Page 72«..1020..71727374..8090..»

TAMU Engineering program comes to Caldwell, introduces kids to robotics, coding – 25 News KXXV and KRHD

CALDWELL, Texas (KRHD) The Texas A&M Engineering SPARK! program introduced Caldwell students to robotics and STEM Thursday as part of the Harrie P. Woodson Memorial Library's summer reading program.

BROADCAST TRANSCRIPT:

For Arley Campbell and her brother Raley, playing around with robots is nothing new.

"Well, I'm kind of used to working with robots," Arley said.

But not with these kinds of robots

"I've never played with robots," Raley said.

But they're expanding her knowledge at Texas A&M Engineering's traveling STEM program SPARK!

"Yeah, a big part of what we do is making sure that we give them a good education and computational thinking, so being able to think through a process and come up with these steps and what we call algorithms or like our programming language," Program Specialist Robert Hoyuela said.

It's one reason their grandma Melissa is signing them up.

Arley had already taken some in school this year, so I thought it would be really exciting, and Raley I figured he would really love it, Melissa Campbell said.

The engineering industry is growing with nearly 200,000 jobs are expected to open each year nationally while Texasremains one of the top engineer employers.

"As manufacturing increases, we're trying to bring more factories and businesses to Texas, so as that manufacturing increases, we need more engineers to fill those roles, so they figured start at a younger age spark that interest, like Robert said, and then hopefully we end up with more engineers," Trudi Skinner, a program specialist said.

Future engineers like Arley who's thinking of a career in the field.

"I thought about it. I thought I might want to work on cars," Arley said.

More stories from Brieanna Smith

Read this article:

TAMU Engineering program comes to Caldwell, introduces kids to robotics, coding - 25 News KXXV and KRHD

Read More..

What Is Badge Engineering And How Did It Lead To Some Of The Best And Worst Cars? – SlashGear

Japanese automaker Honda has experienced significant success with its Accord model selling over 300,000 units per year in the US eleven times over the past two decades. The Accord released in the US in the late 2000s wasn't the same model that Europe received. The Honda sedan across the pond featured a smaller size, tighter handling, and was marketed toward a more youthful demographic. While some countries like Australia received both Accord models to choose from, Honda went another route with Americans.

Acura, the luxury Honda brand, simply took the European version of the Accord, and changed the name to the TSX. Reviews on the 2009 Acura TSX were glowing with examples from Car and Driver who stated, "A fantastic, fun-to-drive car overall" and Edmunds who praised it's "Immense features list, [and] sporty handling." The TSX is a good example of badge engineering, as even though it was originally branded a Honda Accord in Europe, it's a model the US might not have experienced otherwise.

Visit link:

What Is Badge Engineering And How Did It Lead To Some Of The Best And Worst Cars? - SlashGear

Read More..

Air Force Academy hosting annual engineering and construction camp – KOAA News 5

AIR FORCE ACADEMY The Society of American Military Engineers (SAME) are at the United States Air Force Academy (USAFA) for the annual SAME/Air Force Academy Engineering & Construction Camp.

United States Air Force Academy

The camp began on Sunday and will run through Saturday.

United States Air Force Academy

The two organizations held their first camp in 2000. Every year, nearly 100 high school students who are interested in STEM careers and military service have a week-long immersion in the following:

The camp is open to juniors and seniors from all parts of the United States who have expressed an interest in applying to a service academy or ROTC program.

United States Air Force Academy

Upon arrival, campers are grouped in teams to complete engineering and construction-related tasks to test their technical acumen, communication, and collaboration.

United States Air Force Academy

A highlight of the camp is the concrete beam testing event, which was held Monday morning. This activity gives the students an opportunity to work with heavy equipment and see the quality of their work.

The Camp Director is Col. (Ret.) James Hodges, a civil engineer, USAFA graduate and Air Force veteran.

Other projects during the week at camp include the following:

"The campers exposure to such varied and unique STEM career paths in one location within a single week is a once-in-a-lifetime experience that both campers and staff will never forget," said SAME National President Sharon Krock. For more information about the camp, visit SAME's website.

