tag:blogger.com,1999:blog-35251307168292354822024-02-19T12:58:11.976+11:00Ric RichardsonOfficial Web site of Inventor Ric RichardsonUnknownnoreply@blogger.comBlogger707125tag:blogger.com,1999:blog-3525130716829235482.post-25233608410223861972017-11-12T19:00:00.001+11:002017-11-12T19:00:23.900+11:00Could Satoshi Kill Bitcoin?<div class="separator" style="clear: both; text-align: center;">
<a href="https://encrypted-tbn3.gstatic.com/images?q=tbn:ANd9GcTPxKeBEr1n4zLFzrsoPLvjdPwt-4A3W5xM8P2XTVI86ofEKHyc2wxbNNg_" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="314" data-original-width="469" src="https://encrypted-tbn3.gstatic.com/images?q=tbn:ANd9GcTPxKeBEr1n4zLFzrsoPLvjdPwt-4A3W5xM8P2XTVI86ofEKHyc2wxbNNg_" /></a></div>
As I start to really understand Bitcoin’s underlying technologies, I have more and more respect for its designer. It really is Nobel Prize worthy stuff.<br />
<br />
But I also wonder about the 1 million Bitcoin Satoshi has mined and kept in wallets unused for many years now. Most people assume that he has abandoned them as coins generated to prove the network actually works. Logical.<br />
<br />
But what if?<br />
<br />
On another note, he may not like the way his baby has developed. It’s become a speculators paradise.<br />
<br />
Satoshi may be agitated by the complete lack of progress in using it for what it is…. A trading currency for trading, NOT just another get-rich-quick psuedo commodity.<br />
<br />
So what could he do?<br />
<br />
Dump his 1 million bitcoin….. That's what. He could just start to release amounts large enough to stop the price escalation or he could dump a large tranche just to scare everyone into sensibility.<br />
<br />
Sobering thought that.<br />
<br />
As I start to get inside the thinking of this wonderful design, I don’t think Satoshi would do anything so drastic, but it does give one cause to pause. When perception and greed defines the value of something, its potential for value collapse is very very significant.<br />
<div>
<br /></div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3525130716829235482.post-35101323883617895252017-10-23T20:08:00.000+11:002017-10-25T09:56:03.578+11:00Update: Ramifications of quantum advances on security<div class="separator" style="clear: both; text-align: center;">
<a href="https://d1o50x50snmhul.cloudfront.net/wp-content/uploads/2016/08/31180000/bbcrezqu1103-800x533.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="533" data-original-width="800" height="213" src="https://d1o50x50snmhul.cloudfront.net/wp-content/uploads/2016/08/31180000/bbcrezqu1103-800x533.jpg" width="320"></a></div>
<div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;">
<span style="font-family: Arial; font-size: 11pt; vertical-align: baseline; white-space: pre-wrap;">Things are moving so fast in the quantum computer field that it's hard to gauge what is the current state of the art. The </span><a href="https://news.microsoft.com/features/new-microsoft-breakthroughs-general-purpose-quantum-computing-moves-closer-reality/" style="text-decoration-line: none;"><span style="color: #1155cc; font-family: Arial; font-size: 11pt; text-decoration-line: underline; vertical-align: baseline; white-space: pre-wrap;">news that Microsoft has been making major advances</span></a><span style="font-family: Arial; font-size: 11pt; vertical-align: baseline; white-space: pre-wrap;"> in the field, for example, is more about the practicality of writing software for and providing production grade hardware components for what is at its core still very much an experimental technology. On the other hand, the recent news that Russian researchers have broken the 50 qubit threshold is of major significance to security professionals particularly.</span></div>
<b style="font-weight: normal;"><br></b>
<div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: Arial; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">As a result, this article is an attempt to shed some light on the current state of the art in quantum computing and to give some background and context so that someone with limited technical knowledge can understand the main issues.</span></div>
<b style="font-weight: normal;"><br></b>
<div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: Arial; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Questions I’ll try and answer include:</span></div>
<ol style="margin-bottom: 0pt; margin-top: 0pt;">
<li dir="ltr" style="background-color: transparent; color: black; font-family: Arial; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: decimal; text-decoration: none; vertical-align: baseline;"><div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: Arial; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">What is quantum computing in simple terms?</span></div>
</li>
<li dir="ltr" style="background-color: transparent; color: black; font-family: Arial; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: decimal; text-decoration: none; vertical-align: baseline;"><div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: Arial; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Why can’t everybody build there own quantum computer?</span></div>
</li>
<li dir="ltr" style="background-color: transparent; color: black; font-family: Arial; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: decimal; text-decoration: none; vertical-align: baseline;"><div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: Arial; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Why is it particularly powerful in breaking encryption?</span></div>
</li>
<li dir="ltr" style="background-color: transparent; color: black; font-family: Arial; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: decimal; text-decoration: none; vertical-align: baseline;"><div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: Arial; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">What is the significance of the 50 qubit threshold?</span></div>
</li>
<li dir="ltr" style="background-color: transparent; color: black; font-family: Arial; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: decimal; text-decoration: none; vertical-align: baseline;"><div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: Arial; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">What are the ramifications for the next 3-5 years?</span></div>
</li>
<li dir="ltr" style="background-color: transparent; color: black; font-family: Arial; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: decimal; text-decoration: none; vertical-align: baseline;"><div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: Arial; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">How does Haventec fit into this future?</span></div>
</li>
</ol>
<h3 dir="ltr" style="line-height: 1.38; margin-bottom: 4pt; margin-top: 16pt;">
<span style="background-color: transparent; color: #434343; font-family: Arial; font-size: 13.999999999999998pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">What is quantum computing in simple terms?</span></h3>
<div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: Arial; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Traditional computers use switches made of silicon that is either on or off (binary). Quantum computers use subatomic particles that can be in multiple states at once. An excellent way of explaining this phenomenon is to think of a switch as if it was a sphere. </span><a href="http://www.wired.co.uk/article/quantum-computing-explained" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-family: Arial; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">A qubit can be thought of like an imaginary sphere</span></a><span style="background-color: transparent; color: black; font-family: Arial; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">. Whereas a classical bit can be in two states - at either of the two poles of the sphere - a qubit can be any point on the sphere. This means a computer using these bits can store a huge amount more information using less energy than a classical computer. With quantum computers and position on the sphere can be used to as a value. Additionally, each sphere can have multiple values at the same time. To illustrate, a traditional 20-bit data string can have any value from 0 to 2^20 or 1,048,576. But remember that is 20 bits to represent just 1 value. A 20 qubit computing device can handle 1,000,000 values </span><span style="background-color: transparent; color: black; font-family: Arial; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 700; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">at the same time!</span><span style="background-color: transparent; color: black; font-family: Arial; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> As a layman to me it appears like quantum computers are not as flexible as traditional computers but once they get their teeth into a problem, they really get a move on. Which is great for big conundrum’s like molecular calculation but very dangerous when it comes to code breaking. We’ll go into this later but it is </span><a href="https://security.stackexchange.com/questions/87345/how-many-qubits-are-needed-to-factor-2048-bit-rsa-keys-on-a-quantum-computer" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-family: Arial; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">reported that a 28 qubit computer was used to break a public key</span></a><span style="background-color: transparent; color: black; font-family: Arial; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> using a factoring algorithm and achieved in 1 hour what it would take 78 million standard computer hours to accomplish. Thankfully 128-bit keys are used very little these days.</span></div>
