Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Submission + - Go back to preindustrial carbon levels in 10 years (photonics.com)

UnHolier than ever writes: "The key to rolling back climate change could be the sun, according to George Washington University researchers who have demonstrated a carbon capture process called STEP that promises to use solar power to remove carbon dioxide from the air. As a bonus, the technique could generate a profitable product. Calculations showed that it is feasible with STEP carbon capture to reduce CO2 in the atmosphere to preindustrial levels within 10 years."
Education

Submission + - Fermilab Confirms Evidence of 4th Flavor Neutrino (umich.edu)

eldavojohn writes: We've only had evidence for three kinds of neutrinos but a recent test at Fermilab involving an antineutrino beam has reinforced a Michigan researcher's earlier experiment suggesting a fourth flavor. What's really odd about this is that a prior neutrino test (carried out as part of project MiniBooNE) did not result in indications of such strange oscillations. According to the researcher 'The simplest explanation involves adding new neutrino-like particles, or sterile neutrinos, which do not have the normal weak interactions.' But this could also be an unknown or misunderstood effect. A Los Alamos National Laboratory scientist added that an explanation of this strange anomaly could result in understanding 'matter asymmetry of the universe, or why the universe is primarily composed of matter, rather than antimatter.' The results are published in the Physical Review Letters.

Comment Re:too easy (Score 1) 379

The US law says: "In determining the meaning of any Act of Congress, unless the context indicates otherwise-- the words "person" and "whoever" include corporations, companies, associations, firms, partnerships, societies, and joint stock companies, as well as individuals;".

Now, I agree with you that this is not a natural law. All it would take is a simple act of congress to change it. But, the law being what it is.... You can't argue in front of the supreme court that you think a law is wrong. To do that, you have to go to congress.

Comment Not a test (Score 4, Insightful) 284

I scanned through the article and from what I see, they have made an equivalence between the maths used in string theory and the maths used in entanglement. This is interesting in itself, because this allowed them to port a result from string theory to entanglement theory, a result which was not known before and could be falsified.

However, this is like saying that the mathematical theory used to count apples harvested from an orchard (addition of natural numbers) is the same as the mathematical theory behind the algorithm the slashcode uses to count the number of comments below threshold (addition of natural numbers). It allows one to port result from ancient mathematics to modern applications without having to rederive everything from first principles; it does not mean that sub-threshold comments are, deep down, really made of apples.

Comment Re:What automobile ? (Score 1) 1141

I've got a bike, an excellent public transport system for things that aren't nearby, and car-sharing for things that are too large to fit in buses or too isolated to be on a bus route. Car sharing allows me to get 50 MPG when a Smart is all I need and I can get a pickup truck when I need it.

Comment Re:I am not scared (Score 2, Interesting) 895

To create a picture in your mind:

86M barrels per day corresponds to ~158 m^3/s.

This is equivalent to the average discharge of a middlish river. The Shannon, for example, has a discharge of 186 m^3/s. The Potomac has ~300m^3/s on average. The River Thames is only ~65m^3/s.

So, stand on the London bridge and have a look below. The total usage of oil in the world is twice that, every single second.

Comment Re:sigh, the "quantum" buzzword (Score 1) 69

Erm, part of the key quantum key setup process requires a classical channel after transmission in order to exchange information about the quantum bits which were just sent. This isn't just about some password being whispered in advance. If you're talking about some other algorithm, e.g. for general secured data transfer, could you give more specifics?

The classical exchange serves to authenticate some of the qubits that were sent, and those qubits are emphatically NOT used to generate the key. The qubits used for that purpose are not exchanged through the classical channel.

Regardless, classical crypto is about the strength of encryption, and cares little for people reading ciphertext. The quantum crypto promise is of a totally different flavour, promising physical obscurity. If its response is "well of course we can only guarantee that Eve is not intercepting once we have guaranteed that Eve is not intercepting!" then, etc.

More specifically, it guarantees that if Eve intercepts the message, you will know it, and therefore you will throw away whatever OTP you have generated without using it. Yes, this means Eve is able to completely break communication (which she could also do, for example, with an axe). What she cannot do is intercept while staying undetected.

Comment Re:sigh, the "quantum" buzzword (Score 1) 69

(1) Neither of your scenarios covers the case where both the quantum and the secondary channel are created by Eve, not just the secondary channel;

Yes, they do. If Eve eavesdrop on the quantum channel, the correlations will not be there and the OTP will not be established. If the channel is created by Eve, it does not matter. If Eve completely replaces the data sent by Alice, then the correlations will not be there. There is no way to fake these correlations.

(2) How is the relationship between quantum and classical channels informed to Bob by Alice?

You mean, which channel is quantum and which is classical? That can be public knowledge.

(3) If your solution is to transport a one time pad at some earlier point "by some other means", then you're copping out twice over, as now we need another classical channel to transmit one time pads long enough for message exchanges.

There you are right. The protocol must work without being seeded first.

Comment Re:sigh, the "quantum" buzzword (Score 1) 69

No, that's the whole point of the protocol. Even if the secondary channel is insecure, it cannot be faked.

-If a spy tries to fool you by taking control of the secondary channel (for example by impersonating Alice), then the protocol will fail as the spy cannot reproduce the correlations you expect to see.
-If the channel is just listened to, it does not matter because no information about the one-time pad is exchanged on it. The only information Eve can get is "It seems their transmission succeeded" or "It seems it didn't".

Slashdot Top Deals

For God's sake, stop researching for a while and begin to think!

Working...