D-Wave partners with NEC to build hybrid HPC and quantum apps – TechCrunch

D-Wave Systems announced a partnership with Japanese industrial giant NEC today to build what they call hybrid apps and services that work on a combination of NEC high-performance computers and D-Waves quantum systems.

The two companies also announced that NEC will be investing $10 million in D-Wave, which has raised $204 million prior to this, according to Crunchbase data.

D-Waves chief product officer and EVP of R&D, Alan Baratz, whom the company announced this week will be taking over as CEO effective January 1st, says the company has been able to do a lot of business in Japan, and the size of this deal could help push the technology further. Our collaboration with global pioneer NEC is a major milestone in the pursuit of fully commercial quantum applications, he said in a statement.

The company says it is one of the earliest deals between a quantum vendor and a multinational IT company with the size and scale of NEC. The deal involves three key elements. First of all, NEC and D-Wave will come together to develop hybrid services that combine NECs supercomputers and other classical systems with D-Waves quantum technology. The hope is that by combining the classical and quantum systems, they can create better performance for lower cost than you could get if you tried to do similar computing on a strictly classical system.

The two companies will also work together with NEC customers to build applications that will take advantage of this hybrid approach. Also, NEC will be an authorized reseller of D-Wave cloud services.

For NEC, which claims to have demonstrated the worlds first quantum bit device way back in 1999, it is about finding ways to keep advancing commercial quantum computing. Quantum computing development is critical for the future of every industry tasked with solving todays most complex problems. Hybrid applications and greater access to quantum systems is what will allow us to achieve truly commercial-grade quantum solutions, Motoo Nishihara, executive vice president and CTO at NEC Corporation, said in a statement.

This deal should help move the companies toward that goal.

See the rest here:

D-Wave partners with NEC to build hybrid HPC and quantum apps - TechCrunch

Double eureka: Breakthroughs could lead to quantum ‘FM radio’ and the end of noise – The Next Web

A team of scientists from the University of Chicago discovered a method by which quantum states can be integrated and controlled in everyday electronics. The teams breakthrough research resulted in the experimental creation of what theyre dubbing a quantum FM radio to transmit data over long distances. This feels like an eureka moment for quantum computing.

The teams work involves silicon carbide, a naturally occurring semiconductor used to make all sorts of electronics including light emitting diodes (LEDs) and circuit boards. Its also used in rocketry due to its ability to withstand high temperatures and in the production of sand paper presumably because its coarse. What were excited about is its potential as a conduit for controlling quantum states.

Todays quantum computers under the IBM/Google/MIT paradigm are giant, unwieldy things that absolutely wont fit on your desktop. They require lasers and sub-zero temperatures to function. You need a team of physicists standing by in an expensive laboratory just to get started. But the University of Chicago teams work may change all that.

They used good old fashioned electricity, something were pretty good at controlling, to initiate and direct quantum states in silicon carbide. That means they didnt need fancy lasers, a super cold environment, or any of that mainframe-sized stuff to produce quantum results. This wasnt the result of a single experiment, but in fact involved two significant breakthroughs.

The first, the ability to control quantum states in silicon carbide, has the potential to solve quantum computings exotic materials problem. Silicon carbide is plentiful and relatively easy to work with compared to the standard-fair physicists use which includes levitated atoms, laser-ready metals, and perfectly-flawed diamonds. This is cool, and could fundamentally change the direction most quantum computing research goes in 2020 and beyond. But its the second breakthrough that might be the most exciting.

According to a press release from the University of Chicago, the teams method solves quantum computings noise problem. Per Chris Anderson, a co-author on the teams paper:

Impurities are common in all semiconductor devices, and at the quantum level, these impurities can scramble the quantum information by creating a noisy electrical environment. This is a near-universal problem for quantum technologies.

Co-author Alexandre Bourassa added:

In our experiments we need to use lasers, which unfortunately jostle the electrons around. Its like a game of musical chairs with electrons; when the light goes out everything stops, but in a different configuration. The problem is that this random configuration of electrons affects our quantum state. But we found that applying electric fields removes the electrons from the system and makes it much more stable.

The work is still early, but it has incredible implications for the field of quantum computing. With a little tweaking, it appears that this silicon carbide-based method of wrangling quantum states could lead us to the unhackable quantum communications network sooner than many experts believed. According to the team, it would work with the existing fiber optic network that already transmits 90 percent of the worlds data.

On the outside, a quantum FM radio, that essentially sends data along frequency-modulated waves, could augment or replace existing wireless communication methods and bring about an entirely new class of technology. Were thinking something like Star Treks TriCorders, a gadget that records environmental data, processes it instantly, and uses quantum AI to analyze and interpret the results.