<div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: Arial; font-size: 11pt; font-variant-caps: normal; font-variant-ligatures: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"><i><br></i></span></div>
<div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: Arial; font-size: 11pt; font-variant-caps: normal; font-variant-ligatures: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"><i>Note: DWave is a company that uses a simplified approach t quantum computer design that allows them to bost a very high qubit capacity but is not considered competitive with traditional quantum computer designs.</i></span></div>
<h3 dir="ltr" style="line-height: 1.38; margin-bottom: 4pt; margin-top: 16pt;">
<span style="background-color: transparent; color: #434343; font-family: Arial; font-size: 13.999999999999998pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Why can’t everybody build there own quantum computer?</span></h3>
<div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: Arial; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">The physics around quantum computing are complex as is the computation. The big issue seems to be the unstable nature of qubits. From what I understand you need to </span><a href="https://www.sciencealert.com/watch-quantum-computing-explained-in-less-than-2-minutes" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-family: Arial; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">get the qubits very cold to make them stable</span></a><span style="background-color: transparent; color: black; font-family: Arial; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> (ie run the computer at a fraction of a degree above absolute zero or -</span><span style="background-color: white; color: #222222; font-family: Arial; font-size: 12pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">273.15</span><span style="background-color: transparent; color: black; font-family: Arial; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> C) and still you need to do a lot of error checking even then to make sure you are getting reliable results. You can’t do this stuff with a homemade freezer and a server cluster in your garage. Only sizeable enterprise level or state level resources can play in this field… which has its pros and cons. Pro’s in that the technology is beyond your garden variety organised crime or black hat hacker group, but Con’s in that even these large organisations are just as likely to fall prey to hack attacks where the resources are still at least temporarily accessible by attackers.</span></div>
<h3 dir="ltr" style="line-height: 1.38; margin-bottom: 4pt; margin-top: 16pt;">
<span style="background-color: transparent; color: #434343; font-family: Arial; font-size: 13.999999999999998pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Why is it particularly powerful in breaking encryption?</span></h3>
<div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: Arial; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Today's most popular encryption relies on related keys known as asymmetric keys. Commonly this type of encryption is called public key encryption.</span></div>
<b style="font-weight: normal;"><br></b>
<div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: Arial; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Symmetric keys (where the password is the same for both sending and receiving parties) are pretty safe from quantum attack in assessments so far but any type of asymmetric key system (where public/ private key PAIRS are used) that uses factorisation and large prime numbers are easy work for quantum computers. </span></div>
<b style="font-weight: normal;"><br></b>
<div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: Arial; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">The basic weakness is that if you know the public key of a key pair, quantum computers incredible power can use brute force to determine the private or secret key </span><span style="background-color: transparent; color: black; font-family: Arial; font-size: 11pt; font-style: italic; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">in a flash</span><span style="background-color: transparent; color: black; font-family: Arial; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">. This is very serious. For example, as I mentioned in the previous heading a quantum computer was used to break a public key in 1 hour what it would normally take 78 million standard computer hours to accomplish! When you read the article you will find that this achievement was accidental but it underscores the incredible power that is bearing down on us if we want to protect our privacy and our personal information.</span></div>
<b style="font-weight: normal;"><br></b>
<div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: Arial; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">The encryption that protects every client-server connection on the internet today is called TLS version 1.2 (usually you will see HTTP(s) in the URL if you are using TLS) and it uses factor based public keys. It is estimated that 120 qubit computers could break every HTTPS connection made today in 2 seconds or less. </span></div>
<b style="font-weight: normal;"><br></b>
<div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: Arial; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Nothing you do, your passwords, your bank accounts, your emails, none of it, would be secure. A new version called </span><a href="https://www.feistyduck.com/bulletproof-tls-newsletter/issue18_version_intolerance_tls_google_uses_post_quantum_cryptography.html" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-family: Arial; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">TLS 1.3 is being rolled out to try and move to a quantum resistant </span></a><span style="background-color: transparent; color: black; font-family: Arial; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">non-standard factorisation dependant approach.</span></div>
<h3 dir="ltr" style="line-height: 1.38; margin-bottom: 4pt; margin-top: 16pt;">
<span style="background-color: transparent; color: #434343; font-family: Arial; font-size: 13.999999999999998pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">What is the significance of the 50 qubit threshold?</span></h3>
<div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: Arial; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">For some time the turning point for quantum computers to start to outperform supercomputers has been a 50 qubit quantum computer. This point is known as the point of “Quantum Supremacy” and was </span><a href="https://edgylabs.com/russia-51-qubit-quantum-computer-icqt/" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-family: Arial; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">achieved recently by a Russian researcher and team</span></a><span style="background-color: transparent; color: black; font-family: Arial; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> from Harvard University. More particularly the advance means that an approach to encryption cracking called </span><a href="https://en.wikipedia.org/wiki/Quantum_supremacy" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-family: Arial; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">“Shor’s Algorithm</span></a><span style="background-color: transparent; color: black; font-family: Arial; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">” can be used to very efficiently break standard public key encryption in a way that is beyond standard or classical computers and even supercomputers. From here the acceleration of capability will be an order of magnitude.</span></div>
<h3 dir="ltr" style="line-height: 1.38; margin-bottom: 4pt; margin-top: 16pt;">
<span style="background-color: transparent; color: #434343; font-family: Arial; font-size: 13.999999999999998pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">What are the ramifications of Quantum Computing for the next 3-5 years?</span></h3>
<div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: Arial; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">So, in summary, there are few limiting factors on how dangerous Quantum computer will be in their use to attack encryption over the next 3-5 years.</span></div>
<ol style="margin-bottom: 0pt; margin-top: 0pt;">
<li dir="ltr" style="background-color: transparent; color: black; font-family: Arial; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: decimal; text-decoration: none; vertical-align: baseline;"><div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: Arial; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">The technology is VERY finicky to control so will be only usable in the short term by large organisations such as IBM or nation states and their agencies such as the NSA.</span></div>
</li>
<li dir="ltr" style="background-color: transparent; color: black; font-family: Arial; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: decimal; text-decoration: none; vertical-align: baseline;"><div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: Arial; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Using a very much </span><span style="background-color: transparent; color: black; font-family: Arial; font-size: 11pt; font-style: italic; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">research oriented technology</span><span style="background-color: transparent; color: black; font-family: Arial; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> for a concerted encryption breaking exercise in the short term is not a priority for any of the players at the moment.</span></div>
