Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
Compare cell phone plans using Wirefly's innovative plan comparison tool ×
Security

Submission + - "Unbreakable Message Exchange" using single photon (sciencedaily.com)

Taco Cowboy writes: Quantum Key Distribution (QKD) is a process that enables two parties, 'Alice' and 'Bob', to share a secret key that can then be used to protect data they want to send to each other. The secret key is made up of a stream of photons that 'spin' in different directions — vertically, horizontally or diagonally — according to the sender's preferences.

The laws of physics state that it is not possible to measure the state, or 'spin', of a particle like a photon without altering it, so if 'Eve' attempted to intercept the key that was sent between 'Alice' and 'Bob', it would become instantly noticeable.

The use of QKD for message encryption is not new, as it has been used to encode the national election ballot results in Switzerland in 2007.

The techniques currently being used on a commercial scale rely on lasers to create the source of photons, however, may come with a potential defect — The emission events in lasers occur completely random in time, sometimes results in the emission of two photons very close to each other.

Single photon sources are predestined for use in the secure communication systems using quantum communication protocols of the future, with the benefit of having a single photon source emits exactly one photon upon a trigger event, giving further enhancement on the security.

In the new experiment, the single photons were produced with high efficiency, then made into a key and successfully transmitted from the sender to the receiver across 40 cm of free space in the laboratory.

Security

Submission + - Beware of Scammers impersonating as FBI ! (wordpress.com)

Taco Cowboy writes: There are scammers and then there are scammers impersonating as FBI

The FBI are troubled by Nigerian scammers impersonating themselves as FBI agents, so much as that FBI is saying that it has become one of the worst online threats

An example email is available at http://419advancefeefraud.blogspot.com/2012/05/nigerian-scammer-impersonating-fbi.html

Two youtube clips also report about the scam

http://www.youtube.com/watch?v=lFE2NXiYIs0
http://www.youtube.com/watch?v=D82MzqwyK8A

Another article regarding this matter is at http://www.networkworld.com/community/blog/it-staff-engineers-among-top-10-toughest-jobs-fill-us

Privacy

Submission + - Big Brother Chip (technologyreview.com)

Taco Cowboy writes: Just when you think things can't get any badder, here comes a chip that can pinpoint you, in-door and out

It can even tell others on which floor of a building you are located

It's the Broadcom 4752 chip

It takes signals from global navigation satellites, cell phone towers, and Wi-Fi hot spots, coupled with input from gyroscopes, accelerometers, step counters, and altimeters

The company calls abilities like this "ubiquitous navigation," and the idea is that it will enable a new kind of e-commerce predicated on the fact that shopkeepers will know the moment you walk by their front door, or when you are looking at a particular product, and can offer you coupons at that instant.

Android

Submission + - The BYOD Threat - the internal threat (networkcomputing.com)

Taco Cowboy writes: The acronym "BYOD" stands for "Bring Your Own Device" — a common practice in many corporate setting whereby employees are allowed to 'bring your own device' to work and IT will allow it to access the corporate network.

BYOD can also be known as Bring Your Own Disaster

“Consumer devices were never intended to be highly secure,” says Steve Durbin, global vice president of the Information Security Forum (ISF)

“Unless you’ve thought through your BYOD strategy, unless you’ve put in place some real good governance around it and you get your users to sign up to acceptable use policies, there’s very little you can do to enforce some of these things,” he adds

Another source is at http://www.networkcomputing.com/private-cloud/232300473?cid=nwc_trk_ts_inline

Microsoft

Submission + - Embedded "Kill Switch" in upcoming Win 8 ? (businessweek.com)

Taco Cowboy writes: Just in case you are enthusiastic about the arrival of Windows 8 from Microsoft, here is a caveat — Windows 8 contains a "kill switch", which, strangely, Microsoft doesn't want to say too much, other than a cryptic warning that "it might be compelled to use it for legal or security reasons"
Medicine

Submission + - iPhone with embedded cardiac sensor? (unwiredview.com) 2

Taco Cowboy writes: Apple wants to embed cardiac sensors into an iPhone case to identify you

Apple has an idea of a new biometric recognition approach on your iPhone, to make the process seamlessly “magical”.

By embedding the cardiac sensors in iPhone case: ( http://www.unwiredview.com/wp-content/uploads/2010/05/iPhone-EKG1.jpg )

When you hold an iPhone in your hand, cardiac sensors, integrated into the iPhone case, are able to monitor your heart rhythm, and identify the person holding the device.

And that’s about it. No passwords that can be glimpsed or guessed, fancy gesture movements on a touchscreen, that can be easily recognized. Just pick up an iPhone, and it already knows it’s you.

Slashdot Top Deals

If the facts don't fit the theory, change the facts. -- Albert Einstein

Working...