For more information read the Chicago teams research papers here and here.

H/t: Phys.Org

Read next: Buchardt S400 Review: Remarkable speakers near endgame material

Continue reading here:

Double eureka: Breakthroughs could lead to quantum 'FM radio' and the end of noise - The Next Web

China is beating the US when it comes to quantum security – MIT Technology Review

Its been six years since hackers linked with China breached the US Office of Personnel Managements computer system and stole sensitive information about millions of federal employees and contractors. It was the sort of information thats collected during background checks for security clearancesvery personal stuff. But not all was lost. Even though there were obviously some massive holes in the OPMs security setup, some of its data was encrypted. It was useless to the attackers.

Perhaps not for much longer. Its only a matter of time before even encrypted data is at risk. Thats the view of John Prisco, CEO of Quantum Xchange, a cybersecurity firm based in Bethesda, Maryland. Speaking at the EmTech Future Compute event last week, he said that Chinas aggressive pursuit of quantum computing suggests it will eventually have a system capable of figuring out the key to access that data. Current encryption doesnt stand much of a chance against a quantum system tasked with breaking it.

China is moving forward with a harvest today, read tomorrow approach, said Prisco. The country wants to steal as much data as possible, even if it cant access it yet, because its banking on a future when it finally can, he said. Prisco says the China is outspending the US in quantum computing 10 times over. Its allegedly spending $10 billion alone to build the National Laboratory for Quantum Information Sciences, scheduled to open next year (although this number is disputed). Americas counterpunch is just $1.2 billion over five years toward quantum information science. Were not really that safe, he said.

Sign up for The Download your daily dose of what's up in emerging technology

Part of Chinas massive investment has gone toward quantum security itself, including the development of quantum key distribution, or QKD. This involves sending encrypted data as classical bits (strictly binary information) over a fiber-optic network, while sending the keys used to decrypt the information in the form of qubits (which can represent more than just two states, thanks to quantum superposition). The mere act of trying to observe the key changes its state, alerting the sender and receiver of a security breach.

Bu it has its limits. QKD requires sending information-carrying photons over incredibly long distances (tens to hundreds of miles). The best way to do this right now is by installing a fiber-optic network, a costly and time-consuming process.

Its not foolproof, either. The signals eventually scatter and break down over long stretches of fiber optics, so you need to build nodes that will continue to boost them forward. These networks are also point-to-point only (as opposed to a broadcast connection), so you can communicate with only one other party at a time.

Nevertheless, China looks to be all in on QKD networks. Its already built a 1,263-mile link between Beijing and Shanghai to deliver quantum keys. And a successful QKD demonstration by the Chinese Micius satellite was reported across the 4,700 miles between Beijing and Vienna.

Even Europe is making aggressive strides: the European Unions OPENQKD initiative calls for using a combination of fiber optics and satellites to create a QKD-safe communications network covering 13 nations. The US, Prisco argues, is incredibly far behind, for which he blames a lack of urgency. The closest thing it has is a 500-mile fiber-optic cable running down the East Coast. Quantum Xchange has inked a deal to use the cable to create a QKD network that secures data transfers for customers (most notably the financial companies based around New York City).

With Europe and China already taking QKD seriously, Prisco wants to see the US catch upand fast. Its a lot like the space race, he said. We really cant afford to come in second place.

Update: This story has been amended to note that the funding figures for the National Laboratory for Quantum Information Sciences are disputed among some experts.

See more here:

China is beating the US when it comes to quantum security - MIT Technology Review

Inside the weird, wild, and wondrous world of quantum video games – Digital Trends

IBM Research

In 1950, a man named John Bennett, an Australian employee of the now-defunct British technology firm Ferranti, created what may be historys first gaming computer. It could play a game called Nim, a long-forgotten parlor game in which players take turns removing matches from several piles. The player who loses is the one who removes the last match. For his computerized version, Bennett created a vast machine 12 feet wide, 5 feet tall, and 9 feet deep. The majority of this space was taken up by light-up vacuum tubes which depicted the virtual matches.

Bennetts aim wasnt to create a game-playing machine for the sake of it; the reason that somebody might build a games PC today. As writer Tristan Donovan observed in Replay, his superlative 2010 history of video games: Despite suggesting Ferranti create a game-playing computer, Bennetts aim was not to entertain but to show off the ability of computers to do [math].

Jump forward almost 70 years and a physicist and computer scientist named Dr. James Robin Wootton is using games to demonstrate the capabilities of another new, and equally large, experimental computer. The computer in this question is a quantum computer, a dream of scientists since the 1980s, now finally becoming a scientific reality.