___

New video shows Colorado State Patrol's grappler tool in action

News Tips

What should KOAA5 cover? Is there a story, topic, or issue we should revisit? Have a story you believe should make the light of day? Let our newsroom know with the contact form below.

____

Watch KOAA News5 on your time, anytime with our free streaming app available for your Roku, FireTV, AppleTV and Android TV. Just search KOAA News5, download and start watching.

See the original post here:

Air Force Academy hosting annual engineering and construction camp - KOAA News 5

Read More..

Melrose Terrace floodplain restoration receives national engineering award – Brattleboro Reformer

BRATTLEBORO A floodplain restoration project at a former housing complex on the Whetstone Brook recently received a 2024 Engineering Excellence Award.

"These awards go to projects that have significant positive impact in our communities and have innovative engineering elements," said Jessica Clark Louisos, senior water resources engineer for SLR International, which designed the project. "The Melrose Terrace Floodplain restoration project combined many elements including removal of buildings and infrastructure from the floodplain, lowering and reforesting to naturalize floodplain, and increasing capacity of the road crossing to function together and reduce flood risk. I am proud to have been a part of this innovative floodplain restoration project that has already functioned as designed during multiple recent floods causing significantly less damage than prior floods."

Christine Hazzard, executive director of Brattleboro Housing Partnership, which owns and manages 307 rental units for seniors, persons with disabilities and families, said the Melrose Terrace projecthas already successfully served its purpose in five weather events.

"When it is not actively preventing flooding, it is a beautiful space to enjoy and access the Whetstone Brook," said Hazzard. "Brattleboro residents should be very proud of the proactive steps across town to address the inevitable flooding we will most likely continue to see."

Hazzard thanked SLR Consulting engineers Jessica Clark Louisos and Roy Scheff for designing and implementing the project.

During Tropical Storm Irene in August of 2011, the housing complex was flooded and residents were evacuated. Following a multi-year project, many of those residents were relocated to new housing at Red Clover Commons on Fairground Road. Eleven apartment buildings with a total of 80 units at Melrose Terrace were removed as part of the project, which was finished in the fall of 2022 after 28,000 cubic yards of fill was removed and a riparian forest was planted.

Town-owned infrastructure, including a road connection, drinking water main, and sewer main, were all redesigned to relocate as much as possible out of the vulnerable floodplain areas. George Miller Drive was removed from the floodplain where possible, rerouting it between existing buildings where a majority of the road connection would not be flood prone.

This project was developed as part of the 2015 Vermont Economic Resiliency Initiative. BHP, with support of Vermont Emergency Management and the town, secured FEMA Pre-Disaster Mitigation and Vermont Community Development funding to advance the project through design and permitting.

A study revealed that constriction at the George Miller Drive bridge raised Tropical Storm Irene floodwaters by five-and-a-half feet, which was resolved "with an innovative approach including installation of a large overflow culvert and lowering the road surface to provide controlled overtopping during storms over 25-year recurrence," states the project narrative. "Modeling shows that the combined benefits of the project reduce flooding during a Tropical Storm Irene size flood by up to seven feet at the site and two feet in the upstream [Glen Park Mobile Home] community."

"As planned, the new floodplain has slowed and stored flood waters, collected sediment and debris that may have blocked downstream bridges, and reduced flooding in the area," continues the narrative.

The river is naturalizing at the site after being channelized and constricted between walls and the bridge for almost 60 years. The floodplain forest is rejuvenating with a mix of native grasses, flowers, shrubs, and trees included in the extensive planting plan.

Excerpt from:

Melrose Terrace floodplain restoration receives national engineering award - Brattleboro Reformer

Read More..

How AWS engineers infrastructure to power generative AI – About Amazon

Delivering low-latency, large-scale networking

Generative AI models require massive amounts of data to train and run efficiently. The larger and more complex the model, the longer the training time. As you increase time to train, youre not only increasing operating costs but also slowing down innovation. Traditional networks are not sufficient for the low latency and large scale needed for generative AI model training.

