Quantum Computing Explained for Investors – Barron’s

Quantum computing was named a breakout technology in 2017 by the Massachusetts Institute of Technology. It showed up again on the list for 2020. Does that mean quantum computing is ready for prime time? Possibly. That is good news for the world, but the problem is few know what a quantum computer actually doesand investors dont know what quantum computing means for their portfolio.

Where to start? Microsoft (ticker: MSFT) is a large quantum player. And looking at its quantum business can help frame the issue for investorsand anyone else.

Its helpful to start a few steps back from Microsofts quantum aspirations.

Many people have heard of the quantum realm, thanks in large part to Walt Disneys (DIS) Marvel Cinematic Universe. The Avengers, after all, defeated Thanos in Avengers: Endgamethe highest-grossing film of all timewith the help of quantum tunnels. And the Guardians of the Galaxy navigated a quantum asteroid field in their latest stand-alone film.

In the quantum asteroid field, rocks popped in and out of existence. The idea being that in the quantum realm, almost anything is possible. Quantum has become an analogy for weird, counterintuitive outcomes.

Quantum physics does indeed dictate a bunch of weird things, including particlesnot the size of asteroidspopping in and out of existence.

Physicist Richard Feynman said once that all people need to know about quantum physics is the double-slit experiment.

In the experiment, a single electronwhich is a negatively-charged subatomic particlepasses through both slits at the same time. Very weird. But that is because particles have wavelike properties. A wave of water would hit both slits.

So an electron behaves like a wave. OK. But heres the thing, if someone watches the experiment unfoldputting a detector in front of the slitsthe electron stops acting like water. It goes back to being a particle. Weird.

That, curiously, has some benefits for a computer. In a traditional computer, a bitthe basic unit of computing powercan have a value of one or zero. A quantum bit, more commonly called a qubit, is the basic unit of quantum computing. It can have a value of one or zero or anything in betweenat the same time.

There are other things qubits can do, but multiple, simultaneous values makes quantum computers faster. A 64-bit computer can have roughly 18 quintillion (18 with 18 zeros) values. If a computer can do 2 billion values per second, it will take roughly 300 years to go through all potential values.

A 64-bit quantum computer can have, in theory, all 18 quintillion values at once. Go figure.

MIT put quantum computing back on its technology list in 2020 because a quantum computer with 53 qubits built by Google parent Alphabet (GOOGL) did a calculation, in about three minutes, that would have taken a traditional computer 10,000 years.

Quantum supremacy was demonstrated. Great. So when will consumers be buying a quantum desktop, and when will investors be bidding up Alphabet stock on exploding quantum sales?

Not yet.

Qubits are not reliable yet. There is noise, Stephen Jordan, Microsoft quantum principal researcher, told Barrons. People are still working out the hardware. There are, for instance, superconducting qubits, trapped-ion qubits, and topological qubits.

Picking between qubits isnt like beta or VHS, or a Mac versus a PC. With todays computers underlying hardware is the same and 100% reliable, adds Jordan.

The industry is still working out the hardware. To reduce the noise, usually, you take qubits and string a bunch together to make a computing qubit, explains Helmut Katzgraber, Microsoft quantum principal research manager.

Microsoft, of course, is known for software. Maybe that means what the quantum computing industry needs is quantum Intel (INTC), pumping out the quantum equivalent of silicon chips with 1 billion transistors on them. (A transistor can store a bita one or zeroas information.)

For Katzgraber, the qubit hardware industry will be like FPGA, short for field programmable gate arrays, which are integrated circuits that can be configured into ASIC, short for application-specific integrated circuits.

Xilinx (XLNX) makes FPGAs. They get their supply from businesses like Taiwan Semiconductor Manufacturing (TSM), and Taiwan Semi gets silicon from a company like Lam Research (LCRX).

There is now a quantum value chain like that. Honeywell International (HON) can make trapped-ion qubits. That is probably as close as investors have to a quantum supplier at this point.

Hardware doesnt have to come before software and applications though.

We have gone through computer creation before, says Katzgraber. We are doing the whole stackthe software to the qubitsall at once.

That speeds development, but doesnt mean there will be a quantum smartphone soonor sooner than it took to go from mainframe to desktop, to laptop to iPhone. Quantum computing will probably look a little different. These [systems] will live in data centers in the cloud, adds Jordan.

Along with hardware comes apps. And a killer quantum app will help elevate the technology from MITs tech review to the nightly news. There are areas where the existing tech is having an impact. Julie Love, Microsoft quantum applications team leader, tells Barrons about several problems being addressed now from traffic light optimization to industrial catalyst for chemical production.

For now, big tech is big quantum. Google, Microsoft, IBM (IBM), and Amazon.com (AMZN) have quantum aspirations. Honeywell has its toes in quantum waters too. Its tough to buy any of those stock as a quantum investment yet.

Superconductor makers dont talk about quantum computing much in filings either. And superconducting is only a $2 billion industry at the moment.

Quantum computing remains a watch item for investorsalbeit an interesting one.

Write to Al Root at allen.root@dowjones.com

View original post here:
Quantum Computing Explained for Investors - Barron's

What’s the Best Way To Protect Free Speech? Ken White and Greg Lukianoff Debate Cancel Culture – Reason

Even as debates over cancel culture have swept the nation, free speech defenders have disagreed about what, exactly, cancel culture is, and what it means for freedom of speech. In many ways, these disagreements represent differences of opinion about how best to protect and uphold true freedom of speech.

And what better way to deal with questions about free speech than with a debate? Ken White is an attorney, a co-host of All the President's Lawyers, and a frequent commenter on issues of speech and law. Greg Lukianoff is the president of the Foundation for Individual Rights in Education (FIRE), a nonprofit whose mission is to "defend and sustain the individual rights of students and faculty members at America's colleges and universities." In the following exchange, the pair debate the resolution: Free speech law is the best defense against cancel culture.

This is a golden age for free speech in America.

For more than a generation, the United States Supreme Court has reliably protected unpopular speech from government sanction. The Court's staunch defense of the First Amendment is remarkable because it has transcended political partisanship and upheld speech that offends everyone, including the powerful.

In overturning flag burning laws, the Court protected (literally) incendiary speech that remains intolerable to many Americans. Years later, in upholding the right of Westboro Baptist Church to picket the funerals of servicemen with vile homophobic insults, the Court aggrieved both the left and the right, permitting violation of norms of veneration of the military and against hate speech. The Court has protected scatological and humiliating ridicule of public figures and overturned laws purporting to bar "disparaging" or "immoral or scandalous" trademarks, firmly establishing that offensive speech is free speech.

Crucially, the Court has repeatedly rebuked demands that it create new First Amendment exceptions based on the tastes of the moment. Instead, it has adhered to a select, narrowly defined list of historical exceptions, rejecting efforts to create a general "balancing test" that would determine whether speech is protected by an ad hoc weighing of its value and harm. The Court's defense of free speech is not perfectstudents and public employees have seen some narrowing of rightsbut it is unprecedented in American history, and in sharp contrast to the Court's halfhearted defense of Fourth, Fifth, and Sixth Amendment rights.

Moreover, Congresstypically not a reliable defender of rightshas contributed meaningfully to our freedom to speak without fear of legal retaliation. For decades, Section 230 of the Communications Decency Act of 1996 has made online discourse feasible by protecting websites from lawsuits based on the speech of visiting commenters and users. The SPEECH Act, enacted in 2010, protects us from libel tourism by making foreign defamation judgments unenforceable in the United States unless they comply with our robust free speech protections.

Of course, rights are enforced by courts, which can make them more theoretical than actual. Access to justice is inconsistent, and the litigation process is hideously expensive and burdensome. But we've witnessed an explosion of First Amendment advocacy groups from every part of the political spectrum willing to vindicate Americans' rightsincluding the Foundation for Individual Rights in Education.

