{"id":44600,"date":"2020-10-01T00:48:53","date_gmt":"2020-10-01T04:48:53","guid":{"rendered":"https:\/\/www.opensource.im\/uncategorized\/under-the-dragons-thumb-chinese-heft-in-vpns-and-indias-vulnerability-in-a-quantum-computing-era-economic-times.php"},"modified":"2020-10-01T00:48:53","modified_gmt":"2020-10-01T04:48:53","slug":"under-the-dragons-thumb-chinese-heft-in-vpns-and-indias-vulnerability-in-a-quantum-computing-era-economic-times","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/quantum-computing\/under-the-dragons-thumb-chinese-heft-in-vpns-and-indias-vulnerability-in-a-quantum-computing-era-economic-times.php","title":{"rendered":"Under the dragons thumb: Chinese heft in VPNs and Indias vulnerability in a quantum-computing era &#8211; Economic Times"},"content":{"rendered":"<p><p>Concept by Muhabit ul haq<\/p>\n<p>India, a booming hub of user data, is among the most exposed in the world to cyberattacks. While it ranks second in VPN usage globally, more than half of free VPN apps available over the Internet in the country have Chinese links. Given Indias volatile relation with its neighbour, securing users data from Chinese clutches should be a top priority.<\/p>\n<p>The hunger of a dragon is slow to wake, but hard to sate.  Ursula K Le Guin.Kevin Kane and his team of five at Ambit Inc., a US-based post-quantum network-security startup founded in 2019, have been working to create a quantum-resistant virtual private network (VPN) application. The reason: Chinas near-monopoly in the worlds free VPN market and the vulnerability of traditional security infrastructure in the dawning era of quantum computing.<\/p>\n<p>BY<\/p>\n<p>AbcSmall<\/p>\n<p>AbcMedium<\/p>\n<p>AbcLarge<\/p>\n<p>Access the exclusive Economic Times stories, Editorial and Expert opinion<\/p>\n<p>Already a  Member? Sign In now<\/p>\n<p>Sharp Insight-rich, Indepth stories across 20+ sectors<\/p>\n<p>Access the exclusive Economic Times stories, Editorial and Expert opinion<\/p>\n<p>Clean experience withMinimal Ads<\/p>\n<p>Comment & Engage with ET Prime community<\/p>\n<p>Exclusive invites to Virtual Events with Industry Leaders<\/p>\n<p>A trusted team of Journalists & Analysts who can best filter signal from noise<\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Originally posted here:<br \/>\n<a target=\"_blank\" href=\"https:\/\/economictimes.indiatimes.com\/prime\/technology-and-startups\/under-the-dragons-thumb-chinese-heft-in-vpns-and-indias-vulnerability-in-a-quantum-computing-era\/primearticleshow\/78396701.cms\" title=\"Under the dragons thumb: Chinese heft in VPNs and Indias vulnerability in a quantum-computing era - Economic Times\" rel=\"noopener noreferrer\">Under the dragons thumb: Chinese heft in VPNs and Indias vulnerability in a quantum-computing era - Economic Times<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Concept by Muhabit ul haq India, a booming hub of user data, is among the most exposed in the world to cyberattacks. While it ranks second in VPN usage globally, more than half of free VPN apps available over the Internet in the country have Chinese links. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[27372],"tags":[],"class_list":["post-44600","post","type-post","status-publish","format-standard","hentry","category-quantum-computing"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/44600"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=44600"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/44600\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=44600"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=44600"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=44600"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}