Quantum computers encode information as delicate correlations with an incredibly rich structure. This allows for potentially mind-boggling densities of information to be stored and manipulated. Unlike a classical computer, which encodes as a series of ones and zeroes, the bits (called qubits) in a quantum computer can be either a one, a zero, or both at the same time. These qubits are composed of subatomic particles, which conform to the rules of quantum rather than classical mechanics. They play by their own rules a little bit like Tom Cruises character Maverick from Top Gun if he spent less time buzzing the tower and more time demonstrating properties like superpositions and entanglement.

I met Wootton at IBMs research lab in Zurich on a rainy day in late November. Moments prior, I had squeezed into a small room with a gaggle of other excited onlookers, where we stood behind a rope and stared at one of IBMs quantum computers like people waiting to be allowed into an exclusive nightclub. I was reminded of the way that people, in John Bennetts day, talked about the technological priesthood surrounding computers: then enormous mainframes sequestered away in labyrinthine chambers, tended to by highly qualified people in white lab coats. Lacking the necessary seminary training, we quantum computer visitors could only bask in its ambience from a distance, listening in reverent silence to the weird vee-oing vee-oing vee-oing sound of its cooling system.

Wottons interest in quantum gaming came about from exactly this scenario. In 2016, he attended a quantum computing event at the same Swiss ski resort where, in 1925, Erwin Schrdinger had worked out his famous Schrdinger wave equation while on vacation with a girlfriend. If there is a ground zero for quantum computing, this was it. Wotton was part of a consortium, sponsored by the Swiss government, to do (and help spread the word about) quantum computing.

At that time quantum computing seemed like it was something that was very far away, he told Digital Trends. Companies and universities were working on it, but it was a topic of research, rather than something that anyone on the street was likely to get their hands on. We were talking about how to address this.

Wootton has been a gamer since the early 1990s. I won a Game Boy in a competition in a wrestling magazine, he said. It was a Slush Puppy competition where you had to come up with a new flavor. My Slush Puppy flavor was called something like Rollin Redcurrant. Im not sure if you had to use the adjective. Maybe thats what set me apart.

While perhaps not a straight path, Wootton knew how an interest in gaming could lead people to an interest in other aspects of technology. He suggested that making games using quantum computing might be a good way of raising public awareness of the technology.He applied for support and, for the next year, was given to my amazement the chance to go and build an educational computer game about quantum computing. At the time, a few people warned me that this was not going to be good for my career, he said. [They told me] I should be writing papers and getting grants; not making games.

But the idea was too tantalizing to pass up.

That same year, IBM launched its Quantum Experience, an online platform granting the general public (at least those with a background in linear algebra) access to IBMs prototype quantum processors via the cloud. Combined with Project Q, a quantum SDK capable of running jobs on IBMs devices, this took care of both the hardware and software component of Woottons project. What he needed now was a game. Woottons first attempt at creating a quantum game for the public was a version of the game Rock-Paper-Scissors, named Cat-Box-Scissors after the famous Schrdingers cat thought experiment. Wootton later dismissed it as [not] very good Little more than a random number generator with a story.

But others followed. There was Battleships, his crack at the first multiplayer game made with a quantum computer. There was Quantum Solitaire. There was a text-based dungeon crawler, modeled on 1973s Hunt the Wumpus, called Hunt the Quantpus. Then the messily titled, but significant, Battleships with partial NOT gates, which Wootton considers the first true quantum computer game, rather than just an experiment. And so on. As games, these dont exactly make Red Dead Redemption 2 look like yesterdays news. Theyre more like Atari 2600 or Commodore 64 games in their aesthetics and gameplay. Still, thats exactly what youd expect from the embryonic phases of a new computing architecture.

If youd like to try out a quantum game for yourself, youre best off starting with Hello Quantum, available for both iOS and Android. It reimagines the principles of quantum computing as a puzzle game in which players must flip qubits. It wont make you a quantum expert overnight, but it will help demystify the process a bit. (With every level, players can hit a learn more button for a digestible tutorial on quantum basics.)

Quantum gaming isnt just about educational outreach, though. Just as John Bennett imagined Nim as a game that would exist to show off a computers abilities, only to unwittingly kickstart a $130 billion a year industry, so quantum games are moving beyond just teaching players lessons about quantum computing.Increasingly, Wootton is excited about what he sees as real world uses for quantum computing. One of the most promising of these is taking advantage of quantum computings random number generating to create random terrain within computer games. In Zurich, he showed me a three-dimensional virtual landscape reminiscent of Minecraft. However, while much of the world of Minecraft is user generated, in this case the blocky, low-resolution world was generated using a quantum computer.

