Page 3,808«..1020..3,8073,8083,8093,810..3,8203,830..»

Crypto AG Shows That US Concern Over Huawei Encryption Backdoors Comes From Long Experience Doing the Same Thing – CPO Magazine

The United States government has been dead set against the use of Huawei equipment in national infrastructure since early 2018, when AT&T was pressured into dropping a lucrative 5G contract with the Chinese company. Speculation about encryption backdoors for use by the Chinese government has driven most of this, coming to a head recently with direct accusations that Huawei hardware has law enforcement backdoors in addition to new charges of racketeering and theft of trade secrets.

Another news story that broke recently may shed some light on the depth and intensity of United States suspicions even in the face of what sometimes seems to be scanty evidence.

U.S.-controlled Crypto AG, which has sold cryptographic equipment to governments throughout the world, used similar backdoors to allow the CIA to spy on foreign affairs for decades.

All of this is not to say that the U.S. does not have solid reasons to be wary of Huawei. As a company based in China, Huawei is required by law to comply with any demands the governing CCP makes of it; there is no room for something like Apples refusal to create an encryption backdoor for the US government. China and the US are racing to be the first into the lucrative 5G space, and Huawei has been caught with its hand in the industrial espionage cookie jar before.

Before you continue reading, how about a follow on LinkedIn?

The thing that is more nebulous is the accusations of hardware backdoors that lead back to China, which until recently had relied on a trust us, were the government approach from the US. While there may well be classified evidence that makes this more than a case of projection, US history would indicate that this abundance of government caution stems from the actions of its own intelligence agencies. No story is more illustrative than that of Crypto AG.

Founded in Switzerland in 1952, Crypto AGs trade was in providing ciphering machines to U.S. forces during World War II. The firm became an international cryptography giant from there, providing technology to the governments of more than half the worlds nations over the decades.

Initially, Crypto AG was independent. But in the 1960s, control of the Swiss company was covertly taken by the CIA and West German intelligence. Business continued as normal and the rest of the world was unaware, but from about 1970 forward the equipment coming out of Crypto AG contained encryption backdoors.

The U.S. used this to spy on a broad range of foreign nations, and not just enemies and rivals. This equipment was in use in Spain, Italy, Turkey, Greece, Argentina, India, Pakistan, and the Vatican among other locations.

The full details of the relationship were confirmed by a recent Washington Post report, but there were strong indications and suspicions dating back to the 1970s. Communications between the NSA and the founder of Crypto AG hinted at the relationship, as did some careless statements made by President Reagan during the 80s. This may be why primary rivals Russia and China were never customers of the company. However, in the early 1990s the CIA bought out West Germany and continued to produce this compromised equipment until the company was fully dissolved in 2018. News reports speculating about this connection appeared as early as 1995, but at that point the world of cryptography was transitioning to the internet and Crypto AG was becoming much less relevant.

The CIA and West German intelligence were at odds from the beginning, but managed to keep the program together for over two decades. The CIA was dismayed at the West German focus on using the encryption backdoors to make money rather than gather important intelligence; the West Germans were aghast at the willingness of the US to spy on everyone but its closest allies, according to internal reports unearthed by the Washington Post. The reports indicate that the United Kingdom, Sweden, Switzerland and Israel were aware of the encryption backdoor program and were given access to intelligence gathered from it.

The reports also indicate that Crypto AG used bribes to foreign leaders and smear campaigns against competitors to maintain its dominant market position.

Though the US has virtually frozen the company out of the country at this point, not all of its allies have taken the same tack. The UK will allow Huawei components in non-sensitive parts of the countrys 5G network, and a vote on the companys presence in Germany is forthcoming.

Australia has banned it, but New Zealand intends to incorporate some Huawei components into its network and Canada is still mulling the possibility.

Huawei, for its part, has staunchly maintained it does not include encryption backdoors for the Chinese government. And U.S. accusations of that nature have been vague thus far, not providing enough details for anyone else to independently verify them.

The dilemma for every other country in the world is that Huaweis equipment tends to be the cheapest option among the major manufacturers, and is about as advanced as it gets in the 5G realm. There are fair reasons to wonder what kind of access the CCP will have bundled with it, but as of now the only evidence is the insistence of the same government that brought the world Crypto AG, NSA surveillance of allied leaders, demands for an encryption backdoor in all Apple devices, and multiple insecure backdoors in Cisco routers. Whether that helps or hurts their case is in the eye of the beholder.

What can the average end user do with all of these government backdoors in their hardware? Kevin Bocek, VP security strategy & threat intelligence at Venafi, provides some parting thoughts:

Government mandated backdoors will allow cyber criminals to undermine all types of private, secure communications and weaken the power of encryption ultimately, if we create this power for government, it will soon work its way into the wrong hands. We have already seen this with EternalBlue and the Ukranian power station hack. This is why the Crypto AG revelations should be a major concern for all of us.

