Advertisement
If you have a new account but are having problems posting or verifying your account, please email us on hello@boards.ie for help. Thanks :)
Hello all! Please ensure that you are posting a new thread or question in the appropriate forum. The Feedback forum is overwhelmed with questions that are having to be moved elsewhere. If you need help to verify your account contact hello@boards.ie
Hi there,
There is an issue with role permissions that is being worked on at the moment.
If you are having trouble with access or permissions on regional forums please post here to get access: https://www.boards.ie/discussion/2058365403/you-do-not-have-permission-for-that#latest

How will the NSA intercept this then?

  • 04-06-2014 1:08am
    #1
    Closed Accounts Posts: 1,260 ✭✭✭


    Scientists teleport quantum information across the room


    Researchers working at TU Delft's Kavli Institute of Nanoscience in the Netherlands claim to have successfully transferred data via teleportation. By exploiting the quantum phenomenon known as particle entanglement, the team says it transferred information across a 3 m (10 ft) distance, without the information actually traveling through the intervening space.

    "Entanglement is arguably the strangest and most intriguing consequence of the laws of quantum mechanics," said the head of the research project, Professor Ronald Hanson. "When two particles become entangled, their identities merge: their collective state is precisely determined, but the individual identity of each of the particles has disappeared. The entangled particles behave as one, even when separated by a large distance."
    As electrons in an atom exist in orbits around a nucleus – like the way that the Earth spins on its axis – electrons also have "spin." When two electrons are entangled (that is, when they interact physically) and are then forcibly separated, the spin information on each becomes opposite to the other; they are essentially turned into mirror images.


    However – and this is the bit that Einstein found "creepy" in his rejection of the entanglement theory – when one of the entangled electrons has its spin direction changed by some means, the other electron immediately reverses its own spin direction. The distance in the Kavli Institute tests was 3 m (10 ft) but, theoretically, this distance could have been hundreds of light years.

    You could use this method to send stuff to Keplor-10c.


Comments

  • Registered Users, Registered Users 2 Posts: 37,485 ✭✭✭✭Khannie


    First projected use: Gaming.


  • Closed Accounts Posts: 1,004 ✭✭✭Recondite49


    Scientists teleport quantum information across the room







    You could use this method to send stuff to

    Very exciting!

    I imagine it would be possible to detect if this was intercepted anyway? I remember Simon Singh talked about "Quantum Money" in his code book to make the point that any attempt to observe "qubits" would result in a faulty transmission as they'd be destroyed.

    Let's hope it takes off.


  • Registered Users, Registered Users 2 Posts: 36,537 ✭✭✭✭Hotblack Desiato


    Khannie wrote: »
    First projected use: Gaming.pR0n

    Same as..
    Cave paintings
    Printing press
    Photography
    Movies
    Internet..

    In Cavan there was a great fire / Judge McCarthy was sent to inquire / It would be a shame / If the nuns were to blame / So it had to be caused by a wire.



  • Closed Accounts Posts: 1,004 ✭✭✭Recondite49


    ninja900 wrote: »
    Same as..
    Cave paintings
    Printing press
    Photography
    Movies
    Internet..

    Look forward to it, we'll be able to tell where Quantum P0rno is but never where it's going... :)


  • Registered Users, Registered Users 2 Posts: 2,344 ✭✭✭p to the e


    You'll be able to state at what position to start the porno or at what speed to play it at but not both!


  • Advertisement
  • Registered Users, Registered Users 2 Posts: 11,205 ✭✭✭✭hmmm


    They'll intercept it at either end of course. There's too many naive people that think that cryptography and protecting traffic from interception is the be all and end all of security - signs on all these searches for "unbreakable" communication protocols.

    None of this matters if your router has a capturing device. Or your PC has a trojan copying all your traffic. Or your laptop is taken from you at a border. Or you are "encouraged" to hand over your passwords.


  • Closed Accounts Posts: 1,004 ✭✭✭Recondite49


    hmmm wrote: »
    They'll intercept it at either end of course. There's too many naive people that think that cryptography and protecting traffic from interception is the be all and end all of security - signs on all these searches for "unbreakable" communication protocols.

    None of this matters if your router has a capturing device. Or your PC has a trojan copying all your traffic. Or your laptop is taken from you at a border. Or you are "encouraged" to hand over your passwords.

    I'm inclined to agree hmmm but I don't see any reason to throw the baby out with the bath water - an encrypted laptop seized at the border for instance won't do law enforcement much good unless they can scare you into handing over the password with unjust jail sentences.

    Speaking of routers, have you heard of dd-wrt ? I want to install it on home router but my better half won't let me.


  • Registered Users, Registered Users 2 Posts: 43 bd0101


    I'm inclined to agree hmmm but I don't see any reason to throw the baby out with the bath water - an encrypted laptop seized at the border for instance won't do law enforcement much good unless they can scare you into handing over the password with unjust jail sentences.

    Speaking of routers, have you heard of dd-wrt ? I want to install it on home router but my better half won't let me.

    BULLRUN and QUANTUM INSERT has us all.. and no, these are not random words from barbaric dreams, nor our secret grandmother recipe .. these are very sophisticated and highly funded programs, which NSA uses in order to open doors on pretty much any electronic mean.

