-to-end encryption. Therefore, the law would empower regulator Ofcom to order such platforms to scan the contents of messages.

However, to accomplish that, there has to be a weakening of end-to-end encryption itself, making it less secure and eliminating the whole point of using the technique for privacy in the first place.

"End-to-end encryption is a critical capability that protects the privacy of journalists, human rights activists, and diplomats," an Apple statement received by the BBC on Tuesday reads. "It also helps everyday citizens defend themselves from surveillance, identity theft, fraud, and data breaches."

The statement continues "The Online Safety Bill poses a serious threat to this protection, and could put UK citizens at greater risk. Apple urges the government to amend the bill to protect strong end-to-end encryption for the benefit of all."

Apple's statement occurs at the same time as the Open Rights Group sends an open letter to minister Chloe Smith, the Secretary of State for Science, Innovation, and Technology.

Signed by over 80 civil society organizations and academics, the group believes "The UK could become the first liberal democracy to require the routine scanning of people's private chat messages, including chats that are secured by end-to-end encryption" if the bill becomes law.

"As over 40 million UK citizens and 2 billion people worldwide rely on these services, this poses a significant risk to the security of digital communication services not only in the UK, but also internationally," the letter warns.

Apple's statement against the Online Safety Bill means it joins other messaging services who are against the bill. The Meta-owned WhatsApp told the BBC it refuses to weaken its encrypted systems, while Signal said in February that it would "walk" from the UK if ordered to do the scanning.

While Apple is against the bill, it has previously attempted to perform actions that would be somewhat in the ballpark of what the bill would require it to do. Its 2021 attempt to introduce on-device scanning of images as a child protection measure was praised by the UK government, but was ultimately killed off by Apple in December 2022.

Read the original post:
Apple urges UK to rethink anti-encryption Online Safety Bill - AppleInsider

Read More..

A 3-year probe of encrypted phones led to the seizure of hundreds of tons of drugs, prosecutors say – ABC News

International prosecutors say that investigations triggered by the cracking of encrypted phones three years ago have so far led to more than 6,500 arrests worldwide and the seizure of hundreds of tons of drugs

By

MIKE CORDER Associated Press

June 27, 2023, 6:51 AM ET

3 min read

THE HAGUE, Netherlands -- Investigations triggered by the cracking of encrypted phones three years ago have so far led to more than 6,500 arrests worldwide and the seizure of hundreds of tons of drugs, French, Dutch and European Union prosecutors said Tuesday.

The announcement underscored the staggering scale of criminality mainly drugs and arms smuggling and money laundering that was uncovered as a result of police and prosecutors effectively listening in to criminals using encrypted EncroChat phones.

It helped to prevent violent attacks, attempted murders, corruption and large-scale drug transports, as well as obtain large-scale information on organised crime, European Union police and judicial cooperation agencies Europol and Eurojust said in a statement.

The French and Dutch investigation gained access to more than 115 million encrypted communications between some 60,000 criminals via servers in the northern French town of Roubaix, prosecutors said at a news conference in the nearby city of Lille.

As a result, 6,558 suspects have been arrested worldwide, including 197 high-value targets. Seized drugs included 30.5 million pills, 103.5 metric tons (114 tons) of cocaine, 163.4 metric tons (180 tons) of cannabis and 3.3 metric tons (3.6 tons) of heroin. The investigations also led to nearly 740 million euros ($809 million) in cash being recovered and assets or bank accounts worth another 154 million euros ($168 million) frozen.

Police announced in 2020 they had cracked the encryption of EncroChat phones and effectively listened in on criminal gangs.

EncroChat sold phones for around 1,000 euros ($1,094) worldwide and offered subscriptions with global coverage for 1,500 euros ($1,641) per six months. The devices were marketed as offering complete anonymity and were said to be untraceable and easy to erase if a user was arrested.

French law enforcement authorities launched investigations into the company operating EncroChat in 2017. The probe led to a device being installed that was able to evade the phones' encryption and gain access to users' communications.

Authorities also have identified and detained some of the alleged leaders of the EncroChat provider, Carole Etienne, chief prosecutor at the judicial tribunal of Lille, told reporters.

Three people were arrested on June 22 in Spain and handed over to France on the basis of European arrest warrants," she said. "Other individuals have been located outside the European Union and have not yet been charged.