</li>
<li dir="ltr" style="background-color: transparent; color: black; font-family: Arial; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: decimal; text-decoration: none; vertical-align: baseline;"><div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: Arial; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">As soon as a quantum computer show reliable progress in breaking a standard public key system with today's standard key length, agencies such as the NSA and their Russian and Chinese counterparts will start to throw significant resources into production-ising the technology for a critical eavesdropping advantage.</span></div>
</li>
<li dir="ltr" style="background-color: transparent; color: black; font-family: Arial; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: decimal; text-decoration: none; vertical-align: baseline;"><div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: Arial; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">With the above in mind, there is a reason to believe that there are many initiatives TODAY in preparation for reliable encryption cracking. For example any secure communications in use today can be recorded then stored for decryption as soon as the technology arrives.</span></div>
</li>
<ol style="margin-bottom: 0pt; margin-top: 0pt;">
<li dir="ltr" style="background-color: transparent; color: black; font-family: Arial; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: lower-alpha; text-decoration: none; vertical-align: baseline;"><div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: Arial; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">With this in mind, it would be prudent to not store critical data that will have long-term value outside of 2-4 years using anything but quantum resistant encryption such as symmetric keys or POST-quantum public key encryption.</span></div>
</li>
<li dir="ltr" style="background-color: transparent; color: black; font-family: Arial; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: lower-alpha; text-decoration: none; vertical-align: baseline;"><div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: Arial; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Also, it would be prudent to design information systems to ensure that as few as possible quantum exploit holes exist in your system architecture. Lots of advances will be made in quantum resistant encryption over coming years and it will be good practise to ensure that it is easy to find and keep your encryption protocols updated.</span></div>
</li>
</ol>
<li dir="ltr" style="background-color: transparent; color: black; font-family: Arial; font-size: 11pt; font-variant-ligatures: normal; font-variant-caps: normal; font-variant-east-asian: normal; font-variant-position: normal; font-weight: 400; list-style-type: decimal; text-decoration: none; vertical-align: baseline;"><div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;">
<span style="font-style: normal; background-color: transparent; color: black; font-family: Arial; font-size: 11pt; font-variant-ligatures: normal; font-variant-caps: normal; font-variant-east-asian: normal; font-variant-position: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Also be ready for some major advances to accelerate the technology in an unexpected way. For example, quantum stabilization at higher temperatures will allow thousands of more researchers to work with quantum computers. Even as I write this article researchers in Japan have radically increased the performance of quantum computers by </span><a href="https://www.japantimes.co.jp/news/2017/09/24/national/science-health/university-tokyo-pair-invent-loop-based-quantum-computing-technique/#.We2nhxOCxP0" style="font-style: normal; text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-family: Arial; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">cycling information in a continuous loop of qubits</span></a><span style="font-style: normal; background-color: transparent; color: black; font-family: Arial; font-size: 11pt; font-variant-ligatures: normal; font-variant-caps: normal; font-variant-east-asian: normal; font-variant-position: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">. Things will happen sooner rather than later. </span><span style="background-color: transparent; color: black; font-family: Arial; font-size: 11pt; font-variant-ligatures: normal; font-variant-caps: normal; font-variant-east-asian: normal; font-variant-position: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"><i>Note: within days of writing this a <a href="http://www3.imperial.ac.uk/newsandeventspggrp/imperialcollege/newssummary/news_24-10-2017-16-15-59" title="">room temperature </a>approach was devised. Amazing. </i></span></div>
</li>
<li dir="ltr" style="background-color: transparent; color: black; font-family: Arial; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: decimal; text-decoration: none; vertical-align: baseline;"><div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: Arial; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Another reality to consider is that the illegal use of quantum capability will become more of a possibility over time. The ability for a hacker to penetrate a quantum computer centre and use it for hacking activities is a very real possibility and should not be discounted.</span></div>
</li>
</ol>
<b style="font-weight: normal;"><br></b>
<div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: Arial; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">An example of a pervasive quantum weakness is the Bitcoin blockchain. While the blockchain itself uses quantum resistant algorithms and a user's public key is not recorded as part of the blockchain, the fact is that a user's public key is disclosed to blockchain miners for use in verifying the signed transaction data. If an adversary was to record these interactions with miners of Bitcoin then they could come back with the help of a relatively little amount of time using a quantum computer to</span><span style="background-color: transparent; color: black; font-family: Arial; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 700; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> empty every wallet ever used</span><span style="background-color: transparent; color: black; font-family: Arial; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> on the Bitcoin blockchain where the owner has made a payment from their wallet and has left a balance of coins in their wallet. The only current remediation is to change your wallet key pair every time you want to pay someone. You have to do this by moving the unused coin to a completely new wallet. Scary stuff.</span></div>
<h3 dir="ltr" style="line-height: 1.38; margin-bottom: 4pt; margin-top: 16pt;">
<span style="background-color: transparent; color: #434343; font-family: Arial; font-size: 13.999999999999998pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">How does Haventec fit into this future?</span></h3>
<div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: Arial; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">As part of our hardening and intrusion testing regimen, Haventec has worked with some of the best cryptographic minds in the world including the designer of Androids cryptographic technologies and white hat hackers from some of the world's top intrusion testing firms. We can supply details under confidentiality agreements.</span></div>
<b style="font-weight: normal;"><br></b>
<div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: Arial; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">This advantage exposed us to some of the realities of the quantum world even way back when we first engineered Haventec’s core technology. For example, we are not dependant on any specific flavour of public key technology and can easily switch in POST quantum encryption as it becomes available. We also use a number of non-public key based encryption techniques such as advanced obfuscation, symmetric key encryption and single-use keys such as one time codes.</span></div>
<b style="font-weight: normal;"><br></b>
<div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: Arial; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">The simple fact that Haventec allows every enterprise to securely communicate with every one of their customers without storing or using a single password is an example of how forward-thinking the design is. Even though we currently do rely on TLS for our client-server connections, none of our communications contains any information that is usable after the current or next transaction.</span></div>
<br>
<div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: Arial; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Our client-side data security storage called Sanctum is also symmetric key based where the key is rotating with every use. All Haventec’s technologies are quantum resistant from the ground up.</span></div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3525130716829235482.post-67354853614435863132017-10-17T21:27:00.003+11:002017-10-17T21:29:36.385+11:00Background info for ON Tribe Forum 2017 today Tuesday 18th October 2018<div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;">