    BULLRUN, is all about buying developers and having them insert malicious code or backdoors. This would not have to be a very obvious one, but could also be a "flaw" - such as the one of cryptographic library SSL was (HeartBleed bug) - where it would leak info and private memory data to a direct attacker.

    QUANTUM INSERT is about implants, where NSA would use zero-day vulnerabilities or malware for gaining access to computers. Essentially, doing the very same job that criminals do, but under the excuse of "world peace, stability and security".

    What an irony of it all. Promoting insecurity and violation of privacy, in the name of security...


  • Closed Accounts Posts: 1,004 ✭✭✭Recondite49


    bd0101 wrote: »
    BULLRUN and QUANTUM INSERT has us all.. and no, these are not random words from barbaric dreams, nor our secret grandmother recipe .. these are very sophisticated and highly funded programs, which NSA uses in order to open doors on pretty much any electronic mean.

    BULLRUN, is all about buying developers and having them insert malicious code or backdoors. This would not have to be a very obvious one, but could also be a "flaw" - such as the one of cryptographic library SSL was (HeartBleed bug) - where it would leak info and private memory data to a direct attacker.

    QUANTUM INSERT is about implants, where NSA would use zero-day vulnerabilities or malware for gaining access to computers. Essentially, doing the very same job that criminals do, but under the excuse of "world peace, stability and security".

    What an irony of it all. Promoting insecurity and violation of privacy, in the name of security...

    Hi bd101,

    I've heard of the programs but I see that as inspiration to update our existing security practices, not to throw up my hands in despair and concede the NSA have access to all our private data.

    The Tor network is an excellent case in point - the NSA have been unable to compromise the overall structure of it (with the exception of a well publicised Firefox exploit which has since been patched) so they've been focusing on targeting the endpoints (keylogging, rubber hose crypto etc.)

    Do you believe that confidential communications still can't be achieved, for instance via using Torchat with OTR messaging?


  • Registered Users, Registered Users 2 Posts: 66 ✭✭CathalC2011


    Hi bd101,

    I've heard of the programs but I see that as inspiration to update our existing security practices, not to throw up my hands in despair and concede the NSA have access to all our private data.

    The Tor network is an excellent case in point - the NSA have been unable to compromise the overall structure of it (with the exception of a well publicised Firefox exploit which has since been patched) so they've been focusing on targeting the endpoints (keylogging, rubber hose crypto etc.)

    Do you believe that confidential communications still can't be achieved, for instance via using Torchat with OTR messaging?

    Numerous tor end-nodes are already compromised. While it is quick and easy to set up, I would not depend on it as a "golden ticket" to anonymity.


  • Advertisement
  • Closed Accounts Posts: 1,004 ✭✭✭Recondite49


    Numerous tor end-nodes are already compromised. While it is quick and easy to set up, I would not depend on it as a "golden ticket" to anonymity.

    Surely that's only an issue if you make use of exit nodes though? If you kept your communications within the tor network e.g. By using bitmessage's onion domain to exchange e-mails encrypted with gpg, I'd say that's sufficiently robust to prevent your messages being intercepted through DPI etc. - Of course you'd still need to keep your private key safe and connect to the tor network securely by using a private bridge - Snowden himself said strong encryption still does work if we're able and willing to use it.


  • Closed Accounts Posts: 1,004 ✭✭✭Recondite49


    Numerous tor end-nodes are already compromised. While it is quick and easy to set up, I would not depend on it as a "golden ticket" to anonymity.

    Surely that's only an issue if you make use of exit nodes though? If you kept your communications within the tor network e.g. By using bitmessage's onion domain to exchange e-mails encrypted with gpg, I'd say that's sufficiently robust to prevent your messages being intercepted through DPI etc. - Of course you'd still need to keep your private key safe and connect to the tor network securely by using a private bridge - Snowden himself said strong encryption still does work if we're able and willing to use it.


  • Registered Users, Registered Users 2 Posts: 66 ✭✭CathalC2011


    Surely that's only an issue if you make use of exit nodes though? If you kept your communications within the tor network e.g. By using bitmessage's onion domain to exchange e-mails encrypted with gpg, I'd say that's sufficiently robust to prevent your messages being intercepted through DPI etc. - Of course you'd still need to keep your private key safe and connect to the tor network securely by using a private bridge - Snowden himself said strong encryption still does work if we're able and willing to use it.

    You're absolutely right - I didn't read your original post all the way to the end, so my misake there.

    Snowden for Overlord 2014


  • Closed Accounts Posts: 1,004 ✭✭✭Recondite49


    You're absolutely right - I didn't read your original post all the way to the end, so my misake there.

    Snowden for Overlord 2014

    Thanks CathalC2011 I wasn't being horrible, just wasn't sure we were on the same page.

    In a more general sense end points can encompass your own computer - tor can't protect against 'evil maid' attacks nor can it protect any files you've downloaded via the network.

    Personally I'm a fan of using the TAILS Live CD with an encrypted USB Stick for the ultra secret stuff but of course you have to be very careful about saying you've come up with a perfect way to keep your data safe.


Advertisement