Ten Years Ago Satoshi Nakamoto Logged Off – The Final Message from Bitcoin’s Inventor | Featured – Bitcoin News

Ten years ago today, the pseudonymous programmer (or programmers) Satoshi Nakamoto logged into the forum bitcointalk.org one last time, and left the Bitcoin community for good. The day prior Nakamoto wrote a final message to the crypto community by offering a quick build and telling developers that theres more work to be done on denial-of-service (DoS) attacks.

When Satoshi Nakamoto was around, Bitcoins inventor was a mysterious enigma and often led developers in the right direction from 2008 to 2010. Bitcoins creator also left a final message to the community when he/she or they added to the thread on bitcointalk.org called: Added some DoS limits, removed safe mode. The message was written over a decade ago on December 12, 2010, and Nakamoto stressed that theres more work to do.

Theres more work to do on DoS, but Im doing a quick build of what I have so far in case its needed, before venturing into more complex ideas, Nakamoto said at the time. The build for this is version 0.3.19. Added some DoS controls. As Gavin and I have said clearly before, the software is not at all resistant to DoS attack. This is one improvement, but there are still more ways to attack than I can count. Im leaving the -limitfreerelay part as a switch for now and its there if you need it. Removed safe mode alerts, safe mode alerts was a temporary measure after the 0.3.9 overflow bug, Bitcoins creator added.

Nakamoto further wrote:

We can say all we want that users can just run with -disablesafemode, but its better just not to have it for the sake of appearances. It was never intended as a long term feature. Safe mode can still be triggered by seeing a longer (greater total PoW) invalid block chain.

While bitcoin (BTC) was swapping for $0.20 per coin, Nakamoto left a great number of technical replies on the forum that month, which addressed the current Bitcoin build at the time. In fact, during the first two weeks of December 2010, Nakamoto was very active on the forum.

No one knows why the inventor left so abruptly, but Nakamoto had shown he was a bit upset the day before his very last bitcointalk.org forum message. This was because bitcoin was mentioned in a viral pcworld.com article called: Could the Wikileaks Scandal Lead to New Virtual Currency?

At the time, Wikileaks was blocked by a U.S. financial blockade and because Paypal, Mastercard, and Visa stopped servicing the nonprofit whistleblowers, Wikileaks leveraged bitcoin donations.

From Nakamotos responses to the Wikileaks subject, one can assume the crypto inventor was very annoyed by the attention the small little network was getting at the time.

It would have been nice to get this attention in any other context, Nakamoto stressed. Wikileaks has kicked the hornets nest, and the swarm is headed towards us.

Bitcoin was changing fast, and Nakamoto seemed to know that he was steadily losing some of the control and people were making up their own minds on how the cryptocurrency should be back then. The same day the Wikileaks article from pcworld.com published, Nakamoto also thanked Hal Finney in a post called: minimalistic bitcoin client on D language?

Six days prior to Nakamoto speaking about the pcworld.com editorial, he responded to someone who said bring it on, after hearing that Wikileaks was considering cryptocurrency acceptance. Again, Nakamoto seemed flustered and wasnt a big fan of onboarding the nonprofit whistleblowing organization led by Julian Assange.

No, dont bring it on, Nakamoto insisted. The project needs to grow gradually so the software can be strengthened along the way. I make this appeal to Wikileaks not to try to use Bitcoin. Bitcoin is a small beta community in its infancy. You would not stand to get more than pocket change, and the heat you would bring would likely destroy us at this stage, the inventor added.

Nakamotos appeal did not sway Wikileaks and soon after, the nonprofit began accepting bitcoin donations. Bitcoins inventor has not been heard from in over a decade, but there are a number of ostensible emails and messages from the creator that many assume stem from his legitimate accounts. For instance, when Newsweek published a story about Dorian Nakamoto being Bitcoins creator, a post published to p2pfoundation.ning.com on March 7, 2014 says: I am not Dorian Nakamoto.

Moreover, ever since Nakamoto left, there have been many self-proclaimed Satoshi Nakamotos and even clues and messages that have been widely debunked. There are tales from individuals like Craig Wright, a man who has claimed to be Bitcoins inventor for the last five years. Although, Wrights stories have been widely dismissed and debunked by the greater cryptocurrency community.

There was also that time when Bloomberg columnist, Matthew Leising, told people about a so-called Satoshi and published an alleged tell-all about the nakamotofamilyfoundation.org and an individual dubbed: Duality. The patent holder and Hawaiian resident named Ronald Keala Kua Maria said he is Satoshi on a variety of website domains bearing the name Bitcoin and Satoshi.

A man with intense hair like Fabio believes he is Satoshi Nakamoto, but nobody believed Jrg Molts absurd story. In mid-August 2019, a PR firm called Ivy McLemore and the Pakastani Bilal Khalid said he was Bitcoins inventor. Of course, Khalids story was considered ridiculously unfathomable as well. A Belgium native called Debo Jurgen Etienne Guido has told the crypto community he is Satoshi Nakamoto on numerous occasions.

It has also been said that the 47-year-old cartel boss Paul Le Roux could have been Satoshi as well. Still, none of these suspects and self-proclaimed individuals have ever provided a smoking gun pointing in their direction and have always failed to sway the greater crypto community.

As far as recorded history is concerned, Satoshi Nakamoto left the Bitcoin community ten years ago on December 12, 2010, with his final message about adding some DoS controls. Almost everything else from that point forward has been suspect and lacking evidence of legitimacy.