The only way organizations can be confident that their encryption does not possess any backdoors is by ensuring they have complete visibility and control over the encryption keys and certificates that act as machine identities. These security assets enable and secure machine to machine communications and are used in nearly every digital transaction.

Read this article:
Crypto AG Shows That US Concern Over Huawei Encryption Backdoors Comes From Long Experience Doing the Same Thing - CPO Magazine

Read More..

Global Encryption Software Market is projected to reach a value of USD 20.44 billion by 2026 – WhaTech Technology and Markets News

Global Encryption Software Market Outlook 2026 -Top Companies In Market, Trends & Growth Factors

A new business intelligence report released by Report Ocean with the title Global Encryption Software Market Research Report" is made covering in-depth analysis by manufacturers and key business segments. The Over-the-top Market research report offers energetic visions to conclude and study the market size, share, market hopes, industry trends, forecast, and competitive surroundings.

The research is derived through primary and secondary statistics sources and it comprises both qualitative and quantitative detailing. This Report covers the manufacturers' data, including shipment, price, revenue, gross profit, interview record, business distribution, etc; these data help the consumer know about the competitors better.

The global encryption software market size is anticipated to reach USD 20.44 billion by 2026

Key Market Growth Drivers/Restraints

For more information on this report visitwww.reportocean.com/industrrt_id=5148

Geographical Segmentation

Key Players

The Global Encryption Software Market is primarily dominated by major companies like Microsoft Corporation, Symantec Corporation, IBM Corporation, EMC Corporation, CISCO Systems Inc., Intel Security, Check Point Software Technologies Ltd., Oracle Corporation, Trend Micro, Inc., and Sophos Group Plc. among others.

Market Segmentation

Global Encryption Software Market has been divided into the following segments

Deployment

Application

Organization Size

End-user

DOWNLOAD FREE SAMPLE COPY @ http://www.reportocean.com/industrrt_id=5148

Major Highlights of the Global Encryption Software Market

What the report offers?

- Understanding of the potential market opportunity with precise market size and forecast data.- Detailed market analysis focusing on the growth of Encryption Software in the aesthetic industry.- Factors influencing the growth of the Encryption Software market.- In-depth competitive analysis of dominant and pureplay vendors.- Prediction analysis of the Encryption Software industry in both developed and developing regions.- Key insights related to major segments of the Encryption Software market.- The latest market trend analysis impacting the buying behavior of the consumers.

This email address is being protected from spambots. You need JavaScript enabled to view it.

Read more from the original source:
Global Encryption Software Market is projected to reach a value of USD 20.44 billion by 2026 - WhaTech Technology and Markets News

Read More..

MI5 Still Thinks Encryption Backdoors are an Excellent Idea That Couldn’t Possibly Go Wrong – Gizmodo UK

Really, this again?

We feel like we've written this article a thousand times but once again, Britain's security services are complaining that they can't read absolutely all of your online communications and it's JUST NOT FAIR!

Sir Andrew Parker, head of MI5, is asking tech companies to give spy agencies "exceptional access" (meaning in exceptions, not exceptionally detailed although we wouldn't be surprised) to encrypted messages, especially on Facebook (and presumably Facebook-owned WhatsApp) which is introducing end-to-end encryption.

Parker's comments were made in an ITV interview that'll be broadcast this Thursday. In it, Sir Andrew apparently bemoans the fact that your inbox is "a wild west, unregulated, inaccessible to authorities" and says it's "increasingly mystifying" that spies can't just have a quick look.

As ever, the excuse is that MI5 and other spy agencies can't see what terrorists are saying to one another, but as we all know, this kind of argument is always used to try and scare us into giving up the tiny sliver of privacy we have left. Much like the way Met Police chief Cressida Dick recently said having your face scanned against your will is better than "a knife in the chest," as if those were the only two options.

"Use the brilliant technologists youve got," says Parker, to "provide end-to-end encryption but on an exceptional basis [...] where there is a legal warrant and a compelling case to do it, provide access to stop the most serious forms of harm happening." Sorry, how is that end-to-end? From one end to the other with a quick diversion to MI5? Cool.

Essentially, Parker is saying "hey locksmiths, can you provide locks that are totally secure on everyone's doors and windows, but also open with a master key? BUT STILL SECURE!"

As a coalition of tech companies said on one of the many previous occasions spies pleaded for backdoors, it would turn "a two-way conversation into a group chat where the government is the additional participant." Sweet! Who doesn't want Joe The Spy sending gif reacts to your texts?

Even if we do give up the last bit of privacy we had and allow spies into our chats, we won't be safe, Parker admits. Asked if he thought MI5 was in control of the situation in 2017 when there was a string of terror attacks, he said, "Well were not in control of it ever, are we? To be in control would mean that somehow we could manage this whole landscape and stop everything. We cant. We cant do that."

Super. [The Guardian]

Main image: MW238 via Flickr Creative Commons

Read this article:
MI5 Still Thinks Encryption Backdoors are an Excellent Idea That Couldn't Possibly Go Wrong - Gizmodo UK

Read More..

