Skip to main content

Entry 2 - China's Quest for Quantum Computing

NSA Headquarters

Quantum- not just a buzz word

Traditional computing encodes information with the use of bits, that is a series of ones and zeroes. The quickly emerging field of quantum computing makes use of quantum bits, differing in nature from binary bits in that they can be ones and zeroes simultaneously. Quantum processors are still in development, but because of their massive computing potential both private industry and governments around the world are racing to champion the technology.

Applications in computer science

Math and science fields would probably be the most obvious benefactors of a breakthrough in quantum computing, by enabling faster computations and more intricate modeling. A lesser known, yet equally exciting application is known as quantum metrology. By measuring small gravitational changes, this technology would enable self contained navigational systems for use in autonomous vehicles of all sorts, without the need for traditional GPS. (1)

What's the big deal?

The National Security Administration, the agency that houses cyber security operations for the US government, has declared quantum computing a threat that governments must work to learn more about if they hope to keep their cyber ops safe. (2) While there is no immediate threat, countries like China are investing billions in research efforts that could have enormous impacts on cyber security and national defense. (1) The NSA's concern is warranted, even with no immediate danger in quantum tech, countries like China are gearing up to position themselves as leaders in quantum computing, a race the US would be best suited not losing.

References

(1) https:///ww.popsci.com/chinas-launches-new-quantum-research-supercenter
(2) https://www.technologyreview.com/s/600715/nsa-says-it-must-act-now-against-the-quantum-computing-threat/

Comments

  1. Your conclusion on how the government finds quantum computing to be a threat is very interesting. Many seem to focus simply on physical threats like nuclear weapons. However, the threat that is proposed by sophisticated technological advancements is definitely real and it is important that we are prepared for what other countries might have planned for us.

    ReplyDelete

Post a Comment

Popular posts from this blog

Entry 5 - Protecting Anonymity

Terminology TOR- "the onion router" or the idea of wrapping a communication in several layers of encryption Mixnet - series of servers that changes the order in which messages are sent and received before being delivered Staying under the radar Privacy comes in many different forms when we think of the internet. Most people are probably familiar with the idea of private accounts on social media, being able to restrict who sees what you post, and private browsing options on things like Google Chrome and Safari. The word privacy in these cases is a matter of personal comfort and a sense of security, but what if your actual safety depended on this privacy ? Would you trust Facebook, or your favorite web browser to safeguard your anonymity? Probably not. Countries around the world practicing internet censorship obviously don't support internet privacy and so anyone interested in skirting these censors has to find another, safer way to achieve privacy, or r...

Entry 1 - Defending the IoT

T he internet of things, or IoT, is getting a lot of attention with the exploding popularity of smart home devices and general connectedness of the world in general, but what exactly is it and how safe is it? What is IoT IoT can be summarized as the network of devices equipped with electronics, sensors, software and connectivity that allows them to send information to, and receive information from other IoT devices. The super popular Nest home thermostat for example, is on the IoT because it senses temperature in the home, adjusts settings on your A/C or heating units, and relays this information via the internet to your mobile device. Beyond the home it utilizes information on weather conditions and forecasts from weather stations in the area. Now example this small scale application of the IoT on an enormous scale. The thermostat is now controlling the heating and cooling in laboratories at the CDC. Any unwanted variation in temperature could have potentially disastrous ...

Entry 4 - Location, location, location...

The Anonymity of Location Services The advent of the cell phone and subsequently the smartphone has put a world of knowledge at our fingertips. Recipes, maps, music and much more are just a few clicks away, whenever we want them, wherever we want them. This is great for productivity and connectivity, but herein lies the danger to our privacy. Location services drive much of the functionality and enhance the user's experience on many of today's most popular apps, specifically social media applications. Apps encourage "checking in" and "tagging" people and locations attached to posts, and users often accept the risk of sharing their information because of " hyperbolic discounting" , where people focus on the immediate benefit and discount future risk. (3) Some users chose to disable location services, an option that should t heoretically make a user's location private, but recent studies show that this might be a false sense of security....