Yet gloom and despair dominate public discourse about free speech. We're told that free speech is in decline, under siege, subjected to constant threats.

It's true that the First Amendment is constantly under attack and requires ongoing protection from legal assault from all sides. But the prevailing narrative isn't about official threats to speechthat is, threats involving state action that would violate the First Amendment. Instead, we're consumed with a debate about free speech culturea disagreement about whether some speech is impermissibly threatened by other speech. That's "cancel culture": the notion that some people's exercise of their rights to free speech and free association impedes others in exercising those rights. It's a clash of norms, not of laws.

The notion that free speech norms impact free speech rights is not new. The legal system won't reliably protect rights unless the culture values them. Consider how our unreflective "law and order" culture has degraded Fourth, Fifth, and Sixth Amendment rights. Judge Billings Learned Hand articulated it perfectly in his "Spirit of Liberty" speech in 1944: "Liberty lies in the hearts of men and women; when it dies there, no constitution, no law, no court can save it; no constitution, no law, no court can even do much to help it. While it lies there, it needs no constitution, no law, no court to save it." The project of cultivating a cultural respect for free speech is completely legitimate.

How do we protect free speech norms? With our free speech rights, grounded in the rule of law. Cancel culture and denunciation of cancel culture are competing norms in the protected marketplace of ideas. You can't burn down the marketplace in order to save it. Efforts to use state force to tamper with the marketplace to sort "valid" criticism from "invalid" cancellation inevitably result in less free speech, not more.

Consider ongoing efforts to use punitive laws to stop the Boycott, Divestment and Sanctions (BDS) movement against Israel, which put a government thumb on the scales by declaring that some forms of free speech and free association are an impermissible way to protest. Or consider how quickly J.K. Rowling, a very wealthy person who styles herself a victim of cancel culture because of the reactions to her comments about transgender people, uses threats of legal action under the U.K.'s regrettable defamation laws to force retractions and apologies from critics, nominally in service of some right to speak without "unfair" criticism. You can't win real free speech with censorship.

So what does it mean to use legal norms to protect cultural norms?

It's common for people criticizing cancel culture to say "we're not talking about law, we're talking about culture and behavior." Sure. But knowledge is power, and ignorance is poisonous.

Dialogue about free speechincluding about free speech cultureis often shot through with misunderstandings and disinformation about our legal rights. For instance, the debate over how social media platforms should be moderating unpopular speech is dominated by propaganda and gibberish about Section 230. That's bad for culture and civic society, because you can't effectively rely on or defend a right you don't understand.

Debates about free speech need not be limited to the law, but they should not mislead about the law. For example, when FIRE criticizes private universities for censorious policies, they take pains to point out that private schools are not bound by the First Amendment but should be bound by their promises of free exchange of ideas. That approach combines robust discourse about culture with accurate information about rights.

Many people who are concerned with cancel culture are acting in good faith and not trying to push a political agenda. But some people are. Cancel culture like any somewhat useful descriptive termis cynically used to mean "things I don't like" and "liberals suck." Take our president:

The problem isn't just that this reflects a completely unprincipled definition of cancel culture. The bigger problem is that the president (and many other politicians) decry cancel culture while wallowing in it by seeking to inflict social and economic consequences against speakers they don't like.

In fact, I respectfully submit that most complaining about cancel culture is insincere griping meant to convey "liberals are bad." This is part of a general political effort to associate free speech with the right and censorship with the left. (That effort isn't just historically laughable and demonstrably untrue, it's terribly shortsighted and counterproductive if your goal is to sell young people on free speech culture.) As a result, when people of good faith, like my friend Greg Lukianoff, talk about cancel culture, they're viewed with skepticism. They cannot pretend that their arguments exist in a vacuum; they exist in a culture of relentless, unprincipled misuse of the phrase.

So what can they do? They can use the rigor you would associate with legal norms. They can explain their terms, debate principled definitions of what is objectionable, and call out political misuse of the concept, so that their discourse can't be mistaken for mere partisanship. That brings us to the next way legal norms can inform this debate:

The debate over cancel culture is best conducted using specific examples, as you would in a legal argument, not broad generalities.

There is, for instance, a fairly broad consensus that the firing of David Shor was unjust and contemptible. So why not say so explicitly? The now-famous Harper's magazine letter about cancel culture didn't. It relied, instead, on somewhat vague allusions to cases, and on general criticism of "intolerance of opposing views" and "a vogue for public shaming and ostracism"terms that are very susceptible to exactly the sort of cynical political misuse I'm talking about. It should not have shocked the authors that their audience, steeped in our current political culture, read it as a partisan wolf in principled sheep's clothing. Couching the debate in specific cases, like Shor's, will help as much as rigorous definitions.

The point of the law is to sort out competing claims of rights. Any debate over cancel culture must do so as well. The things decried as "cancellation" of free speechpublic denunciations, calls for firings and boycotts, and so forthare indisputably other people's free speech. Just as a legal argument won't persuade if it ignores the claims of the opposing party (well, unless it's a D.A. arguing), the cultural argument won't persuade if it amounts to shut up so I feel more comfortable talking.

This is particularly true because cancel culture is used so flexibly to mean anything from demanding that someone be fired for saying something offensive (which might be a principled definition) to criticizing that person for saying it because doing so might be "mob action" that contributes to cancellation. Everyone's free speech rights are equal before the law. "There's no right not to be offended" is indisputably true, but so is "there's no right not to be criticized." These rights should be equal philosophically, too. People arguing that cancel culture is bad need to confront the fact that boycotts, group public condemnation, and even demands for firing are the sort of speech that comparatively obscure and powerless people have available to them.

And finally, in legal advice I always give to clients:

Like any Very Online debate, cancel culture is a bright flame attracting huckster moths, eager to gather money and attention by portraying themselves as its victimsjust subscribe here to learn all about it! Exercise prudent skepticism.

Debating free speech values is good. A little legal rigor wouldn't hurt.

Free speech culture is more important than the First Amendment. It's more important because free speech culture is what gave us the First Amendment in the 18th century. It's what kept free speech alive in the 19th century. It's what reinvigorated the First Amendment in the 20th century. It's what informs the First Amendment todayand it is what will decide if our current free speech protections will survive into the future.

The thinking that culture can be separated from the law is an odd sociological, let alone legal, theory, especially in a common law country. Indeed, the most important book in the history of freedom of speech, John Stuart Mill's On Liberty, is primarily a philosophical, not legal, argument against a repressive/conformist culture. The same is true of the most important book on freedom of speech in the last 50 years, Jonathan Rauch's Kindly Inquisitors. And the greatest speech on the nature of a free society, Judge Billings Learned Hand's 1944 "Spirit of Liberty" speech, explicitly argues that culture trumps law: "I often wonder whether we do not rest our hopes too much upon constitutions, upon laws and upon courts," he said. "These are false hopes; believe me, these are false hopes. Liberty lies in the hearts of men and women; when it dies there, no constitution, no law, no court can even do much to help it. While it lies there it needs no constitution, no law, no court to save it."

Indeed, the framers of the Constitution and the First Amendment itself were heavily influenced by the cultural norms of the mother country and by radical free speech advocates like John Lilburne. They also benefited from free thinkers like Montesquieu, Francis Bacon, John Locke, David Hume, and the colonial experience in which the press and individual free speech was essentially impossible to control. The Bill of Rights in many ways is a summary of cultural values of what had previously been called "free-born Englishmen."

What does free speech culture look like? Popular idiomslike "it's a free country"are one good window into cultural values, and free speech values are not absent from our idioms. The folk wisdom of "to each his own," and "everyone's entitled to their own opinion" can be found all over First Amendment law and is mirrored in quotes, including my favorite in West Virginia Board of Education v. Barnette (1943): "Freedom to differ is not limited to things that do not matter much."

