iPhone encryption stops FBI, but not this 7-year-old

Matthew Green's iPhone was safely locked -- until his 7-year-old son Harrison figured out how to grab his dad's finger to unlock it.

NEW YORK (CNNMoney)

Yet he's met his match: his 7-year-old son.

You see, Green owns an iPhone 6 Plus. That means everything on the phone is encrypted until Green -- and only he -- unlocks it with his finger.

But Tuesday morning at dawn, little Harrison crept into his parents' bedroom and walked over to his dad's side of the bed. He quietly reached for his father's iPhone, grabbed his right hand and pressed his large thumb onto the fingerprint scanner.

Green woke up and couldn't blame the kid. After all, it was dad who loaded the phone with Minecraft and Angry Birds Transformers.

For Green, who teaches cryptography and computer security at Johns Hopkins University, it's a perfect argument against the notion that iPhone encryption is unbreakable -- for thieves or police.

Apple recently rolled out encryption that no longer lets the company bypass your passcode. Cops can't spy on you by going straight to Apple (AAPL, Tech30). The FBI director says iPhone encryption protects pedophiles by holding back police. Not so, Green said.

Green had this to say on Twitter that morning: "Dear FBI: next time you say 'think of the children' I implore you to note how easily mine can bypass Apple encryption using physical attacks."

Green explained to CNNMoney why biometric features -- like fingerprints or voice -- aren't effective if you want to keep someone out of your phone. A police officer could just press your finger down onto the scanner.

Here is the original post:
iPhone encryption stops FBI, but not this 7-year-old

iPhone encryption stops FBI, but not this kid

Matthew Green's iPhone was safely locked -- until his 7-year-old son Harrison figured out how to grab his dad's finger to unlock it.

NEW YORK (CNNMoney)

Yet he's met his match: his 7-year-old son.

You see, Green owns an iPhone 6 Plus. That means everything on the phone is encrypted until Green -- and only he -- unlocks it with his finger.

But Tuesday morning at dawn, little Harrison crept into his parents' bedroom and walked over to his dad's side of the bed. He quietly reached for his father's iPhone, grabbed his right hand and pressed his large thumb onto the fingerprint scanner.

Green woke up and couldn't blame the kid. After all, it was dad who loaded the phone with Minecraft and Angry Birds Transformers.

For Green, who teaches cryptography and computer security at Johns Hopkins University, it's a perfect argument against the notion that iPhone encryption is unbreakable -- for thieves or police.

Apple recently rolled out encryption that no longer lets the company bypass your passcode. Cops can't spy on you by going straight to Apple (AAPL, Tech30). The FBI director says iPhone encryption protects pedophiles by holding back police. Not so, Green said.

Green had this to say on Twitter that morning: "Dear FBI: next time you say 'think of the children' I implore you to note how easily mine can bypass Apple encryption using physical attacks."

Green explained to CNNMoney why biometric features -- like fingerprints or voice -- aren't effective if you want to keep someone out of your phone. A police officer could just press your finger down onto the scanner.

Read more from the original source:
iPhone encryption stops FBI, but not this kid

Quantum memory storage to help quantum communications go the distance

The technologies made possible by breakthroughs in quantum physics have already provided the means of quantum cryptography, and are gradually paving the way toward powerful, practical, everyday quantum computers, and even quantum teleportation. Unfortunately, without corresponding atomic memories to appropriately store quantum-specific information, the myriad possibilities of these technologies are becoming increasingly difficult to advance. To help address this problem, scientists from the University of Warsaw (FUW) claim to have developed an atomic memory that has both exceptional memory properties and a construction elegant in its simplicity.

The FUW researchers from the Institute of Experimental Physics claim that the new, fully-functioning atomic memory has numerous potential applications, especially in telecommunications where the transmission of quantum information over long distances is not as straightforward as the transmission of simple electronic data encoded on laser light and traveling through optical fiber.

This is because quantum information can't simply be amplified every so often along its path of travel as information digitally encoded on a laser beam can be. Instead, it is essential that the quantum information itself remain absolutely preserved in its original form to maintain its inherent security, and boosting the signal risks disrupting the quantum state and immediately rendering the transmission useless and unusable.

In this vein, the new memory may prove useful in providing a means to bring into reality the DLCZ quantum transmission protocol (DLCZ being the initials of the physicists from the University of Innsbruck and Harvard University who proposed it; Duan, Lukin, Cirac, and Zoller), enabling quantum information to be sent across long distances.

