quantum cryptography

25 results back to index


The Code Book: The Science of Secrecy From Ancient Egypt to Quantum Cryptography by Simon Singh

Bletchley Park, Charles Babbage, Donald Davies, friendly fire, information security, Leo Hollis, Mikhail Gorbachev, old-boy network, operational security, quantum cryptography, Ronald Reagan, Schrödinger's Cat, Simon Singh, Turing machine, unbiased observer, undersea cable, Zimmermann PGP

The really important question is whether quantum cryptography will arrive in time to save us from the threat of quantum computers, or whether there will be a privacy gap, a period between the development of quantum computers and the advent of quantum cryptography. So far, quantum cryptography is the more advanced technology. The Swiss experiment with optic fibers demonstrates that it would be feasible to build a system that permits secure communication between financial institutions within a single city. Indeed, it is currently possible to build a quantum cryptography link between the White House and the Pentagon. Perhaps there already is one. Quantum cryptography would mark the end of the battle between codemakers and codebreakers, and the codemakers emerge victorious. Quantum cryptography is an unbreakable system of encryption.

So far the Los Alamos group has succeeded in transmitting a quantum key through air over a distance of 1 km. Security experts are now wondering how long it will be before quantum cryptography becomes a practical technology. At the moment there is no advantage in having quantum cryptography, because the RSA cipher already gives us access to effectively unbreakable encryption. However, if quantum computers were to become a reality, then RSA and all other modern ciphers would be useless, and quantum cryptography would become a necessity. So the race is on. The really important question is whether quantum cryptography will arrive in time to save us from the threat of quantum computers, or whether there will be a privacy gap, a period between the development of quantum computers and the advent of quantum cryptography.

With hindsight, we can see that the cryptanalysts would inevitably figure out a way of breaking each cipher, or developing technology that would break it for them. However, the claim that quantum cryptography is secure is qualitatively different from all previous claims. Quantum cryptography is not just effectively unbreakable, it is absolutely unbreakable. Quantum theory, the most successful theory in the history of physics, means that it is impossible for Eve to intercept accurately the onetime pad key established between Alice and Bob. Eve cannot even attempt to intercept the onetime pad key without Alice and Bob being warned of her eavesdropping. Indeed, if a message protected by quantum cryptography were ever to be deciphered, it would mean that quantum theory is flawed, which would have devastating implications for physicists; they would be forced to reconsider their understanding of how the universe operates at the most fundamental level.


pages: 236 words: 50,763

The Golden Ticket: P, NP, and the Search for the Impossible by Lance Fortnow

Alan Turing: On Computable Numbers, with an Application to the Entscheidungsproblem, Albert Einstein, Andrew Wiles, Claude Shannon: information theory, cloud computing, complexity theory, Donald Knuth, Erdős number, four colour theorem, Gerolamo Cardano, Isaac Newton, James Webb Space Telescope, Johannes Kepler, John von Neumann, Large Hadron Collider, linear programming, new economy, NP-complete, Occam's razor, P = NP, Paul Erdős, quantum cryptography, quantum entanglement, Richard Feynman, Rubik’s Cube, seminal paper, smart grid, Stephen Hawking, traveling salesman, Turing machine, Turing test, Watson beat the top human players on Jeopardy!, William of Occam

Unlike quantum computing, the basic Bennett-Brassard protocol does not require quantum entanglement, and also unlike quantum computing, there are working implementations of medium-scale quantum cryptography. Researchers at Los Alamos have successfully sent messages over ninety-two miles through fiber optic cables. Others have sent messages between two of the Canary Islands through the air, a distance of nearly ninety miles. One day in the near future we may be able to use quantum techniques to send unbreakable codes via satellite. So why don’t we use quantum cryptography for all secrecy needs? Quantum cryptography is still in the experimental stage, quite expensive, not much bandwidth, and prone to error.