The sentiments "different strokes for different folks" and "who am I to judge?" find their legal analogs in cases including Cohen v. California's great line"one man's vulgarity is another's lyric"from 1971.

Notice, many idioms that were common when many of us were younger just don't have the same cultural force they used to have. Indeed, "sticks and stones" is regularly made fun of and misrepresented as being an incorrect folk notion rather than a mantra a free society teaches its children to help them deal with the burdens of everyday life. Free speech culture is a culture with a high tolerance for difference; a general presumption that, for most of us, our personal political opinions don't matter all that much for our day-to-day lives: "To each his own."

Free speech culture started to decline on college campuses in the mid-1980s, when campuseswhether they knew it or notstarted adopting the idea of "repressive tolerance." This was the belief that free speech protection for minority opinions did not go far enough. Instead, campus authorities should censor hateful speech. Of course, on campus, their political ideology was entirely dominant, giving them a skewed view of the importance of free speech for minority opinions in the off-campus world.

Luckily, lawyers and judges largely educated before the rise of repressive tolerance norms continued to zealously protect it. However, we kid ourselves if we believe our legal freedoms will survive if our free speech culture is undermined by the institutions entrusted to educate future citizens, leaders, lawyers, and judges.

The idea of free speech culture will always be frustrating to lawyers because it doesn't have the specificity of law. Of course, free speech law is more specific than free speech culture; law is about rules, while culture is about norms. That free speech culture is less specific than law does not make it less powerful. As Charles Davenant had mythological King Thoas observe in 1677's Circe, there is great power in "Custom, that unwritten Law, By which the People keep, even Kings in awe."

Oddly, some lawyers think of the law as something barely influenced by culture. But what about, for example, gay marriage? It only became legal after the culture accepted its legitimacyan unthinkable development 50 years ago.

What does free speech culture look like? Free speech culture means high tolerance for difference. It means a general presumption that, for most of us, our personal political opinions don't matter all that much for our day-to-day jobs: That those with "terrible" opinions can still be amazing lawyers, artists, scientists, and accountants, and people with "good" opinions are not necessarily good at anythingindeed, they might be a little too conventional to contribute interesting things to art, science, or social innovation.

The idea that bad people can be beneficial to society, and good people might be useless, is something that seems heretical in the context of cancel culture, which deems nasty things said in tweets 10 years ago relevant.

Cancel culture comes from our natural instinct to silence dissent. The desire for compliance and conformity is reflected in most of human history. It's deeply ingrained in all of us. We did not have to learn to censor others, we had to learn to be tolerant of nonconformity. We had to learn not to burn the heretic.

Cancel culture is a useful term for delineating the social media era expression of the ancient desire for conformity. Pervasive social media means that things that might have previously been ignoredangry letters sent to The New York Timesare now potentially successful efforts to mobilize a sufficient number of people to ruin lives. Early attempts to describe the new phenomena are instructive, including my own short book Freedom From Speech (2014), the documentary Can We Take a Joke? (2015), and Jon Ronson's So You've Been Publicly Shamed (2015).

So how would I define cancel culture? Broadly and tentatively, of course. How about:

"Cancel culture" is a term to refer to a relatively recent (post-2013) uptick inand success ofideologically driven efforts to get individuals fired or otherwise cast out of acceptable society for non-conforming speech or actions, including speech that would have once been considered trivial, private, or unrelated to someone's job. It is tightly related to the rise in social media, which allows for unparalleled collective policing of ideological norms, and the comparative ease of creating online "outrage mobs."

Cancel culture is in my view, the progeny of campus "callout culture" that Jonathan Haidt and I explore in our book The Coddling of the American Mind (2019). Some characteristics of campus callout culture looks similar to cancel culture, including: 1) the conflation of expressions of opinion with physical violence, 2) the use of ad hominem rhetorical tactics which delegitimize the person and soften or ignore the substance of the argument), 3) the elimination of concern for the intent of targeted speech, relying solely on its claimed effect, 4) a high reliance on guilt by association and theories of "moral pollution" (a concept well explained by my colleague Pamela Paresky), and 5) appeals to authority to punish or remove the targeted speaker (also known as moral dependency). None of these criteria are required to be part of cancel culture, but some or all of these characteristics often are.

Cancel culture often relies on speech that is already unprotected under First Amendment law, including threats of bodily harm and outright harassment. In other cases, cancel culture demands behavior from others that would be unconstitutional or otherwise unlawful. While, for example, you're absolutely free to advocate for less free speech by, for example, demanding a professor be fired for their expression, if a public university were to act on those demands it would violate the law, plain and simple.

The forces of conformity are very strong in humans, and we've given them superpowers in recent days. It must be opposed. Diversity of opinion, the right to individual conscience, the power of thought experimentation and devil's advocacy are important for a free and innovative society.

What does a culture look like that has a strong free speech culture, but not favorable law? France in the 18th century is a good example. It was one of the greatest philosophical periods in human history. It featured thinkers like Voltaire, Diderot, Rousseau, Montesquieu, and milie du Chtelet, as well as salons, like those of Baron d'Holbach, attended by thinkers like David Hume, Adam Smith, and Benjamin Franklin. Sometimes these thinkers and writers had to flee France to avoid arrest, and sometimes they were arrested, but the cultural norm of open discussion was so strong they kept writing and innovating and challenging norms and beliefs.

And what does a country look like that has no free speech culture, but good free speech law? Consider the following guarantees of free speech, from other countries' constitutions:

Each of these sounds similar to our own First Amendment's speech promise. And if you want to know how they are working out, you can visit Russia, North Korea, and Turkey, respectively.

And while these are stark examples, free speech is even under threat in the nominally "free world," including in Spain, Britain, and France, where people have been imprisoned for rap lyrics saying the wrong thing, reading the wrong thing, or having the wrong reaction in a Facebook post.

That's where we could be headed if we don't remember that free speech culture is more important than free speech law. A free speech culture can exist without protective law, but not the other way aroundat least not for very long.

My friend Greg Lukianoff is passionate about free speech, as befits someone who has fought so effectively for it. We have few legal disputes about the scope of the First Amendment. Moreover, as a matter of taste, our views about cancel culture are often consistentI, too, think that demands that people suffer economic consequences for disfavored speech are often counterproductive and destructive to civic society. But my view of the current public dialogue about free speech culture is substantially more cynical than his, and there we differ.

Greg asserts that free speech culture "gave us the First Amendment in the 18th century" and "kept free speech alive." That culture has always been more aspirational than actual. The free speech culture that produced the First Amendment also promptly produced the Alien and Sedition Acts. The dawn of the modern age and mass media gave us broad justifications for censorship of political speech, cultural repression, and suppression of minority views and values.

Though Americans support free speech in the abstract, that support often breaks down when we are confronted with specific examples of speech we don't like. The history of the First Amendment is a history of Americans struggling mightily against other Americans trying to silence them. If free speech is in our national DNA, so is censorship.

That's a fundamental flaw in the current popular cancel culture narrative. It suggests, expressly or implicitly, that America enjoyed some golden age of cultural tolerance for speech. But did we? Did we really? If so, when was it? I submit that there was never such an age, and that unpopular views have always met with social and economic repercussions in America.

We can strive to do better, but we shouldn't distort history by claiming that people now are more censorious than they were before. We can argue, for instance, that Americans should be able to express disapproval of gay marriage without losing their jobsbut that shouldn't lead us to suggest that America was previously a safe place to express pro-gay views, when it manifestly was not.

Why does this matter? It matters because the loudest voices condemning cancel culture in America are not people of good faith like Greg. The loudest voices are using the issue as a cynical political wedge from the right to attack the left.