Exporters Should Be ‘Very Careful’ of Misusing New End-to-End Encryption Carve-Out in ITAR, Experts Say – Export Compliance Daily

Companies should ensure their data is fully encrypted with no access by third parties before using the new encryption carve-out in the upcoming amendments to the International Traffic in Arms Regulations, according to a cybersecurity compliance expert and a trade lawyer. Although they lauded the ITAR for recognizing that some technology, such as encryption, can protect transfers of export controlled data, both said complying fully with the carve-out may be complicated. There is a wrong way to do the end-to-end encryption, so you need to be very careful when applying it, said Alex Major, a cybersecurity and trade lawyer with McCarter & English, speaking during a Feb. 27 webinar hosted by the Massachusetts Export Center.

The carve-out, which takes effect March 25, is part of an interim final rule recently issued by the State Department that provides definitions for activities that are not exports, re-exports, retransfers or temporary imports (see 1912230052). The rule makes significant changes to reduce compliance burdens surrounding encrypted data to help better facilitate international data storage and transfers (see 1912300024).

But companies using the carve-out to export data need to ensure they are correctly encrypting data, said Ryan Heidorn, a cybersecurity compliance expert with Steel Root, an information technology services company. Certain encryptions could lead to misuses of the rule and violations of the ITAR. Its super important and probably more difficult than you'd think to implement true end-to-end encryption, Heidorn said.

Heidorn stressed that true end-to-end encryption occurs only when the parties responsible for the data could potentially decrypt that data. That means companies should exclude third parties, including certain encryption apps, which may perform some encryption services but may not meet ITARs standards. End-to-end encryption is when you, as an organization, hold the decryption keys, Heidorn said. Meaning that you could be using a commercial service like Google Mail or Office 365, and even if there's encryption in place, if those other entities hold the decryption key, that is not end-to-end encryption.

Major said compliance with the carve-out ultimately depends on key management, or how secure companies make the encryption key for their exported data. There are companies that perform strong end-to-end encryption, such as PreVeil, Major said, but others may not fully comply with ITAR. You need to make sure you're talking to people who know what they're talking about when it comes to the key management, Major said. If you give that key to a third party you lose the protection of the carve-out. Its very important.

Although encryption can be complex, both Major and Heidorn said that the carve-out can be a significant tool for exporting controlled data. I consider this a win for the ITAR to recognize that technology can protect export controlled data across networks, Heidorn said.

Go here to read the rest:
Exporters Should Be 'Very Careful' of Misusing New End-to-End Encryption Carve-Out in ITAR, Experts Say - Export Compliance Daily

Read More..

Encryption Software Market 2020 Analysis by Overview, Growth, Top Companies, Trends, Demand and Forecast to 2026 – Packaging News 24

Verified Market Research adds new research report on market size for Encryption Software and regional forecasts for 2020-2026. The report provides an in-depth analysis of the Encryption Software market, taking into account market dynamics, segmentation, geographic expansion, the competitive landscape, and various other key issues. The market analysts who prepared the report have thoroughly examined the Encryption Software market and provided reliable and accurate data. They understand the needs of the industry and customers, so they can easily focus on the issues that end users have been looking for. The research report provides an analysis of an assessment of existing and upcoming trends in which players can invest. It also includes an assessment of the players financial prospects and the nature of the competition.

Global Encryption Software Market was valued at USD 3.32 billion in 2016 and is projected to reach USD 30.54 billion by 2025, growing at a CAGR of 27.96% from 2017 to 2025.

This report includes the following Companies; We can also add other companies you want:

Encryption Software Market: Competitive Landscape

The competitive landscape is a must for market participants to withstand the competition in the Encryption Software market. This helps market participants to develop effective strategies to optimize their market positions. In addition, the competitive analysis helps them identify potential benefits and obstacles in the Encryption Software market. This allows them to monitor how their competitors are implementing different strategies, including pricing, marketing, and sales.

Encryption Software Market: Drivers and Limitations

The report section explains the various drivers and controls that have shaped the global market. The detailed analysis of many market drivers enables readers to get a clear overview of the market, including the market environment, government policy, product innovation, development and market risks.

The research report also identifies the creative opportunities, challenges, and challenges of the Encryption Software market. The framework of the information will help the reader identify and plan strategies for the potential. Our obstacles, challenges and market challenges also help readers understand how the company can prevent this.

Encryption Software Market: Segment Analysis

The report section contains segmentations such as application, product type and end user. These segments help determine which parts of the market will improve over others. This section analysis provides information on the most important aspects of developing certain categories better than others. It helps readers understand strategies to make solid investments. The market for Encryption Software is segmented according to product type, applications and end users.

Encryption Software Market: Regional Analysis

This section of the report contains detailed information on the market in different regions. Each region offers a different market size because each state has different government policies and other factors. The regions included in the report are North America, Europe, Asia Pacific, the Middle East and Africa. Information about the different regions helps the reader to better understand the global market.

