{"id":32678,"date":"2017-07-25T16:44:20","date_gmt":"2017-07-25T20:44:20","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/soon-to-launch-communications-network-said-to-be-unhackable-newser.php"},"modified":"2017-07-25T16:44:20","modified_gmt":"2017-07-25T20:44:20","slug":"soon-to-launch-communications-network-said-to-be-unhackable-newser","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/soon-to-launch-communications-network-said-to-be-unhackable-newser.php","title":{"rendered":"Soon-to-launch communications network said to be &#8216;unhackable&#8217; &#8211; Newser"},"content":{"rendered":"<table border=\"0\" cellpadding=\"2\" cellspacing=\"7\"><tr><td width=\"80\" align=\"center\" valign=\"top\"><a href=\"http:\/\/news.google.com\/news\/url?sa=t&amp;fd=R&amp;ct2=us&amp;usg=AFQjCNF07GbwO3jlvETZG2Jvjn9DblTCyw&amp;clid=c3a7d30bb8a4878e06b80cf16b898331&amp;cid=52779560068620&amp;ei=jK13WZCpNsSY3gHhqZawDw&amp;url=http:\/\/www.newser.com\/story\/246223\/china-announces-quantum-leap-in-encryption.html\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/t0.gstatic.com\/images?q=tbn:ANd9GcR7xYozhl7hdUupRunik9I-iAYEzpVkoheqN1ONJKalBdsUurkJvOBQDIqYglfiiLDiomuTcaBZ\" alt=\"\" border=\"1\" width=\"80\" height=\"80\" style=\"padding-left:10px; padding-right: 10px;\"><br>Newser<\/a><\/td><td valign=\"top\"><div><img alt=\"\" height=\"1\" width=\"1\" style=\"padding-left:10px; padding-right: 10px;\"><\/div><div><a href=\"http:\/\/news.google.com\/news\/url?sa=t&amp;fd=R&amp;ct2=us&amp;usg=AFQjCNF07GbwO3jlvETZG2Jvjn9DblTCyw&amp;clid=c3a7d30bb8a4878e06b80cf16b898331&amp;cid=52779560068620&amp;ei=jK13WZCpNsSY3gHhqZawDw&amp;url=http:\/\/www.newser.com\/story\/246223\/china-announces-quantum-leap-in-encryption.html\"><b>Soon-to-launch communications network said to be 'unhackable'<\/b><\/a><br><b>Newser<\/b><br>These aren't real people, but rather the names commonly used in scenarios describing quantum cryptography, a type of technology surpassing traditional <b>encryption<\/b> in terms of keeping communications networks safe from hackers. It's a technology that <b>...<\/b><br><a href=\"http:\/\/news.google.com\/news\/url?sa=t&amp;fd=R&amp;ct2=us&amp;usg=AFQjCNGOo_HZDk_hob8yqs74v8ZXlzjjAQ&amp;clid=c3a7d30bb8a4878e06b80cf16b898331&amp;cid=52779560068620&amp;ei=jK13WZCpNsSY3gHhqZawDw&amp;url=https:\/\/futurism.com\/chinas-new-quantum-communication-network-will-be-unhackable\/\">China's New Quantum Communication Network Will Be Unhackable<\/a><nobr>Futurism<\/nobr><br><a href=\"http:\/\/news.google.com\/news\/url?sa=t&amp;fd=R&amp;ct2=us&amp;usg=AFQjCNFx7xrvpmuXRCQZjOIpYOcN0nzvDw&amp;clid=c3a7d30bb8a4878e06b80cf16b898331&amp;cid=52779560068620&amp;ei=jK13WZCpNsSY3gHhqZawDw&amp;url=https:\/\/edgylabs.com\/unhackable-chinese-communication-network-soon\/\">Unhackable Chinese Communication Network Launches Soon<\/a><nobr>Edgy Labs (blog)<\/nobr><br><a href=\"http:\/\/news.google.com\/news\/url?sa=t&amp;fd=R&amp;ct2=us&amp;usg=AFQjCNFVpUpum5Y5deX6RnEOQAcrvQQpuw&amp;clid=c3a7d30bb8a4878e06b80cf16b898331&amp;cid=52779560068620&amp;ei=jK13WZCpNsSY3gHhqZawDw&amp;url=http:\/\/www.ladbible.com\/news\/technology-news-china-to-launch-unhackable-quantum-computer-network-20170725\">China To Launch 'Unhackable' Quantum Computer Network<\/a><nobr>LADbible (blog)<\/nobr><br><a href=\"http:\/\/news.google.com\/news\/url?sa=t&amp;fd=R&amp;ct2=us&amp;usg=AFQjCNEvkoPpe31Dynna1WuszaNAAvfdDA&amp;clid=c3a7d30bb8a4878e06b80cf16b898331&amp;cid=52779560068620&amp;ei=jK13WZCpNsSY3gHhqZawDw&amp;url=http:\/\/www.livemint.com\/Technology\/UyaRz49kyis1RdgWhLXM9M\/China-set-to-launch-unhackable-internet-communication-rep.html\"><nobr>Livemint<\/nobr><\/a>&nbsp;-<a href=\"http:\/\/news.google.com\/news\/url?sa=t&amp;fd=R&amp;ct2=us&amp;usg=AFQjCNHAK32wNL0d2NJdxIT6ces1O7hjiw&amp;clid=c3a7d30bb8a4878e06b80cf16b898331&amp;cid=52779560068620&amp;ei=jK13WZCpNsSY3gHhqZawDw&amp;url=http:\/\/www.ibtimes.co.uk\/china-set-launch-unhackable-messaging-network-using-quantum-cryptography-1631922\"><nobr>International Business Times UK<\/nobr><\/a>&nbsp;-<a href=\"http:\/\/news.google.com\/news\/url?sa=t&amp;fd=R&amp;ct2=us&amp;usg=AFQjCNEZd2XsgzBJzBwK_eM9gYSD7QSXLw&amp;clid=c3a7d30bb8a4878e06b80cf16b898331&amp;cid=52779560068620&amp;ei=jK13WZCpNsSY3gHhqZawDw&amp;url=https:\/\/news4c.com\/new-invincible-communications-network-made-in-china\/\"><nobr>News4C<\/nobr><\/a><br><a href=\"http:\/\/news.google.com\/news\/more?ncl=dDI6FbymCmrA6UMcN4pmW4EnAiryM&amp;authuser=0&amp;ned=us\"><nobr><b>all 11 news articles&nbsp;&raquo;<\/b><\/nobr><\/a><\/div><\/td><\/tr><\/table><p><!-- Auto Generated --><\/p><p>Excerpt from:<br><a target=\"_blank\" href=\"http:\/\/www.newser.com\/story\/246223\/china-announces-quantum-leap-in-encryption.html\" title=\"Soon-to-launch communications network said to be 'unhackable' - Newser\">Soon-to-launch communications network said to be 'unhackable' - Newser<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p> Newser Soon-to-launch communications network said to be &#39;unhackable&#39; Newser These aren&#39;t real people, but rather the names commonly used in scenarios describing quantum cryptography, a type of technology surpassing traditional encryption in terms of keeping communications networks safe from hackers. It&#39;s a technology that ..<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-32678","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/32678"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=32678"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/32678\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=32678"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=32678"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=32678"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}