After Bitcoins inventor published the post, the creator must have been curious about the responses and may have been prepared to write one last message. Nakamoto logged into bitcointalk.org on December 13, 2010, logged off, and has not been seen on the forum since then.

What do you think about the last message Satoshi Nakamoto wrote? Let us know what you think about this story in the comments section below.

Image Credits: Shutterstock, Pixabay, Wiki Commons, p2pfoundation, bitcointalk.org, pcworld.com,

Disclaimer: This article is for informational purposes only. It is not a direct offer or solicitation of an offer to buy or sell, or a recommendation or endorsement of any products, services, or companies. Bitcoin.com does not provide investment, tax, legal, or accounting advice. Neither the company nor the author is responsible, directly or indirectly, for any damage or loss caused or alleged to be caused by or in connection with the use of or reliance on any content, goods or services mentioned in this article.

Read the original:
Ten Years Ago Satoshi Nakamoto Logged Off - The Final Message from Bitcoin's Inventor | Featured - Bitcoin News

Eight leading quantum computing companies in 2020 | ZDNet

The use of quantum computers has grown over the past several months as researchers have relied on these systems to make sense of the massive amounts of data related to the COVID-19 virus.

Quantum computers are based on qubits, a unit that can hold more data than classic binary bits, said Heather West, a senior research analyst at IDC.

Besides better understanding of the virus, manufacturers have been using quantum systems to determine supply and demand on certain products -- toilet paper, for example -- so they can make estimates based on trends, such as how much is being sold in particular geographic areas, she said.

"Quantum computers can help better determine demand and supply, and it allows manufacturers to better push out supplies in a more scientific way,'' West said. "If there is that push in demand it can also help optimize the manufacturing process and accelerate it and actually modernize it by identifying breakdowns and bottlenecks."

Quantum has gained momentum this year because it has moved from the academic realm to "more commercially evolving ecosystems,'' West said.

In late 2019, Google claimed that it had reached quantum supremacy, observed Carmen Fontana, an IEEE member and a cloud and emerging tech practice lead at Centric Consulting. "While there was pushback on this announcement by other leaders in tech, one thing was certain -- it garnered many headlines."

Echoing West, Fontana said that until then, "quantum computing had felt to many as largely an academic exercise with far-off implications. After the announcement, sentiment seemed to shift to 'Quantum computing is real and happening sooner than later'."

In 2020, there have been more tangible timelines and applications for quantum computing, indicating that the space is rapidly advancing and maturing, Fontana said.

"For instance, IBM announced plans to go from their present 65-qubit computer to a 1,000-qubit computer over the next three years," he said. "Google conducted a large-scale chemical simulation on a quantum computer, demonstrating the practicality of the technology in solving real-world problems."

Improved artificial intelligence (AI) capabilities, accelerated business intelligence, and increased productivity and efficiency were the top expectations cited by organizations currently investing in cloud-based quantum computing technologies, according to an IDC surveyearlier this year.

"Initial survey findings indicate that while cloud-based quantum computing is a young market, and allocated funds for quantum computing initiatives are limited (0-2% of IT budgets), end users are optimistic that early investment will result in a competitive advantage,'' IDC said.

Manufacturing, financial services, and security industries are currently leading the way by experimenting with more potential use cases, developing advanced prototypes, and being further along in their implementation status, according to IDC.

Quantum is not without its challenges, though. The biggest one West sees is decoherence, which happens when qubits are exposed to "environmental factors" or too many try to work together at once. Because they are "very, very sensitive," they can lose their power and ability to function, and as result, cause errors in a calculation, she said.

"Right now, that is what many of the vendors are looking to solve with their qubit solutions,'' West said.

Another issue preventing quantum from becoming more of a mainstream technology right now is the ability to manage the quantum systems. "In order to keep qubits stable, they have to be kept at very cold, subzero temps, and that makes it really difficult for a lot of people to work with them,'' West said.

Nevertheless, With the time horizon of accessible quantum computing now shrinking to a decade or less, Fontana believes we can expect to see "an explosion of start-ups looking to be first movers in the quantum applications space. These companies will seek to apply quantum's powerful compute power to solve existing problems in novel ways."

Here are eight companies that are already focused on quantum computing.

Atom Computing is a quantum computing hardware company specializing in neutral atom quantum computers. While it is currently prototyping its first offerings, Atom Computing said it will provide cloud access "to large numbers of very coherent qubits by optically trapping and addressing individual atoms," said Ben Bloom, founder and CEO.

The company also builds and creates "complicated hardware control systems for use in the academic community,'' Bloom said.

Xanadu is a Canadian quantum technology company with the mission to build quantum computers that are useful and available to people everywhere. Founded in 2016, Xanadu is building toward a universal quantum computer using silicon photonic hardware, according to Sepehr Taghavi, corporate development manager.

The company also provides users access to near-term quantum devices through its Xanadu Quantum Cloud (XQC) service. The company also leads the development of PennyLane, an open-source software library for quantum machine learning and application development, Taghavi said.

In 2016, IBM was the first company to put a quantum computer on the cloud. The company has since built up an active community of more than 260,000 registered users, who run more than one billion every day on real hardware and simulators.

