Toggle light / dark theme

ISARA Corporation Readies Security Measures for the Quantum Age

Wireless security and internet standards experts release a complete quantum resistant toolkit for commercial use.

TORONTO, Sept. 19, 2016 /CNW/ — 4TH ETSI/IQC Workshop on Quantum-Safe Cryptography – ISARA Corporation today announced the availability of its ISARA Quantum Resistant (IQR) Toolkit. The toolkit helps software and hardware solution providers build robust commercial products that protect vulnerable infrastructure against the threat quantum computing already poses to widely-used security standards.

Similar to the Y2K crisis, the technology industry is facing a ‘Y2Q’ (years to quantum) challenge that has a limited timeline and requires significant work to ensure systems and information are properly protected. The massive processing power of quantum computers is such that, without integrating quantum resistant security solutions, all security that depends on existing standards is vulnerable.

Quantum Teleportation Just Happened For Real

I remember when this was announced last year; however, I am glad to see the topic highlighted again especially after China’s launch of their Quantum Satellite.


Quantum teleportation is the mystical, far-off in the future idea where quantum information encoded into particles of light can be transferred from one place to another remotely. Except it’s not far-off in the future — it just happened. Teleportation is real and it is here.

The teleportation occurred over several kilometres of optical fibre networks in the cities of Hefei in China and Calgary in Canada.

The two independent studies show that quantum teleportation across metropolitan networks is technologically feasible, and pave the way towards future city-scale quantum technologies and communications networks, such as a quantum internet.

Dark Web Criminals Supplying Forged Diplomas & Certifications

And, we all have heard all of the horrorr stories of a botch surgery or treatment performed by a MD who was a fraud. Well, our friends on the Dark Web are at work again in supplying anyone willing to pay fake diplomas & certifications. The challenge is how do companies and agencies validate? Something to ponder as we all know hackers can also forge educational records as well.


Criminals on the Dark Web (a lawless, unregulated part of the Internet) are supplying fake diplomas and employment certifications to anyone with a few hundred bucks.

According to Israeli threat intelligence firm Sixgill, people are even hiring hackers to penetrate university computer systems to alter grades.

The company has pinpointed multiple vendors selling degrees and accreditation that can easily be mistaken for being legitimate, so the market for fraudulent documents is booming.

China Suspected of Cyberwar Recon; Huawei Fears Linger

Hmmm; Chinese antitrust regulators are investigating Microsoft, and Huawei has been shut out of the U.S. telecommunications-equipment market over concerns it might be a front for cyberspying.


Alleged Chinese hacking of American companies may have diminished since tensions over the issue came to a head during Xi Jinping’s state visit to the U.S. last year. At Lawfare, however, security technologist Bruce Schneier describes a recent series of attacks which appear to show “someone […] learning to take down the internet.” “The data I see suggests China,” he writes, “an assessment shared by the people I spoke with.”

Over the past year or two, someone has been probing the defenses of the companies that run critical pieces of the . These probes take the form of precisely calibrated attacks designed to determine exactly how well these companies can defend themselves, and what would be required to take them down. We don’t know who is doing this, but it feels like a large a large nation state. China or Russia would be my first guesses.

How Russia and the UN are actually planning to take over the Internet

Ouch!


According to a countdown clock from Sen. Ted Cruz, there are less than three weeks until the Obama administration puts the Internet at risk from takeover and censorship by China, Russia, and Iran. This conspiratorial fearmongering is, frankly, absurd.

But just because this particular alleged conspiracy is insane doesn’t mean that there is no conspiracy. Of course authoritarian regimes want more control over the Internet, and at this very moment, they are working through the U.N. to get it. But instead of targeting the administration of the domain name system (which, thanks to the so-called “IANA transition” Sen. Cruz opposes, is nearly out of their reach), their chosen vehicle is next-generation Internet standards, particularly an arcane proposal called the Digital Object Architecture (DOA). The best way to stop authoritarian regimes and keep the Internet free is to go through with the transition.

DOA is the brainchild of the legendary Bob Kahn, co-inventor of the Internet’s TCP/IP protocol. The Internet does a great job of moving bits around the world, but it isn’t always so good at authentication, rights management, and access controls. Kahn’s idea, dating back to the early 1990s, is to bake “information management” directly into core protocols. What if every piece of data and every device that accessed the network had a permanent, trackable unique identifier? If you wanted to access information on the network, the system would decide if you were authorized to receive it and, if so, allow you to fetch it.

/* */