Were constantly working to reduce network latency and improve performance for customers. Our approach is unique in that we have built our own network devices and network operating systems for every layer of the stackfrom the Network Interface Card, to the top-of-rack switch, to the data center network, to the internet-facing router and our backbone routers. This approach not only gives us greater control over improving security, reliability, and performance for customers, but also enables us to move faster than others to innovate. For example, in 2019, we introduced Elastic Fabric Adapter (EFA), a network interface custom-built by AWS that provides operating system bypass capabilities to Amazon EC2 instances. This enables customers to run applications requiring high levels of inter-node communications at scale. EFA uses Scalable Reliable Datagram (SRD), a high-performance, lower-latency network transport protocol that was designed specifically by AWS, for AWS.

More recently, we moved fast to deliver a new network for generative AI workloads. Our first generation UltraCluster network, built in 2020, supported 4,000 graphics processing units, or GPUs, with a latency of eight microseconds between servers. The new network, UltraCluster 2.0, supports more than 20,000 GPUs with 25% latency reduction. It was built in just seven months, and this speed would not have been possible without the long-term investment in our own custom network devices and software. Internally, we call UltraCluster 2.0 the 10p10u network, as it delivers tens of petabits per second of throughput, with a round-trip time of less than 10 microseconds. The new network results in at least 15% reduction in time to train a model.

View post:

How AWS engineers infrastructure to power generative AI - About Amazon

Read More..

BYU Engineering hosts Lego-building competition – The Daily Universe – Universe.byu.edu

The BYU Engineering Building Lego model sits in front of the actual Engineering Building. This Lego set is the prize for the winner of this Junes Battle of the Bricks. (BYU Engineering)

The BYU College of Engineering is challenging students, alumni and the community in June to build the best Lego creation.

The first ever Battle of the Bricks competition is open for anyone to enter, according to the BYU Engineering Instagram. The competition is open from Monday, June 17 to Friday, June 28. The winner will receive a custom Lego set of the BYU Engineering Building.

Brian Blumer, communications manager for the Ira A. Fulton College of Engineering, said this competition is intended for alumni to get involved in the college in a light-hearted way.

Its basically just a way to reach out and try to engage with our alumni from BYU Engineering online, Blumer said. You can just participate in something with your fellow alumni and sort of connect with each other.

While other engineering events require alumni to commit their time and be physically present, Blumer said this competition is intended to lower the barriers to participation.

Its something that we figured would be universal enough of an interest, Blumer said. Everybodys pretty much familiar with the little toy blocks.

Dan McGuire said the firm he works for, Jones and DeMille Engineering, Inc., has several BYU Engineering alumni. A group of employees from multiple offices plan to meet together to build an entry for the competition.

We thought this would be a great way to get together, have a little non-work fun and celebrate the great program we all graduated from, McGuire said.

The creation can also be built using other compatible interlocking bricks, according to Instagram.

BYU Engineering posted five guidelines for the competition on their website:

The winner will be decided based on public votes through BYU Engineering social media, such as Facebook, Instagram and X, according to BYU Engineering.

To enter, participants must submit a five- to ten-second video clip in landscape orientation of the build and a picture of the participant with the build no later than Friday, June 28.

BYU Engineering also asked participants to follow their social media accounts to vote for their favorite builds and stay up-to-date with the winner of the competition. Voters are allowed only one vote per platform.

See the rest here:

BYU Engineering hosts Lego-building competition - The Daily Universe - Universe.byu.edu

Read More..

Williams bolsters engineering team; Matt Harman to join as design director – Professional Motorsport World

The Williams F1 team has been on a recruiting drive across its technical team, announcing no less than six new hires to senior positions.

Matt Harman will join the team as design director, starting after the summer shutdown. Most recently technical director at Alpine, Harman has also worked at Renault, Mercedes and Mercedes powertrains division over a 24-year career in F1.

Fabrice Moncade is set to join the team as chief engineer, computing science on July 1. Formerly head of performance analytics at Ferrari, he has pioneered modern-day lap simulation in F1 and worked on two title-winning cars while at Mercedes. He has also worked at McLaren, Sauber and BMW Sauber during his 17 years in the sport.