In 2017, IBM was the first company to offer universal quantum computing systems via theIBM Q Network. The network now includes more than 125 organizations, including Fortune 500s, startups, research labs, and education institutions. Partners include Daimler AG,JPMorgan Chase, andExxonMobil. All use IBM's most advanced quantum computers to simulate new materials for batteries, model portfolios and financial risk, and simulate chemistry for new energy technologies, the company said.

By2023, IBM scientists will deliver a quantum computer with a 1,121-qubit processor, inside a 10-foot tall "super-fridge" that will be online and capable of delivering a Quantum Advantage-- the point where certain information processing tasks can be performed more efficiently or cost effectively on a quantum computer, versus a classical one, according to the company.

ColdQuanta commercializes quantum atomics, which it said is "the next wave of the information age." The company's Quantum Core technology is based on ultra-cold atoms cooled to a temperature of nearly absolute zero; lasers manipulate and control the atoms with extreme precision.

The company manufactures components, instruments, and turnkey systems that address a broad spectrum of applications: quantum computing, timekeeping, navigation, radiofrequency sensors, and quantum communications. It also develops interface software.

ColdQuanta's global customers include major commercial and defense companies; all branches of the US Department of Defense; national labs operated by the Department of Energy; NASA; NIST; and major universities, the company said.

In April 2020, ColdQuanta was selected by the Defense Advanced Research Projects Agency (DARPA) to develop a scalable, cold-atom-based quantum computing hardware and software platform that can demonstrate quantum advantage on real-world problems.

Zapata Computing empowers enterprise teams to accelerate quantum solutions and capabilities. It introduced Orquestra, an end-to-end, workflow-based toolset for quantum computing. In addition to previously available backends that include a full range of simulators and classical resources, Orquestra now integrates with Qiskit and IBM Quantum's open quantum systems, Honeywell's System Model H, and Amazon Braket, the company said.

The Orquestra workflow platform provides access to Honeywell's H, and was designed to enable teams to compose, run, and analyze complex, quantum-enabled workflows and challenging computational solutions at scale, Zapata said. Orquestra is purpose-built for quantum machine learning, optimization, and simulation problems across industries.

Recently introduced Azure Quantum provides a "one-stop-shop" to create a path to scalable quantum computing, Microsoft said. It is available in preview to select customers and partners through Azure.

For developers, Azure Quantum offers:

Founded in 1999, D-Wave claims to be the first company to sell a commercial quantum computer, in 2011, and the first to give developers real-time cloud access to quantum processors with Leap, its quantum cloud service.

D-Wave's approach to quantum computing, known as quantum annealing, is best suited to optimization tasks in fields such as AI, logistics, cybersecurity, financial modeling, fault detection, materials sciences, and more. More than 250 early quantum applications have been built to-date using D-Wave's technology, the company said.

The company has seen a lot of momentum in 2020. In February, D-Wave announced the launch of Leap 2, which introduced new tools and features designed to make it easier for developers to build bigger applications. In July, the company expanded access to Leap to India and Australia. In March, D-Wave opened free access to Leap for researchers working on responses to the COVID-19 pandemic. In September, the company launched Advantage, a quantum system designed for business. Advantage has more than 5,000 qubits, 15-way qubit connectivity, and an expanded hybrid solver service to run problems with up to one million variables, D-Wave said. Advantage is accessible through Leap.

Strangeworks, a startup based in Austin, Texas, claims to be lowering the barrier to entry into quantum computing by providing tools for development on all quantum hardware and software platforms. Strangeworks launched in March 2018, and one year later, deployed a beta version of its software platform to users from more than 140 different organizations. Strangeworks will open its initial offering of the platform in Q1 2021, and the enterprise edition is coming in late 2021, according to Steve Gibson, chief strategy officer.

The Strangeworks Quantum Computing platform provides tools to access and program quantum computing devices. The Strangeworks IDE is platform-agnostic, and integrates all hardware, software frameworks, and supporting languages, the company said. To facilitate this goal, Strangeworks manages assembly, integrations, and product updates. Users can share their work privately with collaborators, or publicly. Users' work belongs to them and open sourcing is not required to utilize the Strangeworks platform.

Go here to read the rest:
Eight leading quantum computing companies in 2020 | ZDNet

Quantum computing: Strings of ultracold atoms reveal the surprising behavior of quantum particles – ZDNet

Spinning atoms in a magnetic field notoriously behave in ways that scientists are yet to understand entirely. New research from MIT has now shed some light on the obscure laws that govern the smallest of particles, which could pave the way for further developments in the design of quantum devices that rely on atomic spin.

The team exposed spinning lithium atoms to magnetic forces of different strengths to observe how the quantum particles reacted both individually and as a group. They were faced in each scenario with a surprising choreography of atoms, revealing unexpected diversity of behavior in a well-known and studied magnetic material.

Spin, like mass or charge, is an intrinsic property of atoms: the particles rotate around an axis in either a clockwise manner (often described as "down") or anticlockwise ("up"). Based on their spin, atoms can react to magnetic fields in different ways, for example by aligning themselves with other atoms in a specific pattern.

SEE: Managing AI and ML in the enterprise 2020: Tech leaders increase project development and implementation (TechRepublic Premium)

The spin of many atoms together in a magnetic material that is exposed to a magnetic field can reach an equilibrium state, where all the atom spins are aligned; or the atoms can adopt dynamic behavior, where the spins across many atoms create a wave-like pattern.