Quantum mechanics is known for its randomness, so the easiest possibility is just to use quantum computing as a [random number generator], Wootton said. I have a game in which I use only one qubit: the smallest quantum computer you can get. All you can do is apply operations that change the probabilities of getting a zero or one as output. I use that to determine the height of the terrain at any point in the game map.

Plenty of games made with classical computers have already included procedurally generated elements over the years. But as the requirements for these elements ranging from randomly generated enemies to entire maps increase in complexity, quantum could help.

Gaming is an industry that is very dependent on how fast things run

Gaming is an industry that is very dependent on how fast things run, he continued. If theres a factor of 10 difference in how long it takes something to run that determines whether you can actually use it in a game. He sees today as a great jumping-on point for people in the gaming industry to get involved to help shape the future development of quantum computing. Its going to be driven by what people want, he explained. If people find an interesting use-case and everyone wants to use quantum computing for a game where you have to submit a job once per frame, that will help dictate the way that the technology is made.

Hes now reached the point where he thinks the race may truly be on to develop the first commercial game using a quantum computer. Weve been working on these proof-of-principle projects, but now I want to work with actual game studios on actual problems that they have, he continued. That means finding out what they want and how they want the technology to be [directed].

One thing thats for certain is that Wootton is no longer alone in developing his quantum games. In the last couple of years, a number ofquantum game jams have popped up around the world. What most people have done is to start small, Wootton said. They often take an existing game and use one or two qubits to help allow you to implement a quantum twist on the game mechanics. Following this mantra, enthusiasts have used quantum computing to make remixed versions of existing games, including Dr. Qubit (a quantum version of Dr. Mario), Quantum Cat-sweeper (a quantum version of Minesweeper), and Quantum Pong (a quantum version of, err, Pong).

The world of quantum gaming has moved beyond its 1950 equivalent of Nim. Now we just have to wait and see what happens next. The decades which followed Nim gave us MITs legendary Spacewar in the 1960s, the arcade boom of the 1970s and 80s, the console wars of Sega vs. Nintendo, the arrival of the Sony PlayStation in the 1990s, and so on. In the process, classical computers became part of our lives in a way they never were before. As Whole Earth Catalog founder Stewart Brand predicted as far back as 1972 Rolling Stone in his classic essay on Spacewar: Ready or not, computers are coming to the people.

At present, quantum gamings future is at a crossroads. Is it an obscure niche occupied by just a few gaming physics enthusiasts or a powerful tool that will shape tomorrows industry? Is it something that will teach us all to appreciate the finer points of quantum physics or a tool many of us wont even realize is being used, that will nevertheless give us some dope ass games to play?

Like Schrdingers cat, right now its both at once. What a superposition to be in.

Read this article:

Inside the weird, wild, and wondrous world of quantum video games - Digital Trends

Shaping the technology transforming our society | News – Fermi National Accelerator Laboratory

Technology and society are intertwined. Self-driving cars and facial recognition technologies are no longer science fiction, and data and efficiency are harbingers of this new world.

But these new technologies are only the beginning. In the coming decades, further advances in artificial intelligence and the dawn of quantum computing are poised to change lives in both discernible and inconspicuous ways.

Even everyday technology, like a smartphone app, affects people in significant ways that they might not realize, said Fermilab scientist Daniel Bowring. If there are concerns about something as familiar as an app, then we need to take more opaque and complicated technology, like AI, very seriously.

A two-day workshop took place from Oct. 31-Nov.1 at the University of Chicago to raise awareness and generate strategies for the ethical development and implementation of AI and quantum computing. The workshop was organized by the Chicago Quantum Exchange, a Chicago-based intellectual hub and community of researchers whose aim is to promote the exploration of quantum information technologies, and funded by the Kavli Foundation and the Center for Data and Computing, a University of Chicago center for research driven by data science and AI approaches.

Members of the Chicago Quantum Exchange engage in conversation at a workshop at the University of Chicago. Photo: Anne Ryan, University of Chicago

At the workshop, industry experts, physicists, sociologists, journalists and more gathered to learn, share insights and identify next steps as AI and quantum computing advance.

AI and quantum computing are developing tools that will affect everyone, said Bowring, a member of the workshop organizing team. It was important to us to get as many stakeholders in the room as possible.

Workshop participants listened to presentations that framed concerns such as power asymmetries, algorithmic bias and privacy before breaking out into small groups to deliberate these topics and develop actionable strategies. Groups reported to all attendees after each breakout session. On the last day of the workshop, participants considered how they would nurture the dialogue.

At one of the breakout sessions, participants discussed the balance between collaborative quantum computing research and national security. Today, the results of quantum computing research are dispersed in a wide variety of academic journals, and a lot of code is accessible and open source. However, because of its potential implications for cybersecurity and encryption, quantum computing is also of interest to national security, so it may be subject to intelligence and export controls. What endeavors, if any, should be open source or private? Are these outcomes realizable? What level of control should be maintained? How should these technologies be regulated?