Juan Molina will also arrive as chief aerodynamicist, starting on July 15. Previously principal aerodynamicist at Haas, he won three championship doubles during a spell with Red Bull and will report to Adam Kenyon who was promoted to head of aerodynamics in April.

Steve Winstanley has been appointed chief engineer, composites and structures to lead and transform the structures department within the design office. He brings 22 years of F1 experience including 14 at Red Bull, where he was involved in six double-championship-winning campaigns.

Richard Frith will also join Williams in 2025 as head of performance systems. Formerly head of performance at Alpine, Frith has 25 years of experience in the sport including spells with Jordan, Force India, Sauber, Marussia and McLaren.

All five will form part of the technical team being led by Pat Fry, who joined Williams in November. They are among 26 recruits from other F1 teams who will join Williams over the year, including several from Mercedes and Ferrari, four from Red Bull and 10 from Alpine. There has been a particular focus on strengthening the aerodynamics team, with 11 hires, and the design office with 13.

These hires will be joined by Sorin Cheran, who arrives at Williams as chief information and analytics officer after a 17-year career with Hewlett Packard Enterprise. He specializes in artificial intelligence and innovation and will lead a transformation of how the team acquires, stores, indexes and uses data to build a best-in-class technology operation.

James Vowles, team principal, commented, I am delighted to welcome these six incredible people to Williams. We are on a mission to fight our way back to the front and being able to attract experienced, championship-winning talent from other teams demonstrates huge belief in the journey we are on. Williams is investing in what it takes to win, and this is just the start as we prepare to welcome more new faces from across the grid in the months ahead.

Original post:

Williams bolsters engineering team; Matt Harman to join as design director - Professional Motorsport World

Read More..

Redwood City names Tanisha Werner as new Director of Engineering and Transportation – Peninsula 360 Press

Redwood City appoints Tanisha Werner as new Director of Engineering and Transportation. She will begin her duties on July 15. She has more than 18 years of progressively responsible experience in civil engineering, with a focus on infrastructure projects that benefit the public.

Redwood City Manager Melissa Stevenson Daz announced the appointment of Tanisha Werner as the new Director of Engineering and Transportation.

We are delighted to welcome Tanisha back to Redwood City, stated Stevenson Daz. Her engineering background and commitment to community service make her the perfect person for this position. We look forward to his leadership to advance our citys infrastructure and transportation initiatives.

Werner, who will begin his duties on July 15, has more than 18 years of progressive responsibility experience in civil engineering, with a focus on infrastructure projects that benefit the public.

Most recently, Werner held the position of Deputy Director of Infrastructure at SamTrans, where she worked on managing the design and construction of critical infrastructure for the transition to zero emissions.

Previously, she served as Deputy Director of Public Works/Municipal Engineer for the City of Menlo Park, where she oversaw a $100 million Capital Improvements Program and led a team responsible for reviewing private development and utility sections. .

Werner's previous career included progressively responsible positions in the cities of Sunnyvale and Santa Clara, and the Mid-Peninsula Regional Open Space District. Most notably, she began her public service career in Redwood City as an associate engineer, managing roadway resurfacing programs and capital improvement projects.

Werner holds a master's degree in Public Administration from San Jose State University and a bachelor's degree in Civil Engineering from Fresno State University.

I am honored to have the opportunity to lead the Redwood City Engineering and Transportation Department. This city holds a special place in my heart as the starting point of my career in public service. I am committed to leveraging my experience to improve our city's infrastructure and to working collaboratively with our community to achieve our goals, Werner said.

As Director of Engineering and Transportation, Werner will oversee land use and development functions, including land development, engineering and transportation.

Additionally, you will have functional responsibility for the Capital Improvements Program (CIP) of the city, which covers public services, civic projects and construction inspections.

You may be interested in: San Mateo County to implement CARE Court strategy to provide critical mental health services

See more here:

Redwood City names Tanisha Werner as new Director of Engineering and Transportation - Peninsula 360 Press

Read More..