<span style="font-family: "arial"; font-size: 11pt; white-space: pre-wrap;">I am writing this post in support of the talk I am scheduled to give tomorrow at the On Tribe Forum regarding “How to find your Free-Range-Chook”. </span><span style="font-family: "arial"; font-size: 11pt; white-space: pre-wrap;">Michelle Carter, who asked me to speak, has heard my bird analogy and thought it might be worth sharing, but it sure doesn't help explain what I'm talking about! I hope everyone is intrigued enough to stay and work out what it's about… in fact, it’s a principle which I have used for most of my mature business life so I hope it ends up being useful for everyone else.</span></div>
<b style="font-weight: normal;"><br /></b>
<br />
<div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">During the talk, I hope to get lots of feedback from the audience so I can zero in on what is most important to everyone, but I will be mentioning two books that I found very helpful and may be worth looking at in the context of our discussion.</span></div>
<b style="font-weight: normal;"><br /></b>
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://images-na.ssl-images-amazon.com/images/I/513PXm-edXL.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="500" data-original-width="324" height="200" src="https://images-na.ssl-images-amazon.com/images/I/513PXm-edXL.jpg" width="129" /></a></div>
<div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 700; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Now discover your strengths by Marcus Buckingham</span><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> is really important for Aussies in particular as we often don’t realise how powerful our strengths are, but this also means that we may have weaknesses that preclude us from ever being effective in other areas of our business life. Reading and implementing this book was probably the most influential single factor in my business success and happiness at work.</span></div>
<div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;">
<a href="https://www.amazon.com/Discover-Your-Strengths-Marcus-Buckingham/dp/0743518144" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">https://www.amazon.com/Discover-Your-Strengths-Marcus-Buckingham/dp/0743518144</span></a></div>
<b style="font-weight: normal;"><br /></b>
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://dhfreedman.files.wordpress.com/2012/02/corps_business.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="137" data-original-width="97" height="200" src="https://dhfreedman.files.wordpress.com/2012/02/corps_business.jpg" width="141" /></a></div>
<div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">The other book is</span><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 700; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> Corps Business by Freedman</span><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">. This book has lots of interesting things in it. Firstly let me say I am not interested in warfare or politics for that matter, but handling a life-threatening situation shows when an approach will work or fail. The specific chapter I will refer to in the book will be talking about “End State” thinking. About how to work back from the desired goal to achieve it in the shortest possible number of steps, or how to find the right people to help you get there.</span></div>
<div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;">
<a href="https://www.amazon.com/Corps-Business-Management-Principles-Marines/dp/0066619793/ref=sr_1_1?s=books&ie=UTF8&qid=1508235066&sr=1-1&keywords=business+corp" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">https://www.amazon.com/Corps-Business-Management-Principles-Marines/dp/0066619793/ref=sr_1_1?s=books&ie=UTF8&qid=1508235066&sr=1-1&keywords=business+corps</span></a></div>
<br />
<div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Hope this helps.</span></div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3525130716829235482.post-64690284318590085762017-10-02T17:21:00.000+11:002017-10-02T17:24:13.531+11:00Why mobile authentication IS NOT and WILL not cut it<a href="http://www.techiemode.com/wp-content/uploads/2013/08/mobile-authentication-300.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" src="http://www.techiemode.com/wp-content/uploads/2013/08/mobile-authentication-300.png" data-original-height="300" data-original-width="300" /></a><br />
<div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;">
<span style="font-family: "arial"; font-size: 11pt; vertical-align: baseline; white-space: pre-wrap;">Quite a bit of discussion came up after my article on Double Octopus and TokenOne who both rely on mobile authentication. For the uninitiated </span><span style="font-family: "arial"; font-size: 11pt; font-style: italic; vertical-align: baseline; white-space: pre-wrap;">mobile authentication</span><span style="font-family: "arial"; font-size: 11pt; vertical-align: baseline; white-space: pre-wrap;"> is the use of a mobile phone for primary or secondary authentication/ logon. </span></div>
<b style="font-weight: normal;"><br /></b>
<br />
<div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">So here are my top reasons that mobile authentication will not cut it:</span></div>
<b style="font-weight: normal;"><br /></b>
<br />
<div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 700; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Reason 1: No one uses it today even though all the big companies have mobile authentication systems</span></div>
<div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Google Authenticator is the most widely distributed and used mobile authentication app but…. look for it in the app stores top downloads list. It does not appear in the top 200 list for any market. And using the rule that there are 1,000 downloads for every comment then it’s a dead man walking. On top of that, I downloaded Google Authenticator so I am a downloaded but I only used it once. It feels like getting my keys out every time I want to go on a website. I wonder if any of the people touting mobile authentication have used it! Note: Google claims millions of downloads but I can’t find any place to verify this.</span></div>
<b style="font-weight: normal;"><br /></b>
<br />
<div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 700; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Reason 2: not everyone has a phone and not everyone with a phone has it with them all the time.</span></div>
<div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">According to PEW RESEARCH, only 77% of Americans have smartphones. Everyone can use a PIN. 1 out of 4 DO NOT have a smartphone. Sorry but to have to support multiple systems across any system let alone a banking system is too much of a big ask. It’s unfair to even ask them to consider it.</span></div>
<b style="font-weight: normal;"><br /></b>
<br />
<div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 700; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Reason 3: Mobile authentication sounds good in principle but is it really secure?</span></div>
<div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">One of the rules of security is to have multiple factors in a secure authentication (ie two or more) of a) something you know b) something you have c) something you are. A PIN is </span><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: italic; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">something you know</span><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> and identifies the user… if your phone is </span><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: italic; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">something you have</span><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> but there is no PIN then you are only getting one factor… not good practice… Haventec Auth combines the user's PIN with a device identifying rolling private key so even though there is only one action the process is true multi-factor AND if you use thumbprint biometrics to trigger your PIN then you can substitute the “</span><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: italic; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">something you are</span><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">” for a little more convenience.</span></div>
<b style="font-weight: normal;"><br /></b>
<br />
<div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Additionally, security firm Sophos reports that 67% of smartphone user's do not have password or PIN protected access to their phones. This alarming figure means that anyone who can access a target's phone can log on without knowing anything except their account name. The more I write this the more concerned I get. Even Google only uses mobile authentication as a secondary credential behind a username and a password, so using only a phone authentication is pretty dangerous.</span></div>
<b style="font-weight: normal;"><br /></b>
<br />
<div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">If you are going to use the </span><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: italic; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">“something you have” </span><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">credential as your primary or even ONLY credential then you need to use something that is a lot easier to protect than a phone that gets left on a desk or in a purse or with a friend. Something small and constantly on your person… something… but that’s for another blog and something I’m trying to talk my team into considering soon.</span></div>