EncroChat is not the only secret communications network used by criminals that have been infiltrated by law enforcement authorities.

In March 2021, Belgian police arrested dozens of people and seized more than 17 metric tons (18.7 tons) of cocaine after cracking another encrypted chat system, called Sky ECC.

The FBI and other law enforcement agencies went a step further and created an encrypted service ANOM that was marketed to criminals in a global sting that led to the arrest of more than 800 suspects and seizure of more than 32 metric tons (35.2 tons) of drugs, including cocaine, cannabis, amphetamines and methamphetamines.

See the original post here:
A 3-year probe of encrypted phones led to the seizure of hundreds of tons of drugs, prosecutors say - ABC News

Read More..

Apple Joins Opposition in UK To Encrypted Message App Scanning – Slashdot

Apple has criticised powers in the UK's Online Safety Bill that could be used to force encrypted messaging tools like iMessage, WhatsApp and Signal to scan messages for child abuse material. From a report: Its intervention comes as 80 organisations and tech experts have written to Technology Minister Chloe Smith urging a rethink on the powers. Apple told the BBC the bill should be amended to protect encryption. End-to-end encryption (E2EE) stops anyone but the sender and recipient reading the message. Police, the government and some high-profile child protection charities maintain the tech -- used in apps such as WhatsApp and Apple's iMessage -- prevents law enforcement and the firms themselves from identifying the sharing of child sexual abuse material.

But in a statement Apple said: "End-to-end encryption is a critical capability that protects the privacy of journalists, human rights activists, and diplomats. "It also helps everyday citizens defend themselves from surveillance, identity theft, fraud, and data breaches. The Online Safety Bill poses a serious threat to this protection, and could put UK citizens at greater risk. "Apple urges the government to amend the bill to protect strong end-to-end encryption for the benefit of all."

See the original post:
Apple Joins Opposition in UK To Encrypted Message App Scanning - Slashdot

Read More..

The Role of Encryption in a Zero-Trust Security Strategy – CityLife

Exploring the Importance of Encryption in Implementing a Zero-Trust Security Strategy

In todays digital landscape, organizations face an ever-evolving array of cyber threats. As businesses continue to adopt cloud-based services, remote work, and digital transformation initiatives, the traditional security perimeter is becoming increasingly difficult to define and defend. In response to these challenges, many organizations are turning to a zero-trust security strategy to protect their sensitive data and assets. At the core of this approach is the concept of never trust, always verify, which emphasizes the need for strong encryption to ensure the confidentiality, integrity, and availability of data.

Encryption is a fundamental component of a zero-trust security strategy, as it provides a robust layer of protection for sensitive data, both at rest and in transit. By encrypting data, organizations can ensure that even if unauthorized individuals gain access to their systems, they will be unable to read or modify the information without the proper decryption keys. This significantly reduces the risk of data breaches, as well as the potential damage that can result from such incidents.

One of the key principles of a zero-trust security strategy is the idea of least privilege, which dictates that users should only have access to the resources they need to perform their job functions. Encryption plays a crucial role in enforcing this principle, as it allows organizations to restrict access to sensitive data on a granular level. By implementing strong encryption and key management practices, businesses can ensure that only authorized individuals can access and decrypt specific data sets.

In addition to protecting data at rest, encryption is also essential for securing data in transit. As organizations increasingly rely on cloud-based services and remote work, the need for secure communication channels has become more important than ever. By encrypting data as it travels across networks, organizations can prevent eavesdropping and man-in-the-middle attacks, which can lead to data breaches and other security incidents.

Another important aspect of a zero-trust security strategy is continuous monitoring and verification of user activity. Encryption can play a role in this process by enabling organizations to track and monitor the use of encryption keys, as well as the access and modification of encrypted data. This can help businesses detect and respond to potential security threats in real-time, further reducing the risk of data breaches and other incidents.

In order to effectively implement encryption as part of a zero-trust security strategy, organizations must adopt a comprehensive approach to key management. This includes the secure generation, storage, and distribution of encryption keys, as well as the regular rotation and revocation of keys as needed. By maintaining strong key management practices, businesses can ensure the ongoing effectiveness of their encryption efforts and minimize the risk of unauthorized access to sensitive data.