Were already behind on setting ground rules for these technologies, which, if left to progress on their own, could increase power asymmetries in society, said Brian Nord, Fermilab and University of Chicago scientist and member of the workshop organizing team. Our research programs, for example, need to be crafted in a way that does not reinforce or exacerbate these asymmetries.

Workshop participants will continue the dialogue through online and in-person meetings to address key ethical and societal issues in the quantum and AI space. Potential future activities include writing proposals for joint research projects that consider ethical and societal implications, white papers addressed to academic audiences, and media editorials and developing community action plans.

Organizers are planning to hold a panel next spring to engage the public, as well.

The spring event will help us continue to spread awareness and engage a variety of groups on issues of ethics in AI and quantum computing, Nord said.

The workshop was sponsored by the Kavli Foundation in partnership with the Center for Data and Computing at the University of Chicago. Artificial intelligence and quantum information science are two of six initiatives identified as special priority by the Department of Energy Office of Science.

The Kavli Foundation is dedicated to advancing science for the benefit of humanity, promoting public understanding of scientific research, and supporting scientists and their work. The foundations mission is implemented through an international program of research institutes, initiatives and symposia in the fields of astrophysics, nanoscience, neuroscience, and theoretical physics, as well as the Kavli Prize and a program in public engagement with science. Visitkavlifoundation.org.

The Chicago Quantum Exchange catalyzes research activity across disciplines and member institutions. It is anchored by the University of Chicago, Argonne National Laboratory, Fermi National Accelerator Laboratory, and the University of Illinois at Urbana-Champaign and includes the University of Wisconsin-Madison, Northwestern University and industry partners. Visit chicagoquantum.org.

View post:

Shaping the technology transforming our society | News - Fermi National Accelerator Laboratory

Atos Boosts Quantum Application Development Through the Creation of the First Quantum User Group – AiThority

Following on from the 6thmeeting of its Quantum Scientific Council, Atos, a global leader in digital transformation, announces that it is continuing to enrich its quantum development ecosystem, through the creation of a global User Group of the Atos Quantum Learning Machine (QLM), which will be chaired by a representative from French multi-national energy company Total. This announcement follows the commercial success of the QLM, the worlds highest-performing quantum programming appliance, allowing for the first time to simulate quantic behaviors. This ecosystem is supported by the Atos Quantum Scientific Council, which includes universally recognized quantum physicists. It is also further enhanced by partners such as leading software company Zapata and start-up Xofia.

Just two years on from its launch in 2017, Atos QLM users continue to grow as the QLM is being used in numerous countries worldwide includingAustria,France,Germany, Ireland, Mexico, the Netherlands,UKand theUnited States, empowering major research programs in various sectors.

Read More: ImmersiveTouch Launches New Personalized VR Imaging Platform into the Radiology Market

The User Group will bring together current QLM customers and their ecosystems of users from around the world, including research centers, universities and global industrial companies. It will be chaired by a representative from Total, Henri Calandra, Expert in Numerical Methods and High Performance Computing. This QLM User Group aims to drive advances in quantum programming and simulation, as well as to develop and enrich collaboration between users and share best practice and support. Feedback will be used to influence Atos QLM evolutions and further enhance the technical support that it provides its customers, paving the road towards the new world of quantum computing.

Atos is committed to enrich its quantum ecosystem and with this, its research program in order to continue to provide researchers worldwide with the right conditions and solutions so that they can take advantage of the innovative opportunities provided by quantum computing. We have some of the worlds leading scientists on our Quantum Scientific Council which, together with our rich base of QLM customers, means we are creating the most advanced quantum ecosystem said Elie Girard, CEO of Atos Now, with the creation of this Group of Atos QLM Users, we are ensuring that we continue to support them to develop new advances in deep learning, algorithmics and artificial intelligence with the support of the breakthrough computing acceleration capacities that quantum simulation provides.

Read More: Test Release of Virtual Graffiti App Kokorobakari for Writing Graffiti and Making Donations Using Blockchains Developed by Profound Design Technology and Saltfish

As President of this new User Group, Total is involved in the advancement of quantum research, together with Atos. Quantum simulationenables us to explore new ways of solving complex problems, improve performance and drive significant technological advances to prepare the future of low carbon energy. This contributes to realizing Totals ambition: to become the responsible energy major, said Marie-Noelle Semeria, Senior Vice President, Group CTO at Total.