The drive would be created by some trusted organization (the U.S. government?) with some method of providing the same pad securely to Facebook and other companies as well. P = NP makes most things much easier, but it makes cryptography a bit more painful. Facebook could also use quantum mechanics to both create and transmit a pad to Alice. We’ll talk more about quantum cryptography in the next chapter, but that approach will likely be too expensive to use on a large scale. Zero-Knowledge Sudoku Bob was spending his lunch hour struggling to solve a Sudoku puzzle from to the day’s newspaper. Bob exclaims in agony, “There must be a mistake in the paper, for this Sudoku puzzle cannot have a solution.”

In the decades that followed, computer scientists and physicists, often working together, showed in theory that quantum computers can solve certain problems, such as factoring numbers, much faster. Whether we can actually build large or even medium-scale working quantum computers and determine exactly what these computers can or cannot do still remain significant challenges. In this chapter we explore the power of quantum computing, as well as the related concepts of quantum cryptography and teleportation. The Quantum DVR Tom is a Bostonian and, of course, a huge Red Sox fan. The New York Yankees played in Boston earlier in the day but Tom had to work, and he purposely avoided reading anything about the game. When he got home he ordered in some pizza, fired up the DVR, and started watching the game hours after it had ended.


pages: 287 words: 87,204

Erwin Schrodinger and the Quantum Revolution by John Gribbin

Albert Einstein, Albert Michelson, All science is either physics or stamp collecting, Arthur Eddington, British Empire, Brownian motion, double helix, Drosophila, Eddington experiment, Edmond Halley, Ernest Rutherford, Fellow of the Royal Society, Gregor Mendel, Henri Poincaré, Isaac Newton, Johannes Kepler, John von Neumann, Large Hadron Collider, lateral thinking, quantum cryptography, quantum entanglement, Richard Feynman, Schrödinger's Cat, The Present Situation in Quantum Mechanics, the scientific method, trade route, upwardly mobile

Together with William Wooters he proved that “a single photon cannot be cloned,” and used that phrase as the title for a paper published in Nature in October 1982 which began: “Note that if photons could be cloned, a plausible argument could be made for the possibility of faster-than-light communication.” Although it ruled out FTL signalling, it was the “no cloning theorem,” also discovered independently by the Dutch physicist Dennis Dieks, that opened the way to the practical use of quantum entanglement to create uncrackable codes—quantum cryptography. There are several approaches to the problem of quantum cryptography, but they all depend on code systems that use a “key” of random numbers. The description here is adapted from my book Schrödinger’s Kittens, since I could not see any way to improve on it. The kind of code I want to describe is familiar from spy stories.

Life itself Quantum chemistry The green pamphlet Schrödinger’s variation on the theme The double helix Chapter Thirteen: Back to Vienna Farewell to Dublin Home is the hero Declining years The triumph of entropy Chapter Fourteen: Schrödinger’s Scientific Legacy Hidden reality and a mathematician’s mistake The Bell test and the Aspect experiment Quantum cryptography and the “no cloning” theorem Quantum teleportation and classical information The quantum computer and the Multiverse Quantum physics and reality Postscript Sources and Further Reading Index Copyright © 2013 by Mary and John Gribbin. All rights reserved Cover Design: Tom Poland Cover Image: Professor Erwin Schrödinger © Bettmann/CORBIS Published by John Wiley & Sons, Inc., Hoboken, New Jersey First published in Great Britain in 2012 by Bantam Press an imprint of Transworld Publishers No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600, or on the web at www.copyright.com.

But a few maverick physicists made a series of wrong-headed but sophisticated attempts to prove that entanglement offers a way to send messages faster than light. They were ultimately proved wrong, but research partly stimulated by their quest has led quantum physics into the almost equally exotic realms of cryptography and teleportation. Quantum cryptography and the “no cloning” theorem One of the people who tried to devise a way to use entanglement to send messages faster than light was Nick Herbert, an American physicist who had completed a PhD at Stanford University in 1967, but had been unable to get an academic post and had worked in a variety of jobs while pursuing his interest in quantum physics in his spare time, together with a group of like-minded thinkers based in Berkeley, California.


pages: 277 words: 87,082

Beyond Weird by Philip Ball

Albert Einstein, Bayesian statistics, cosmic microwave background, dark matter, dark pattern, dematerialisation, Ernest Rutherford, experimental subject, Higgs boson, Isaac Newton, John von Neumann, Kickstarter, Large Hadron Collider, Murray Gell-Mann, quantum cryptography, quantum entanglement, Richard Feynman, Schrödinger's Cat, Stephen Hawking, theory of mind, Thomas Bayes