MIT's research team focused on the way that atoms evolve from dynamic behavior back into an equilibrium state and found that the magnetic force that the atoms are exposed to plays a key part in determining the particles' behavior. Some magnets triggered a so-called "ballistic" behavior, where the atomic spins shot quickly back into an equilibrium state, while others revealed "diffusive behavior", with the particles spinning back to equilibrium in a much slower fashion.

"Studying one of the simplest magnetic materials, we have advanced the understanding of magnetism," said Wolfgang Ketterle, professor of physics at MIT and the leader of the research team. "When you find new phenomena in one of the simplest models in physics for magnetism, then you have a chance to fully describe and understand it. This is what gets me out of bed in the morning, and gets me excited."

To study the phenomenon, Ketterle's team brought the lithium atoms down to temperatures more than ten times colder than interstellar space, which freezes the particles to a near standstill and enables easier observation. Using lasers as a type of tweezer, the scientists then grabbed the atoms and arranged them into strings of beads. With 1,000 strings, each comprising 40 atoms, the team created an ultra-cold 40,000-strong atom lattice.

Pulsed magnetic forces of different strengths were then applied to the lattice, causing each atom along the string to tilt its spin in a wavelike manner. The researchers were able to image those wave patterns on a detector, and watched how the atoms gradually evolved from dynamic behavior to equilibrium, depending on the nature of the magnetic field that they were exposed to.

The process, explained Ketterle, is similar to plucking a guitar's strings: playing the strings brings them out of their equilibrium condition, and allows the scientists to watch what happens before they return to their original state.

"What we're doing here is, we're kind of plucking the string of spins. We're putting in this helix pattern, and then observing how this pattern behaves as a function of time," Ketterle said. "This allows us to see the effect of different magnetic forces between the spins."

Although some of this behavior had been theoretically predicted in the past, detailed observation of patterns of atomic spins had never been observed in detail until now. These patterns, however, were found to fit an existing mathematical model called the Heisenberg model, which is commonly used to predict magnetic behavior.

SEE: Quantum computers are coming. Get ready for them to change everything

Together with a team of scientists at Harvard, MIT's researchers were able to calculate the spin's dynamics. The results, therefore, aren't only useful to advance the knowledge of magnetism at a fundamental level; but they could also be used as a blueprint for a device that could predict the properties and behaviors of new materials at the quantum level.

"With all of the current excitement about the promise of quantum information science to solve practical problems in the future, it is great to see work like this actually coming to fruition today," said John Gillaspy, program officer in the Division of Physics at the National Science Foundation, and a funder of the research.

A higher-level understanding of quantum particles could also lead to the design of new technologies, such as spintronic devices, according to the researchers. Unlike electronics, which leverage the flow of electrons, spintronics tap the spin of quantum particles to transmit, process and store information. They hold promise, therefore, for quantum computing, where the spin of particles would constitute a bit of quantum information.

See original here:
Quantum computing: Strings of ultracold atoms reveal the surprising behavior of quantum particles - ZDNet

Anyon Systems to Deliver a Quantum Computer to the Canadian Department of National Defense – GlobeNewswire

Anyon Systems's Quantum Computer

Anyon System's superconducting quantum processor.

MONTREAL, Dec. 15, 2020 (GLOBE NEWSWIRE) -- Anyon Systems Inc. (Anyon), a quantum computing company based in Montreal, Canada, announced today that it is to deliver Canadas first gate-based quantum computer for the Department of National Defenses Defence Research and Development Canada (DRDC). The quantum computer will feature Anyons Yukon generation superconducting quantum processor. Named after Canadas westernmost territory, the quantum computer will enable DRDC researchers to explore quantum computing to solve problems of interest to their mission.

Quantum computing is expected to be a disruptive technology and is of strategic importance to many industries and government agencies. Anyon is focused on delivering large-scale, fault-tolerant quantum computers to a wide group of early adopters including government agencies, high performance computing centers and universities in the near term, said Dr. Alireza Yazdi, founder and CEO of Anyon.

About Anyon Systems

Founded in 2014, Anyon Systems is the first Canadian company manufacturing gate-based quantum computing platform for universal quantum computation. Anyon Systems delivers turnkey gate-based quantum computers. The company is headquartered in Montreal, Quebec.

Media Contact:media@anyonsys.com

A photo accompanying this announcement is available at https://www.globenewswire.com/NewsRoom/AttachmentNg/7c776a6e-2ef8-4875-b33a-06c3ccf9f8df

Excerpt from:
Anyon Systems to Deliver a Quantum Computer to the Canadian Department of National Defense - GlobeNewswire

Atos Delivers Its First GPU-Accelerated Quantum Learning Machine to the Irish Centre for High-End Computing – HPCwire

DUBLIN and PARIS, Dec. 17, 2020 Atos today announces it will deliver its first GPU-acceleratedAtos Quantum Learning Machine Enhanced(Atos QLM E), the worlds highest-performing commercially available quantum simulator, to the Irish Centre for High-End Computing (ICHEC).

The Atos QLM E will be integrated with the Irish national supercomputer Kay and equipped with a variety of quantum software programming tools. As a hybrid HPC-Quantum Computing environment, the integrated Kay-Atos QLM E platform will serve theQuantum Programming Ireland (QPI) Initiativefor conducting R&D and national-level skills development activities in quantum technologies by ICHEC as well as other Irish organizations in academic, enterprise and public sector.