As cyber threats continue to evolve and become more sophisticated, the importance of encryption in a zero-trust security strategy cannot be overstated. By implementing strong encryption and key management practices, organizations can protect their sensitive data and assets, while also adhering to the principles of least privilege and continuous monitoring. In doing so, businesses can significantly reduce the risk of data breaches and other security incidents, while also maintaining the trust of their customers and partners.

In conclusion, the role of encryption in a zero-trust security strategy is paramount. As organizations continue to navigate the complexities of the digital landscape, the need for robust data protection measures will only grow. By embracing encryption as a core component of their security strategy, businesses can ensure the confidentiality, integrity, and availability of their data, while also fostering a culture of trust and accountability.

More here:
The Role of Encryption in a Zero-Trust Security Strategy - CityLife

Read More..

How Application Allowlisting Combats Ransomware Attacks – Security Intelligence

Ransomware attacks are on the rise in both volume and sophistication. Triple extortion (a ransomware attack on one business leading to extortion threats on its business partners) is raising the cost of attacks. Ransomware-as-a-Service puts the means to attack in the hands of smaller criminal entities, making the tactic a commodity and not just the tool of masterminds. Its no surprise that ransomware attacks are now substantially more expensive to recover from than other types of data breaches.

Keeping attackers out of your systems altogether is ideal, but cyber criminals are persistent and inventive. So what can you do to stop ransomware attacks from succeeding?

Data encryption at all levels is a powerful measure and critical to implement with depth and weight. But it should be only part of a larger whole. You should consider augmenting encryption with additional controls that identify attackers at the application and process levels. This technique is known as application (or process) allowlisting.

Lets discuss why its necessary, how it works and how to use it.

A common cyberattack involves installing dummy applications on endpoints that look like common utilities Word, Adobe Photoshop or Slack, for example but which secretly encrypt and/or exfiltrate data. Phishing tactics are the most common way for these applications and trojan horses to find their way onto a system. Without realizing it, an employee may click a seemingly harmless link that installs malware on their device.

When one of these malware applications shows up on a desktop or in a directory, it avoids suspicion because the user assumes the app has always been there. However, a nefarious actor with access to the endpoint can deploy the malware, find valuable data and take it hostage. When a legitimate user tries to access the compromised data, a message appears demanding ransom and threatening to expose sensitive data online if they dont pay.

If you are unlucky enough to see such a message, it means your data is compromised. Your company should prepare to go down a long and expensive path of assessing the damage, weighing the options, managing the crisis and possibly sourcing the funds to pay the ransom. The negative impact of these actions is evident in ransom fees and consulting costs. Even if you pay the ransom, the decrypting program from the cyber extortionist might be painfully slow and prolong the time your business is offline, your mission is put on hold and your market reputation is damaged. In the best-case scenario, you have a robust data backup and restore capability, but disaster recovery is neither instantaneous nor 100% successful.

Encryption at every level is crucial. But if native encryption is weak, criminals can decrypt it with their own tools or ones they rent on the dark web (in the burgeoning and convenient Ransomware-as-a-Service marketplace). They can exfiltrate the data and in addition to halting your own business operations they can threaten to make sensitive data public and charge more for its safe return. So even if you can restore your business operations on your own, you still risk submitting to extortion to prevent public exposure of your data or stop it from being sold to the highest bidder.

In-line administrative tools, such as those native to a specific database, offer access controls. However, they generally dont include allowlisting and are limited in system and database coverage. Application allowlisting and granular policy-based access controls delivered by an enterprise solution are configured so that only authorized users and processes can read or write data. Those policies should be applicable across platforms to eliminate inconsistencies and gaps.

With mature application allowlisting capabilities, you have the power to specify which users and processes have the authority to access specific data resources. The result is that ransomware cannot read or write to protected files because the process signatures will not pass the control point that only allows authorized and known processes to access the data.

In other words, the malware will not be able to maliciously encrypt the underlying data, even if they know where it exists.

Sensitive data should, ideally, already be encrypted. That way even if malicious actors steal and exfiltrate the files, they are rendered useless as the criminals cannot decrypt them in a useful timeframe (or at all, if the encryption and key protection are strong). In other words, unreadable data has close to zero market value.