Ask for Discount @ https://www.verifiedmarketresearch.com/ask-for-discount/?rid=1826&utm_source=PN24&utm_medium=001

Table of Content

1 Introduction of Encryption Software Market

1.1 Overview of the Market1.2 Scope of Report1.3 Assumptions

2 Executive Summary

3 Research Methodology of Verified Market Research

3.1 Data Mining3.2 Validation3.3 Primary Interviews3.4 List of Data Sources

4 Encryption Software Market Outlook

4.1 Overview4.2 Market Dynamics4.2.1 Drivers4.2.2 Restraints4.2.3 Opportunities4.3 Porters Five Force Model4.4 Value Chain Analysis

5 Encryption Software Market , By Deployment Model

5.1 Overview

6 Encryption Software Market , By Solution

6.1 Overview

7 Encryption Software Market , By Vertical

7.1 Overview

8 Encryption Software Market , By Geography

8.1 Overview8.2 North America8.2.1 U.S.8.2.2 Canada8.2.3 Mexico8.3 Europe8.3.1 Germany8.3.2 U.K.8.3.3 France8.3.4 Rest of Europe8.4 Asia Pacific8.4.1 China8.4.2 Japan8.4.3 India8.4.4 Rest of Asia Pacific8.5 Rest of the World8.5.1 Latin America8.5.2 Middle East

9 Encryption Software Market Competitive Landscape

9.1 Overview9.2 Company Market Ranking9.3 Key Development Strategies

10 Company Profiles

10.1.1 Overview10.1.2 Financial Performance10.1.3 Product Outlook10.1.4 Key Developments

11 Appendix

11.1 Related Research

Request Report Customization @ https://www.verifiedmarketresearch.com/product/global-encryption-software-market-size-and-forecast-to-2025/?utm_source=PN24&utm_medium=001

About Us:

Verified market research partners with clients to provide insight into strategic and growth analytics; data that help achieve business goals and targets. Our core values include trust, integrity, and authenticity for our clients.

Analysts with high expertise in data gathering and governance utilize industry techniques to collate and examine data at all stages. Our analysts are trained to combine modern data collection techniques, superior research methodology, subject expertise and years of collective experience to produce informative and accurate research reports.

Contact Us:

Mr. Edwyne FernandesCall: +1 (650) 781 4080Email: [emailprotected]

TAGS: Encryption Software Market Size, Encryption Software Market Growth, Encryption Software Market Forecast, Encryption Software Market Analysis, Encryption Software Market Trends, Encryption Software Market

Read the original post:
Encryption Software Market 2020 Analysis by Overview, Growth, Top Companies, Trends, Demand and Forecast to 2026 - Packaging News 24

Read More..

If We Build It (They Will Break In) – Lawfare

Attorney General William Barr has staked his ground in the long-running debate over law enforcement access to encrypted communications. Last fall, Barr decried end-to-end encryption as enabling dangerous criminals to cloak their communications and activities behind an essentially impenetrable digital shield. As the debate continues, commentators and policymakers often overlook a historical example of the problems with law enforcement access.

Barrs position is hardly novel. For more than two decades, law enforcement has argued that end-to-end encrypted communications present an extreme public safety risk and that tech companies must build in access in the form of some variation of escrowed keys, backdoors, front doors or exceptional access. During that time, many observers have argued that creating this access for law enforcement would decrease public security, not increase it. Theres a cautionary tale about wiretapping from the 1990s that has bearing on todays encryption battles.

As new (primarily digital) telephone services emerged in the 1990s, old-style wiretapping couldnt keep up. The old techniques werent equipped to handle new capabilities, such as call forwarding and other advanced features. Law enforcement was really worried. Then-FBI Director Louis Freeh called digital telephony the number one law enforcement, public safety and national security issue facing us today. After several years of pressing Congressand an added sweetener for the telecom providers in the form of a half-billion in funds to the service providers for updating switches to accommodate the new requirementslaw enforcement got its way with the 1994 passage of the Communications Assistance for Law Enforcement Act (CALEA), which required service providers to build digitally switched telephone networks so that they were wiretap enabled. That meant that the phone switches, which connect telephone lines, were to be built in a way that enabled any call to have a silent third partyan eavesdropperlistening in. These wiretap enabled networks essentially put a security hole in the middle of a phone switch, creating serious risks. Although computer scientists raised that concern about the legislation, the law ultimately passed.

Nothing was simple about implementing CALEA. There were arguments over lots of different issues: how much surveillance capacityboth wiretaps and pen/traps metadata collectionhad to be put into the switches; whether post-cut-through-digits, which have prompts that can vary from press 1 to speak to a receptionist to please enter your credit card number now, were considered content (and thus required a wiretap warrant in order to be collected); and whether location information should be included in information that the telephone companies provided law enforcement. And then there was a debate over fundingthe half-billion dollars did not come close to covering the service providers expenses. Court battles over various aspects of CALEA implementation went on for more than a decade.