Offering up to 12 times more computation speed than the original Atos QLM, the Atos QLM E is also an integral component of the NEASQC project, in the 1 bn European flagship quantum initiative, of which Ireland is a partner along with 11 other European companies and research labs, andcoordinated by Atos.

Once the Atos QLM E is delivered on-premise, Atos will provide a fast-track training program and continue to enhance the system throughout its lifetime to ensure that it delivers the functionality required in this fast-moving discipline of quantum computing.

Prof. Jean-Christophe (JC) Desplat, Director at ICHEC, said:As Irelands high performance computing authority, were committed to using the power of technology to solve some of the toughest challenges across public, academic and enterprise sectors. Working with a number of partners across Europe, we look forward to utilizing the Atos QLM E related for R&D on a number of scientific and industry-relevant quantum computing use-casesand supporting scientific breakthroughs in high-performance computing.

Agns Boudot, Senior Vice President, Head of HPC & Quantum at Atos, said:As the first Atos QLM E deployed globally, this partnership marks an important milestone in our Quantum Program. We look forward to supporting ICHEC on their quantum journey, helping them explore with their users the huge potential that quantum computing offers. The solution will provide a scalable, future-proof, national framework for the porting of hybrid applications, and for the training and skills development of Irish researchers, and ICHECs partners across Europe.

Atos QLM E has been optimized to drastically reduce the simulation time of hybrid classical-quantum algorithms simulations, leading to quicker progress in application research.

Atos, a pioneer in quantum

In 2016, Atos launched Atos Quantum an ambitiousprogram to anticipate the future of quantum computing. As a result of this initiative,Atos was the first organization to offer aquantum noise simulation modulewithin its Atos QLM offer. Atos QLM is being used in numerous countries worldwide includingAustria,Finland,France,Germany,India, Italy,Japan,the Netherlands, Senegal,UKand theUnited States, empowering major research programs in various sectors like industry orenergy. Recently, Atos introduced Q-score, the first universal quantum metrics reference, applicable to all programmable quantum processors.

Source: Atos

See the rest here:
Atos Delivers Its First GPU-Accelerated Quantum Learning Machine to the Irish Centre for High-End Computing - HPCwire

‘Magic’ angle graphene and the creation of unexpected topological quantum states – Princeton University

Electrons inhabit a strange and topsy-turvy world. These infinitesimally small particles have never ceased to amaze and mystify despite the more than a century that scientists have studied them. Now, in an even more amazing twist, physicists have discovered that, under certain conditions, interacting electrons can create what are called topological quantum states. This finding, which was recently published in the journal Nature,holds great potential for revolutionizing electrical engineering, materials science and especially computer science.

Topological states of matter are particularly intriguing classes of quantum phenomena. Their study combines quantum physics with topology, which is the branch of theoretical mathematics that studies geometric properties that can be deformed but not intrinsically changed. Topological quantum states first came to the publics attention in 2016 when three scientists Princetons Duncan Haldane, who is Princetons Thomas D. Jones Professor of Mathematical Physics and Sherman Fairchild University Professor of Physics, together with David Thouless and Michael Kosterlitz were awarded the Nobel Prize for their work in uncovering the role of topology in electronic materials.

A Princeton-led team of physicists have discovered that, under certain conditions, interacting electrons can create what are called topological quantum states, which,has implications for many technological fields of study, especially information technology. To get the desired quantum effect, the researchersplaced two sheets of graphene on top of each other with the top layer twisted at the "magic" angle of 1.1 degrees, whichcreates a moir pattern. This diagram shows a scanning tunneling microscopeimaging the magic-angle twisted bilayer graphene.

Image courtesy of Kevin Nuckolls

The last decade has seen quite a lot of excitement about new topological quantum states of electrons, said Ali Yazdani, the Class of 1909 Professor of Physics at Princeton and the senior author of the study. Most of what we have uncovered in the last decade has been focused on how electrons get these topological properties, without thinking about them interacting with one another.

But by using a material known as magic-angle twisted bilayer graphene, Yazdani and his team were able to explore how interacting electrons can give rise to surprising phases of matter.

The remarkable properties of graphene were discovered two years ago when Pablo Jarillo-Herrero and his team at the Massachusetts Institute of Technology (MIT) used it to induce superconductivity a state in which electrons flow freely without any resistance. The discovery was immediately recognized as a new material platform for exploring unusual quantum phenomena.

Yazdani and his fellow researchers were intrigued by this discovery and set out to further explore the intricacies of superconductivity.

But what they discovered led them down a different and untrodden path.

This was a wonderful detour that came out of nowhere, said Kevin Nuckolls, the lead author of the paper and a graduate student in physics. It was totally unexpected, and something we noticed that was going to be important.

Following the example of Jarillo-Herrero and his team, Yazdani, Nuckolls and the other researchers focused their investigation on twisted bilayer graphene.

Its really a miracle material, Nuckolls said. Its a two-dimensional lattice of carbon atoms thats a great electrical conductor and is one of the strongest crystals known.

Graphene is produced in a deceptively simple but painstaking manner: a bulk crystal of graphite, the same pure graphite in pencils, is exfoliated using sticky tape to remove the top layers until finally reaching a single-atom-thin layer of carbon, with atoms arranged in a flat honeycomb lattice pattern.