Allowlisting and encryption are indeed powerful, but you might be asking about the administrative and performance overhead. Administration is ideally done through a single management console that can span heterogeneous databases and system environments. This allows trained operators to apply policy consistently across the enterprise.

A modern data encryption solution should not incur significant performance overhead to protect files at this level and will lower processing impact by only decrypting data for authorized users and processes. No changes to applications or workflows should be necessary. If your current tool cant do this, it might be time to search for an alternative.

An added benefit of enforcing a high level of granularity is the improvement youll find in governance. Role-based access control improves your separation of duties posture, and detailed access logs will delight internal and external auditors.

A modern data security solution, such as IBM Security Guardium Data Encryption, will be able to enable policy creation based on multiple criteria more than just user ID and process. For example, policies can also include the specific resource being accessed, the type of action being performed (read, write, delete, etc.) and the time window permitted.

A key part of modern data security is knowing where your sensitive data resides and which users and processes or applications should have access to it. A repeatable data discovery and classification competency is mandatory. Once you have this knowledge, allowlisting becomes simple: apply allowlists by knowing your approved process and systems and block everything else by default. This may create the occasional oversight, but they should be the exception. In addition, your data security and administration team will be far less burdened with triage and remediation, which makes those oversights easy to address.

Some modern data security products can also have a learn mode enabled during deployment that can observe all processes that access encrypted files on a regular basis. That observed data can then be used as criteria to identify the trusted processes to add to the allowlist. With that control in place, any new process requesting access can be considered an exception and go through a change control process with the proper checks and balances.

A point-in-time intrusion detection or identification of a single compromised credential might just be a bump in the road for sophisticated cyber criminals, and they will not relent. The bottom line is that organizations need controls, technologies and trained personnel that address every link in the ransomware attack chain. Persistent, adaptable competencies focused on protection, like allowlisting and smart access controls, can provide the necessary defenses when other controls fail. When combined with encryption at all levels, they can provide you with defense in depth that is especially useful at the end of the attack chain.

Theres some satisfaction in knowing that if cyber criminals do penetrate defenses, the chamber holding the proverbial crown jewels will be empty.

Product Marketing Manager, IBM Security

Continue Reading

Go here to read the rest:
How Application Allowlisting Combats Ransomware Attacks - Security Intelligence

Read More..

Signal: Here’s what Apple has to say on UK law opposed by … – Times of India

"At Apple, we believe privacy is a fundamental human right," the company said in an announcement while talking about new privacy features on the App Store earlier this month. And rightly so. The iPhone maker has joined WhatsApp and Signal in opposing the Uk's Online Safety Bill that could give powers to the regulators to allow scanning of encrypted messaging platforms like iMessage, WhatsApp and Signal for child abuse material.According to a report in BBC, Apple's stand comes as 80 organisations and tech experts have written to the UK's technology minister Chloe Smith to rethink the powers that the bill grants to the Office of Communications (or Ofcom)."End-to-end encryption is a critical capability that protects the privacy of journalists, human rights activists, and diplomats. It also helps everyday citizens defend themselves from surveillance, identity theft, fraud, and data breaches," Apple was quoted as saying. End-to-end encryption restricts anyone - even the company offering the service - except the sender and recipient to read the message."The Online Safety Bill poses a serious threat to this protection, and could put UK citizens at greater risk," the company said, adding that the bill should be amended to protect encryption."Apple urges the government to amend the bill to protect strong end-to-end encryption for the benefit of all," the company noted.The UK government's takeThe UK government, the Police, and some high-profile child protection charities argue that the end-to-end encryption prevents the authorities "and the firms themselves" from identifying the sharing of child sexual abuse material."Tech companies have a moral duty to ensure they are not blinding themselves and law enforcement to the unprecedented levels of child sexual abuse on their platforms," the government has previously said. Both WhatsApp and Signal have opposed the Bill in the past. A letter signed by Will Cathcart, head of WhatsApp at Meta; Meredith Whittaker, president at Signal; and representatives from Threema, Element, Wire and Session apps was shared on Twitter back in April.In March, Cathcart said the company would rather be blocked in the UK than to weaken the privacy of encrypted messages under the Online Safety Bill, if asked by the government.Signal chief has also threatened that it could stop providing services in the UK if the bill required it to scan messages.