As an essential requirement for this protocol to work, quantum information transmitted must be stored at various relay points along the channel of communication. Up until now, the physical capabilities to realize the DLCZ protocol have been unavailable, but this new atomic memory may help solve that problem.

"The greatest challenge in the construction of our quantum memory was the precise selection of system parameters that would allow it to save, store and read quantum information effectively," says Dr. Wojciech Wasilewski of FUW, "We have also found a novel way of reducing noise during detection."

The primary component of the quantum memory is a glass chamber about 25 mm (1 in) in diameter and around 100 mm (4 in) long. Coated on the inside with rubidium, the container was evacuated of air and filled with krypton gas and the cell magnetically shielded to protect the interior from stray magnetic fields. When the tube was heated to around 90 C (194 F), pairs of rubidium atoms expanded to fill the inside of it, whilst the pressurized krypton gas acted as a noise reducer by dampening their movement.

To record and recover quantum information, the researchers used three horizontally polarized external lasers on the chamber: one was used to pump (excite) the rubidium atoms, another was used to write by creating spin-wave excitations on those atoms, and the third was used to apply a read pulse. The resultant multimode light was then passed through a series of filters and detected by a sCMOS high-speed camera.

In other words, quantum information stored in the memory used photons from the laser beam to "imprint" quantum spin states on many of the excited rubidium atoms. As a result of this interaction, other photons were emitted simultaneously and the detection of these verified that the information had been saved. Information stored in the memory was then retrieved using another laser pulse.

"Until now, quantum memory required highly sophisticated laboratory equipment and complex techniques chilling the systems to extremely low temperatures approaching absolute zero," said Radek Chrapkiewicz, a doctoral student at FUW and researcher on the project. "The atomic memory device we have been able to create operates at far higher temperatures, in the region of tens of degrees Celsius, which are significantly easier to maintain."

See original here:
Quantum memory storage to help quantum communications go the distance

Cryptocurrency | Bitcoin News and Views

Readers may recall an article published on this website not two days ago, in which we embarked on a foray into the world of bitcoin, in order to show how the average investor with little to no knowledge of the cryptocurrency goes about throwing money ... [...]

Paul Solman: Our Bitcoin story on the NewsHour is proving so popular that we've decided to post longer excerpts of our main interviews. Earlier Wednesday, we published our conversation with Bitcoin Education Project's Charles Hoskinson. This one is ... [...]

Stockholm, Sweden's KnCMiner AB, the stratospheric Bitcoin mining start-up that gained huge recognition earlier this week for producing the world's first 28nm Bitcoin miner, and believed to be the world's fastest 28nm concept to silicon ever made, will ... [...]

BTC-e is one of the most well-known cryptocurrency exchanges on the Internet and features in the Bitcoin Price Index. In light of difficulties in withdrawing funds from Mt. Gox, more people are turning to the Bulgaria-based exchange to buy and sell digital coins. We take a look at just what you can do with this exchange.To start with, BTC-e has a good range of trading options. On the fiat side users can trade for US dollars (USD), Russian Roubles (RUR), and Euros (EUR).The range of digital currencies is even larger with: Bitcoin (BTC), Litecoin (LTC), Namecoin (NMC), NovaCoin (NVC), Terracoin (TRC), PPCoin (PPC), and Feathercoin (FTC). The allowed trading pairs are shown in the table below:EURRURBTCLTCNMCNVCTRCPPCFTCUSDYESYESYESYESYESNONONONOEURNOYESYESNONONONONORURYESYESNONONONONOBTCYESYESYESYESYESYESThe main page of the site, the trading interface, gives you a candle chart of the selected trading pair.All trading pairs are displayed through HTML buttons, and include the current exchange rate. Each of them updates in real time, and if you watch for long enough youll see a green or red highlight when the rate changes, depending on whether it has increased or decreased.The rates are shown in the format of Buying/'Selling, e.g. BTC/USD=120 would mean a bitcoin is worth 120 USD. Despite this, trading in both directions is possible.An honourable mention goes to the real time chat box shown beside the trading data lovingly known as the troll box. This is a place where regular users inhabit and much sarcasm ensues!From the trading page you can see a recent history of trades for the currently selected trading pair.For each direction, there are fields you may fill to create a buy or sell order. If you accept the price that the forms are automatically filled with, your order will be completed immediately as long as there are sufficient funds on offer at the given price.If you decided to set your own price, youll have t [...]