To get the desired quantum effect, the Princeton researchers, following the work of Jarillo-Herrero, placed two sheets of graphene on top of each other with the top layer angled slightly. This twisting creates a moir pattern, which resembles and is named after a common French textile design. The important point, however, is the angle at which the top layer of graphene is positioned: precisely 1.1 degrees, the magic angle that produces the quantum effect.

Its such a weird glitch in nature, Nuckolls said, that it is exactly this one angle that needs to be achieved. Angling the top layer of graphene at 1.2 degrees, for example, produces no effect.

The researchers generated extremely low temperatures and created a slight magnetic field. They then used a machine called a scanning tunneling microscope, which relies on a technique called quantum tunneling rather than light to view the atomic and subatomic world. They directed the microscopes conductive metal tip on the surface of the magic-angle twisted graphene and were able to detect the energy levels of the electrons.

They found that the magic-angle graphene changed how electrons moved on the graphene sheet. It creates a condition which forces the electrons to be at the same energy, said Yazdani. We call this a flat band.

When electrons have the same energy are in a flat band material they interact with each other very strongly. This interplay can make electrons do many exotic things, Yazdani said.

One of these exotic things, the researchers discovered, was the creation of unexpected and spontaneous topological states.

This twisting of the graphene creates the right conditions to create a very strong interaction between electrons, Yazdani explained. And this interaction unexpectedly favors electrons to organize themselves into a series of topological quantum states.

The researchers discovered that the interaction between electrons creates topological insulators:unique devices that whose interiors do not conduct electricity but whose edges allow the continuous and unimpeded movement ofelectrons. This diagram depicts thedifferent insulating states of the magic-angle graphene, each characterized by an integer called its Chern number, which distinguishes between different topological phases.

Image courtesy of Kevin Nuckolls

Specifically, they discovered that the interaction between electrons creates what are called topological insulators. These are unique devices that act as insulators in their interiors, which means that the electrons inside are not free to move around and therefore do not conduct electricity. However, the electrons on the edges are free to move around, meaning they are conductive. Moreover, because of the special properties of topology, the electrons flowing along the edges are not hampered by any defects or deformations. They flow continuously and effectively circumvent the constraints such as minute imperfections in a materials surface that typically impede the movement of electrons.

During the course of the work, Yazdanis experimental group teamed up two other Princetonians Andrei Bernevig, professor of physics, and Biao Lian, assistant professor of physics to understand the underlying physical mechanism for their findings.

Our theory shows that two important ingredients interactions and topology which in nature mostly appear decoupled from each other, combine in this system, Bernevig said. This coupling creates the topological insulator states that were observed experimentally.

Although the field of quantum topology is relatively new, itcouldtransform computer science. People talk a lot about its relevance to quantum computing, where you can use these topological quantum states to make better types of quantum bits, Yazdani said. The motivation for what were trying to do is to understand how quantum information can be encoded inside a topological phase. Research in this area is producing exciting new science and can have potential impact in advancing quantum information technologies.

Yazdani and his team will continue their research into understanding how the interactions of electrons give rise to different topological states.

The interplay between the topology and superconductivity in this material system is quite fascinating and is something we will try to understand next, Yazdani said.

In addition to Yazdani, Nuckolls, Bernevig and Lian, contributors to the study included co-first authors Myungchul Oh and Dillon Wong, postdoctoral research associates, as well as Kenji Watanabe and Takashi Taniguchi of the National Institute for Material Science in Japan.

Strongly Correlated Chern Insulators in Magic-Angle Twisted Bilayer Graphene, by Kevin P. Nuckolls, Myungchul Oh, Dillon Wong, Biao Lian, Kenji Watanabe, Takashi Taniguchi, B. Andrei Bernevig and Ali Yazdani, was published Dec. 14 in the journal Nature (DOI:10.1038/s41586-020-3028-8). This work was primarily supported by the Gordon and Betty Moore Foundations EPiQS initiative (GBMF4530, GBMF9469) and the Department of Energy (DE-FG02-07ER46419 and DE-SC0016239). Other support for the experimental work was provided by the National Science Foundation (Materials Research Science and Engineering Centers through the Princeton Center for Complex Materials (NSF-DMR-1420541, NSF-DMR-1904442) and EAGER DMR-1643312), ExxonMobil through the Andlinger Center for Energy and the Environment at Princeton, the Princeton Catalysis Initiative, the Elemental Strategy Initiative conducted by Japans Ministry of Education, Culture, Sports, Science and Technology (JPMXP0112101001, JSPS KAKENHI grant JP20H0035, and CREST JPMJCR15F3), the Princeton Center for Theoretical Science at Princeton University, the Simons Foundation, the Packard Foundation, the Schmidt Fund for Innovative Research, BSF Israel US foundation (2018226), the Office of Naval Research (N00014-20-1-2303) and the Princeton Global Network Funds.

More:
'Magic' angle graphene and the creation of unexpected topological quantum states - Princeton University

Quick Thoughts on the Russia Hack – Lawfare

David Sanger, building on a Reuters story, reports in the New York Times that some country, probably Russia, broke into a range of key government networks, including in the Treasury and Commerce Departments, and had free access to their email systems. The breach appears to be much broader. [N]ational security-related agencies were also targeted, though it was not clear whether the systems contained highly classified material. The Department of Homeland Security appears to be one of those agencies. Sanger says that the intrusions have been underway for months and that the hackers have had free rein for much of the year. The original Reuters story on Dec. 13 noted that people familiar with the hacks feared the hacks uncovered so far may be the tip of the iceberg. On the evening of Dec. 13, the Cybersecurity and Infrastructure Security Agency issued an Emergency Directive to all federal civilian agencies to review their networks for indicators of compromise.

