Toggle light / dark theme

The Man Said That His Country Has Been In Existence For 1000 Years And Was A Little Puzzled Why His Country Was Called Andorra On The Map.

It was July 1954 when a smartly dressed man arrives at Haneda Airport in Tokyo, Japan. Much like other passengers, he makes his way to customs. But whatever happened from this point onwards have left all puzzled and concerned. When questioned by the customs officers, the mysterious passenger said he was from Taured, also referred to as Taured Mystery. The mystery man claimed that it was the third time he was visiting Japan from his country. But, to the surprise of officers, they couldn’t find any country named Taured. The primary language of the man, described as Caucasian looking with a beard, was French. However, she was purportedly speaking Japanese and many other languages as well.

Officers were perplexed because they had never heard about any such country. The passport of the man was issued by of course the Taured. The passport looked authentic but the place was not recognized.

Location of Taured.
The man was then given a map and asked to point out his country. He immediately man pointed to the area occupied by the Principality of Andorra is at the border of France and Spain. The man said that his country has been in existence for 1000 years and was a little puzzled why his country was called Andorra on the map. The man argued with the customs officers for long and refused to give in.

What Is The Mystery All About?
He was also carrying currencies of different countries, probably because he had made several business trips. The mystery man shared other details like the company for which he was working and the hotel where he stayed. Officials find out that the company which he mentioned existed in Tokyo but not in Taured. Similarly, the hotel he mentioned did exist but hotel employees informed them that no such booking was made. This prompted officers to take the man in custody for further interrogation. Officers were suspicious that he might be some criminal and confiscated his documents and personal belongings. The officers put the mystery man in a nearby hotel whilst they conducted their investigation.

Mystery Man Vanishes Amid Tight Security.
To ensure that the mystery man didn’t escape, two guards were placed on the door. It must be mentioned that the hotel room in which he was staying only had one entry and exit point. But to everyone’s surprise, the man vanished the next morning. Not only that, but all his personal documents had also disappeared. A search was launched to find the man but in vain. The thing that was troubling investigating officers was that he was put up in a room high up in the multi-storey hotel building with no balcony.

Unexplained Phenomena.

The arrival of government-operated autonomous police robots does not look like predictions in science fiction movies. An army of robots with gun arms is not kicking down your door to arrest you. Instead, a robot snitch that looks like a rolling trash can is programmed to decide whether a person looks suspicious —and then call the human police on them. Police robots may not be able to hurt people like armed predator drones used in combat— yet —but as history shows, calling the police on someone can prove equally deadly.

Long before the 1987 movie Robocop, even before Karel Čapek invented the word robot in 1920, police have been trying to find ways to be everywhere at once. Widespread security cameras are one solution—but even a blanket of CCTV cameras couldn’t follow a suspect into every nook of public space. Thus, the vision of a police robot continued as a dream, until now. Whether they look like Boston Dynamics’ robodogs or Knightscope’s rolling pickles, robots are coming to a street, shopping mall, or grocery store near you.

The Orwellian menace of snitch robots might not be immediately apparent. Robots are fun. They dance. You can take selfies with them. This is by design. Both police departments and the companies that sell these robots know that their greatest contributions aren’t just surveillance, but also goodwill. In one brochure Knightscope sent to University of California-Hastings, a law school in the center of San Francisco, the company advertises their robot’s activity in a Los Angeles shopping district called The Bloc. It’s unclear if the robot stopped any robberies, but it did garner over 100000 social media impressions and Knightscope claims the robot’s 193 million overall media impressions was worth over $5.8 million. The Bloc held a naming contest for the robot, and said it has a “cool factor” missing from traditional beat cops and security guards.

In a study published in Physical Review Letters, a team led by academician Guo Guangcan from the University of Science and Technology of China (USTC) of the Chinese Academy of Sciences (CAS) has made progress in high dimensional quantum teleportation. The researchers demonstrated the teleportation of high-dimensional states in a three-dimensional six-photon system.