The Quantum Scientific Council is made up of universally recognized quantum physicists, including Nobel prize laureate in Physics, Serge Haroche; Research Director, CEA Saclay, and Head of Quantronics, Daniel Estve; professor at the Institut dOptique and Ecole Polytechnique, Alain Aspect; Alexander von Humboldt Professor, Director of the Institute for Theoretical Nanoelectronics at the Juelich Research Center, David DiVincenzo; and Professor of Quantum Physics at the Mathematical Institute, University of Oxford and Singapore, Artur Ekert.

Atos ambitious program to anticipate the future of quantum computing and to be prepared for the opportunities as well as the risks that come with it Atos Quantum program was launched in November 2016. As a result of this initiative,Atos was the first organization to offer a quantum noisy simulation module, the Atos QLM. Earlier this year, it launched myQLM, a free tool that allows a broader ecosystem to get acquainted with quantum programming and discover some features of the Atos QLM.

Quantum computing should make it possible, in the years to come, to deal with the explosion of data, which Big Data and the Internet of Things bring about. With its targeted and unprecedented compute acceleration capabilities, notably based on the exascale class supercomputerBullSequana, quantum computing should also promote advances in deep learning, algorithmics and artificial intelligence for areas as various as pharmaceuticals or new materials.

Read More: Artificial Intelligence Will Facilitate Growth of Innovative Kinds of VR and AR Platforms

See the rest here:

Atos Boosts Quantum Application Development Through the Creation of the First Quantum User Group - AiThority

WireGuard to be merged with Linux net-next tree and will be available by default in Linux 5.6 – Packt Hub

On December 9, WireGuard announced that its secure VPN tunnel kernel code will soon be included in Linux net-next tree. This indicates, WireGuard will finally reach the mainline kernel with the Linux 5.6 cycle kicking off in late January or early February!, reports Phoronix.

WireGuard is a layer 3 secure networking tunnel made specifically for the kernel, that aims to be much simpler and easier to audit than IPsec.

On December 8, Jason Donenfeld, WireGuards lead developer sent out patches for the net-next v2 WireGuard. David Miller has already pulled in WireGuard as the first new feature in net-next that is destined for Linux 5.6 now that the 5.5 merge window is over, the email thread mentions.

While WireGuard was initiated as a Linux project, its Windows, macOS, BSD, iOS, and Android versions are already available. The reason behind the delay for Linux was that Donenfeld disliked Linuxs built-in cryptographic subsystem citing its API is too complex and difficult.

Donenfeld had plans to introduce a new cryptographic subsystem his own Zinc library. However, this didnt go down well with several developers as they thought that rewriting the cryptographic subsystem was a waste of time. Fortunately for Donenfeld, Linus Torvalds was on his side.

Torvalds stated, Im 1000% with Jason on this. The crypto/model is hard to use, inefficient, and completely pointless when you know what your cipher or hash algorithm is, and your CPU just does it well directly.

Finally, Donenfeld compromised saying, WireGuard will get ported to the existing crypto API. So its probably better that we just fully embrace it, and afterward work evolutionarily to get Zinc into Linux piecemeal. Hence a few Zine elements have been imported into the legacy crypto code in the next Linux 5.5 kernel.

This laid the foundation for WireGuard to finally ship in Linux early next year. WireGuard works by securely encapsulates IP packets over UDP. Its authentication and interface design has more to do with Secure Shell (SSH) than other VPNs. You simply configure the WireGuard interface with your private key and your peers public keys, and youre ready to securely talk.

After the arrival, WireGuard VPN can be expected to become the new standard for Linux VPNs with its key features, namely, tiny code-size, high-speed cryptographic primitives, and in-kernel design. With being super-fast, WireGuard for Linux would be secure too as it supports state-of-the-art cryptography technologies such as the Noise protocol framework, Curve25519, BLAKE2, SipHash24, ChaCha20, Poly1305, and HKD.

Donenfeld in the email thread writes, This is big news and very exciting. Thanks to all the developers, contributors, users, advisers, and mailing list interlocutors who have helped to make this happen. In the coming hours and days, Ill be sending followups on next steps.

ArsTechnica reports, Although highly speculative, its also possible that WireGuard could land in-kernel on Ubuntu 20.04 even without the 5.6 kernelWireGuard founder Jason Donenfeld offered to do the work backporting WireGuard into earlier Ubuntu kernels directly. Donenfeld also stated today that a 1.0 WireGuard release is on the horizon.

To know more about this news in detail, read the official email thread.

WireGuard launches an official MacOS app

Researchers find a new Linux vulnerability that allows attackers to sniff or hijack VPN connections.