They're the same voices who try to get people fired for speech when that speech is offensive to them, when that speech comes from the left. The "golden era" conceptthe suggestion that there was a better time for social tolerance of speech in America, and it's now been spoiled by millennials and progressivesis not just wrong, it's nakedly partisan, and it's part of the same effort to make free speech culture into a political weapon.

Making free speech a partisan issue is foolhardy, and true free speech defenders must resist it. The First Amendmentand free speech culture more broadlyrely on a sometimes tenuous bargain. The bargain is this: We all agree not to use the power of the state to punish speech that makes us mad, and instead to use the power of the marketplace of ideas to fight it. That deal convinces Americans to refrain, at least some of the time, from state censorship of some truly despicable and upsetting speech.

But what if we now tell Americans that yes, they have the marketplace of ideas, they have the ability to respond to speech they hate with "more speech"but that more speech shouldn't be too harsh? What if we tell themand especially young people, who tend to be far more left-leaningthat we should see harsh responses to ugly speech as "liberal" and mild responses as "conservative"? Their natural reaction may be to see the free speech "deal" as a partisan sham, a rationalization for preferring the speech and feelings of one group over the other. It's hard to imagine a better way to lose an entire generation's commitment to free speech values.

To be taken seriously, cancel culture critiques must be doggedly nonpartisan and overtly hostile to political misuse. They must also strive for evenhandedness. Critics shouldn't impose norms on "more speech" that they don't impose on the speech it's rebutting.

So, for instance, if you're concerned that widespread condemnation of a professor's column chills speech, you might ask at the same time whether the professor's description of student activists as a "terrorist organization" was also chilling. More speech is free speech, entitled to the same legal and cultural protection as the speech to which it responds. A philosophy that criticizes one to the exclusion of the other will not convince Americans.

Ken White and I are both great admirers of American First Amendment law. I believe it's the best body of thought on how to have freedom of speech in the real world. Where Ken and I differ is that I believe free speech culture and law are (almost) inextricable. We interpret law through the lens of culture, and culture is what makes our law possible and effective. The list of countries that have good free speech laws on the books, but have no free speech because they utterly lack a free speech culture, is long.

We are extremely lucky that our Supreme Court is populated by attorneys educated or coming up during the 1970s, arguably the best decade for both free speech culture on campus and free speech law. However, I've seen a stark decline in student respect for, or understanding of, speech norms over the past decade, and I believe this will inevitably lead to an eventual decline in law.

As I've recounted countless times, from 2001 to about 2012, the students were the best constituency for free speech on campus. Then, in the 201314 school year, students started to demand new campus speech codes and disinvitations, claiming that the presence of people with certain views was medically harmful. Conservatives had railed against campus narrow mindedness for years, but starting in 2014, more and more liberals and left-of-center people grew concerned about the trend, as well. As researchers would discover, the population hitting campuses around 20132014 were less tolerant of free speech.

Because the Foundation for Individual Rights in Education works exclusively on campus, I saw this change in real time and on the groundboth figuratively and literally. In 2015, I filmed Nicholas Christakis when he was encircled by Yale students calling for him to lose his job.

As more members of Generation Z hit the "real world," free speech norms like tolerance for political differences will erode. A 2020 Cato/YouGov survey found that 27 percent of Americans under 30 would support firing a business executive who personally donates to Joe Biden's campaign; 44 percent support firing a similar Donald Trump donor.

Ken warned me about grifters, charlatans, and Trump tainting my argument. But this is the kind of guilt-by-association argument I am fighting: "Bad people make argument, therefore argument bad!" Never mind that I was speaking about this phenomenon years before anyone imagined a President Trump. Yes, Trump pointed out a rising intolerance on the left, but former President Barack Obama has also made similar arguments several times over, and continues to do so.

So have former presidential candidates Bernie Sanders and Elizabeth Warren.

Ken is a friend who I love, admire, and respect, but I have to vent some frustration. I've seen a lot of hostility to the idea of free speech culture coming from people who defer to Ken's point of view. If Ken is concerned about free speech cynicism, he's fortuitously positioned to help stop it.

So, I have some requests of Ken, but, more importantly, of his fans, and for many others.

Not everybody who cares about freedom of speech is as well-versed in its nuances as Ken and me. I try to give people the benefit of the doubt, and even expect people to be inconsistent, because that's part of human nature. Sometimes free speech defenders can disagree about what should be protected, may still be learning, or just made a bad call once. If the price of chiming in to say "I believe in free speech" is to be called out as a presumptive hypocrite, why wouldn't people become cynical?

If someone usually disagrees with you, but actually agrees with you on a particular free speech incident, welcome their help rather than fixate on what you consider to be their previous hypocrisy (which sometimes isn't even there).

Jonathan Rauch, Nadine Strossen, and I and many others are people who actually work in this profession; Milo Yiannopoulos and Charlie Kirk, for example, are explicitly partisan and only care about free speech for ideological allies. In my experience, speech professionals are thoughtful and consistent, and should not be dragged down because grifters exist, as they have always existed.

Many people follow Ken's example by tweeting something about how people on the right "don't care about these casesin your face, conservative!" But few realize what else he does: Send the cases our way and actually support our work. Be more like Ken and do more than dunk on your opponents: Spread the word, contact the school, and urge other influential people to join the profree speech side.

Ken and I don't have to agree on the value of free speech culture. But when people are fostering contempt and cynicism about free speech it makes the job of actual free speech fighters, including both Ken and me, much harder. If we preoccupy ourselves with distancing ourselves from the "bad" folks, we will eventually cede free speech to the grifters.

It's okay that people deemed "bad" by internet mobs agree with me about cancel culture. Indeed, I would like more people to come out against cancel culture; most Americans are against it but may be afraid to say so. I may be greedy, but I'd like both strong free speech law and a strong culture.

Therefore, I would like more people to return to the idioms of a free society: How about "everyone's entitled to their own opinion," "it's a free country," "address the argument, not the person," and maybe a new one: "Even people I hate have to make a living."

More here:

What's the Best Way To Protect Free Speech? Ken White and Greg Lukianoff Debate Cancel Culture - Reason

Today in History: Today is Saturday, Aug. 1, the 214th day of 2020. – wausaupilotandreview.com

By The Associated Press

Todays Highlight in History:

On August 1, 1957, the United States and Canada announced they had agreed to create the North American Air Defense Command (NORAD).

On this date:

In 1714, Britains Queen Anne died at age 49; she was succeeded by George I.

In 1907, the U.S. Army Signal Corps established an aeronautical division, the forerunner of the U.S. Air Force.

In 1912, the U.S. Marine Corps first pilot, 1st Lt. Alfred A. Cunningham, went on his first solo flight as he took off in a Burgess/Curtis Hydroplane from Marblehead Harbor in Massachusetts.

In 1914, Germany declared war on Russia at the onset of World War I.

In 1936, the Olympics opened in Berlin with a ceremony presided over by Adolf Hitler.

In 1944, an uprising broke out in Warsaw, Poland, against Nazi occupation; the revolt lasted two months before collapsing.

In 1966, Charles Joseph Whitman, 25, went on an armed rampage at the University of Texas in Austin that killed 14 people, most of whom were shot by Whitman while he was perched in the clock tower of the main campus building. (Whitman, who had also slain his wife and mother hours earlier, was finally gunned down by police.)

In 1981, the rock music video channel MTV made its debut.

In 2001, Pro Bowl tackle Korey Stringer, 27, died of heat stroke, a day after collapsing at the Minnesota Vikings training camp on the hottest day of the year.

In 2007, the eight-lane Interstate 35W bridge, a major Minneapolis artery, collapsed into the Mississippi River during evening rush hour, killing 13 people.

In 2013, defying the United States, Russia granted Edward Snowden temporary asylum, allowing the National Security Agency leaker to slip out of the Moscow airport where he had been holed up for weeks.