<b style="font-weight: normal;"><br /></b>
<div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">---- Quote from comment on Double Octopus vs Haventec article ----</span><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"><br class="kix-line-break" /></span></div>
<div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">I am not sure I 100% agree.</span><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"><br class="kix-line-break" /></span><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> </span><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"><br class="kix-line-break" /></span><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">I think the elderly represent a very small percentage of a banks customer base and if they have needed to do a transaction over the last decade they have already encountered a dongle, an sms or a push notification. Although I accept someone may have helped – they have already overcome this hurdle. The new elderly (ie: people becoming elderly) have been using a mobile phone for a long time to facetime/whatsapp family and friends and do banking transactions. I am also not sure they are the core target market for many other services that rely on authentication (ie: dropbox, amazon, ebay, instacart, gmail etc).</span><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"><br class="kix-line-break" /></span><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> </span><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"><br class="kix-line-break" /></span><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">I think that the dongle was terrible as you only needed it for a transaction. Today, people have their phone with them 24/7 for a wide range of reasons: calls, whatsapp, facebook, email etc etc. Plus they have been taught that it is a requirement for a banking transaction. As a result, using it as a step in authentication is not so scary if it actually solves the security flaws associated with the current methodologies out there. Secret Double Octopus seems to have removed most if not all of those security flaws. Not sure that sharing a computer matters with their solution – I can’t see a reason why that would impact their implementation.</span><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"><br class="kix-line-break" /></span><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> </span><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"><br class="kix-line-break" /></span><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">The thing I liked the most was how they balanced security and user experience. Not needing a 4 digit pin per application was a big plus for me.</span><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"><br class="kix-line-break" /></span><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> </span><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"><br class="kix-line-break" /></span><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">To be clear, I also very much like the Haventec solution and my comments are really just about the use of a phone in the process.</span><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"><br class="kix-line-break" /></span><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> </span><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"><br class="kix-line-break" /></span><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Cheers</span><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"><br class="kix-line-break" /></span><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">G</span></div>
<br />
<div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">----- End of quote -----</span></div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3525130716829235482.post-84666453251108939942017-09-26T17:43:00.001+10:002017-09-26T17:43:36.872+10:00Microsoft plans to own quantum computing like it owns Windows PCs - PCWorld<img src='https://ifttt.com/images/no_image_card.png' style='max-width:586px;' /><br />
<div>Microsoft plans to own quantum computing like it owns Windows PCs - PCWorld http://ift.tt/2yEaNXb</div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3525130716829235482.post-45578713298511420562017-09-26T17:35:00.005+10:002017-09-26T17:35:26.991+10:00Yubico's new authentication key is super tiny and works with USB-C ports<img src='https://cdn.vox-cdn.com/thumbor/GD3krRg6wou8wcgyHT4eUfEokOk=/0x0:6000x4000/1310x873/cdn.vox-cdn.com/uploads/chorus_image/image/56813481/yubikey.0.jpg' style='max-width:586px;' /><br />
<div>Yubico's new authentication key is super tiny and works with USB-C ports http://ift.tt/2wNcYdP</div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3525130716829235482.post-5662504069065442202017-09-26T17:35:00.003+10:002017-09-26T17:35:26.252+10:00An iceberg four times the size of Manhattan broke off a glacier in Antarctica<img src='https://cdn.vox-cdn.com/thumbor/VwbrtMNTYOv43uW0qkv9guy0Ze8=/0x62:831x616/1310x873/cdn.vox-cdn.com/uploads/chorus_image/image/56845243/pineislandglacier.0.jpg' style='max-width:586px;' /><br />
<div>An iceberg four times the size of Manhattan broke off a glacier in Antarctica http://ift.tt/2fuyvQZ</div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3525130716829235482.post-42755479897900782012017-09-26T17:35:00.001+10:002017-09-26T17:35:25.501+10:00Japanese researchers work out theoretical universal quantum computer that could scale to millions of qubits - Next Big Future<img src='https://www.nextbigfuture.com/wp-content/uploads/2017/09/8626c0cc396aca5f3b940779eba46b16.png' style='max-width:586px;' /><br />
<div>Japanese researchers work out theoretical universal quantum computer that could scale to millions of qubits - Next Big Future http://ift.tt/2htcGSr</div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3525130716829235482.post-31175192050002099012017-09-26T09:27:00.003+10:002017-09-26T09:27:19.432+10:00One Of The World's Biggest Accounting Firms Hacked After Basic Security Goof<img src='https://i.kinja-img.com/gawker-media/image/upload/t_large/dlf477mkviuvp7entyki.jpg' style='max-width:586px;' /><br />
<div>One Of The World's Biggest Accounting Firms Hacked After Basic Security Goof http://ift.tt/2wOVNsh</div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3525130716829235482.post-41409162844105188902017-09-26T09:27:00.001+10:002017-09-26T09:27:08.835+10:00How to Stop the Next Equifax-Style Megabreach—Or At Least Slow It Down<img src='https://media.wired.com/photos/59b71f9904afdc5248726b58/master/pass/SafetyFirst-FA-106682971.jpg' style='max-width:586px;' /><br />
<div>How to Stop the Next Equifax-Style Megabreach—Or At Least Slow It Down http://ift.tt/2wXGWKn</div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3525130716829235482.post-22586506604984054942017-09-26T09:25:00.001+10:002017-09-26T09:25:20.009+10:00Cloudflare's Unlimited DDoS Protection Won't Kill Off Botnets For Good<img src='https://media.wired.com/photos/59c81232d5750f210e8ea41a/master/pass/Cloudflare-FA-613744314.jpg' style='max-width:586px;' /><br />
<div>Cloudflare's Unlimited DDoS Protection Won't Kill Off Botnets For Good http://ift.tt/2xrrd7F</div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3525130716829235482.post-72646297120231602542017-09-24T18:51:00.001+10:002017-09-24T18:51:47.223+10:00The West Coast is finally getting an earthquake early warning system<img src='https://ifttt.com/images/no_image_card.png' style='max-width:586px;' /><br />
<div>The West Coast is finally getting an earthquake early warning system http://ift.tt/2wF0Lrv</div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3525130716829235482.post-8877844005347556372017-09-24T18:42:00.001+10:002017-09-24T18:42:57.780+10:00Some brave soul volunteered for a completely robotic dental surgery<img src='https://ifttt.com/images/no_image_card.png' style='max-width:586px;' /><br />
<div>Some brave soul volunteered for a completely robotic dental surgery http://ift.tt/2xXKePB
<div><img src="http://ift.tt/2xp4pmC" title="Some brave soul volunteered for a completely robotic dental surgery" /><br />
<div>
<div class="article-text c-gray-1 no-review">
<p>Prior to the <a href="http://ift.tt/2rucrLd">surgery</a>, the robot was oriented to the patient's head and mouth and researchers then programmed the device with all of the necessary information for it to complete the procedure. That included the angles and depth required for accurate placement of the implants. After testing the programmed movements, the operation was carried out. It took about an hour and though medical staff were present during the <a href="http://ift.tt/2wKbaQU">procedure</a>, none of them assisted the robot while it worked. Afterwards, the staff determined that the robot had implanted the <a href="http://ift.tt/2gvtva0">teeth</a> with high precision.</p>
<p>Due to a dentist shortage, <em>South China Morning Post</em> reports that while around 400 million people need dental implants in the country, only about one million are done each year. Further, when people turn to less qualified individuals in order to get needed dental work done, they often end up with additional problems. Robots stand to increase service rates and complete operations with fewer errors.</p>
<p>I'm not sure what's scarier -- a human dentist or a robot dentist. But you can check out the video below for some shots of the robot in action.</p>
<p>VIDEO</p>
</div>
</div>
</div>
