Fujitsu Has a 1 Million Qubit Digital Emulated Quantum Annealing System in the Lab and 8192 Qubits Commercially Available

Fujitsu has a Digital Annealer with 8192 Qubits and a 1 million qubit system in the lab. This is a classical hardware emulation of quantum annealing (analog) system. This is not a quantum computer but hardware emulation. David Worral, Head of Quantum Technologies at Cambridge Quantum Computing, indicated that Fujitsu has a 1 million qubit …

Read more

Cambridge Quantum Random Key Generation and Encryption

Cambridge Quantum Computing has a demo of its quantum key security generation at Ironbridgeapi.com. Above is a picture of a quantum random key generation device IronBridge is the world’s first commercially available certifiable Quantum Cryptographic Device. IronBridge addresses major security challenges and vulnerabilities in today’s infrastructure and has important structural implications for cybersecurity and quantum …

Read more

US Military Will Use Big Brother Monitoring Technology to Track All Movement in the USA

The US Military will conduct high altitude MESH networking radar tests over South Dakota to provide a persistent surveillance system to locate and deter narcotic trafficking and homeland security threats. High altitude balloons will fly at twice the altitude of passenger jets and use radar to simultaneously track many individual vehicles day or night, through …

Read more

Thought Transparent World and Privacy

Facebook has created devices that read all the words of your inner voice and Elon Musk’s Neuralink is creating brain-computer interfaces (BCI) that will have thousands and later millions of nodes. Temporarily mitigating remote mind-reading of your inner voice could involve headphones for music and distractions of your own thoughts to less sensitive topics. However, …

Read more

How You Walk and Hold Your Device Could Replace Passwords

The Defense Information Systems Agency (DISA) is looking at 46 ways to identify a person for mobile devices that do not involve passwords. They are looking at how you walk, swipe and hold your device among other methods to not use passwords. Continuous multi-factor authentication (CMFA) will run seamlessly in the background allowing access through …

Read more

DARPA Wants to Include Scalable Defense Mechanisms into Chip Designs

Cybersecurity threats have moved from high in the software stack to towards the underlying hardware. The rise of the Internet of Things (IoT) has driven the creation of a rapidly growing number of accessible devices and a multitude of complex chip designs needed to enable them. With this rapid growth comes increased opportunity for economic …

Read more

Tencent Keen Security Lab Tricks Tesla Autopilot into Oncoming Traffic

Tesla Autopilot recognizes lanes and assists control by identifying road traffic markings. Tencent Keen Labs proved that by placing interference stickers on the road, the Autopilot system will capture this information and make an abnormal judgment, which causes the vehicle to enter into the reverse lane. Tesla stated “a driver can easily override Autopilot at …

Read more

Tesla Cars With Autopilot 2+ Hardware Will Watch Over the Car in Sentry Mode

Elon Musk tweeted that Tesla is working on Sentry Mode for 360° dashcam surveillance. The car cameras will record activity like someone hitting a Tesla car parked in a parking lot. More software and storage will be used to activate more cameras for always-on monitoring for good and bad uses. Since it’s part of safety …

Read more

DARPA Creating Physically Provable Assurances Around Data Security and Privacy

DARPA is seeking to create new software and hardware architectures that provide physically provable assurances around data security and privacy. Keeping a system completely disconnected from all means of information transfer is an unrealistic security tactic. Modern computing systems must be able to communicate with other systems, including those with different security requirements. Today, commercial …

Read more