Go here to read the rest:
Signal: Here's what Apple has to say on UK law opposed by ... - Times of India

Read More..

Silicon Valley startup SandboxAQ hired to beef up US military cyber security – The Economic Times

Artificial intelligence and quantum computing startup SandboxAQ on Tuesday said it has won a U.S. government contract for military cyber security in a deal that includes Microsoft and Deloitte & Touche as subcontractors. The contract is with the Defense Information Systems Agency which provides global communications infrastructure for the Department of Defense, the Silicon Valley firm said. SandboxAQ, which spun off from Alphabet last year, offers software that can scan systems and identify and replace encryption algorithms that can be broken with current technology and techniques or will likely be broken in the near term, SandboxAQ CEO Jack Hidary told Reuters. Researchers expect quantum computers to eventually be able to break today's encryption algorithms, and new cryptography techniques designed to withstand quantum computers have been introduced to prevent hackers from gathering encrypted data to decrypt in the future. "It's a great milestone for our company," Hidary said. "We needed additional complementary skill sets in our consortium. We turned to Deloitte and Microsoft as our subcontractors."

Microsoft is able to provide the infrastructure platform needed for deploying software to large organizations such as the Department of Defense and Deloitte has in-person services that can implement changes.

Earlier this year, SandboxAQ won a contract with the U.S. Air Force to research quantum navigation technology which could serve as an alternative to the Global Positioning System (GPS), which can be jammed.

Go here to see the original:
Silicon Valley startup SandboxAQ hired to beef up US military cyber security - The Economic Times

Read More..

Comprehensive Overview of Progress Achieved in the Field of Quantum Teleportation – SciTechDaily

Prof. Guangcan Guos team from CAS and USTC published an in-depth review on quantum teleportation, highlighting its importance in quantum communication and computing. The teams advancements include creating a high-fidelity 32-dimensional quantum entanglement and its successful transmission over long distances, with the paper also discussing quantum technologys future practical development.

A team led by Academician Prof. Guangcan Guo from the Chinese Academy of Sciences (CAS) provides a comprehensive overview of the progress achieved in the field of quantum teleportation. The team, which includes Prof. Xiaomin Hu, Prof. Yu Guo, Prof. Biheng Liu, and Prof. Chuanfeng Li from the University of Science and Technology of China (USTC), CAS, was invited to publish a review paper on quantum teleportation in the peer-reviewed scientific journal Nature Review Physics. The paper was officially released online on May 24.

As one of the most important protocols in the field of quantum information, quantum teleportation has attracted great attention since it was proposed in 1993. Through entanglement distribution and Bell-state measurement, quantum teleportation enables the nonlocal transmission of an unknown quantum state, which has deepened the understanding of quantum entanglement. More importantly, quantum teleportation can effectively overcome the distance limitation of direct transmission of quantum states in quantum communication, as well as realize long-range interactions between different quantum bits in quantum computing.

The team, under the leadership of Prof. Biheng Liu and Prof. Chuanfeng Li, has been at the forefront of experimental studies on high-dimensional quantum teleportation and quantum networks. Their notable achievements include the successful preparation of the worlds highest fidelity 32-dimensional quantum entanglement, the effective transmission of high-dimensional entanglement over 11 kilometers of optical fiber, and the development of efficient techniques for quantum entanglement detection. They have also made significant progress in areas such as high-dimensional quantum dense coding, high-dimensional quantum guidance, and high-dimensional quantum teleportation.

Based on the important progress made by the research group over the years in high-dimensional quantum teleportation and high-dimensional quantum communication, Dr. Iulia Georgescu, chief editor of Nature Review Physics, invited Guos team to write a review paper about advances in quantum teleportation.

Teleportation has advanced a lot in both theoretical research and experimental verification. It is currently at the critical stage from proof-of-principle to practical application. This paper discussed potential applications and future development in quantum communication and quantum computing in depth, which will promote the practical development of quantum technology.

Reference: Progress in quantum teleportation by Xiao-Min Hu, Yu Guo, Bi-Heng Liu, Chuan-Feng Li and Guang-Can Guo, 24 May 2023, Nature Reviews Physics.DOI: 10.1038/s42254-023-00588-x

More:

Comprehensive Overview of Progress Achieved in the Field of Quantum Teleportation - SciTechDaily

Read More..