</div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3525130716829235482.post-27221426239578043782017-09-24T18:41:00.001+10:002017-09-24T18:41:31.376+10:00Climbkhana: Ken Block explains Pikes Peak assault in latest Gymkhana video<img src='https://ifttt.com/images/no_image_card.png' style='max-width:586px;' /><br />
<div>Climbkhana: Ken Block explains Pikes Peak assault in latest Gymkhana video http://ift.tt/2xo5ET3 <img src="http://ift.tt/2wbkqLe" />By Carter Jung Climbkhana is clever. And no, not because it's a portmanteau. Rather it's how Ken Block and his merry band of Hoonigan Media Machine misfits took something the internet clearly loves, hooning, and paired it with a picturesque mountain...
<div><a href="http://ift.tt/2hp6Y0g"><img border="0" src="http://ift.tt/2hp5hDx" /></a> <a href="http://ift.tt/2hp6Yxi"><img border="0" src="http://ift.tt/2hmIgBe" /></a> <a href="http://ift.tt/2hp6Z4k"><img border="0" src="http://ift.tt/2hmYPx9" /></a> <a href="http://ift.tt/2hp6ZBm"><img border="0" src="http://ift.tt/qlaaXf" /></a></div>
<img width="1" alt="" src="http://ift.tt/2hmYQ4b" height="1" /></div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3525130716829235482.post-82551303755550642542017-09-24T18:29:00.001+10:002017-09-24T18:29:37.123+10:00Aire security drone roams the home on its own<img src='https://assets.feedblitz.com/images/blank.gif' style='max-width:586px;' /><br />
<div>Aire security drone roams the home on its own http://ift.tt/2jI17r4
<p><img alt="The Aire drone is claimed to detect and avoid obstacles in every direction" src="http://ift.tt/2wunhDt" /></p>
<p>Security cameras that let you <a href="http://ift.tt/2rTbOdv">check in on your home</a> using your phone are common enough these days, but how many of them can fly? Billed as a smarter home monitoring system, Aire is a self-flying robot that can be engaged remotely to provide a livestream of around the house, featuring a soft fabric exterior to avoid injuries to anybody nearby.</p>
.. Continue Reading <a href="http://ift.tt/2wunpmf">Aire security drone roams the home on its own</a><br />
<br />
<b>Category:</b> <a href="http://ift.tt/2ntz903">Drones</a><br />
<br />
<b>Tags:</b>
<ul>
<li><a rel="tag" href="http://ift.tt/2qcCANY">Camera drone</a></li>
<li><a rel="tag" href="http://ift.tt/2thF8Hy">Home Security</a></li>
<li><a rel="tag" href="http://ift.tt/2mwlCDB">Kickstarter</a></li>
</ul>
<b>Related Articles:</b>
<ul>
<li><a href="http://ift.tt/2tOLbHi">DroneSentry jamming system open for orders</a></li>
<li><a href="http://ift.tt/2rbtXTJ">World's first autonomous security vehicle with companion drone</a></li>
<li><a href="http://ift.tt/2skpw8T">Logitech's new security cam keeps watch indoors or out</a></li>
<li><a href="http://ift.tt/2rc6stI">Pentagon puts the call out to hackers to test its cyber defences</a></li>
<li><a href="http://ift.tt/2f6RvkV">August's new smart locks know when your door is left ajar</a></li>
<li><a href="http://ift.tt/2wuAtIi">Anti-UAV Defense System uses radio beam to disable drones</a></li>
</ul>
<img border="0" src="http://ift.tt/2fywP5Z" width="1" alt="" align="left" hspace="0" height="1" /></div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3525130716829235482.post-60069455198771071292017-09-24T18:28:00.001+10:002017-09-24T18:28:26.168+10:00Hypersonic flight: Threat or opportunity?<img src='https://assets.feedblitz.com/images/blank.gif' style='max-width:586px;' /><br />
<div>Hypersonic flight: Threat or opportunity? http://ift.tt/2wx9hZx
<p><img alt="Artist's concept of the X-43A" src="http://ift.tt/2yphcp0" /></p>
<p>If there's one word that keeps military planners from sleeping at night, it's "hypersonic." The ability to fly at more than five times the speed of sound holds the promise of flying to the antipodes in less time than it takes to drive across town. However, it also makes possible deadly weapons that can penetrate any defenses currently available while delivering the destructive force of a tactical nuclear weapon. So what is hypersonic flight and is its development an opportunity or a threat?</p>
.. Continue Reading <a href="http://ift.tt/2wymXDG">Hypersonic flight: Threat or opportunity?</a><br />
<br />
<b>Category:</b> <a href="http://ift.tt/2nVS3A8">Aircraft</a><br />
<br />
<b>Tags:</b>
<ul>
<li><a rel="tag" href="http://ift.tt/2ndkYQr">DARPA</a></li>
<li><a rel="tag" href="http://ift.tt/2pA5F5C">Hypersonic</a></li>
<li><a rel="tag" href="http://ift.tt/2mvsLEE">NASA</a></li>
<li><a rel="tag" href="http://ift.tt/2wf7g3H">Weapons</a></li>
</ul>
<b>Related Articles:</b>
<ul>
<li><a href="http://ift.tt/2tvmz5A">New ceramic brings hypersonic travel closer to reality</a></li>
<li><a href="http://ift.tt/2qkWx1M">Latest steel-punching, hypersonic railgun projectiles test-fired</a></li>
<li><a href="http://ift.tt/2p29z2q">Experimental hypersonic craft hits Mach 7.5</a></li>
<li><a href="http://ift.tt/2t9PoCg">Successful test flight for hypersonic glider</a></li>
<li><a href="http://ift.tt/2pAc6Wd">3D-printed engine combustor withstands hypersonic flight testing</a></li>
<li><a href="http://ift.tt/2wymYHK">X-51a test results released</a></li>
</ul>
<img border="0" src="http://ift.tt/2ypxjTt" width="1" alt="" align="left" hspace="0" height="1" /></div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3525130716829235482.post-22106434323597247262017-09-24T18:27:00.005+10:002017-09-24T18:27:45.705+10:00Yamaha shows off new house brand of e-bikes<img src='https://assets.feedblitz.com/images/blank.gif' style='max-width:586px;' /><br />
<div>Yamaha shows off new house brand of e-bikes http://ift.tt/2xSohkV
<p><img alt="Yamaha's YDX-TORC" src="http://ift.tt/2jKq1GS" /></p>
<p>Although it may be best-known for things like motorcycles, Yamaha claims to have launched the world's first electrically power assisted bicycle back in 1993. Since then, it's sold over two million electric bikes – in the Japanese market. Now, Yamaha Motor Corp USA has unveiled a new line of e-bikes that should be available at American and Japanese dealerships starting next spring.</p>
.. Continue Reading <a href="http://ift.tt/2wHuWJS">Yamaha shows off new house brand of e-bikes</a><br />
<br />
<b>Category:</b> <a href="http://ift.tt/2m65ahP">Bicycles</a><br />
<br />
<b>Tags:</b>
<ul>
<li><a rel="tag" href="http://ift.tt/2nKSMBd">Electric Bicycle</a></li>
<li><a rel="tag" href="http://ift.tt/2xopgbc">Interbike 2017</a></li>
<li><a rel="tag" href="http://ift.tt/2n17PZp">Yamaha</a></li>
</ul>
<b>Related Articles:</b>
<ul>
<li><a href="http://ift.tt/2okNnTP">Mando announces "big"-wheeled version of its Footloose chainless e-bike</a></li>
<li><a href="http://ift.tt/2wIBEiI">Interbike 2016 – stuff you might like</a></li>
<li><a href="http://ift.tt/2xp8BEt">Spinning bike wheels compress flat-filling air</a></li>
<li><a href="http://ift.tt/2wHUAOB">New device lets cyclists give manual shifting the gears</a></li>
<li><a href="http://ift.tt/2mVeBfN">Skulpt measures muscle quality and fat levels in an instant</a></li>
<li><a href="http://ift.tt/2wHYGGg">Interbike 2015 – pics of our picks</a></li>
</ul>
<img border="0" src="http://ift.tt/2jLFkiz" width="1" alt="" align="left" hspace="0" height="1" /></div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3525130716829235482.post-40735318271526567432017-09-24T18:27:00.003+10:002017-09-24T18:27:22.553+10:00Shelby Raptor shapes as the ultimate off-road truck... for a lucky few<img src='https://assets.feedblitz.com/images/blank.gif' style='max-width:586px;' /><br />
<div>Shelby Raptor shapes as the ultimate off-road truck... for a lucky few http://ift.tt/2higkhS
<p><img alt="The Shelby Raptor builds on the base of the already-tough Ford Raptor" src="http://ift.tt/2fcCwpy" /></p>
<p>Ford would argue the F-150 Raptor is the roughest, toughest production truck available on (and off) the road. Shelby American would beg to differ. The new Shelby Raptor builds on the base Raptor with more power, better off-road capability and tougher looks – but you'll need to get in quickly, with a production run of just 500.</p>
.. Continue Reading <a href="http://ift.tt/2xoUJKm">Shelby Raptor shapes as the ultimate off-road truck... for a lucky few</a><br />
<br />
<b>Category:</b> <a href="http://ift.tt/2npmwXo">Automotive</a><br />
<br />
<b>Tags:</b>
<ul>
<li><a rel="tag" href="http://ift.tt/2nDVagm">Ford</a></li>
<li><a rel="tag" href="http://ift.tt/2nGGPM6">Off-road</a></li>
<li><a rel="tag" href="http://ift.tt/2rxEghM">Shelby</a></li>
<li><a rel="tag" href="http://ift.tt/2nptF9Y">Truck</a></li>
</ul>
<b>Related Articles:</b>
<ul>
<li><a href="http://ift.tt/2xoKxS5">Sport Trac Adrenalin – supercharged V8, All-Wheel-Drive, 6-speed auto, Sport Utility Truck</a></li>
<li><a href="http://ift.tt/2wHYSWf">Sebring Tribute Roadster will be the first global turnkey Shelby</a></li>
<li><a href="http://ift.tt/2rxAeX3">Shelby lets loose a pair of supercharged Super Snakes</a></li>
<li><a href="http://ift.tt/2i3YxuR">Track-only club racing Mustang joins the paddock</a></li>
<li><a href="http://ift.tt/2fKmqXD">Original Shelby engineers give 1965 GT350R a new lease on life</a></li>
<li><a href="http://ift.tt/2wHYTJN">Shelby GR-1 set for world trip</a></li>
</ul>
<img border="0" src="http://ift.tt/2fbBfiv" width="1" alt="" align="left" hspace="0" height="1" /></div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3525130716829235482.post-27930399397614014122017-09-24T18:27:00.001+10:002017-09-24T18:27:20.849+10:00Sound waves enable blood sample analysis in minutes<img src='https://assets.feedblitz.com/images/blank.gif' style='max-width:586px;' /><br />
<div>Sound waves enable blood sample analysis in minutes http://ift.tt/2fC8Brp