But fights over implementation were not CALEAs most serious problem. Building a wiretapping interface for law enforcement into a telephone switch did, as predicted, enable others to listen in. The most well-known occurrence of this phenomenon is the Greek wiretapping case of 2004-2005. Unknown parties wiretapped the cellphones of 100 senior members of the Greek government for a period of 10 months using the law enforcement interface of an Ericsson phone switch built for Greek Telecom. The law enforcement wiretapping interface was built according to European Telecommunications Standards Institute (ETSI) specifications, which were modeled on the CALEA requirements. In another example, IBM researcher Tom Cross showed in 2010 that Cisco specifications for an IP network wiretapping architecture based on the ETSI standards had major security holes. Cross demonstrated that various service providers had implemented a flawed architecture and allowed unauthorized people to intercept communications.

Security problems were not limited to Europe. In 2011, Dickie George, the former technical director of the National Security Agencys Information Assurance Division, told me that his agency had found security problems with the CALEA-compliant implementation on every single switch submitted for testing. In other words, required wiretapping capabilities built for law enforcement were insecure, and others, including nefarious actors, could potentially access them. And then, just this month, the Wall Street Journal reported that U.S. officials are now telling our allies that Huawei Technologies Co. can covertly access mobile-phone networks around the world through back doors designed for use by law enforcement. Why were those backdoors put in? They are what is legally required by CALEA and the European laws based on the U.S. law.

Fast forward to today. Law enforcements line on encryption is that surely the smart people in Silicon Valley can figure out how to build systems that enable law enforcement, backed up with a court order, to access encrypted communications and encrypted data on phones. In reality, such surveillance systems are not easy to buildand not easy to build securely. If the CALEA story reveals anything, it shows that when companies build in backdoors, hackers, nation-states and criminals will come. Thats not the cybersecurity, national security or public safety solution we need.

Originally posted here:
If We Build It (They Will Break In) - Lawfare

Read More..

What Is Quantum Computing? The Next Era of Computational …

When you first stumble across the term quantum computer, you might pass it off as some far-flung science fiction concept rather than a serious current news item.

But with the phrase being thrown around with increasing frequency, its understandable to wonder exactly what quantum computers are, and just as understandable to be at a loss as to where to dive in. Heres the rundown on what quantum computers are, why theres so much buzz around them, and what they might mean for you.

All computing relies on bits, the smallest unit of information that is encoded as an on state or an off state, more commonly referred to as a 1 or a 0, in some physical medium or another.

Most of the time, a bit takes the physical form of an electrical signal traveling over the circuits in the computers motherboard. By stringing multiple bits together, we can represent more complex and useful things like text, music, and more.

The two key differences between quantum bits and classical bits (from the computers we use today) are the physical form the bits take and, correspondingly, the nature of data encoded in them. The electrical bits of a classical computer can only exist in one state at a time, either 1 or 0.

Quantum bits (or qubits) are made of subatomic particles, namely individual photons or electrons. Because these subatomic particles conform more to the rules of quantum mechanics than classical mechanics, they exhibit the bizarre properties of quantum particles. The most salient of these properties for computer scientists is superposition. This is the idea that a particle can exist in multiple states simultaneously, at least until that state is measured and collapses into a single state. By harnessing this superposition property, computer scientists can make qubits encode a 1 and a 0 at the same time.

The other quantum mechanical quirk that makes quantum computers tick is entanglement, a linking of two quantum particles or, in this case, two qubits. When the two particles are entangled, the change in state of one particle will alter the state of its partner in a predictable way, which comes in handy when it comes time to get a quantum computer to calculate the answer to the problem you feed it.

A quantum computers qubits start in their 1-and-0 hybrid state as the computer initially starts crunching through a problem. When the solution is found, the qubits in superposition collapse to the correct orientation of stable 1s and 0s for returning the solution.

Aside from the fact that they are far beyond the reach of all but the most elite research teams (and will likely stay that way for a while), most of us dont have much use for quantum computers. They dont offer any real advantage over classical computers for the kinds of tasks we do most of the time.

However, even the most formidable classical supercomputers have a hard time cracking certain problems due to their inherent computational complexity. This is because some calculations can only be achieved by brute force, guessing until the answer is found. They end up with so many possible solutions that it would take thousands of years for all the worlds supercomputers combined to find the correct one.

The superposition property exhibited by qubits can allow supercomputers to cut this guessing time down precipitously. Classical computings laborious trial-and-error computations can only ever make one guess at a time, while the dual 1-and-0 state of a quantum computers qubits lets it make multiple guesses at the same time.

So, what kind of problems require all this time-consuming guesswork calculation? One example is simulating atomic structures, especially when they interact chemically with those of other atoms. With a quantum computer powering the atomic modeling, researchers in material science could create new compounds for use in engineering and manufacturing. Quantum computers are well suited to simulating similarly intricate systems like economic market forces, astrophysical dynamics, or genetic mutation patterns in organisms, to name only a few.