Dominic Mayers of the University of Montreal showed in 1997 that for quantum cryptography this unconditionally secure bit commitment is impossible. That doesn’t undermine quantum cryptography, which can still be made secure for all practical purposes. But it exposes some of the limits of what is possible. Well, so far so cryptic. What can be so fundamental about a desideratum for sending secure information? But as we saw earlier, the very existence of quantum information technologies such as quantum computing and quantum cryptography stems from deep features of quantum mechanics. It’s not so much that these features lend themselves to applications in information processing (although that’s true), but that quantum mechanics is increasingly – as Bub says – about information.

Inspired by a much earlier suggestion of physicist Stephen Wiesner of Columbia University, Charles Bennett and Gilles Brassard pointed out in the early 1980s that quantum correlations between entangled states can be exploited to send information encoded in qubits that is immune to eavesdropping. The signal could never be intercepted and read without the tampering being detected. This was the start of the technology known as quantum cryptography. The idea goes like this. Alice encodes her message in two entangled qubits – 1s and 0s represented by, say, the polarization states of pairs of photons. One photon from each entangled pair is then sent to Bob, who measures their states and so decodes the message. There are several methods (protocols) for making this process tamper-proof, but in general they exploit the fact that if an eavesdropper (Eve) intercepts any of these photons, with an unknown polarization state, she can’t copy it because she doesn’t know exactly how Alice prepared it and so is snookered by quantum no-cloning.

The upshot is that, once Bob has discarded the one in four results he measured wrongly, he and Alice then find there is still not a perfect match in their ‘checking’ subset. This tells them that the transmission was intercepted. So it’s not that the optical signal can’t be intercepted; it can be. But Eve’s snooping can never be hidden from Alice and Bob. Quantum cryptography, says Brassard, ‘offers an unbreakable method for code-makers42 to win the battle once and for all against any possible attack available to codebreakers’. Bennett, Brassard and their students achieved a crude experimental demonstration of their protocol in 1989: adequate to show that the idea could be made to work but nowhere near good enough to be practically useful.


Applied Cryptography: Protocols, Algorithms, and Source Code in C by Bruce Schneier

active measures, cellular automata, Claude Shannon: information theory, complexity theory, dark matter, Donald Davies, Donald Knuth, dumpster diving, Dutch auction, end-to-end encryption, Exxon Valdez, fault tolerance, finite state, heat death of the universe, information security, invisible hand, John von Neumann, knapsack problem, MITM: man-in-the-middle, Multics, NP-complete, OSI model, P = NP, packet switching, quantum cryptography, RAND corporation, RFC: Request For Comment, seminal paper, software patent, telemarketer, traveling salesman, Turing machine, web of trust, Zimmermann PGP

Smolin, “Experimental Quantum Cryptography,” Advances in Cryptology—EUROCRYPT ’90 Proceedings, Springer–Verlag, 1991, pp. 253–265. 122. C.H. Bennett, F. Bessette, G. Brassard, L. Salvail, and J. Smolin, “Experimental Quantum Cryptography,” Journal of Cryptology, v. 5, n. 1, 1992, pp. 3–28. 123. C.H. Bennett and G. Brassard, “Quantum Cryptography: Public Key Distribution and Coin Tossing,” Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing, Banjalore, India, Dec 1984, pp. 175–179. 124. C.H. Bennett and G. Brassard, “An Update on Quantum Cryptography,” Advances in Cryptology: Proceedings of CRYPTO 84, Springer–Verlag, 1985, pp. 475–480. 125.

Charles Bennett, Gilles Brassard, Claude Crépeau, and others have expanded on this idea, describing quantum key distribution, quantum coin flipping, quantum bit commitment, quantum oblivious transfer, and quantum secure multiparty computation. Their work is described in [128,129,123,124,125,133,126,394,134,392,396]. The best overview of quantum cryptography can be found in [131]; [1651] is another good nontechnical overview. A complete bibliography of quantum cryptography is [237]. This would still be on the lunatic fringe of cryptography, but Bennett and Brassard actually went and built a working model of the thing [127,121,122]. Now we have experimental quantum cryptography. So sit back, get yourself something to drink, and relax. I’m going to explain what this is all about. According to quantum mechanics, particles don’t actually exist in any single place.