This attack is the latest in a long string of other serious breaches of government networks by insiders and outsiders in the past decadefor example, the Office of Personnel Management (OPM) in 2014-2015; the White House, State Department, and Joint Chiefs email breach during those same years; the 2016 theft of CIA hacking tools; the Shadow Brokers theft of National Security Agency tools in 2017; and Edward Snowdens mammoth disclosures in 2013 and beyond. These events constitute a stunning display of the U.S. governments porous defenses of sensitive government networks and databases.

The U.S. approach to preventing these breaches appears to involve five elements: (a) tighten insider controls, (b) thicken defenses, (c) indict (but very rarely prosecute) responsible individuals, (d) impose sanctions on the responsible countries and (e) live in adversary networks to monitor and interrupt actions against the United States before they beginthe so-called defend forward strategy. The United States is probably retaliating for some of these breaches, but there is little information on that in the public record.

On the whole, these elements have failed to stop, prevent or deter high-level breaches. Of course, we do not know what we dont know, both about unreported or undetected breaches and about successful interruption of attempted breaches. Nor does the public know anything about how the costs of these breaches compare to the huge benefits, on the whole, of the digitalization of government information. But the public record is not a happy one for the U.S. government across the past few administrations.

For me, the Russia breach raises three questions.

First, is defend forward all its built up to be? Cyber Command has been touting its successes in, for example, preventing interference in the 2018 and 2020 elections. But the strategy did not prevent the Russia breach. As Sanger notes, while the government was worried about Russian intervention in the 2020 election, key agencies working for the administrationand unrelated to the electionwere actually the subject of a sophisticated attack that they were unaware of until recent weeks. I have always wondered how Cyber Command possibly possessed the intelligence resources and cyber tools to monitor, detect and prevent all possible major cyber threats. It will be interesting to see what Commander of Cyber Command Gen. Paul Nakasone, who has not been shy about the value and power of defend forward, says about how the strategy worked here, whether and why it failed, and what those answers imply about the value of the defend forward overall.

Second, is what the Russians did to U.S. government networks different from what the National Security Agency does on a daily basis? Government-to-government electronic espionage and data theft, including on this scale, is almost certainly commonplace. As then-Director of National Intelligence James Clapper said after the OPM breach: You have to kind of salute the Chinese for what they did. If we had the opportunity to do that, I don't think we'd hesitate for a minute (emphasis added). It is important to keep this in mind when assessing the Russian operation. The public in the United States receives asymmetric information both about the cyber exploitations of our adversaries (Americans hear loads more about adversary activity than U.S. government activity abroad) and about breaches (Americans hear loads more about adversary breaches of U.S. systems than U.S. breaches in adversary systems).

Third, knowledge of what the U.S. government is doing in this realm is necessary to assess, among other things, whether the current posture of U.S. activity in foreign networks is optimal. One important question is: Does the United States gain more from living in adversary networks than adversaries gain from living in American networks? If not, might the United States pull back on some of its digital activities abroad in exchange for relief from the pain caused by our adversaries activities in our digital networks? I have suggested before that cooperation (in the sense of mutual restraint) may be the least bad approach to defending our networks, since the other approaches dont seem to be working very well. There would be many challenges, of course, including clarity on what counts as cooperationthat is, what precisely will each side not doand verification. But these challenges do not seem to me insurmountable in theory and are worth at least exploring. And yet U.S. government officials never publicly discuss restraint as a possible strategy.

Read the original here:
Quick Thoughts on the Russia Hack - Lawfare

Tulsi Gabbard and Thomas Massie Team Up to Take a Stand for the Fourth Amendment – Foundation for Economic Education

The Patriot Act was passed in 2001 in the wake of the tragic 9/11 terrorist attacks.

In the name of combatting terrorism, the sweeping law vastly expanded the federal governments surveillance powers and ability to spy on Americans. In the nearly two decades since, the National Security Agencys mass warrantless surveillance of American citizens was exposed by whistleblower Edward Snowden, a key government spying program was declared illegal by a federal court, and only a minuscule percentage of federal spying has been tied to terrorism.

Nevertheless, much of the Patriot Act has remained on the books and in use for decades. Two members of Congress from opposite sides of the political spectrum want to change that.

Hawaii Rep. Tulsi Gabbard, a progressive Democrat, has just introduced a bill alongside libertarian-leaning Republican Rep. Thomas Massie of Kentucky to repeal the Patriot Act, revoke much of the FISA Amendments Act, and restore Americans privacy protections. Their legislation would do the following (and more):

The case for this legislation is rooted in privacy rights and the need to restore Fourth Amendment stipulations that protect Americans from being spied on by their government.

The Constitution of the United States guarantees fundamental rights and freedoms for every Americanincluding the right to privacy and protection against illegal search and seizure without probable cause, Gabbard said. Unfortunately, the so-called Patriot Act and FISA Amendments Act allowed the intelligence community to conduct mass surveillance on Americans, collecting information about our phone calls and our emails.

The Patriot Act contains many provisions that violate the Fourth Amendment and have led to a dramatic expansion of our domestic surveillance state, Massie added. "Our Founding Fathers fought and died to stop the kind of warrantless spying and searches that the Patriot Act and the FISA Amendments Act authorize. It is long past time to repeal the Patriot Act and reassert the constitutional rights of all Americans.