Amidst all these generally inoffensive applications of this emerging technology, though, there are also some uses of quantum computers that raise serious concerns. By far the most frequently cited harm is the potential for quantum computers to break some of the strongest encryption algorithms currently in use.

In the hands of an aggressive foreign government adversary, quantum computers could compromise a broad swath of otherwise secure internet traffic, leaving sensitive communications susceptible to widespread surveillance. Work is currently being undertaken to mature encryption ciphers based on calculations that are still hard for even quantum computers to do, but they are not all ready for prime-time, or widely adopted at present.

A little over a decade ago, actual fabrication of quantum computers was barely in its incipient stages. Starting in the 2010s, though, development of functioning prototype quantum computers took off. A number of companies have assembled working quantum computers as of a few years ago, with IBM going so far as to allow researchers and hobbyists to run their own programs on it via the cloud.

Despite the strides that companies like IBM have undoubtedly made to build functioning prototypes, quantum computers are still in their infancy. Currently, the quantum computers that research teams have constructed so far require a lot of overhead for executing error correction. For every qubit that actually performs a calculation, there are several dozen whose job it is to compensate for the ones mistake. The aggregate of all these qubits make what is called a logical qubit.

Long story short, industry and academic titans have gotten quantum computers to work, but they do so very inefficiently.

Fierce competition between quantum computer researchers is still raging, between big and small players alike. Among those who have working quantum computers are the traditionally dominant tech companies one would expect: IBM, Intel, Microsoft, and Google.

As exacting and costly of a venture as creating a quantum computer is, there are a surprising number of smaller companies and even startups that are rising to the challenge.

The comparatively lean D-Wave Systems has spurred many advances in the fieldand proved it was not out of contention by answering Googles momentous announcement with news of a huge deal with Los Alamos National Labs. Still, smaller competitors like Rigetti Computing are also in the running for establishing themselves as quantum computing innovators.

Depending on who you ask, youll get a different frontrunner for the most powerful quantum computer. Google certainly made its case recently with its achievement of quantum supremacy, a metric that itself Google more or less devised. Quantum supremacy is the point at which a quantum computer is first able to outperform a classical computer at some computation. Googles Sycamore prototype equipped with 54 qubits was able to break that barrier by zipping through a problem in just under three-and-a-half minutes that would take the mightiest classical supercomputer 10,000 years to churn through.

Not to be outdone, D-Wave boasts that the devices it will soon be supplying to Los Alamos weigh in at 5000 qubits apiece, although it should be noted that the quality of D-Waves qubits has been called into question before. IBM hasnt made the same kind of splash as Google and D-Wave in the last couple of years, but they shouldnt be counted out yet, either, especially considering their track record of slow and steady accomplishments.

Put simply, the race for the worlds most powerful quantum computer is as wide open as it ever was.

The short answer to this is not really, at least for the near-term future. Quantum computers require an immense volume of equipment, and finely tuned environments to operate. The leading architecture requires cooling to mere degrees above absolute zero, meaning they are nowhere near practical for ordinary consumers to ever own.

But as the explosion of cloud computing has proven, you dont need to own a specialized computer to harness its capabilities. As mentioned above, IBM is already offering daring technophiles the chance to run programs on a small subset of its Q System Ones qubits. In time, IBM and its competitors will likely sell compute time on more robust quantum computers for those interested in applying them to otherwise inscrutable problems.

But if you arent researching the kinds of exceptionally tricky problems that quantum computers aim to solve, you probably wont interact with them much. In fact, quantum computers are in some cases worse at the sort of tasks we use computers for every day, purely because quantum computers are so hyper-specialized. Unless you are an academic running the kind of modeling where quantum computing thrives, youll likely never get your hands on one, and never need to.

View post:
What Is Quantum Computing? The Next Era of Computational ...

Read More..

Honeywell says it will soon launch the worlds most powerful quantum computer – TechCrunch

The best-kept secret in quantum computing. Thats what Cambridge Quantum Computing (CQC) CEO Ilyas Khan called Honeywells efforts in building the worlds most powerful quantum computer. In a race where most of the major players are vying for attention, Honeywell has quietly worked on its efforts for the last few years (and under strict NDAs, it seems). But today, the company announced a major breakthrough that it claims will allow it to launch the worlds most powerful quantum computer within the next three months.

In addition, Honeywell also today announced that it has made strategic investments in CQC and Zapata Computing, both of which focus on the software side of quantum computing. The company has also partnered with JPMorgan Chase to develop quantum algorithms using Honeywells quantum computer. The company also recently announced a partnership with Microsoft.

Honeywell has long built the kind of complex control systems that power many of the worlds largest industrial sites. Its that kind of experience that has now allowed it to build an advanced ion trap that is at the core of its efforts.