Brassard, “Quantum Public Key Distribution Reinvented,” SIGACT News, v. 18, n. 4, 1987, pp. 51–53. 127. C.H. Bennett and G. Brassard, “The Dawn of a New Era for Quantum Cryptography: The Experimental Prototype is Working!” SIGACT News, v. 20, n. 4, Fall 1989, pp. 78–82. 128. C.H. Bennett, G. Brassard, and S. Breidbart, Quantum Cryptography II: How to Re–Use a One–Time Pad Safely Even if P=NP, unpublished manuscript, Nov 1982. 129. C.H. Bennett, G. Brassard, S. Breidbart, and S. Weisner, “Quantum Cryptography, or Unforgeable Subway Tokens,” Advances in Cryptology: Proceedings of Crypto 82, Plenum Press, 1983, pp. 267–275. 130. C.H.


pages: 247 words: 60,543

The Currency Cold War: Cash and Cryptography, Hash Rates and Hegemony by David G. W. Birch

"World Economic Forum" Davos, Alan Greenspan, algorithmic management, AlphaGo, bank run, Big Tech, bitcoin, blockchain, Bretton Woods, BRICs, British Empire, business cycle, capital controls, cashless society, central bank independence, COVID-19, cross-border payments, cryptocurrency, Diane Coyle, disintermediation, distributed ledger, Donald Trump, driverless car, Elon Musk, Ethereum, ethereum blockchain, facts on the ground, fault tolerance, fiat currency, financial exclusion, financial innovation, financial intermediation, floating exchange rates, forward guidance, Fractional reserve banking, global reserve currency, global supply chain, global village, Hyman Minsky, information security, initial coin offering, Internet of things, Jaron Lanier, Kenneth Rogoff, knowledge economy, M-Pesa, Mark Zuckerberg, market clearing, market design, Marshall McLuhan, mobile money, Money creation, money: store of value / unit of account / medium of exchange, moral hazard, Network effects, new economy, Northern Rock, one-China policy, Overton Window, PalmPilot, pattern recognition, Pingit, QR code, quantum cryptography, race to the bottom, railway mania, ransomware, Real Time Gross Settlement, reserve currency, Satoshi Nakamoto, seigniorage, Silicon Valley, smart contracts, social distancing, sovereign wealth fund, special drawing rights, subscription business, the payments system, too big to fail, transaction costs, Vitalik Buterin, Washington Consensus

As an International Monetary Fund (IMF) paper on the subject puts it (see Adrian and Mancini-Griffoli 2019), digital money systems ‘could for instance allow users to determine the goods that e-money could purchase – a useful feature for remittances or philanthropic donations’. That is only the tip of the iceberg, to my mind. An aside: post-quantum cryptography Much of the discussion about meta-technology here rests on the use of asymmetric cryptography (which uses public and private keys), which is at the heart of the practical implementation of e-money. Before I am deluged with letters from sophisticated and educated readers pointing out that the advent of quantum computing may well render widely deployed asymmetric cryptography null and void … I know.

Countermeasures Broadly speaking, there are two very different approaches to protecting against the threat posed by quantum computation. One is quantum key distribution, or QKD. This exploits the quantum properties of physical systems, so it requires specialized hardware. The other is post-quantum cryptography, or PQC, which, as with existing forms of asymmetric cryptography, exploits the intractability of certain mathematical problems, so it can be implemented in hardware or software. The goal of PQC (also called quantum-resistant cryptography, or QRC) is to develop cryptographic systems that are secure against both quantum and classical computers, and that can interoperate with existing communications protocols and networks.