In 2014, a medical examiner ruled that a New York City police officers chokehold caused the death of Eric Garner, whose videotaped arrest and final pleas of I cant breathe! had sparked outrage.

Ten years ago: The United States announced that it would provide Pakistan with $10 million in humanitarian assistance in the wake of deadly flooding. Lolita Lebron, a Puerto Rico independence activist whod spent 25 years in prison for participating in a gun attack on the U.S. Congress in 1954, died in San Juan at age 90.

Five years ago: Japans Imperial Household Agency released a digital version of Emperor Hirohitos radio address on Aug. 15, 1945, announcing his countrys surrender in World War II; the digital recording offered clearer audio, although Hirohito spoke in an arcane form of Japanese that many of his countrymen would have found difficult to comprehend. British singer and TV host Cilla Black, 72, died in Estepona (eh-steh-POH-nah) in southern Spain.

One year ago: President Donald Trump intensified pressure on China to reach a trade deal by warning he would impose 10% tariffs on Sept. 1 on the remaining $300 billion in Chinese imports that he hadnt already taxed.

Todays Birthdays: Singer Ramblin Jack Elliott is 89. Former Sen. Alfonse DAmato, R-N.Y., is 83. Actor Giancarlo Giannini is 78. Basketball Hall of Fame coach Roy Williams is 70.

Blues singer-musician Robert Cray is 67. Singer Michael Penn is 62. Rock singer Joe Elliott (Def Leppard) is 61. Rock singer-musician Suzi Gardner (L7) is 60. Rapper Chuck D (Public Enemy) is 60. Actor Jesse Borrego is 58. Actor Demian Bichir is 57. Rapper Coolio is 57. Actor John Carroll Lynch is 57. Rock singer Adam Duritz (Counting Crows) is 56. Movie director Sam Mendes is 55. Country singer George Ducas is 54. Country musician Charlie Kelley is 52. Actress Jennifer Gareis is 50. Actor Charles Malik Whitfield is 48. Actress Tempestt Bledsoe is 47. Actor Jason Momoa is 41. Actress Honeysuckle Weeks is 41. Singer Ashley Parker Angel is 39. Actress Taylor Fry is 39. Actor Elijah Kelley is 34. Actor James Francis Kelly is 31. Actress Ella Wahlestedt is 22.

See more here:
Today in History: Today is Saturday, Aug. 1, the 214th day of 2020. - wausaupilotandreview.com

Global Quantum Information Processing Market 2025 Real Time Analysis & Forecast of COVID 19 Impact on Top Manufacturers: 1QB Information…

This detailed and meticulously composed market research report on the Quantum Information Processing market discussed the various market growth tactics and techniques that are leveraged by industry players to make maximum profits in the Quantum Information Processing market even amidst pandemic situation such as COVID-19.

The various components and growth propellants such as dominant trends, existing challenges and restrictions as well as opportunities have also been discussed at length. The report is designed to guide the business decisions of various companies and research experts who look forward to market profitable decisions in the Quantum Information Processing market.

The study encompasses profiles of major companies operating in the Quantum Information Processing Market. Key players profiled in the report includes:1QB Information TechnologiesAirbusAnyon SystemsCambridge Quantum ComputingD-Wave SystemsGoogleMicrosoftIBMIntelQC WareQuantumRigetti ComputingStrangeworksZapata Computing

We Have Recent Updates of Quantum Information Processing Market in Sample [emailprotected] https://www.orbismarketreports.com/sample-request/84594?utm_source=Puja

Global Quantum Information Processing market research report presentation demonstrates and presents an easily understandable market depiction, lending crucial insights on market size, market share as well as latest market developments and notable trends that collectively harness growth in the global Quantum Information Processing market.

Scope of the ReportThis aforementioned Quantum Information Processing market has recorded a growth valuation of xx million US dollars in 2019 and is also likely to show favorable growth worth xx million US dollars throughout the forecast tenure until 2024, clocking at an impressive CAGR of xx% through the forecast period.

By the product type, the market is primarily split into HardwareSoftware

By the end-users/application, this report covers the following segments BFSITelecommunications and ITRetail and E-CommerceGovernment and DefenseHealthcareManufacturingEnergy and UtilitiesConstruction and EngineeringOthers

Browse Full Report with Facts and Figures of Quantum Information Processing Market Report at @ https://www.orbismarketreports.com/global-quantum-information-processing-market-growth-analysis-by-trends-and-forecast-2019-2025?utm_source=Puja

For better and superlative comprehension of the Quantum Information Processing market by leading market players and participants striving to strike a profitable growth trail in the Quantum Information Processing market during 2020-26.

Understanding Regional Scope of the Keyword Market: Additionally, the report serves as a convenient guide to design and implement potential growth steering activities across select regional pockets in the Quantum Information Processing market. Frontline players and their effective growth strategies are also enlisted in the report to emulate growth.

North America (U.S., Canada, Mexico) Europe (U.K., France, Germany, Spain, Italy, Central & Eastern Europe, CIS) Asia Pacific (China, Japan, South Korea, ASEAN, India, Rest of Asia Pacific) Latin America (Brazil, Rest of L.A.) Middle East and Africa (Turkey, GCC, Rest of Middle East)

Do You Have Any Query or Specific Requirement? Ask Our Industry [emailprotected] https://www.orbismarketreports.com/enquiry-before-buying/84594?utm_source=Puja

Seven Pointer Guide for Report Investment A complete documentation of historical, current events as well as future predictions concerning market value and volume Leading industry best practices and growth friendly initiatives by dominant players A thorough, in-depth analytical review of the Quantum Information Processing market A complete synopsis of major market events and developments A methodical reference of the dominant alterations in market dynamics A detailed take on market events, developments as well as tactical business decisions An illustrative reference point determining market segmentation

Further in its subsequent sections of the report, this mindful presentation of the Quantum Information Processing market lends vital details on regional scope and development sprees highlighting potential growth spots.

The report also is a collective hub to identify both upstream and downstream market developments and events comprising raw material sourcing as well as downstream demand prospects that harness an agile growth prognosis in the Quantum Information Processing market.

About Us :

With unfailing market gauging skills, has been excelling in curating tailored business intelligence data across industry verticals. Constantly thriving to expand our skill development, our strength lies in dedicated intellectuals with dynamic problem solving intent, ever willing to mold boundaries to scale heights in market interpretation.

Contact Us :

Hector CostelloSenior Manager Client Engagements4144N Central Expressway,Suite 600, Dallas,Texas 75204, U.S.A.Phone No.: USA: +1 (972)-362-8199 | IND: +91 895 659 5155

Read more from the original source:
Global Quantum Information Processing Market 2025 Real Time Analysis & Forecast of COVID 19 Impact on Top Manufacturers: 1QB Information...

How to unearth the different scams in Cryptocurrency Exchanges? – YourStory

With a rise in the tendency to make a quick buck, Cryptocurrency Exchanges have emerged in different parts of the globe courtesy friendly regulations and crashes in financial markets. As the number of users and volume of trades reaches new heights, it is important to take precautionary measures from scams. Scams rob not only funds but also the reputation of cryptocurrencies.

Investors can avoid the above scams and stay safe by installing top-notch security features in their respective accounts. Taking steps such as two-factor authentication, reserving funds in cold wallets, double-checking cryptocurrency addresses before finalizing deals, and keeping their private keys safely with themselves will go a long way in preventing the occurrence of such dangerous scams.

Want to make your startup journey smooth? YS Education brings a comprehensive Funding Course, where you also get a chance to pitch your business plan to top investors. Click here to know more.

Read more here:
How to unearth the different scams in Cryptocurrency Exchanges? - YourStory

What is On-the-Fly Memory Encryption? – Electropages

The importance of hardware security is ever-growing, and designers are continually developing new ways to implement such measures. What is on-the-fly RAM encryption, and what problems can it solve?