ATLANTA and STOCKHOLM, Oct. 5, 2013 /CNW/ - Stockholm, Sweden's KnCMiner AB, the stratospheric Bitcoin mining start-up that gained huge recognition earlier this week for producing the world's first 28nm Bitcoin miner, and believed to be the world's... [...]

Cryptocurrency made the leap from being an academic concept to (virtual) reality with the creation of Bitcoin in 2009. While Bitcoin attracted a growing following in subsequent years, it captured significant investor and media attention in April 2013 ... [...]

Bitcoin -- a cryptography based digital currency, or "cryptocurrency" for short -- has had its fair share of ups and downs, but today is the most used digital currency. A Bitcoin trades for around $120 USD at current rates and offers secure, nation ... [...]

US fugitive Edward Snowden's defense fund, launched recently by WikiLeaks to raise money for the legal protection of the NSA leaker, has announced it now accepts donations in virtual currency Bitcoin. The Journalistic Source Protection Defence Fund... [...]

Here is the original post:
Cryptocurrency | Bitcoin News and Views

How Ronald Reagan planted the seed for NSA spying …

It's been over a year since former National Security Agency (NSA) contractor Edward Snowden began leaking classified information about the United States government. Among the numerous leaks, Snowden revealed the U.S. government's massive domestic spying program, which included, but wasn't limited to, the NSA's bulk collection of telephone metadata. While the cat is out of the bag now, it's important to dig deeper into the past to see how the NSA actually began, and how it affects people today.

Photo by Bryan Bedder/Getty Images for The New Yorker

It was in March of 2013 when Snowden flew to Hong Kong to meet with investigative journalists Glenn Greenwald and Laura Poitras. Less than a month later, Edward Snowden was a household name in Washington, as his leaks became public. Since this time, Snowden has been seeking asylum in Russia, avoiding arrest if he steps back onto U.S. soil. According to the International Business Times on November 29, the Centre for International Governance Innovation released a new study that showed that 60 percent of the over 20,000 that participated in the survey had heard of Edward Snowden and his government leaks.

Following the attacks on 9/11, many point to the Patriot Act, signed by then President George W. Bush, as the birth of NSA spying. Despite campaigning on reigning in the law, President Obama has not only reneged on his promise, but has expanded the Bush polices in many areas. However, as reported by the Intercept in September, the American Civil Liberties Union obtained legal papers in regards to a Freedom of Information Act lawsuit that dealt with current NSA operations. The documents point to an executive order issued over 30 years ago as the "primary source" of NSA spying. The Hill details Executive Order 12333 and Reagan's plan moving forward.

"The order, known as Executive Order 12333, allows the NSA to collect Internet communications about foreigners, including their email messages and online chats. The agency is not allowed to target people in the U.S., though Americans communications can be incidentally picked up in the course of a foreign investigation, which critics have said poses grave risks to privacy."

Reagan signed the order in 1981, and was amended by George W. Bush following the 9/11 terrorist attacks. Earlier this month, the Senate failed to pass "The Freedom Act," which would have begun reigning in the NSA's mass collection of U.S. phone data. The bill actually had bipartisan support, as it was sponsored by Democrat Sen. Patrick Leahy, and Republican Sen. Ted Cruz. Others voted against the bill, such as Republican Sen. Rand Paul, who thought the bill didn't go far enough, and Republican Sen. Marco Rubio, who thought it went too far. Riding the political line, the Obama administration supported the bill, which, while baring the government from retaining metadata, would have also required phone companies to keep those records until the government was given the approval of the Foreign Intelligence Surveillance Court.

Reagan's executive order is the origins of the NSA's mass collection of domestic phone data, something that the majority of Americans see as a problem. According to a Pew Research Center survey released in early November, over 70 percent of Americans said they were concerned that the NSA could be obtaining private information of its citizens. The Centre for International Governance Innovation survey also confirms those suspicions, as nearly 40 percent of those who have heard of the Snowden leaks have taken major steps to guard against the NSA.

Both President George W. Bush and President Barack Obama deserve varying degrees of blame for the continuing policies of NSA spying and bulk data collection. While blame can be placed at the door step of the current and previous administrations, it was Ronald Reagan who signed the executive order that got the ball rolling for the NSA to lurk into the private lives of the American people.

More:
How Ronald Reagan planted the seed for NSA spying ...