Glossary ACU: alternative currency unit AI: artificial intelligence AML: Anti-Money Laundering AMLDV: Anti-Money Laundering Directive API: application programming interface BIS: Bank for International Settlements BRI: Belt and Road Initiative (China) BSA: Bank Secrecy Act (United States) CBDC: central bank digital currency CDD: customer due diligence CDP: collateralized debt position CFA: Franc of the Financial Community of Africa CFSI: Centre for the Study of Financial Innovation CHIPS: Clearing House Interbank Payment System CPS: Crime Pays System CTF: counter-terrorist financing DCA: digital currency area DCEP: Digital Currency/Electronic Payment DeFi: decentralized finance ECB: European Central Bank ECU: European Currency Unit ELMI: Electronic Money Institution ESL: enterprise shared ledger FinCEN: Financial Crimes Enforcement Network FINMA: Financial Market Supervisory Authority ICO: initial coin offering IMF: International Monetary Fund IMFS: International Monetary and Financial System JPMC: JPMorgan Chase SHC: synthetic hegemonic currency HMRC: Her Majesty’s Revenue and Customs KYC: Know Your Customer KYZ: Known-bY-Zuck NFC: near-field communication NCSC: National Cyber Security Centre NIST: National Institute of Standards and Technology OFAC: Office of Foreign Assets Control PBoC: People’s Bank of China PEPSI: Pan-European Payment System Initiative PIN: personal identification number Pseudonym: a persistent alias to an identity PQC: post-quantum cryptography SDR: special drawing right SEC: Securities and Exchange Commission SGA (Saga): a partially collateralized stablecoin SHC: synthetic hegemonic currency Sibos: The annual SWIFT banking conference SIM: subscriber identification module, the chip inside a digital mobile phone that links the device to a user SMS: short message service (the GSM text message service) SWIFT: Society for Worldwide Interbank Financial Telecommunications USSD: Unstructured Supplementary Service Data Bibliography Adrian, T., and T.


pages: 511 words: 139,108

The Fabric of Reality by David Deutsch

Any sufficiently advanced technology is indistinguishable from magic, Arthur Eddington, Boeing 747, butterfly effect, coherent worldview, complexity theory, Computing Machinery and Intelligence, conceptual framework, cosmological principle, different worldview, Donald Knuth, Douglas Hofstadter, Eddington experiment, Georg Cantor, Gödel, Escher, Bach, Johannes Kepler, Occam's razor, phenotype, quantum cryptography, Richard Feynman, scientific worldview, Stephen Hawking, the scientific method, Thomas Kuhn: the structure of scientific revolutions, time dilation, Turing machine

But there is an additional class of new tasks open to quantum computers that no classical computer could perform at all. By a strange coincidence, one of the first of these tasks to be discovered also concerns public-key cryptography. This time it is not a matter of breaking an existing system, but of {217} implementing a new, absolutely secure system of quantum cryptography. In 1989, at IBM Research, Yorktown Heights, New York, in the office of the theoretician Charles Bennett, the first working quantum computer was built. It was a special-purpose quantum computer consisting of a pair of quantum cryptographic devices designed by Bennett and pilles Brassard of the University of Montreal.

At worst, persistent eavesdropper might prevent any communication froi taking place at all (though of course that is more easily achievr just by cutting the telephone line). But as for reading a message, {218} only the intended recipient can do that, and the guarantee of that is provided by the laws of physics. Because quantum cryptography depends on manipulating individual photons, it suffers from a major limitation. Each photon that is successfully received, carrying one bit of the message, must somehow have been transmitted intact from the transmitter to the receiver. But every method of transmission involves losses, and if these are too heavy the message will never arrive.

The best existing quantum-cryptographic systems use fibre-optic cables and have a range of about ten kilometres. This would suffice to provide, say, the financial district of a city with absolutely secure internal communications. Marketable systems may not be far away, but to solve the problem of public-key cryptography in general - say, for global communication - further advances in quantum cryptography are required. Experimental and theoretical research in the field of quantum computation is accelerating world-wide. Ever more promising new technologies for realizing quantum computers are being proposed, and new types of quantum computation with various advantages over classical computation are continually being discovered and analysed.