For the longest time, attacks on devices often came from a software point of view whereby an attacker would use code exploits, or bugs in an OS to gain access to sensitive data. While hardware attacks have existed for as long as hardware has been around, they were far rarer than their software counterparts. A classic example of a simple hardware attack on older Windows machines is when an attacker can reboot the machine, gain entry into the Windows boot menu, and start-up in an admin account with full privileges. While some may consider this an OS exploit (which it is), it requires access to the physical computer. This type of attack is known as a side-channel attack as it bypasses security measures without needing to interact with them.

However, the increase of IoT devices sees a whole new range of hardware attacks thanks to poor design and high payoffs. But hardware attacks are often about gaining entry to protected data or taking control of software via the use of hardware. These types of attacks are particularly difficult to stop as software-based security can do very little against them. Software is not real and cannot affect the world outside it, whereas hardware is real. As a result, designers have begun integrating hardware security into CPUs, SoCs, microcontrollers, and boards to protect devices from hardware attacks.

Read More

The hardware security field is still in its infancy (when compared to software security), but has already made leaps and bounds. The most basic form of hardware security comes in the form of tamper pins which detect when an attacker has attempted to demount an IC. Once identified, a software subroutine can be called, which could be made to wipe all internal data. Another form of hardware security comes in the form of cryptographic accelerators which are special units that perform specialised encryption algorithms. These units are immutable, and as a result, can defend against hardware attacks that may try to monitor buses. But one emerging technology that could see use in the future is the use of on-the-fly RAM encryption. What does this do, and what attacks can it defend against?

Read More

Random Access Memory, or RAM, is an area of memory in a computer that is used to hold temporary data. However, the term temporary is incredibly loose, as RAM is used to keep everything from running programs to sensitive data. Because of this, many CPUs deploy privilege levels that prevent an application from accessing the RAM of other processes. Therefore, an operation launched by an attacker cannot peek into the RAM contents of a bank app and obtain usernames, passwords, and additional personal information. However, RAM is incredibly weak against hardware attacks, and attackers can get around privilege levels using such an attack.

When RAM is turned off, it loses the contents of its memory, but this can take minutes depending on its temperature. To make matters worse, most processors do not wipe RAM when rebooting which means that a computer which is quickly turned off and on forces it to reboot, but preserves the contents of RAM. Therefore, an attacker can reduce the temperature of RAM (using compressed air), increase the longevity of the memory, load a custom OS on a flash drive, and have it dump the contents of RAM (which are now entirely unprotected), and store it into a text file. Since RAM can be used to hold private keys, passwords, and much more, the attacker has a wealth of potentially sensitive information with minimal effort. How can such a system be protected against?

Read More

One method to protect against such an attack is to implement on-the-fly RAM encryption. While this is still incredibly rare in the industry (but does exist), the contents of RAM are encrypted meaning that even if an attacker can dump the contents into a file, the results would be encrypted. Specialised cryptographic accelerators can load bytes from RAM and decode them in real-time for the CPU to read.

The use of memory encryption requires the use of a private key that should change on each boot of the CPU. Storing this key in RAM would be counter-intuitive, which is why such a system could utilise internal registers instead. The advantage of this is that most CPUs reset all their registers when they first boot meaning that an attacker could not retrieve the encryption key used to encrypt the RAM. However, on-the-fly encryption does have its shortfalls; the strong the encryption the longer it takes to read from RAM. This is also problematic for systems needing DMA as all data needs to be encrypted/decrypted before being transferred.

Read More

On-the-fly encryption of RAM could provide future systems with high-degrees of security that not only prevent processes from accessing areas of RAM that they shouldnt but wouldnt even be able to decode the data if they did. However, it may be a form of protection that is far too complex for most applications, including IoT, where price and size are essential.

Read more:
What is On-the-Fly Memory Encryption? - Electropages

Security, privacy, and cloud: 3 examples of why research matters to IT – The Enterprisers Project

When youre busy running around putting out fires, its easy to dismiss research as something that may be interesting for university professors and their students but doesnt exactly merit bandwidth from a busy IT professional. While its almost certainly true that it shouldnt be a primary focus, I hope to convince you that it deserves at least a little bit of your attention.

Previously,Ive written about why quantum computingin general and quantum-resistant cryptography in particular, even in their early stages, are of more than academic interest to anyone charting the future course of a technology-focused organization. Here, Im going to take you through a few of the forward-looking topics covered in the newestRed Hat Research Quarterly issueand connect them to challenges that IT professionals face today.

[ How can automation free up more staff time for innovation? Get the free eBook:Managing IT with Automation. ]

The cryptography that underpins much of software security is critical and is certainly the subject of a great deal of ongoing research. The issue even contains an article by Vojtch Polek that describes research into transforming easy to remember passwords into secure cryptographic keys using derivation functions. However, of perhaps more immediate interest to IT pros is Martin Ukrops usability research.

For the past few years, Ukrop, a PhD candidate at the Centre for Research on Cryptography and Security at Masaryk University in the Czech Republic, has conducted experiments at theDevConf.czopen source event. These experiments revolve around X.509 certificates, their generation, validation, and understanding. Ukrop explains this focus: Nowadays, most developers need secure network connections somewhere in their products. Today, that mostly means using TLS [Transport Layer Security], which, in turn, most likely means validating the authenticity of the server by validating its certificate. Furthermore, it turns out that understanding all the various quirks and corners of certificate validation is far from straightforward. OpenSSL, one of the most widely used libraries for TLS, has almost 80 distinct error states related only to certificate validation.

About 20 percent of the participants considered both a self-signed certificate and one with violated name constraints as "looking OK"or better.

One experiment, conducted in 2018, which would likely be relevant to many developers, involved investigating how much developers trust flawed TLS certificates. They were presented with certificate validation errors, asked to investigate the issue, assess the connections trustworthiness, and describe the problem in their own words. Ukrops conclusion was that some certificate cases were overtrusted. For example, about 20 percent of the participants considered both a self-signed certificate and one with violated name constraints as looking OK or better; most security professionals would disagree.

Ukrops work aims to improve security usability for developers; the work in progress can be found athttps://x509errors.org. However, in the meantime it suggests that training developers to better deal with certain types of security errors might have a good payoff.

Another area of interest to IT leaders,which Ive written about previously, relates to the complications associated with balancing data sharing needs with privacy protection. That was the topic of an interview that Sherard Griffin, a director at Red Hat in the AI Center of Excellence conducted with James Honaker and Merc Crosas of Harvard University. Honaker is a researcher at the Harvard John A. Paulson School of Engineering and Applied Sciences, while Crosas is Chief Data Science and Technology Officer at Harvards Institute for Quantitative Social Science.

Griffin lays out a common challenge faced by many organizations including his own. The datasets we needed from a partner to create certain machine learning models had to have a fair amount of information. Unfortunately, the vendor had challenges sharing that data, because it had sensitive information in it. In Harvards case, it is a challenge they face with Dataverse, which Crosas describes as a software platform enabling us to build a real data repository to share research datasets. The emphasis is on publishing datasets associated with research that is already published. Another use of the platform is to create datasets that could be useful for research and making them available more openly to our research communities.

Differential privacy works by adding a small amount of noise sufficient to drown out the contribution of any one individual in the dataset.

Harvards approach to guaranteeing individual privacy when a shared dataset like Dataverse is exposed to researchers: Use differential privacy. Its a relatively new technique which came out of work primarily by Cythia Dwork in 2006 but is starting to see widespread use, including by the US Census Bureau in 2020. So its certainly not of just academic interest at this point.

Differential privacy works by adding a small amount of noise sufficient to drown out the contribution of any one individual in the dataset. Making it harder to tease out individual data points from an aggregated set isnt a new thing of course. The difference is that differential privacy approaches privacy guarantees in a mathematically rigorous way.