To transmit unknown quantum states from one location to another, quantum teleportation is one of the key technologies to realize long-distance transmission.

Compared with two-dimensional systems, high-dimensional system quantum networks have the advantages of higher channel capacity and better security. In recent years more and more researchers of the quantum information field have been working on generating efficient generation of high-dimensional quantum teleportation to achieve efficient high-dimensional quantum networks.

They are as thin as a hair, only a hundred thousand times thinner—so-called two-dimensional materials, consisting of a single layer of atoms, have been booming in research for years. They became known to a wider audience when two Russian-British scientists were awarded the Nobel Prize in Physics in 2010 for the discovery of graphene, a building block of graphite. The special feature of such materials is that they possess novel properties that can only be explained with the help of the laws of quantum mechanics and that may be relevant for enhanced technologies. Researchers at the University of Bonn (Germany) have now used ultracold atoms to gain new insights into previously unknown quantum phenomena. They found out that the magnetic orders between two coupled thin films of atoms compete with each other. The study has been published in the journal Nature.

Quantum systems realize very unique states of matter originating from the world of nanostructures. They facilitate a wide variety of new technological applications, e.g. contributing to secure data encryption, introducing ever smaller and faster technical devices and even enabling the development of a quantum computer. In the future, such a computer could solve problems which conventional computers cannot solve at all or only over a long period of time.

How unusual quantum phenomena arise is still far from being fully understood. To shed light on this, a team of physicists led by Prof. Michael Köhl at the Matter and Light for Quantum Computing Cluster of Excellence at the University of Bonn are using so-called quantum simulators, which mimic the interaction of several quantum particles—something that cannot be done with conventional methods. Even state-of-the-art computer models cannot calculate complex processes such as magnetism and electricity down to the last detail.

As the number of devices connected to the internet continues to increase, so does the amount of redundant data transfer between different sensory terminals and computing units. Computing approaches that intervene in the vicinity of or inside sensory networks could help to process this growing amount of data more efficiently, decreasing power consumption and potentially reducing the transfer of redundant data between sensing and processing units.

Researchers at Hong Kong Polytechnic University have recently carried out a study outlining the concept of near-sensor and in-sensor computing. These are two computing approaches that enable the partial transfer of computation tasks to sensory terminals, which could reduce and increase the performance of algorithms.

“The number of sensory nodes on the Internet of Things continues to increase rapidly,” Yang Chai, one of the researchers who carried out the study, told TechXplore. “By 2032, the number of will be up to 45 trillion, and the generated information from sensory nodes is equivalent to 1020 bit/second. It is thus becoming necessary to shift part of the computation tasks from cloud computing centers to edge devices in order to reduce energy consumption and time delay, saving communication bandwidth and enhancing data security and privacy.”

Over the past 25 years, suicide attacks have emerged as a method used on a large scale by terrorist organizations to inflict lethal damage and create fear and chaos. Data collected by the University of Chicago’s Project on Security & Threats shows that worldwide there were 5, 021 suicide attacks utilizing bombs, which resulted in 47, 253 deaths and 113, 413 wounded from 2000 to 2016.

And recent news reports have highlighted the attempted use of suicide bombs in U.S. subways and city streets as well as on major airlines. An individual willing to sacrifice their own life in an attack is a significant force-multiplier, who too often escapes conventional threat detection methods. However, new technologies may yet close the security gap.

To detect suicide bombers preparing to attack public places and other high-value targets, a research team led by a professor at the Naval Postgraduate School invented a method to detect persons wearing wires or a significant amount of metal that might be part of an explosive device.