pages: 211 words: 57,618

Quantum Computing for Everyone by Chris Bernhardt

Albert Einstein, complexity theory, correlation does not imply causation, discrete time, John von Neumann, low earth orbit, P = NP, quantum cryptography, quantum entanglement, reversible computing, Richard Feynman, selection bias, Turing machine, Von Neumann architecture

The mathematical model of spin or, equivalently, that of polarization is given using linear algebra. This enables us to give the definition of a qubit and to describe exactly what happens when we measure it. Several examples of measuring qubits in different directions are given. The chapter ends with an introduction to quantum cryptography, describing the BB84 protocol. Chapter 4. This chapter describes what it means for two qubits to be entangled. Entanglement is difficult to describe in words, but it is easy to describe mathematically. The new mathematical idea is the tensor product. This is the simplest way of combining mathematical models of individual qubits to give one model that describes a collection of qubits.

Over the years other methods of encryption have been developed, but Shor’s algorithm also works on many of these. It has become clear that we need to develop new cryptographic methods—and these new methods should be able to withstand not just classical attacks but also attacks by quantum computers. Post-quantum cryptography is now an extremely active area, with new methods of encryption being developed. Of course, there is no reason why these have to use quantum computing. We just need the encrypted message to be able to withstand being broken by a quantum computer. But quantum ideas do give us ways of constructing secure codes.

See Complexity classes, EQP Exponential time, 143 Fan-out, 100 Feynman, Richard, 89, 115, 182 Flip about the mean, 179 Flip-flop, 103 Fredkin, Edward, 89, 111, 115 Freedman, Stuart, 82 Function balanced, 146 constant, 146 Functional completeness, 94–96 Garbage bit, 109 Gate AND, 98 controlled not (CNOT), 67, 105 Fredkin, 109 Hadamard, 122 NAND, 99 NOT, 98 OR, 99 Pauli, 121 quantum, 117, 120 reversible, 102 switch, 111 Toffoli, 107 universal, 101, 108, 110, 123 XOR, 102 Gerlach, Walther, 1 Google, 184 Gravity, 75–76 Grover, Lov, 176 Half-adder, 102–103 Hidden variables, 11, 71, 77–78 IBM, 182, 184 ID Quantique, 176 Interference, 52–53, 174 Ion-trap, 183 Josephson junction, 183 Ket, 19 Kronecker product, 149–152 Landauer limit, 105 Linear algebra toolbox, 35 Linearly independent, 165 Linear superposition, 50 Local realism, 71, 75–76 Logical equivalence, 93 Many-worlds view, 85 Matrix, 30 Hadamard, 159–160 identity, 32 Kronecker product, 149–152 main diagonal, 32 multiplication, 31, 32 not commutative, 32 orthogonal, 34 square, 32 transpose, 31 unitary, 34 Micius, 176 Millennium Prize, 144 NMR machine, 185 No cloning theorem, 124–126, 134, 138 Non-commutative operation, 32, 58 NVision Imaging Technologies, 185 Oracle, 145 Ordered basis, 29 Orthonormal basis, 25 Parallelogram law, 22 Parallel universes, 187 Parity check, 137–139 Pauli, Wolfgang, 121 Pauli transformations, 121 Peirce, Charles Sanders, 97 Petzold, Charles, 101 Photosynthesis, 182 Podolsky, Boris, 76 Polarization, 11–15 Polarized filters, 12–15 Polynomial time, 142–144 Post-quantum cryptography, 175 Probability, 37–38 Probability amplitude, 29, 39, 52 Pseudorandom numbers, 15 P versus NP, 144 Pythagorean theorem, 20 Quadratic speedup, 180 Quantized spin, 15 Quantum annealing, 185–186 Quantum bit, 1, 49–50 Quantum bit-flip correction, 137–140 Quantum clock, 6, 14, 68–69, 78 Quantum Fourier transform, 174 Quantum key distribution (QKD), 53, 86, 175–176 Quantum parallelism, 141, 168–169 Quantum speedup, 141 Quantum supremacy, 184, 186–188 Quantum teleportation, 132–135, 176 Quantum tunneling, 186 Qubit.