<p><img alt="This illustration shows how the exosomes (represented by pink spheres) are separated from other materials by ..." src="http://ift.tt/2xTGpes" /></p>
<p>A few years ago, a team of <a href="http://ift.tt/2xwZUZh">MIT scientists developed a novel way</a> to separate blood cells using sound waves. Now the team, in conjunction with scientists from several other institutions, has taken the technology even further by demonstrating that the process can isolate exosomes from blood samples. This has the potential for a fast way to detect biomarkers for neurodegenerative diseases and cancer.</p>
.. Continue Reading <a href="http://ift.tt/2fkBtHL">Sound waves enable blood sample analysis in minutes</a><br />
<br />
<b>Category:</b> <a href="http://ift.tt/2mUiZPb">Biology</a><br />
<br />
<b>Tags:</b>
<ul>
<li><a rel="tag" href="http://ift.tt/2myYqUZ">Biomarkers</a></li>
<li><a rel="tag" href="http://ift.tt/2ntTYf6">Blood</a></li>
<li><a rel="tag" href="http://ift.tt/2mMxO3I">Cancer</a></li>
<li><a rel="tag" href="http://ift.tt/2nsnz5Q">Microfluidic</a></li>
<li><a rel="tag" href="http://ift.tt/2nfD2IF">MIT</a></li>
<li><a rel="tag" href="http://ift.tt/2poYNTs">Sound</a></li>
</ul>
<b>Related Articles:</b>
<ul>
<li><a href="http://ift.tt/2ntZy1a">Could a blood test accurately diagnose autism?</a></li>
<li><a href="http://ift.tt/2nu1OFz">Sweat-sensing wristband monitors the state of your health</a></li>
<li><a href="http://ift.tt/2myGie3">Sweat-analyzing skin patch could replace blood sampling</a></li>
<li><a href="http://ift.tt/2nu4Sld">Researchers develop new paper-based portable lab</a></li>
<li><a href="http://ift.tt/2myGhqv">Biomarker discovery points to blood test for osteoarthritis</a></li>
<li><a href="http://ift.tt/2fkBueN">Ultra-sensitive biosensor could detect diseases in their earliest stages</a></li>
</ul>
<img border="0" src="http://ift.tt/2xxjUem" width="1" alt="" align="left" hspace="0" height="1" /></div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3525130716829235482.post-69554514998968484892017-09-24T18:26:00.003+10:002017-09-24T18:26:29.660+10:00Hyperloop One gets a fresh injection of cash<img src='https://assets.feedblitz.com/images/blank.gif' style='max-width:586px;' /><br />
<div>Hyperloop One gets a fresh injection of cash http://ift.tt/2xzrS6I
<p><img alt="Hyperloop One's prototype pod at its test facility in the Nevada desert" src="http://ift.tt/2fmHlAl" /></p>
<p>There are a number of startups working on Elon Musk's Hyperloop, a tube-based travel concept that moves pods at the speed of sound, but none are gathering quite the momentum of Hyperloop One. The company has today announced US$85 million in new funding, as it looks to move forward with the development of routes around the world.</p>
.. Continue Reading <a href="http://ift.tt/2xyZDVw">Hyperloop One gets a fresh injection of cash</a><br />
<br />
<b>Category:</b> <a href="http://ift.tt/2n4Hfwr">Urban Transport</a><br />
<br />
<b>Tags:</b>
<ul>
<li><a rel="tag" href="http://ift.tt/2njKtyf">Hyperloop</a></li>
<li><a rel="tag" href="http://ift.tt/2qZ68PD">Hyperloop One</a></li>
</ul>
<b>Related Articles:</b>
<ul>
<li><a href="http://ift.tt/2p68Mxl">Hyperloop One floats 11 potential routes for first US system</a></li>
<li><a href="http://ift.tt/2n4DeYO">Hyperloop Technologies to start testing high-speed transport system next month</a></li>
<li><a href="http://ift.tt/2njpCv2">There's a new player in the Hyperloop game</a></li>
<li><a href="http://ift.tt/2njA8Th">Changing tracks: HTT reveals blueprint for cheaper and safer Hyperloop system</a></li>
<li><a href="http://ift.tt/2yauvcV">Hyperloop One challenge outlines 10 high-potential routes</a></li>
<li><a href="http://ift.tt/2sQWgEo">Hyperloop One floats vehicle above track in first full-scale test</a></li>
</ul>
<img border="0" src="http://ift.tt/2jPcTAe" width="1" alt="" align="left" hspace="0" height="1" /></div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3525130716829235482.post-45918056673964688902017-09-24T18:26:00.001+10:002017-09-24T18:26:28.552+10:00Walmart to trial delivery service that restocks your fridge<img src='https://assets.feedblitz.com/images/blank.gif' style='max-width:586px;' /><br />
<div>Walmart to trial delivery service that restocks your fridge http://ift.tt/2xyQLPB
<p><img alt="Would you trust this man in your home?" src="http://ift.tt/2xWi9Iu" /></p>
<p>Would you be comfortable with a Walmart employee wandering into your home and restocking your fridge? What if you could watch on as they did it? The retail giant is at least looking to test out this possibly unnecessary concept through a new partnership with smart home security company <a href="http://ift.tt/2f6RvkV">August</a>.</p>
.. Continue Reading <a href="http://ift.tt/2xkaJ1b">Walmart to trial delivery service that restocks your fridge</a><br />
<br />
<b>Category:</b> <a href="http://ift.tt/2maMrlu">Around The Home</a><br />
<br />
<b>Tags:</b>
<ul>
<li><a rel="tag" href="http://ift.tt/2ogUV7P">Delivery</a></li>
<li><a rel="tag" href="http://ift.tt/2sR9ALs">Online Shopping</a></li>
<li><a rel="tag" href="http://ift.tt/2fEUZf0">Walmart</a></li>
</ul>
<b>Related Articles:</b>
<ul>
<li><a href="http://ift.tt/2smAkzC">Deliveries can now come straight to the door ... of your refrigerator</a></li>
<li><a href="http://ift.tt/2sRrJbY">Volvo drivers can now have online shopping orders delivered to their cars</a></li>
<li><a href="http://ift.tt/2n2dLzq">eBay joins with Australian retailer on "world's first VR department store"</a></li>
<li><a href="http://ift.tt/2n7Xfj2">Hiku gets online shopping on the button</a></li>
<li><a href="http://ift.tt/2smI6cX">Self-driving pod delivers groceries to online supermarket customers</a></li>
<li><a href="http://ift.tt/2n2nUfz">Amazon Dash can track your trash to keep your kitchen stocked</a></li>
</ul>
<img border="0" src="http://ift.tt/2wCPg3U" width="1" alt="" align="left" hspace="0" height="1" /></div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3525130716829235482.post-44143865760291646572017-09-24T18:25:00.003+10:002017-09-24T18:25:42.780+10:003D-printable synthetic muscle is three times stronger than you<img src='https://assets.feedblitz.com/images/blank.gif' style='max-width:586px;' /><br />
<div>3D-printable synthetic muscle is three times stronger than you http://ift.tt/2xoUOxJ
<p><img alt="Columbia University engineers have developed a soft actuator that mimics natural muscle, but is three times ..." src="http://ift.tt/2jM02Ph" /></p>
<p>The classic image of a robot is one clad in a rigid metal shell, but that's not going to be practical in situations where man and machine will need to work together. The emerging field of <a href="http://ift.tt/2xTTKn0">soft robotics</a> is helping to make that collaboration safer, but recreating muscle is no easy task. Now, mechanical engineers from Columbia University have developed a synthetic soft muscle that's much more simple to make and run than others, and is three times stronger than the real thing.</p>
.. Continue Reading <a href="http://ift.tt/2jNVqYL">3D-printable synthetic muscle is three times stronger than you</a><br />
<br />
<b>Category:</b> <a href="http://ift.tt/2mQuS8W">Robotics</a><br />
<br />
<b>Tags:</b>
<ul>
<li><a rel="tag" href="http://ift.tt/2jKYkh8">Artificial Muscles</a></li>
<li><a rel="tag" href="http://ift.tt/2mStVeF">Columbia University</a></li>
<li><a rel="tag" href="http://ift.tt/2nVAqMT">Engineering</a></li>
<li><a rel="tag" href="http://ift.tt/2pUcbUY">Robots</a></li>
<li><a rel="tag" href="http://ift.tt/2nIw6Dq">Soft Robotics</a></li>
</ul>
<b>Related Articles:</b>
<ul>
<li><a href="http://ift.tt/2xTTLY6">Powerful artificial muscles made from ... fishing line?</a></li>
<li><a href="http://ift.tt/2nxi2Oe">Restricting field of view to reduce motion sickness in VR</a></li>
<li><a href="http://ift.tt/2nxg2pb">3D food printer designed to cook up culinary creations</a></li>
<li><a href="http://ift.tt/2pIgx0o">Color barrier broken: Microscope's palette nearly quintupled</a></li>
<li><a href="http://ift.tt/2nxgRhZ">Cambits system lets users build cameras from high-tech blocks</a></li>
<li><a href="http://ift.tt/2mSuW6d">Microneedle painlessly monitors drug levels without the need to draw blood</a></li>
</ul>
<img border="0" src="http://ift.tt/2xTXipa" width="1" alt="" align="left" hspace="0" height="1" /></div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3525130716829235482.post-72977623759821442922017-09-24T18:25:00.001+10:002017-09-24T18:25:18.534+10:00Hackers Break Into the SEC, DHS Tells 21 States Russian Hackers Targeted Them, and More Security News This Week<img src='https://media.wired.com/photos/59c59654e78fd924d349f8ca/191:100/pass/sec-FA.jpg' style='max-width:586px;' /><br />
<div>Hackers Break Into the SEC, DHS Tells 21 States Russian Hackers Targeted Them, and More Security News This Week http://ift.tt/2xBU20V
<div><img title="Hackers Break Into the SEC, DHS Tells 21 States Russian Hackers Targeted Them, and More Security News This Week | WIRED" src="http://ift.tt/2fogALG" /><br />
<div>
<div>
<p><span>The week kicked</span> off with news that CCleaner, a popular security software tool, had itself been compromised, <a href="http://ift.tt/2w4nxEE">distributing a backdoor</a> to hundreds of thousands of users and highlighting software's serious supply-chain security issue. Just a few days later, it turned out that the CCleaner was designed instead to target <a href="http://ift.tt/2hkwpjB">nearly two dozen specific tech firms</a>. That's... not good.</p>