This ion trap, the company claims in a paper that accompanies todays announcement, has allowed the team to achieve decoherence times that are significantly longer than those of its competitors.

It starts really with the heritage that Honeywell had to work from, Tony Uttley, the president of Honeywell Quantum Solutions, told me. And we, because of our businesses within aerospace and defense and our business in oil and gas with solutions that have to do with the integration of complex control systems because of our chemicals and materials businesses we had all of the underlying pieces for quantum computing, which are just fabulously different from classical computing. You need to have ultra-high vacuum system capabilities. You need to have cryogenic capabilities. You need to have precision control. You need to have lasers and photonic capabilities. You have to have magnetic and vibrational stability capabilities. And for us, we had our own foundry and so we are able to literally design our architecture from the trap up.

The result of this is a quantum computer that promises to achieve a quantum Volume of 64. Quantum Volume (QV), its worth mentioning, is a metric that takes into account both the number of qubits in a system as well as decoherence times. IBM and others have championed this metric as a way to, at least for now, compare the power of various quantum computers.

So far, IBMs own machines have achieved QV 32, which would make Honeywells machine significantly more powerful.

Khan, whose company provides software tools for quantum computing and was one of the first to work with Honeywell on this project, also noted that the focus on the ion trap is giving Honeywell a bit of an advantage. I think that the choice of the ion trap approach by Honeywell is a reflection of a very deliberate focus on the quality of qubit rather than the number of qubits, which I think is fairly sophisticated, he said. Until recently, the headline was always growth, the number of qubits running.

The Honeywell team noted that many of its current customers are also likely users of its quantum solutions. These customers, after all, are working on exactly the kind of problems in chemistry or material science that quantum computing, at least in its earliest forms, is uniquely suited for.

Currently, Honeywell has about 100 scientists, engineers and developers dedicated to its quantum project.

Go here to see the original:
Honeywell says it will soon launch the worlds most powerful quantum computer - TechCrunch

Read More..

10 Revolutionary Technologies To Lookout For In 2020 – Fossbytes

Technology is booming day by day from anti-solar panels to Quantum computing; revolutionary inventions and modifications are everywhere.

2020 is going to be another year of new technologies as a number of technological advances have been lined up, as per the MIT Technology Review. These inventions are surely going to change the way we live.

Scientists have begun human trials of the Anti-aging drugs (Senolytics). The drugs are not supposed to make you live longer but they will reverse the process of aging.

The drug removes senescent cells; cells that lose function as we start aging, however, are resistant to cell death and infect neighboring cells.

Senolytic drugs will help save the human body from diseases that occur mainly due to aging such as Dementia, Arthritis, Cancer and Heart diseases.

Previously, scientists were dogmatic to link the natural disaster with climate change. Thanks to the new rising technologies, weather attribution studies have been able to accurately draw a link, thus convincing the world that climate change is real.

This came into existence by the increased computing power which allowed the scientists to develop high-resolution simulations. Now, scientists are able to perform more virtual experiments which increase the chances of tackling unwanted weather disturbances.

The studies also provide brief information about what natural risks can occur in the future. As per the latest studies, scientists came to the conclusion that global warming is boosting dangerous weather disturbances.

The Internet is easily hackable, however, researchers are trying to create a quantum-based Internet which will be unhackable.

A team of developers at the Delft University of Technology is creating a network that will connect four cities in the Netherlands with the use of quantum technology.

The technology will be based on a quantum behavior of atomic particles known as entanglement. Previously, there have been attempts to send photons through fiber-optic cables, however, the process broke the quantum link and made the information prone to hacking.

However, entangled photons cant be read without disrupting their content.

In the wrong hands, Census data can lead back to individuals when combined with other public statistics. To safeguard the privacy of users, the US government Census Bureau injects inaccuracies aka noise to protect the data.

However, the Census Bureau has often mixed up data with other statistics that resulted in the wrong identification of the residents.

Differential privacy is a mathematical technique that measures how much privacy increases when noise is added. The technique will help the bureau in keeping the identities of the residents private.

Hyper-personalized medicines are genetic medicines that can be tailored to any persons genes, therefore curing any specific medical issue they are suffering from. This will help in curing the diseases which are termed as too rare to cure.

Several cases are registered every year in which the patient is suffering from a rare disease caused by a genetic flaw. The concept of hyper-personalized medicines will help in curing extremely rare diseases caused due to flaws in the DNA.

As of now, Artificial intelligence relies a lot on centralized cloud services, that generate high carbon emissions and limit the privacy of AI applications.

However, researchers are working on reducing the size of deep-learning models without hampering their efficiency. Nowadays, AI chips claim to possess more computational power in compact physical space.

In May 2019, Google announced that it can run Google Assitant on smartphones without establishing connections with the remote servers. Slowly and steadily, the world is moving towards Tiny AI

Digital money is going to be the digital version of a particular countrys currency which will work as a replacement for the physical money.