NCSC investigates several vulnerabilities in VPN products from Pulse secure, Palo Alto and Fortinet

Follow this link:
WireGuard to be merged with Linux net-next tree and will be available by default in Linux 5.6 - Packt Hub

Global Quantum Cryptography Market 2019 by Manufacturers, Regions, Type and Application, Forecast to 2025 – PR Industry News

The Quantum Cryptography Market report gives a purposeful depiction of the area by the practice for research, amalgamation, and review of data taken from various sources. The market analysts have displayed the different sidelines of the area with a point on recognizing the top players (ID Quantique, SeQureNet, Quintessence Labs, MagiQ Technologies, Toshiba, QuantumCTek, Qasky) of the industry. The Quantum Cryptography market report correspondingly joins a predefined business market from a SWOT investigation of the real players. Thus, the data summarized out is, no matter how you look at it is, reliable and the result of expansive research.

This report mulls over Quantum Cryptography showcase on the classification, for instance, application, concords, innovations, income, improvement rate, import, and others (Financial, Government, Military & Defense, Others) in the estimated time from 20192025 on a global stage. In like manner, the overall Quantum Cryptography market report reveals knowledge identified with the type of product, its applications, customers, prime players, and various components agreeing with the account. This first data demonstrates critical contenders and their definite picture of the general Quantum Cryptography market. Other than this, the report further demonstrates expected market power, challenges, and prospects in the Quantum Cryptography market.

Request for Sample Report @https://www.intenseresearch.com/market-analysis/global-quantum-cryptography-market-2019-by-manufacturers-regions.html#request-sample

Types Segment:Table Pros, Table Cons

Key Market Features:

The scope of the report extends from market eventualities to a comparative rating between major players, price, and profit of the required market regions. This makes available the holistic view on competitive analysis of the market. Some of the top players involved in the market are profiled completely in a systematic manner. In the end, the report concludes the new project, key development areas, business overview, product/services specification, SWOT analysis, investment feasibility analysis, return analysis and development trends. The study also presents a round-up of vulnerabilities in which companies operating in the market and must be avoided in order to enjoy sustainable growth through the course of the forecast period.

The study provides a comprehensive analysis of the key market factors and their latest trends, along with relevant market segments and sub-segments. Market size is calculable in terms of revenue (USD Million) production volume during the forecast period.

Global Quantum Cryptography Market report provides a valuable source of insightful data for business strategists. It provides the industry overview with growth analysis and historical & futuristic cost, revenue, demand and supply data (as applicable). The research analysts provide an elaborate description of the value chain and its distributor analysis. The report also looks at the influential factors that are affecting the development of the Global Automotive Bumpers Market. This statistical report also offers various internal and external driving as well as restraining factors for this research report.

Get Exclusive Buying report:https://www.intenseresearch.com/market-analysis/global-quantum-cryptography-market-2019-by-manufacturers-regions.html#inquiry-for-buying

Essential application areas of Quantum Cryptography are also measured on the basis of their performance. Market forecasts along with the statistical nuances presented in the report render an insightful view of the Quantum Cryptography market. The market study on report studies present as well as coming aspects of the Quantum Cryptography Market mainly based upon factors on which the companies contribute to the market evolution, key trends, and segmentation analysis.

The scope of the report extends from market eventualities to a comparative rating between major players, price, and profit of the required market regions. This makes available the holistic view on competitive analysis of the market. Some of the top players involved in the market are profiled completely in a systematic manner.

Thanks for reading this article; you can also get individual chapter wise section or region wise report versions like North America, Europe or Asia.

Sorry! The Author has not filled his profile.

Continued here:
Global Quantum Cryptography Market 2019 by Manufacturers, Regions, Type and Application, Forecast to 2025 - PR Industry News

What are security keys, how do they work, and which is the best to buy? – Pocket-lint

If you use two-factor authentication (also known as 2FA) on your online accounts, you may want to switch to a hardware security key instead.

When 2FA is enabled and you attempt to log into your account, like Twitter, a temporary code will be sent to your phone. You need to enter this code to sign in to your account. Since only you should have access to your phone/code (one factor) and your login credentials (the second factor), two factor essentially verifies your identity and ensures only you are logging into your account.

There are downsides to two-factor authentication. If you lose your phone, or if it's breached by a hacker who's swapped your SIM or somehow gained access to your device, they'll obviously be able to retrieve your code and potentially use it to hack into your account (especially if they also know your login credentials). Luckily, a security key can help you avoid this nightmare.

Hardware security keys (also called security keys, U2F keys, or physical security keys) add an extra layer of security to your online accounts. They protect against automated bots and targeted attacks by leveraging cryptography to verify your identity and the URL of a login page. They're therefore phishing-resistant, too, as they can ascertain whether you're trying to log into alegit service.