As Honaker puts it: The point is to balance that noise exactly [between making the data useless and exposing individual data points]; thats why the ability to reason formally about these algorithms is so important. Theres a tuning parameter called Epsilon. If an adversary, for example, has infinite computational power, knows algorithmic tricks that havent even been discovered yet, Epsilon tells you the worst case leakage of information from a query. Some of the ongoing research in this area involves the tuning of that parameter and dealing with cases where that parameter can get used up by repeated queries.

[ Check out our primer on 10 key artificial intelligence terms for IT and business leaders:Cheat sheet: AI glossary. ]

The final topic that Ill touch on here is AIOps, which Red Hats Marcel Hild researches in the Office of the CTO. This emerging area recognizes that open sourcecode is only a part of whats needed to implement and operate services based on that code. Hild argues that: We need to open up what it takes to stand up and operate a production-grade cloud. This must not only include architecture documents, installation, and configuration files, but all the data that is being produced in that procedure: metrics, logs, and tickets. Youve probably heard the AI mantra that data is the new gold multiple times, and there is some deep truth about it. Software is no longer the differentiating factor: its the data.

Hild acknowledges that the term AIOps can be a bit nebulous. But he sees it as meaning to augment IT operations with the tools of AI, which can happen on all levels, starting with data exploration. If a DevOps person uses a Jupyter notebook to cluster some metrics, I would call it an AIOps technique. He adds that the road to the self-driving cluster is paved with a lot of data labeled data.

Fittingly, much of this research is itself taking place in the open, such as with the evolving open cloud community at theMass Open Cloud. All discussions happen in public meetings and, even better, are tracked in a Git repository, so we can involve all parties early in the process and trace back how we came to a certain decision. Thats key, since the decision process is as important as the final outcome. All operational data will be accessible, and it will be easy to run a workload there and to get access to backend data, writes Hild.

To read more about these examples, read back issues, orsign up for a complimentary subscriptionto Red Hat Research Quarterly (print or digital).

Original post:
Security, privacy, and cloud: 3 examples of why research matters to IT - The Enterprisers Project

Meet The Scrappy Space Startup Taking Quantum Security Into Space – Forbes

Loft Orbital is helping take quantum security into space

What do you get when you combine space, lasers, photons, the laws of physics, a Fortune 100 company, the Canadian Space Agency and a scrappy space startup?

The answer, it is hoped, will be a revolution in encrypted communications. Or, at least, the start of one: a mission to test quantum security in space. Why might you want to do that? Let me explain, with the help of a scrappy space startup and a seriously clued-up quantum security boffin.

The Fortune 100 company involved here is Honeywell, the prime contractor for the Canadian Space Agency's Quantum Encryption and Science Satellite mission, QEYSSat. The aim? Quite simply to put space-based quantum key distribution (QKD) to the test. More of that in a moment, but first, let's meet the scrappy space startup.

Loft Orbital is a company that specializes in deploying and operating space infrastructure as a service. Using its Payload Hub technology, Loft Orbital takes a "Yet Another Mission" or YAM approach to payloads with a hardware and software stack to enable plug and play sensors on a standard microsatellite platform.

QEYSSat is, I am informed, the largest contract since Loft Orbital was founded in 2017. By coincidence, the same year that the Chinese Academy of Sciences launched a similar QKD program using the Micius satellite.

So, why should you give a rat's behind if it's all been done before? Because, dear reader, QKD is a nascent technology, so every new test program will, almost inevitably, unlock further and valuable information. A few years is a very long time in quantum technology, to bastardize the political idiom.

There are a bunch of differences between the older Micius approach to QKD and that which QEYSSat is taking. For a start, QEYSSat is aiming to be less than 20% the size of the Micius satellite and will leverage commercial technology. Hence the involvement of Loft Orbital. Does size matter? You betcha. Reductions in size of that scale should lead to significant savings in both cost and time as far as the next generation of test projects is concerned. Size and mass will also be key if you'll forgive the pun, as any QKD implementation at scale will demand a large satellite constellation.

Ultimately, if all goes according to plan, QEYSSat could have broad-reaching impacts as it should prove the capability to deliver QKD over much longer distances than the current ground to ground tests have managed to date. "This mission will demonstrate game-changing technology with far-reaching implications for how information will be shared and distributed in the future," says Loft Orbital CEO, Pierre-Damien Vaujour, "we are honored and thrilled to be supporting it."

Time, I think, to bring in my friendly quantum security expert, mathematician and security researcher, Dr. Mark Carney, who you may remember helped me explain why the math says Person Woman Man Camera TV made such a lousy password. Dr. Carney has a particular interest in quantum key distribution threat modeling, so makes the ideal guide to what we can expect, or not, from the QEYSSat mission.

"There are four ways quantum affects security," Dr. Carney begins, "quantum computers break classical algorithms, post-quantum algorithms try to get around this by using harder math problems in classical crypto, quantum algorithms can be used to accelerate decisions (popular in quantum finance, but nobody in infosec has really looked at what algorithms can help where), and QKD, that uses quantum effects to do cryptography, bypassing the need for 'mathematical crosswords' altogether."

Still with me, good? Because it gets a little more complicated from this point on.

The algorithms that drive QKD are oldish, and the most popular and well-established, BB84 and E91, primarily work in the same way.

"Because regular cryptography goes over regular networks, it is fully error corrected," Dr. Carney says, "the security is in the underlying math. As such, it can be packet-switched without any consequence."

What has all this got to do with QKD in space? I'm getting there, and so is Dr. Carney. "The problem with QKD is that packet switching is somewhere between very very hard and basically impossible," he says, "because unlike the security of classical crypto being in the math, the security of QKD is in the physical photon state."

Time to get your just accept this at face value head screwed on: if you observe a photon, the quantum effects you are using disappear and you may as well just use classical crypto because it is much better at being transmitted in the clear.

So, if not packet switching, then what? "You need a direct fiber link to do light photon-based QKD between every single endpoint you want to exchange a key with," Dr. Carney explains. One major manufacturer of QKD fiber solutions produces building-to-building link equipment so that the internal security of the network is the only concern of the QKD keys produced. "This is where satellites turn out to be really handy," says Dr. Carney, "send up one satellite, and have a load of users communicate with that, and no need to build dozens or hundreds of fiber links."

If you have a laser array and a laser receiver, you can send pulses of photons up to satellites and still do QKD, albeit with higher error rates due to atmospheric diffusion of light that cannot be avoided. Dr. Carney will come back to that shortly, I'm sure.

"Another advantage of space is that you don't need fiber repeaters," he says, "and for distances of over 14km, single fiber connections get kind of useless." There are fiber repeater network designs for QKD, but these are not necessarily immune to tampering, so breaking the trust modeling according to Dr. Carney.

"I mentioned error and atmospheric dispersion on uplink before," Dr. Carney reminds me, as much as bad weather doesn't actually affect cloud computing, cloud cover certainly affects QKD! Dispersion on the way down is also an issue, and targeting your downlink comms is also hard."

It turns out that getting the aperture of that link down to a minimum seems like a tough problem. "I don't think the calculations are favorable if your downlink laser disperses over a broad area," Dr. Carney adds, "Eve would just have to plant a small mirror on your fence or carefully park another satellite quietly next to yours," to break the threat model once more.

Dr. Carney is of the opinion that "going into space solves a few problems, but also introduces others." Not least because QKD has a fundamental problem which is hard to solve under any circumstance: all of the security is in the physicality of the system. "One foot wrong," Dr. Carney says, "and you can fail pretty badly very quickly."