In 2019, Facebook revealed its global digital currency known as Libra, however, the idea met a lot of criticism form countries and politicians. Soon after Facebooks announcement, the Peoples Bank of China also announced that it is going to launch its digital currency.

Chinese leaders see Libra as a threat because it will be backed by US dollars. Mark Zuckerberg claimed that Libra will play a major role in providing financial leadership to America on a global level.

A quantum computer can perform calculations that are almost impossible for the worlds best supercomputers. In October, Google described the first incident of quantum supremacy when a quantum computer with 53 qubits the basic unit of quantum computation solved a calculation in a time span of three minutes.

Google claimed the same calculation would have been solved by a supercomputer in a time span of 10,000 years i.e 1.5 billion times to the time taken by a quantum computer. It clearly states that is the number of qubits will be increased, quantum supremacy can be achieved soon.

Satellite mega-constellations are being created to provide high-speed internet all around the globe. SpaceX has started creating its own mega-constellation.

SpaceX CEO Elon Musk has said that as soon as they create 400 satellite constellation, the internet service will be launched for selected areas. SpaceX has the ultimate goal of creating a constellation of 800 satellites to provide internet coverage all around the globe.

Earth is home to billions of molecules and each molecule offers unlimited chemical possibilities if only researchers knew the right ones.

But now, scientists are using machine learning to explore the existing database of molecules and using the information to come up with breakthrough drugs.

Back in September, researchers at Hong Kong-based Insilico Medicine discovered 30,000 molecules with desirable properties by using deep learning techniques. Out of the total number, six molecules were selected to synthesize and test. One of them was found active and showed promising results when tested on animals.

Read more here:
10 Revolutionary Technologies To Lookout For In 2020 - Fossbytes

Read More..

Majority of Promising AI Startups Are Still Based in the US – Transport Topics Online

[Stay on top of transportation news: Get TTNews in your inbox.]

The most promising startups using artificial intelligence are U.S.-based companies working in the fields of health care, retail and transportation, according to a study that looked at budding AI companies around the world.

Of the top 100 startups in AI, 65% were based in the U.S., though some of those had dual headquarters in China or elsewhere, according to the analysis by CB Insights, a tech research group that analyzed data on close to 5,000 startups around the world.

These would be companies to watch that are doing really interesting research in AI, said Deepashri Varadharajan, the lead analyst on the report. Some of them might get acquired. Some might have successful product launches.

The research group considered venture capital investment, patent activity and market potential to develop its list of the companies most likely to succeed. The high percentage of U.S.-based companies reflect the countrys historical dominance in AI research, Varadharajan said.

Host Seth Clevenger went to CES 2020 in Las Vegas and met with Rich Mohr of Ryder Fleet Management Solutions and Stephan Olsen of the Paccar Innovation Center to discuss how high-tech the industry has become. Listen to a snippet above, and to hear the full episode, go to RoadSigns.TTNews.com.

More than 4,300 startups in 80 countries have raised $83 billion since 2014, including $26.6 billion just last year, according to CB Insights. While the dollar figures for investment have grown rapidly, the share of U.S.-based investments dropped in that period to 39% from 71%.

The U.S. still has the most number of deals, but that deal share has started to drop as other countries are starting to fund technologies, she said. The vast majority are automating specific tasks in white-collar settings.

That echoes a Brookings Institution study last year that found white-collar jobs are most likely to see an impact from AI, particularly in the life sciences and computer industries.

Top-ranked firms in the CB Insights ranking included several unicorns, or startups whose private valuations reached $1 billion or more. These include the following: Butterfly Network, which is building an ultrasound device that uses AI-assisted diagnostics; Faire Wholesale Inc., which helps local retailers determine what goods are predicted to sell best in specific locations, and DataRobot, whose tools help companies develop their own AI applications.

Some of the startups already have begun work with larger companies, including Caspar.AI, a U.S. and Japan-based firm thats working with Panasonic Corp. on smart home products and ClimaCell Inc., a climate-monitoring firm thats partnered with Alphabet Inc.s Google, JetBlue Airways Corp. and Delta Air Lines Inc. Google also is working with U.K.-based InstaDeep Ltd., which builds AI systems for other companies in the fields of logistics, energy and electronic design.

What the companies have in common is that they are addressing a need within specific industries and, in many cases, breaking through bottlenecks, Varadharajan said.

You can be using AI, thats great, but is there a problem that youre trying to solve? she said. It can be an industry-specific need or pushing the boundaries of core research itself.

The health care startups were looking at diagnostics, health monitoring and enhancing imaging. AI companies are working to develop commuter modeling, waste recycling and mapping for city planning. Improving the energy grid, anti-fraud features in the finance industry, and indoor farming are some of the other areas where AI is being used.

Some future trends she pointed to include energy efficiency, improving quantum computing and doctored videos called deepfakes.

With assistance from Alex Tanzi.

Want more news? Listen to today's daily briefing:

See the rest here:
Majority of Promising AI Startups Are Still Based in the US - Transport Topics Online

Read More..