pages: 315 words: 89,861

The Simulation Hypothesis by Rizwan Virk

3D printing, Albert Einstein, AlphaGo, Apple II, artificial general intelligence, augmented reality, Benoit Mandelbrot, bioinformatics, butterfly effect, Colossal Cave Adventure, Computing Machinery and Intelligence, DeepMind, discovery of DNA, Dmitri Mendeleev, Elon Musk, en.wikipedia.org, Ernest Rutherford, game design, Google Glasses, Isaac Newton, John von Neumann, Kickstarter, mandelbrot fractal, Marc Andreessen, Minecraft, natural language processing, Nick Bostrom, OpenAI, Pierre-Simon Laplace, Plato's cave, quantum cryptography, quantum entanglement, Ralph Waldo Emerson, Ray Kurzweil, Richard Feynman, Schrödinger's Cat, Search for Extraterrestrial Intelligence, Silicon Valley, Stephen Hawking, Steve Jobs, Steve Wozniak, technological singularity, TED Talk, time dilation, Turing test, Vernor Vinge, Zeno's paradox

As mentioned earlier, even though it was the result of a paper that Einstein coauthored with Rosen and Podolsky, Einstein himself derided the idea as “spooky action at a distance.” Since then, there has been confirmation that quantum entanglement exists, and it has even been used in the new field of quantum cryptography. Quantum cryptography relies on the strange property that if the quantum field is collapsed (by a particle or qubit being read or observed), then the other entangled particle (or qubit) will also be affected. Thus, it’s possible to know that someone has “read” the secret message. Recent experiments have shown that there are different ways for particles to become entangled.

Quantum entanglement seems to have the capacity for instantaneous communication across light years—which means that information would go from one part of our world to another faster than the speed of light. While physicists admit that quantum entanglement exists and is being used in applications like quantum cryptography, there is still plenty of debate about whether two entangled particles actually constitutes sending information from place A to B faster than the speed of light. No one knows exactly how or why quantum entanglement works. We’ll explore this idea and quantum computing in more detail in Chapter 11, Skeptics and Believers: Evidence of Computation, but once again the simulation hypothesis provides us with a model from the world of video games that may be relevant in explaining the previously unexplainable.

