The Next Open Source Battle Is Being Waged In The 3D Printing Industry

More than twenty years ago, Linux began wending its way out of the primordial soup that was the early Internet and ensconcing itself in servers and workstations around the world.

After its creation in 1991 it took another eight years or so to be widely recognized, but during that period, arguments arose as to what Linux really was. Could Red Hat, a company founded in 1993, sell services around it? Who made money when you sold a CD containing the latest version of Mandrake Linux? Who owned code written on top of Linux for specific purposes? To the open source community, the answers to all those questions was No one. The community owned Linux.

And the battles began. Richard Stallman, the man behind the GNU operating system, fought for a licensing model that allowed for absolute freedom in software while Linus Torvalds called for a less adamant interpretation of the philosophy. These wars, which were waged on mailing lists and usenet, are now almost forgotten and, thanks to quick and easy donation systems and direct downloads of open source software, it is trivial to support your favorite open source project either through code check-in or actual donations. Its also trivial if not expected to sell services and support on top of open source software. Many services, including WordPress, follow this model.

Now we are entering a different conflict, one whose core question is Who owns 3D printing? The origin of this quandary lies with the creation of the RepRap Project, an open source effort to create a machine that can build itself. Founded in 2005 by Dr. Adrian Bowyer, RepRap printers have existed in a parallel evolutionary course to high-end industrial printers that cost thousands if not millions of dollars. Now those waters are muddied thanks to the big guys, Stratsys and 3D Systems, beginning to actively use their patents to protect their IP. Furthermore, there are examples of designers who offer their 3D objects up in the Creative Commons (here are mine, for example) and are then upset when users with printers offer their designs for sale.

The IP in question is manifold but the battle most recently came to a head in two patents the corporation filed on behalf of its designers. One is a self-leveling bed solution something thats been done before and is currently the Holy Grail of open source printers and another is for a quick-release filament guide which users are claiming is similar to this open source project on MakerBots own Thingiverse. I leave it as an exercise to the reader to decide whether either of these cases exhibit enough prior art and borrowing to accurately state that MakerBot stole these ideas from the community. In a nutshell, the outrage is mostly about he act of patenting the ideas rather than the ideas themselves.

The problem with the open source community is that it is, by design, not owed anything for its work, yet expects utmost deference to be paid. To be clear, Linux could have never gotten off the ground without the community that surrounded it. But that does not mean that every business based on open source tools (provided that business returns the various and direct changes to open source code when applicable) must grovel at the feet of a self-designated cabal of protectors.

The same can be said of 3D printing. MakerBot itself was an early proponent of open source hardware and, over the years, has made its money selling products that work better and more stably than most open source and home-brew printers. However, like Red Hat and Ubuntu, at some point equal deference must be paid to the gods of commerce. Those who have printers should be able to sell prints from their machine to those that do not have printers this is the basis for services like MakeXYZ that allow customers to request prints using a streamlined process and there are countless others who will brave the perils of prior patent art to try to build the next great 3D printer. In fact, a quick perusal of Kickstarter shows us a few dozen 3D printers already in their final stages of funding as well as a 3D scanner that looks surprisingly like a MakerBot Digitizer.

The open source community is vociferous and prone to throw victims on the fires of their collective wrath. But this ethos is always tempered by time and the improvement of the OS product in question. When an open source printer and open source 3D software is as solid and usable as offerings from Form 1 and MakerBot, I will most likely switch. Until then, as a weekend tinkerer without the time or the energy to invest hours into maintenance and software tweaks, Ill have to keep investing the so-called mean giants of the industry. I think 3D printing is changing the world and open source printing is at the forefront of this effort. But I dont want either party to enter into the spiral of recrimination and FUD that once characterized the Linux world. The 3D printing evolutionary tree is open to all comers at this point and todays giants might be tomorrows roadkill. As the bard once said, the wheels still in spin.

The rest is here:
The Next Open Source Battle Is Being Waged In The 3D Printing Industry

Heads or tails: Experimental quantum coin flipping cryptography performs better than classical protocols

5 hours ago by Stuart Mason Dambrot Experimental setup of the plug-and-play Clavis2 system. This type of interferometric setup does not necessitate continuous polarization control and alignment, and therefore guarantees excellent system stability for quantum communications. Courtesy: Anna Pappa, LTCI, CNRSTlcom ParisTech

(Phys.org) Cryptography the practice and study of techniques for secure communication in the presence of third parties, referred to as adversaries has a long and varied history. In ancient Greece, for example, the Spartan military may have used the so-called scytale transposition cipher to encrypt and decrypt messages. Steganography (hiding the existence of a message) was also first developed at that time as, according to Herodotus, a message tattooed on a slave's shaved head and then hidden under regrown hair and is still in use in the form of invisible ink, microdots, and digital watermarks. That said, applying complexity cryptography to quantum communication is and will continue to be essential and while quantum cryptographic primitives are in principle more secure than classical protocols, demonstrating this in a practical system has proven difficult.