As Massie indicates, this legislation is long overdue. Fortunately, it may find some allies in the Senate, given that figures such as Sen. Rand Paul have similarly opposed the Patriot Act and other Fourth Amendment intrusions. However, the legislation is likely to meet strong opposition from members of both parties establishments, so the chances of it becoming law in the immediate future are, its fair to say, quite slim.

Why?

The biggest reason is that expansions of government power are inherently difficult to roll back. In times of emergency, citizens acquiesce to sweeping expansions of state power they would never accept in normal times. But even after the emergency has passed, the government retains much of this power, because removing it would require government officials to vote to decrease their own powersomething most politicians are unlikely to do.

Thus, government power increases over time as it spikes during crises but never fully recedes. This cycle is what economist Robert Higgs dubbed the ratchet effect. And it's a lesson Americans should keep in mind during the COVID-19 pandemic.

Whether Gabbard and Massies bill is successful or not, it offers an important reminder. If Americans accept extreme intrusions of government power during times of crisis, those invasions of our liberty may well remain on the books for decades to come.

See the article here:
Tulsi Gabbard and Thomas Massie Team Up to Take a Stand for the Fourth Amendment - Foundation for Economic Education

Why do you need a VPN in the US? – Tom’s Guide

The best VPN acts as an intermediary between your internet service provider (ISP) and the rest of the net, creating a secure tunnel through which you perform all of your internet activities. The boom in popularity of US VPN services over the last few years can be explained by the enhanced anonymity and privacy they offertheir use of strong encryption can help prevent ISPs from monitoring and logging your activity.

The best services also prevent ISPs from blocking websites based on your location, which can be particularly useful if you wish to surf freely when visiting certain countries outside of the US.

One can see the justification for using a VPN in countries such as China, where large portions of the Internet are censored, but why might you want to use a VPN in the US specifically?

Youve more than likely experienced the frustration of reading about some highly anticipated new TV series, only to find out that for some obscure reason your streaming provider isnt showing it in the US.

VPNs give you a selection of servers that you can connect to in multiple geographic locations, thus hiding your true location from the websites that you visit and opening up the possibility of watching geo-blocked content.

This so-called location spoofing lets you watch streaming content from whatever country you like. If you wish, for example, to spend the entire evening checking out the Netflix Mexico library or watching some compelling content on BBC iPlayer, you can do so easily with a streaming VPN.

Identity theft is a major problem in the US, accounting for billions of dollars of financial loss for US citizens every year. One way a criminal might get access to your private data is when you connect to an unencrypted public Wi-Fi network such as in an airport or a caf.

If you use a VPN while connecting to a public network, your data becomes encrypted and secure, making it practically impossible for another person to decipher it and use it for fraudulent activity.

Another favorite tool of fraudsters is malwaremalicious software that attempts to send your private data to criminals once it's installed on your device. Certain VPN providers, such as NordVPN, maintain databases of sites known to contain malware and block you from accessing them, letting you surf more safely.

The laws governing data protection in the US are labyrinthinewhile some laws exist at a federal level, much of the legislation changes from state to state.

If you wish to avoid wasting hours researching state-specific data protection laws any time you hop on an inbound flight in the US, we recommend availing of a secure VPN service to protect your data from prying eyes and prevent it from being monetized by ISPs.

The US government has a history of spying on its citizensfrom the ramp-up in surveillance following the 9-11 attacks to the now-infamous PRISM program, dramatically disclosed by Edward Snowden in 2013, which monitors private communications within the US on a massive scale.

Note that while VPNs are an excellent way of making it difficult for individuals or agencies to snoop on your internet activity and location, they are not infallible. If you are keen to surf the net with even better security we suggest using the TOR protocol, ideally in conjunction with a private VPN.

The only way of completely ensuring that the US authorities arent spying on your communications is to avoid internet use altogether, but if youre keen to not go to such extremes, we recommend getting a VPN and taking advantage of the added layer of security and anonymity that this technology offers.

ExpressVPN stands out from the competition in terms of price, features, and value. With servers in nearly 100 countries and plenty within the US, blazing connection speeds, and reliable access to multiple streaming services, ExpressVPN has everything that one would need from a VPN.

While some users may prefer certain features of other top VPNs, its the best overall option for most users and now Toms Guide readers can claim three months absolutely free.View Deal

More:
Why do you need a VPN in the US? - Tom's Guide

Letter: Who will protect America from censorship by media? – The Mercury

Editor:

With Hunter Bidens admission that he is the subject of a federal criminal investigation, the mainstream media has finally been shamed into reporting on him and the financial entanglements between the Biden family and the Chinese Communist Party.

As vice president, Joe Biden hauled his neer-do-well son Hunter on Air Force Two around the globe like a soiled Turkish towel to be thrown in every murky puddle of cash between Ukraine and China to be wrung out later for personal profit. Only now that the election is over is the media bringing this to the attention of voters. It may have had an impact on how they voted.

When the framers of the Constitution sought to protect free speech, they envisioned abridgment of free speech by the government; they didnt envision self-censorship by the media to advance political objectives. Where do we turn for protection from that?

James R. Blair

Spring Township

See the rest here:

Letter: Who will protect America from censorship by media? - The Mercury