Telegram says it has ‘about 30 engineers’; security experts say that’s a red flag – TechCrunch

Over the weekend, a clip from a recent interview with Telegrams founder Pavel Durov went semi-viral on X (previously Twitter). In the video, Durov tells right-wing personality Tucker Carlson that he is the only product manager at the company, and that he only employs about 30 engineers.

Security experts say that while Durov was bragging about his Dubai-based company being super efficient, what he said was actually a red flag for users.

Without end-to-end encryption, huge numbers of vulnerable targets, and servers located in the UAE? Seems like that would be a security nightmare, Matthew Green, a cryptography expert at Johns Hopkins University, told TechCrunch. (Telegram spokesperson Remi Vaughn disputed this, saying it has no data centers in the UAE.)

Green was referring to the fact that by default chats on Telegram are not end-to-end encrypted like they are on Signal or WhatsApp. A Telegram user has to start a Secret Chat to switch on end-to-end encryption, making the messages unreadable to Telegram or anyone other than the intended recipient. Also, over the years, many people have cast doubt over the quality of Telegrams encryption, given that the company uses its own proprietary encryption algorithm, created by Durovs brother, as he said in an extended version of the Carlson interview.

Eva Galperin, the director of cybersecurity at the Electronic Frontier Foundation and a longtime expert in the security of at-risk users, said that its important to remember that Telegram, unlike Signal, is a lot more than just a messaging app.

What makes Telegram different (and much worse!) is that Telegram is not just a messaging app, it is also a social media platform. As a social media platform, it is sitting on an enormous amount of user data. Indeed, it is sitting on the contents of all communications that are not one-on-one messages that have been specifically [end-to-end] encrypted, Galperin told TechCrunch. Thirty engineers means that there is no one to fight legal requests, there is no infrastructure for dealing with abuse and content moderation issues.

And I would even argue that the quality of those 30 engineers isnt that great, Galperin continued. Also, if I was a threat actor, I would definitely consider this to be encouraging news. Every attacker loves a profoundly understaffed and overworked opponent.

In other words, its unlikely for Telegram to be very effective fighting hackers, especially government-backed ones, with such a small staff.

Telegrams spokesperson confirmed the company has 30 developers working on the apps and infrastructure, but claims to have an additional 30 people on its core team. The spokesperson did not answer our specific questions, including whether the company has a chief security officer, and how many of its engineers work full time on securing the platform.

Last week, the well-known cybersecurity expert SwiftOnSecurity wrote on X that The cost to run a company that has all the right cyber security tools and staff is absolutely obscene.

Its hard to describe the numbers Ive seen. Even saying this is a gray area. But it is [an] incredible headcount and spend, SwiftOnSecurity wrote.

All to say, even the biggest companies on the planet probably dont spend enough money, time and energy on securing themselves. Telegram has almost one billion users, according to Durov. Its one of the most popular platforms for people working in crypto (who move millions of dollars), extremists, hackers and disinformation peddlers.

That makes it an incredibly interesting target for both criminal and government hackers. And it has at most just a handful of people dedicated to cybersecurity.

For years, security experts have warned that people should not see Telegram like a truly secure messaging app. Given what Durov said recently, it may be even worse than experts thought.

UPDATE: June 25, 10:31 a.m. ET: This story was updated to include comments from Telegrams spokesperson, which were provided after publication.

Originally posted here:

Telegram says it has 'about 30 engineers'; security experts say that's a red flag - TechCrunch

Read More..

Your data could be leaked in five years – here’s why – Tom’s Guide

The invention of quantum computers poses a global threat to internet security. This is because they have the processing power necessary to break the majority of the encryption algorithms that currently protect most of the worlds data. They achieve this by using quantum physics to perform a lot more efficiently than traditional supercomputers.

Before you panic, its worth noting that, as it stands, quantum computers are only being used for research purposes, so youre unlikely to find one outside of a research center, such as a university, research lab, or supercomputer center. But experts are predicting that at some point in the next five years, this will change and quantum computers will start being used to break the encryption that has, up until now, kept most of the sensitive data on the internet from being hacked. This event is referred to as Q-day.