Recently, however, scientists at Laboratory for Communication and Processing of Information (LTCI), Paris a joint research lab between Centre National de la Recherche Scientifique (CNRS) and Tlcom ParisTech have experimentally implemented a quantum coin flipping protocol that performs better than any classical system over a distance suitable for deployment in metropolitan area optical networks. Based on an enhanced commercial quantum key distribution (QKD) device, the approach is nearly perfectly secure against bounded adversaries a feature the researchers state make it a practical toolbox for designing secure quantum communications systems.

Researcher Anna Pappa discussed the paper she and her co-authors published in Nature Communications with Phys.org beginning with the challenge of addressing the historical difficulty of demonstrating the known information-theoretic security advantages of quantum versions of coin flipping and other primitives (basic cryptographic algorithms used to construct more complicated cryptographic tools) relative to classical protocols in a practical communication scenario. "Quantum cryptography is a relatively new field that emerged after Bennett and Brassard's groundbreaking paper in19841, which introduced the idea of using quantum mechanics to enhance classical cryptographic protocols like key distribution and coin flipping," Pappa tells Phys.org, adding that the main difference between classical and quantum computing is that in the latter, information is contained in the physical properties of the exchanged messages.

"This provides a strong advantage but also hinders straightforward applications of quantum protocols," Pappa point out. "Historically, many protocols that were in theory secure were completely broken in practice, because of limitations in current technology. For example," she illustrates, "previous coin flipping protocols necessitated a single-photon source or an entangled source in order to be secure but the first is not currently available, while the second cannot be easily deployed for long-distance communications since entanglement is very fragile, and cannot be maintained for long periods of time due to quantum memory limitations. In our research, while we are exploiting the effects of superposition in quantum mechanics, we do not use entangled states and this is what makes our implementation easily implementable with standard photonic sources."

Another important factor, she notes, is that coin flipping is a protocol used when participants do not trust each other, which makes correcting transmission errors more difficult. At the same time, trusted setting protocols like quantum key distribution (QKD) have in recent years achieved security for distances of more than 100 kilometers. This is due to the fact that measuring a quantum system disturbs that system, and any third party trying to gain knowledge of the key can therefore be detected by the two communicating users.

The researchers also faced the challenge of experimentally implementing a quantum coin flipping protocol that performs strictly better than classically possible over a distance suitable for communication over metropolitan area optical networks. "The Clavis2 platform that we used was developed by IdQuantique, a company based in Geneva, Switzerland that works closely with researchers worldwide in order to test and verify their systems," Pappa recalls. "There were many challenges that we faced during the implementation of our coin flipping protocol using a commercial plug-and-play system originally designed to perform key distribution between two parties (commonly referred to as Alice and Bob) who trust each other and want to establish a common secret key.

"In quantum coin flipping," Pappa explains, "the players do not trust each other, since both want to win the coin flip, so they try to cheat by numerous ways for example, by increasing the average photons contained in the pulses, or by declaring that they lost some message when they do not like the result of the protocol. Furthermore, they could try to exploit the physical properties of the system, like an asymmetry in the creation of the different quantum states used, or in the detection of the different states. We therefore needed to account for all imperfections of the system and come up with detailed security proofs in order to show the quantum advantage of our implementation."

Relatedly, the scientists sought to provide combined quantum coin flipping protocols that were almost perfectly secure against bounded adversaries. "We wanted to find a way to provide security against an adversary of unknown abilities, so we used two schemes that are secure against adversaries of limited power that is, noisy storage and computationally bounded and enhanced them with our protocol." To do this, they we analyzed the bounded protocols and found the exact step where an unbounded adversary would be able to perfectly cheat, and then strengthened that step using our protocol."