Security keys connect to your device via USB-A, USB-C, Lightning, NFC, and Bluetooth, and they're portable enough to be carried on a keychain. Most of them use an open authentication standard, called FIDO U2F (or the improved FIDO2 standard), and some even feature hardware that's designed to resist physical attacks aimedat extracting firmware and material from the key itself.

Hardware security keys are made by various manufacturers and work with the most popular web browsers, as well as hundreds of apps and online services. They can even help you log in to your workstation.Overall, they'renot hard to use and are relatively inexpensive. And all other forms oftwo-factor authentication (texts, authenticator apps, and notifications) don't offer the same level of protection.

You can use a single hardware security key for as many accounts as you like. Typically, you insert the security key into your device (or wirelessly connect it) and press a button on the key itself. The security key will then be presented with a challenge by your web browser or app. It will cryptographically sign this challenge, verifying your identity and whatever it is you're trying to access.

All this sounds complicated. But it happens in the background without any input from you, other than you inserting the hardware security key into your device. Hardware security keys also use original domains of sites to generate its keys, which means it can't be tricked by phishing sites.

Many online accounts, apps, services, and websites support hardware security keys, including Twitter, Facebook, Google, Instagram, GitHub, Dropbox, Electronic Arts, Epic Games, Microsoft account services, Nintendo, Okta, and Reddit. Most web browsers do too, like Google Chrome.

Be sure to do your research - look into whether your most-used online accounts and even whether your devices support security keys before you invest in one.You can use hardware security keys to log in to many computers and mobile devices, including Macs, Chromebooks, Windows 10 PCs, and Android and iOS devices. The FIDO2 standard on some security keys can work with Windows Hello and Microsofts Edge browser, too.

Your hardware security key works in addition to your account login credentials. So, if someone steals your key, they can't get into your accounts without knowing your logins. Also, if you've lost your security key, you can always resort to a backup method of two-factor authentication. You can then gain access to your online account, remove your lost or stolen security key, and either add another or continue using a backup method.

All hardware security keys tend to work the same, as we've detailed above, but setting them up varies by app and device. To give you an idea of how one works with an online account, we've detailed the exact steps for pairing a security key with Facebook and signing into your account.

There are several choices to choose from. Yubico, which helps develop is the FIDO U2F authentication standard, is one of the more popular options and has different models available. Google sells its own key, called the Titan, and it includes a spare key with Bluetooth functionality. Other security key manufacturers include Kensington and Thetis.

Here's our pick of the best ones you can buy:

See the original post:
What are security keys, how do they work, and which is the best to buy? - Pocket-lint

When Might Bitcoin Be Ready To Resume Its Bull Trend? – Yahoo Finance

Two weeks ago, Bitcoin completed a 61.8% Fibonacci retracement ($7,231.40) off the June high as it fell to a low of $6,526. That low put it 52.9% below the 2019 peak.

Bull Flag pattern

The price correction since the June high has been normal and well-constructed, forming a potential bull flag trend continuation pattern. This can be seen as the falling parallel trend channel in the enclosed charts.

BTC/USD Weekly Chart

Given the significant advance in the first half of the year, and the related signs of a trend change from bearish to bullish, Bitcoin has a good chance of eventually triggering a continuation of the new bull trend. The 2019 rally exceeded several prior swing highs and the 10-week exponential moving average (ema) crossed back above the 34-week ema.

Have we seen the bottom?

The question now is, has the bottom of the retracement been reached or might Bitcoin pullback further than it has so far? Theres no way to know this ahead of time but we can identify some important price levels to watch going forward.

As long as price stays above the $6,526 swing low, there is a chance for an upside breakout of the bull flag. If the falling trend channel is to further evolve and retain its general shape, a move up to at least the top trend line seems possible in the near-term.

BTC/USD Daily Chart

A decisive daily close above the downtrend line is the first sign that a bullish breakout of the flag could be in the works. At that point, additional signs of strength will be needed. Watch for a daily close above the most recent swing high of $10,540.49 for confirmation of a bullish breakout. There is also a monthly high at $9,600 from November. Bitcoin has not had a move above a prior month high since the June peak. A move above a prior month high would be an additional sign of a change in the downtrend pattern, to an uptrend.

If we see further weakness

Alternatively, notice that the 10-week ema has just crossed below the 34-week ema, after being above it since early-May. By itself this is bearish, and supports a bearish scenario if Bitcoin falls below the most recent swing low, thereby triggering a continuation of the downtrend off the 2019 high. If that occurs, next watch for signs of support around the $5,900 to $5,427 (78.6% Fibonacci retracement) price zone, and then for indications of a bottom and subsequent bullish reversal.

Bruce Powers, CMT

This article was originally posted on FX Empire

See the original post here:

When Might Bitcoin Be Ready To Resume Its Bull Trend? - Yahoo Finance