When this happens, everything from photos, private emails, and medical records to government files, business documents, and banking details will be vulnerable. So its likely to have huge and far-reaching consequences, causing political, financial, and social chaos around the world. It will also make it much easier to scam unsuspecting victims, as hackers will be able to use private details to make phishing scams a lot more believable.

Thankfully, there is a way you can protect your data from Q-day. Cyber security experts have already developed a range of post-quantum algorithms that will offer sufficient data protection against quantum computers. This level of security is available now to anyone. All you need to do is sign up for a VPN with post-quantum encryption.

Well use this article to explain the risks in much more detail and recommend VPNs you can get right now that already come future-proofed with robust post-quantum protection. So read on to learn all you need to know.

At the moment, your data should be fairly secure, particularly if you use a reputable VPN to encrypt your traffic. However, it might not stay that way for long, as quantum computers pose a significant cyber security threat to most online data. This is because these machines use quantum physics to make their computations infinitely more efficient than those of a traditional supercomputer.

Referred to as Q-day, experts are predicting that this day will happen at some point in the next five years. So while your data is probably safe for the time being, it probably wont be secure once Q-day happens.

Upgrade your life with a daily dose of the biggest tech news, lifestyle hacks and our curated analysis. Be the first to know about cutting-edge gadgets and the hottest deals.

If you rely on traditional forms of encryption, Q-day will jeopardize all your online information. This includes everything from your documents, photos, and emails to your banking details, work documents, and your internet search history.

However, its important to know that your data doesnt have to be compromised. There are already post-quantum algorithms to protect against attacks from quantum computers. You can get this level of security today by signing up to a VPN that offers post-quantum encryption. Weve recommended our favorite picks further down the page.

While Q-day cant be prevented as such, given that quantum computers will become more powerful and more widely used, the impact of it can be dramatically reduced. To achieve this, experts have been working on post-quantum encryption. As the name suggests, this is a form of cryptography thats powerful enough to protect against hacks from quantum computers.

Q-day is predicted to happen at some point in the next five years. So, while the threat isnt necessarily imminent, its a very sensible idea to prepare for Q-day by securing your data with quantum-resistant encryption. This type of security is already available from a select number of VPN providers, so you can safeguard your data from today.

There are several different types of post-quantum algorithms that can protect your data from quantum computers and prevent your data from Q-day.

The best thing you can do to protect your data from quantum computer attacks that will happen on Q-day and beyond is to use a VPN that comes with post-quantum encryption. These algorithms have been specifically designed to be unbreakable, even by quantum computers, meaning that they can give the required level of protection to guard against Q-day.

But its important to note that not all VPNs (even the best VPNs) offer post-quantum protection. In fact, the majority of providers havent yet built this into their protocols. So even if you use a VPN, its quite possible your data will be vulnerable to attack by quantum computers.

Q-day is predicted to happen at some point in the next five years. So while the threat might not be immediate, its important to protect your data against Q-day, as we dont yet know when its going to happen. So the most prudent thing you can do is sign up for a VPN that offers post-quantum encryption. This is especially important if youre looking to save money by signing up for a long-term subscription. That way, no matter when Q-day happens, your data will be protected.

As we mentioned, there are a select number of VPNs with post-quantum encryption that will future-proof your cyber security. Here, weve compiled a list of reputable ones that will keep your data safe from Q-day. Well also explain what type of encryption each VPN uses to help you make an informed choice.

If youve read any of our other VPN guides, youll be used to seeing ExpressVPNs name being mentioned as one of the very best VPNs. This is largely because of its ability to deliver market-leading security, along with fast speeds, and a great user experience. But, unlike a lot of its direct competitors, ExpressVPN stands out by offering quantum-resistant encryption, thereby giving users much more sophisticated protection than youd find on most other providers.

As with most VPNs, ExpressVPN uses AES 256-bit encryption, which is sufficient to protect against attacks from classical computers. But it also goes a step further with its very own open-source Lightway protocol, which has built-in post-quantum algorithms. These are too powerful to be broken by quantum computers.