<p>Elsewhere in security news this week, <a href="http://ift.tt/2xkT2xG">Donald Trump threatened to destroy North Korea</a> in front of the UN General Assembly, a dangerous escalation of his already incendiary rhetoric. WikiLeaks dumped a bunch of information on <a href="http://ift.tt/2yq1oCn">how Russia spies on its citizens</a>—much of which was already publicly available. We took a look at why the <a href="http://ift.tt/2yhpI8O">Google Play Store keeps suffering malware plagues</a>, and why you should <a href="http://ift.tt/2xXrxM6">use a PIN instead of a pattern</a> to lock your Android phone.</p>
<p>Also, a new <a href="http://ift.tt/2wxrcPN">hacker group linked to Iran</a> appears to be planting destructive malware at a variety of key targets. So there's that.</p>
<p>And there’s more. As always, we’ve rounded up all the news we didn’t break or cover in depth this week. Click on the headlines to read the full stories.</p>
<p>In the world of finance, where knowledge of even the slightest secret data point about a company's fortunes can give traders an edge, it comes as no surprise that the Securities and Exchange Commission has come into hackers' crosshairs. On Wednesday, feds revealed that hackers had taken advantage of a security vulnerability in the SEC's software, called EDGAR, that it uses to publish companies' financial filings. The breach, according to the Commission's analysis, revealed financial documents that weren't available to the public, giving hackers a potential illegal advantage in any market trading—insider trading from the outside. It's not the first time that EDGAR has had data-control issues. In 2014, EDGAR was shown to be revealing news to some users faster than others, creating an imbalance in trading information for automated high frequency trading systems. And a year later, hackers inserted fake information on the site about a takeover of the company Avon, likely exploiting the shift in the stock's price that news caused.</p>
<p>It had been reported for some time that Russian hackers targeted nearly two dozen states in last year's presidential election (though it's important to note that there's no evidence of actual vote tampering). What remained unknown until Friday was which states those were—<a href="http://ift.tt/2vhDKpu">including among the states themselves</a>. Now, the Department of Homeland Security has informed the victims that Russia targeted them, though it has yet to make the list of impacted states public. Still, it's an important step, especially if it helps election organizers better protect their voter rolls ahead of the 2018 Congressional campaigns.</p>
<p>The recent crackdown on dark web that ended bustling black markets AlphaBay and Hansa didn't end with those two high-profile English-language contraband bazaars, it seems. This week, Russian authorities revealed that they'd also taken down RAMP, the Russian Anonymous Marketplace, a Russian-language market for drugs that had been online for five years, longer than any other known narcotics outlet on the dark web. A Russian Interior Ministry official told Russian news agency TASS that the takedown happened in July, when RAMP mysterious went offline. But it's still not clear how the site was found, or if its low-profile owner, who went by the pseudonym Darkside, was arrested in the police action. When WIRED interviewed Darkside via his site's anonymous messaging system in 2014, he said he was careful to keep his business focused on Russia only to limit attention from foreign governments. “We never mess with the CIA, we work only for Russians and this keeps us safe," Darkside said at the time. That strategy seems to have worked for years—until it didn't.</p>
<p>If it wasn't yet clear that ransomware hackers are depraved sociopaths, one new form of that criminal scheme seems designed to prove it. A new strain of ransomware known as nRansom appeared this week, and demands that anyone who wants to unlock their files email ten nude photos of themselves to the hackers' email address. "Once you are verified, we will give you your unlock code and sell your nudes on the deep web," reads the statement that appears on infected computers' screens, along with a picture of Thomas the Tank Engine, and the words "FUCK YOU!!!" The malware also reportedly plays the theme song from the HBO show <em>Curb Your Enthusiasm</em>. While the nudeware has already been included in the crowdsourced malware repositories VirusTotal and Hybrid Analysis, and some Twitter users have reported being infected, it's not clear how widespread the infections really are—or whether the ransomware is a legitimate threat or a trolly joke.</p>
</div>
</div>
</div>
</div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3525130716829235482.post-15411472226385894002017-09-21T19:59:00.000+10:002017-09-21T20:47:15.616+10:00Sept 2017 at Haventec<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi6mk0b_U6AStzTWLO8YDvEVwJvEsieeA944rq4PEZQYZsQqOQTBPM7fjg_6OAV3ivJ6RDKUWcxjrmJPrX6MV66Zf2tkCVbR8gWwrbS02njUYMxghPK2q4PYUJBfoyN2wiU8mX0zZkYdMk/s1600/Screen+Shot+2017-09-21+at+8.39.52+pm.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em; text-align: center;"><img border="0" data-original-height="132" data-original-width="124" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi6mk0b_U6AStzTWLO8YDvEVwJvEsieeA944rq4PEZQYZsQqOQTBPM7fjg_6OAV3ivJ6RDKUWcxjrmJPrX6MV66Zf2tkCVbR8gWwrbS02njUYMxghPK2q4PYUJBfoyN2wiU8mX0zZkYdMk/s1600/Screen+Shot+2017-09-21+at+8.39.52+pm.png" /></a><b style="text-align: left;">Business--</b><span style="text-align: left;">- This month has been very busy on the business side of things for our CEO Rob Morrish and my partner and chairman Tony Castagna. The sales and partner pipelines are just busting at the seams. </span><b style="text-align: left;">---Engineering---</b><span style="text-align: left;"> But September also marks the culmination of many moths of hard work for our engineers as we put the final touches on the cloud versions of our products. </span><b style="text-align: left;">---Public Understanding---</b><span style="text-align: left;"> This month I'm also going to start addressing some of the issues that seem to have become really confusing in understanding security, privacy and the storage of sensitive information on enterprise networks.</span>
<br />
<span style="text-align: left;"><br /></span> <b>Articles coming this month:</b><br />
<br />
<ul>
<li>An Australian FinancialReview article positioned TokenOne as a major breakthrough in password-less logons. I'll be doing a pretty thorough coverage of why TokenOne is great but not the true password-less solution the world is crying out for.</li>
<li>A comparison between <a href="http://www.ricrichardson.com/2017/09/double-octopus-vs-haventec-authenticate.html" target="_blank">Double Octopus and Haventec's Authentication</a>.</li>
<li>A review of a leader in the authentication space called Octa and why, though successful, their approach is perpetuating sameness.</li>
</ul>
<div>
<b>Issues I'm looking at this month:</b></div>
<div>
<ul>
<li>Helping the public understand how insecure their passwords are in most institutions.</li>
<li>Helping top executives understand that there is a way to get rid of the liability of storing passwords on their networks</li>
<li>Helping security executives at those same enterprises feel safe about migrating out of their 55 year old password systems.</li>
<li>And generally what it means to really get rid of passwords</li>
</ul>
<div>
<b>The future:</b></div>
</div>
<div>
While the team pounds away at production and getting our initial customers happy, everyone has kindly left me to continue solving problems with our existing tech and also toying with what the future holds for someone like us on the bleeding edge of identity management, security and data privacy. Here are some snapshots:</div>
<div>
<ul>
<li>Exploring how our PIN-less authentication could be used for machine to machine authentication, ie when servers need to talk to other servers securely.</li>
<li>Looking at the initial inklings of a public key system for personal use that would do away with having to use a PIN or remember anything or even use biometrics.</li>
<li>How to use the blockchain to stop the worlds domain name servers from being attacked.</li>
</ul>
<div>
Phew. I suppose that's enough. Ha.</div>
</div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3525130716829235482.post-27493630524512311642017-09-21T19:42:00.000+10:002017-09-21T19:43:21.530+10:00Why Haventec?<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiH0_nT-4t08WK_2sFBwd6I5Cy7Va8fgLuBrONWCGKs9p7cQc4QzahvyRe-Wl2uJZRKh94OhrKgwhI9cTdeYmZ7D7hZVOXtQ5ggI0e3rfu-8QdV7H21UIB3ubooQO8DZf4EtG8xAcFHZxY/s1600/Screen+Shot+2017-09-21+at+7.32.23+pm.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="1181" data-original-width="1600" height="472" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiH0_nT-4t08WK_2sFBwd6I5Cy7Va8fgLuBrONWCGKs9p7cQc4QzahvyRe-Wl2uJZRKh94OhrKgwhI9cTdeYmZ7D7hZVOXtQ5ggI0e3rfu-8QdV7H21UIB3ubooQO8DZf4EtG8xAcFHZxY/s640/Screen+Shot+2017-09-21+at+7.32.23+pm.png" width="640" /></a></div>
<div class="separator" style="clear: both; text-align: left;">
When I started Haventec over two years ago with my good partner Tony Castagna, I had invented the core technology for the express purpose of getting rid of passwords, replacing the with simple PIN's but making the logon process even more secure. A peripheral advantage that has since become the companies main focus is the removal of the headache of protecting and storing passwords on enterprise servers.</div>
<br />Unknownnoreply@blogger.com0