Quantum key distribution is one kind of important cryptographic protocols based on quantum mechanics, in which any outside eavesdropper attempting to obtain the secret key shared by two users will be detected. The successful detection comes from Heisenberg’s uncertainty principle: the measurement of a quantum system, which is required to obtain information of that system, will generally disturb it. The disturbances provide two users with the information that there exists an outside eavesdropper, and they can therefore abort the communication. Nowadays, most people need to share some of their private information for certain services such as products recommendation for online shopping and collaborations between two companies depending on their comm interests. Private Set Intersection Cardinality (PSI-CA) and Private Set Union Cardinality (PSU-CA), which are two primitives in cryptography, involve two or more users who intend to obtain the cardinalities of the intersection and the union of their private sets through the minimum information disclosure of their sets1,2,3.

The definition of Private Set Intersection (PSI), also called Private Matching (PM), was proposed by Freedman4. They employed balanced hashing and homomorphic encryption to design two PSI protocols and also investigated some variants of PSI. In 2012, Cristofaro et al.1 developed several PSI-CA and PSU-CA protocols with linear computation and communication complexity based on the Diffie-Hellman key exchange which blinds the private information. Their protocols were the most efficient compared with the previous classical related ones. There are also other classical PSI-CA or PSU-CA protocols5,6,7,8. Nevertheless, the security of these protocols relies on the unproven difficulty assumptions, such as discrete logarithm, factoring, and quadratic residues assumptions, which will be insecure when quantum computers are available9,10,11.

For the sake of improving the security of PSI-CA protocols for two parties, Shi et al.3 designed a probabilistic protocol where multi-qubit entangled states, complicated oracle operators, and measurements in high N-dimensional Hilbert space were utilized. And the same method in Ref.3 was later used to develop a PSI-CA protocol for multiple parties12. For easy implementation of a protocol, Shi et al.13 leveraged Bell states to construct another protocol for PSI-CA and PSU-CA problems that was more practical than that in Ref.3. In both protocols Ref.3 and Ref.13, only two parties who intend to get the cardinalities of the intersection and the union of their private sets are involved. Although Ref.12 works for multiple parties, it only solves the PSI-CA problem and requires multi-qubit entangled states, complicated oracle operators, and measurements. It then interests us that how we could design a more practical protocol for multiple parties to simultaneously solve PSI-CA and PSU-CA problems. Inspired by Shi et al.’s work, we are thus trying to design a three-party protocol to solve PSI-CA and PSU-CA problems, where every two and three parties can obtain the cardinalities of the intersection and the union of their respective private sets with the aid of a semi-honest third party (TP). TP is semi-honest means that he loyally executes the protocol, makes a note of all the intermediate results, and might desire to take other parties’ private information, but he cannot collude with dishonest parties. We then give a detailed analysis of the presented protocol’s security. Besides, the influence of six typical kinds of Markovian noise on our protocol is also analyzed.

CSL’s Systems and Networking Research Group (SyNRG) is defining a new sub-area of mobile technology that they call “earable computing.” The team believes that earphones will be the next significant milestone in wearable devices, and that new hardware, software, and apps will all run on this platform.

“The leap from today’s earphones to ‘earables’ would mimic the transformation that we had seen from basic phones to smartphones,” said Romit Roy Choudhury, professor in electrical and (ECE). “Today’s smartphones are hardly a calling device anymore, much like how tomorrow’s earables will hardly be a smartphone accessory.”

Instead, the group believes tomorrow’s earphones will continuously sense , run acoustic augmented reality, have Alexa and Siri whisper just-in-time information, track user motion and health, and offer seamless security, among many other capabilities.

The security company FireEye was breached by a sophisticated attack that stole multiple red team assessment tools. Malwarebytes customers are safe.

Hello folks! If you have not heard yet, the security firm FireEye has had a breach of many red team assessment tools used for identification of vulnerabilities to help protect customers.

While it is not known exactly who was behind this attack, a big concern is the sharing and use of these stolen red team tools by both sophisticated and non-sophisticated actors, similar to what we saw in 2017 with the ShadowBrokers group breach of the NSA’s Equation Group.