If this isnt enough to put your mind at ease, the Lightway protocol has undergone independent auditing twice in the last couple of years by Cure53. It passed both with flying colors, therefore proving that its every bit as secure as ExpressVPN has claimed.

You might be concerned that such sophisticated encryption might slow down any traffic using the Lightway protocol. But actually, it performed really well in our speed tests, coming in at 410 Mbps. This speed will be more than fast enough for anything youd want to do online, including streaming, online gaming, and video editing.

But the Lightway protocol isnt the only reason why ExpressVPN comes so highly recommended. It also delivers everything else you could want from a VPN, including the ability to unblock region-restricted content with ease, as well as helpful customer support, and a fleet of strong servers.

QSTVPN has integrated post-quantum encryption into its VPN connections to protect user data from quantum computers, as well as classical computers. So its a great choice if youre looking to keep your data safe now and into the future.

Despite its additional security, QSTVPN delivers fast and reliable speeds that will lead to a smooth online experience.

If youre concerned about cyber security in a post-Q-day world, QAL VPN could be the perfect solution to protect your business from hackers. It offers a number of post-quantum algorithms to provide plenty of protection against quantum machines. The provider utilizes three lattice-based algorithms, as well as its SPHINCS+ cryptography, which uses hash-based functions. So its definitely one of the most future-proofed business options around.

However, because its a VPN designed for large businesses, its probably not the ideal solution if you want one for individual use. But if youre looking for something to protect your organization from the ramifications of Q-day, it could be the ideal choice for you.

If youre primarily a desktop user, Mullvad will provide you with sophisticated post-quantum encryption for your Windows, MAC, or Linux machine. It does this by incorporating quantum-resistant tunnels in all its WireGuard protocols for its desktop app with Kyber and Classic McEliece post-quantum algorithms.

If youre concerned about leaving your other devices vulnerable, dont worry because Mullvad is already working on rolling out this level of security for its iOS and Android apps. Customers signing up for a Mullvad subscription should have post-quantum protection across all their devices long before Q-day happens.

Mullvads encryption shares a secret in a way thats too sophisticated for a quantum computer to be able to decipher. Once this has been shared, that tunnel will be disconnected and a new one will be opened with the new shared secret.

You wont go far wrong with Mullvad as your VPN provider because, in addition to its post-quantum algorithms, it also delivers fast speeds and total customer anonymity.

Windscribe is a strong VPN with plenty of security features, fast speeds, and content-unblocking capabilities. On top of this, it also uses the WireGuard protocol to generate unique pre-shared keys for each user that are quantum-resistant.

Even if a quantum computer were able to decrypt these keys, which is extremely unlikely, it would be unable to interpret the traffic. Therefore, it will keep your data hidden from any hacks past Q-day.

Quantum computers pose a potentially catastrophic threat to online security. Once these machines are powerful enough and begin being used outside of research labs, they will have the power and the capability to break the encryption that protects most of the data on the internet. This event is known as Q-day and experts are predicting that this could happen at any time in the next five years.

Luckily, there are already some post-quantum algorithms that are strong enough to protect your data against this threat. All you need to do is sign up for a VPN that offers this level of security, such as ExpressVPN, Windscribe, or Mullvad.

Post-quantum encryption is a form of cyber security thats powerful enough to protect your data from attacks by quantum computers. There are a few different types of post-quantum cryptography that are currently available, such as lattice-based, hash-based, and code-based algorithms. If you want this level of protection, use a VPN that has built it into its protocols, such as Mullvad, ExpressVPN, or Windscribe.

Although quantum computers dont currently pose a security threat, as theyre only being used in research labs right now, there will come a day when theyre strong enough to break most of the worlds encryption.

Referred to as Q-day, this event will wreak havoc across the world and could effectively render VPNs obsolete, as theyll no longer be able to protect user data. That is unless VPNs incorporate post-quantum encryption into their protocols. Some VPNs have already done this, such as ExpressVPN, Mullvad, and Windscribe. If other providers follow suit, quantum computers wont be able to decrypt the protection offered, meaning that they can no longer pose a threat to VPNs.

Read more:
Your data could be leaked in five years - here's why - Tom's Guide

Read More..