"A problem that we faced," Pappa tells Phys.org, "was that, since the players do not trust each other, they cannot perform error-correction and other procedures that necessitate collaboration between the parties, therefore limiting the tolerance to errors. We therefore needed to make some changes to the system in order to observe a quantum advantage for a considerable channel length. For example," Pappa explains, "the detectors on Bob's side had to be replaced because they had low detection efficiencies and high dark counts, and we could not observe any quantum advantage for any channel length. By substituting them with better quality detectors, we managed to experimentally demonstrate a quantum advantage for a channel distance of 15km. In addition," she continues, "photon source attenuation was very high. This meant that essential Clavis2 procedures could not be executed, requiring significant reprogramming." Finally, Pappa notes, in order for the players to decide on the protocol parameters, the scientists had to perform detailed careful system analyses to identify system component losses and errors in order to, for example, estimate how many times they need to run the protocol and how much attenuation needs to be applied.

Read this article:
Heads or tails: Experimental quantum coin flipping cryptography performs better than classical protocols

Bible Prophecy is Changing News 5-21-2014 – WikiLeaks Threatens To Reveal Information … – Video


Bible Prophecy is Changing News 5-21-2014 - WikiLeaks Threatens To Reveal Information ...
http://www.businessinsider.com/iris-scanning-coming-to-samsung-smartphones-2014-5 http://www.huffingtonpost.com/2014/05/19/ufos-crash-china-villages_n_535375...

By: dewerbylhserf .

Read the original here:
Bible Prophecy is Changing News 5-21-2014 - WikiLeaks Threatens To Reveal Information ... - Video

Edward Snowden ‘Considering’ Return to U.S.

Whistleblower Edward Snowden is reportedly considering a return flight to the U.S., if certain conditions are met with the U.S. government.

"There are negotiations," Snowden's lawyer Wolfgang Kaleck told the German newspaper Der Spiegel, notes RT.com. "Those who know the case are aware that an amicable agreement with the U.S. authorities will be most reasonable.

According to Kaleck, Snowden isnt directly involved in the negotiations.

Kaleck said that Snowden did not act for personal gain and there is no evidence of any damage that has been caused.

"Thats why, one could hope that a democratic U.S. government paves the way back to him," Kaleck added.

Snowden is currently under temporary asylum in Moscow, Russia, because the U.S. canceled his passport while he was en route to another country.

Snowden, who gave a trove of NSA documents to journalists Glenn Greenwald and Laura Poitras in 2013, has been charged by the U.S. government for espionage and theft of government property.

The Guardian reported last week that a top-secret Pentagon report claimed the scope of the compromised knowledge related to US intelligence capabilities is staggering."

The 39-page report, which was prepared by the U.S. Defense Department in December 2013, says that the damage done to U.S. intelligence capabilities is grave," but the U.S. government refuses to provide any specific evidence to back up its dramatic claim.

Sources: The Guardian and RT.com

See the rest here:
Edward Snowden 'Considering' Return to U.S.

Scottish Nationalist Proposes Asylum For NSA Whistle-Blower Edward Snowden

Scottish supporters of Edward Snowden say an independent Scotland shouldoffer political asylum to the man whose disclosure of classified NSA documents revealed pervasive U.S. surveillance around the world.

Members of theScottish parliament (MSPs) have considered a call for the former NSA contractor, who is currently being sheltered in Russia, to be given political asylum in Scotland if voters opt for independence in September's referendum.

Mick Napier, a former university lecturer, put forward a petition to the Scottish parliament's Public Petitions Committee, saying Snowden was owed a "debt of gratitude" for his actions and that hosting him would be an "honor for Scotland."

"Edward Snowden has revealed information to us that we would not otherwise know. It is of significance to every single citizen in Scotland," Napier said.

"He acted out of the purest of motives and an offer of asylum to the man by an independent Scottish government -- an offer made today conditional upon an outcome in September -- would itself be news and would allow the members of this committee to strike a blow for a private life for all of us."

Committee members expressed "sympathy" with Snowden's situation, with the ruling Scottish National Party's John Wilson even going as far as saying that he would make the offer now if Scotland had the power.

The proposals were greeted with fury by U.S. officials, with House Intelligence Committee Chairman Mike Rogers, R-Mich., saying Scotland should be more grateful toAmerica for "saving" Europe from the Nazis during World War II.

Speaking to the Scottish Sunday Express, Rogers said, "I am confounded that a close ally would consider granting asylum to a traitor whose leaks of military secrets have placed American and allied troops at risk, including Scottish soldiers serving proudly in Afghanistan.

"America and its allies bore great costs saving Western Europe, including Scotland, from the Nazis in World War II. The former NSA contractor should walk away from Vladimir Putin's embrace and face criminal charges in the United States for betraying his country."

Scottish politicians said further consideration of the petition would be deferred until after the referendum on Sept. 18.

Read more:
Scottish Nationalist Proposes Asylum For NSA Whistle-Blower Edward Snowden