Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 internet speed test! ×

Submission + - "Unbreakable Message Exchange" using single photon (sciencedaily.com)

Taco Cowboy writes: Quantum Key Distribution (QKD) is a process that enables two parties, 'Alice' and 'Bob', to share a secret key that can then be used to protect data they want to send to each other. The secret key is made up of a stream of photons that 'spin' in different directions — vertically, horizontally or diagonally — according to the sender's preferences.

The laws of physics state that it is not possible to measure the state, or 'spin', of a particle like a photon without altering it, so if 'Eve' attempted to intercept the key that was sent between 'Alice' and 'Bob', it would become instantly noticeable.

The use of QKD for message encryption is not new, as it has been used to encode the national election ballot results in Switzerland in 2007.

The techniques currently being used on a commercial scale rely on lasers to create the source of photons, however, may come with a potential defect — The emission events in lasers occur completely random in time, sometimes results in the emission of two photons very close to each other.

Single photon sources are predestined for use in the secure communication systems using quantum communication protocols of the future, with the benefit of having a single photon source emits exactly one photon upon a trigger event, giving further enhancement on the security.

In the new experiment, the single photons were produced with high efficiency, then made into a key and successfully transmitted from the sender to the receiver across 40 cm of free space in the laboratory.


Submission + - Beware of Scammers impersonating as FBI ! (wordpress.com)

Taco Cowboy writes: There are scammers and then there are scammers impersonating as FBI

The FBI are troubled by Nigerian scammers impersonating themselves as FBI agents, so much as that FBI is saying that it has become one of the worst online threats

An example email is available at http://419advancefeefraud.blogspot.com/2012/05/nigerian-scammer-impersonating-fbi.html

Two youtube clips also report about the scam


Another article regarding this matter is at http://www.networkworld.com/community/blog/it-staff-engineers-among-top-10-toughest-jobs-fill-us


Submission + - Big Brother Chip (technologyreview.com)

Taco Cowboy writes: Just when you think things can't get any badder, here comes a chip that can pinpoint you, in-door and out

It can even tell others on which floor of a building you are located

It's the Broadcom 4752 chip

It takes signals from global navigation satellites, cell phone towers, and Wi-Fi hot spots, coupled with input from gyroscopes, accelerometers, step counters, and altimeters

The company calls abilities like this "ubiquitous navigation," and the idea is that it will enable a new kind of e-commerce predicated on the fact that shopkeepers will know the moment you walk by their front door, or when you are looking at a particular product, and can offer you coupons at that instant.


Submission + - The BYOD Threat - the internal threat (networkcomputing.com)

Taco Cowboy writes: The acronym "BYOD" stands for "Bring Your Own Device" — a common practice in many corporate setting whereby employees are allowed to 'bring your own device' to work and IT will allow it to access the corporate network.

BYOD can also be known as Bring Your Own Disaster

“Consumer devices were never intended to be highly secure,” says Steve Durbin, global vice president of the Information Security Forum (ISF)

“Unless you’ve thought through your BYOD strategy, unless you’ve put in place some real good governance around it and you get your users to sign up to acceptable use policies, there’s very little you can do to enforce some of these things,” he adds

Another source is at http://www.networkcomputing.com/private-cloud/232300473?cid=nwc_trk_ts_inline


Submission + - Embedded "Kill Switch" in upcoming Win 8 ? (businessweek.com)

Taco Cowboy writes: Just in case you are enthusiastic about the arrival of Windows 8 from Microsoft, here is a caveat — Windows 8 contains a "kill switch", which, strangely, Microsoft doesn't want to say too much, other than a cryptic warning that "it might be compelled to use it for legal or security reasons"

Submission + - iPhone with embedded cardiac sensor? (unwiredview.com) 2

Taco Cowboy writes: Apple wants to embed cardiac sensors into an iPhone case to identify you

Apple has an idea of a new biometric recognition approach on your iPhone, to make the process seamlessly “magical”.

By embedding the cardiac sensors in iPhone case: ( http://www.unwiredview.com/wp-content/uploads/2010/05/iPhone-EKG1.jpg )

When you hold an iPhone in your hand, cardiac sensors, integrated into the iPhone case, are able to monitor your heart rhythm, and identify the person holding the device.

And that’s about it. No passwords that can be glimpsed or guessed, fancy gesture movements on a touchscreen, that can be easily recognized. Just pick up an iPhone, and it already knows it’s you.

Slashdot Top Deals

But it does move! -- Galileo Galilei