As for the Chinese Micius program and what that taught us about QKD in space, the latest I heard was a June 2020 paper published in Nature that explained "entanglement-based QKD between two ground stations separated by 1,120 kilometers at a finite secret-key rate of 0.12 bits per second, without the need for trusted relays." That paper claims the methods used increased the on the ground secure distance tenfold and increased the "practical security of QKD to an unprecedented level."

And what of Loft Orbital, which seems to think that this new QKD technology should be available to the private sector, and adopted at scale, in the 2030s? Dr. Carney doesn't have a problem with that as a date for adoption, given that Loft Orbital is demonstrating how microsats are getting ever easier to launch.

"Adopted at scale," he says, "this is I think the kicker. There seem to be a lot of variables in the mix that don't have easy engineering solutions. Unless you are launching a satellite per region and getting decent coverage with superb bandwidth to mitigate issues such as cloud cover, it's hard to see how the cost viability is maintained."

One thing is for sure, this is a move forward, and it will be interesting to see where all this takes us. Especially with "private equity making investments that heretofore were only really of interest and in reach of nation-states," Dr. Carney concludes.

Follow this link:
Meet The Scrappy Space Startup Taking Quantum Security Into Space - Forbes

Quantum Cryptography Market Size, Share, Analysis, Demand, Applications, Sale, Growth Insight, Trends, Leaders, Services and Forecast to 2025 – Market…

The Quantum Cryptography Market report upholds the future market predictions related to Quantum Cryptography market size, revenue, production, Consumption, gross margin, and other substantial factors. It also examines the role of the prominent Quantum Cryptography market players involved in the industry including their corporate overview. While emphasizing the key driving factors for the Quantum Cryptography market, the report also offers a full study of the future trends and developments of the market.

Get sample copy of Quantum Cryptography Market report @ https://www.adroitmarketresearch.com/contacts/request-sample/958

Quantum Cryptography Market boons an in-depth synopsis of the competitive landscape of the market globally, thus helping establishments understand the primary threats and prospects that vendors in the market are dealt with. It also incorporates thorough business profiles of some of the prime vendors in the market. The report includes vast data relating to the recent discovery and technological expansions perceived in the market, wide-ranging with an examination of the impact of these intrusions on the markets future development.

Top Leading Key Players are:

ID Quantique, MagiQ Technologies, Infineon Technologies, QuintenssenceLabs, Crypta Labs, ISARA, Toshiba, Microsoft, IBM, HP, PQ Solutions, and Qubitekk.

Browse the complete report @ https://www.adroitmarketresearch.com/industry-reports/quantum-cryptography-market

This Quantum Cryptography market report provides description about the complete market analysis with inputs from industry experts. Furthermore, businesses can decide upon the strategies about the product, customer, key player, sales, promotion or marketing by acquiring a detailed analysis of competitive markets. The research and analysis performed in this Quantum Cryptography report assists clients to forecast investment in an emerging market, expansion of market share or success of a new product. A comprehensive analysis of the market structure along with the forecast of the various segments and sub-segments of the market have been delivered through this Quantum Cryptography market report.

Based on application, the market has been segmented into:

NA

This crucial research report on Global Quantum Cryptography Market is an in-depth and crucial extensive market presentation presented meticulously to derive optimum understanding on market developments as well as the growth factors, dynamics, in the form of growth drivers, restraints, threats, challenges and the like that have a thumping catalytic impact on onward growth trail of Quantum Cryptography market.

This research documentation built on the basis of in-depth market analysis is aiming at offering report readers with accurate, market specific synopsis of the industry, evaluating it across dynamics and touchpoint analysis, thus shedding ample light on various classifications, industry chain review, dynamic applications, besides harping largely on overall competitive scenario, including leading market players, their growth objectives, long and short term business goals, a thorough evaluation of their tactical business moves, winning business strategies as well as investment details that cohesively influence onward growth trail of the Quantum Cryptography market besides positioning themselves in an advantageous manner in global Quantum Cryptography market.

Global Quantum Cryptography Market Report Provides Comprehensive Analysis of Following:-Market segments and sub-segments Industry size & shares-Market trends and dynamics Market Drivers and Opportunities Supply and demand of world Quantum Cryptography industry Technological inventions in Quantum Cryptography trade-Marketing Channel Development Trend Global Quantum Cryptography industry Positioning Pricing and Brand Strategy Distributors/Traders List enclosed in Positioning Quantum Cryptography Market

For Any Query on the Quantum Cryptography Market: https://www.adroitmarketresearch.com/contacts/enquiry-before-buying/958

About Us :

Adroit Market Research is an India-based business analytics and consulting company. Our target audience is a wide range of corporations, manufacturing companies, product/technology development institutions and industry associations that require understanding of a markets size, key trends, participants and future outlook of an industry. We intend to become our clients knowledge partner and provide them with valuable market insights to help create opportunities that increase their revenues. We follow a code- Explore, Learn and Transform. At our core, we are curious people who love to identify and understand industry patterns, create an insightful study around our findings and churn out money-making roadmaps.

Contact Us :

Ryan JohnsonAccount Manager Global3131 McKinney Ave Ste 600, Dallas,TX 75204, U.S.APhone No.: USA: +1 972-362 -8199 / +91 9665341414

Visit link:
Quantum Cryptography Market Size, Share, Analysis, Demand, Applications, Sale, Growth Insight, Trends, Leaders, Services and Forecast to 2025 - Market...

CGTN rehires former Ofcom and Sky News head as pressure mounts – Digital TV Europe

China Global Television Network (CGTN) has rehired a former Ofcom board member amid ongoing pressure on the regulator to revoke the state-owned broadcasters UK licence.

Over the past few months, the broadcaster has been found guilty on multiple occasions of breaching impartiality rules and airing forced confessions, and has been forced to register as a foreign agent.

Now in an effort to protect itself from further scrutiny, it has appointed Ofcoms former content board chairman Nick Pollard in an as-yet unnamed role.

Pollard was previously poached by CGTN from Sky News, where he ran the network for a decade, and was charged with heading up the broadcasters newly-opened London office. The exec was hired by CGTN one month after Ofcom opened an investigation over its broadcasting of forced confessions, and would only stay with CGTN for less than a year. His initial resignation was based on concerns over its failure to comply with UK rules on impartiality in regards to its coverage of the Hong Kong protests.

Evidently CGTN has done enough ethically or economically to convince Pollard to rejoin. Neither party commented on the appointment, but the FT reports that he has been advising the broadcaster since May.

The UK has been viewed as key to CGTNs worldwide expansion plans, with London being chosen for its third main office alongside those in Washington and Nairobi. To date, it has hired about 100 journalists to work in London.

While it looks to pick up where it left off with Pollard, CGTN is facing mounting scrutiny from Ofcom, with possible sanctions expected before the end of the year.

The regulator is considering punishments ranging from fines to the withdrawal of its broadcast licence the latter being endorsed by free speech advocates and politicians.

Peter Dahlin, director of human rights group Safeguard Defenders which has submitted a complaint to the regulator said: The best way forward is to revoke their licence to teach them that this is unacceptable. And then of course they can, according to the rules, reapply for a licence after that and restart the process.

UK shadow culture secretary Jo Stevens said: The findings against CGTN are damning and Ofcom have already said they will take action which could go as far as banning the channel from the UK airwaves. Ofcom has an ongoing duty to make sure those that hold a licence to broadcast in this country are fit and proper.

All too often TV channels run by foreign states, such as Russia Today and the Iranian Press TV, which was banned in 2012, have found themselves unable to abide by the broadcasting code. CGTN and other state-backed broadcasters have a history of flagrantly breaching the Ofcom code. While the regulator can and does impose financial penalties, these are less of a deterrent than for other TV channels. There needs to be a review of whether the current sanction regime is sufficient.

Go here to see the original:

CGTN rehires former Ofcom and Sky News head as pressure mounts - Digital TV Europe