“simulated reality,” 75 physical world, creation of, 219–221 physics, new, 126–27 physics, old (classical), 124–26 physics engines, 16–17, 36–37, 123, 162, 176–78, 235, 283–84 physics engines vs. rendering engines, 51 “The Physics of Everything Else” (Vallée, TED talk, 2011), 240–41 picture element (pixel), 163 pixelated reality, 161 pixels 3D pixels and particles, 164–65 and 3D rendering engines, 59 characteristics of, 255 created by rendering engine, 51 definition of, 10 games rendered using, 2D to 3D, 42–44 information rendered as, 53 and particles, 162–64 physics engines vs. rendering engine, 51 and quanta, 167–69 rendered pixels, 135 value of, 162–64, 181, 262 and video game languages, 33 and virtual space (pixelated world), 181–82 pixels, experiments for evidence, 255–266 Planck, Max, 167–68, 290 Planck constant, 168, 267 Planck length, 168–69, 175, 181–82 Planck time, 181–82 Planetfall, 29 Plato, 201, 270–71 Play Labs, 6 player characters (PCs), 82, 280–81 player game state, 30 PMR (Physical Matter Reality), 157, 173–74 PNG, 163–64 Podolsky, Boris, 261 Pole Position, 34, 35f Pong, 24–25, 32, 32f possible futures, 12 posthuman civilization, 111–13 Princeton’s Advanced Engineering Research Lab (PEAR), 76 probability wave for a particle, 128f procedural generation, 47 procedurally generated world, 51 “Programming a Computer for Playing Chess” (Shannon, 1950), 85 Project Blue Book, 232 purely deterministic model, 125 Q QI (quantum indeterminancy), 11, 124 QI, philosophical questions raised by, 140–41 Qiyamah, Day of, 221–23 quanta, 10, 126–27, 161, 166–67, 181–82 quanta, of space, 167–69 quantized space and time, 173–76, 288 quantized time, 171–74 quantum computers, 257–260, 267, 273–74 quantum cryptography, 261 quantum entanglement, 179–182, 259–260 quantum entanglement and simulation, 261–63 quantum error correction, 259–260, 263 quantum foam, 168 quantum indeterminacy (QI), 11, 124, 134–35, 139–140, 253, 255, 257, 267, 282–83 quantum leap, 10, 127 quantum mechanics, 133, 168, 254–55, 259 quantum physics many worlds interpretation, 148–150 as new physics, 126–27 physical reality as quantized, 281–82 and physical world, 122–23 quanta in, 166–67 rendering engines based on QI, 283–84 and subjective reality, 10–13 quantum probability wave, 10–11, 130, 253 quantum probability wave, collapse of, 129–130 quantum superposition, 132–34 qubits (quantum bits), 258 quests, 285–86 quests and achievements, 210–11 quests and storylines, 41 R Raiders of the Lost Ark, 38 random number generators (RNGs), 76 raster image, 163–64 Ready Player One, 56–57, 61 “real object” definition, 68–69 reality nature of, 6 world views and religion, 5 real-time motion controls, 36 real-world rendering, 67 rebirth, 201 Reid, Harry, 232 reincarnation, 285–86 reincarnation, theoretical model, 205–8, 206f religion, mysticism and simulation hypothesis, 13–16 remote viewing, 243–44 rendered pixels, 135 rendered world, 42 rendering engine, 3D, 59 rendering engine rules, 138 rendering engine vs. physical engine, 51 rendering engines 2D to 3D, 58–59 and 3D world rendering, 66–67, 123 based on quantum indeterminacy, 282–83 for real world, 3D printers as, 69–71 and Simulation Point, 63–64 speed of, 66–67 rendering engines, speed of, 66 rendering engines vs. physical engines, 51 The Republic (Plato), 5, 270 resource argument, 250–52 retrocausality, 146 retrocausation, 160 Ricard, Matthieu, 207 Ringel, Zohar, 251–52 RNGs (random number generators), 76 role-playing games (RPGs), 38 role-playing games (RPGs), graphical, 39–42 room-scale VR, 55–56 Rosen, Nathan, 178, 261 RPGs (role-playing games), 38 RPGs (role-playing games), graphical, 39–42 Rucker, Rudy, 251–52 Rumi, 183 Rutherford, Ernest, 125, 167–68 Rutherford-Bohr planetary model, 125 S Samsara, 201 Sauvageau, Joe, 254–55 Savage, Martin J., 255 Saved by the Light (Brinkley, 1994), 229–230 Schrödinger, Erwin, 125, 132–34 Schrödinger’s Cat, 132–34, 140, 149, 259 science, goal of, 6 Science Advances, 251–52 scroll of deeds, 222–23 Second Life, 4, 45–46, 50, 56, 71, 177, 180, 191, 209–10, 213 Sedol, Lee, 87 Sega Genesis, 38 The Self-Aware Universe (Goswami), 133 self-contained world (video games), 2–3 SETI (Search for Extraterrestrial Intelligence), 236 seventh yoga, 197–99 Shannon, Claude, 23, 85–86, 104 Siddhartha Gautama, 203 simple programs, 266 The Sims, 4 simulated artificial intelligence (SAI), 281 simulated consciousness, 17–18 simulated world, 3 Simulation Argument, 5, 24–26, 110–11, 112f simulation game, 3–4 simulation hypothesis, 16 AI, gods and angels, 226–28 and conscious based arguments, 267 and dreams, 196–97 experiments for, 254–55 to explain the unexplainable, 20–21 fundamental question of, 4–5 the Great Simulation, 19–20 implications of Plato’s allegory of the cave, 270–71 OBEs, remote viewing, telepathy and other “unexplained” phenomena, 241–44 and parallel universes, 159–160 and quantum indeterminacy (QI), 139–140 and quantum physics, 10–13 and quests, 213–14 in religion and mysticism, 13–16 and resource based arguments, 267 and science fiction, 6–10 and simulations, computation and chaos, 18–19 storage of consciousness, 117 video game model based on karma, 211–13 virtual reality, artificial intelligence, and simulated consciousness, 16–18 as world explanation, 118–19 simulation hypothesis, arguments/experiment categories evidence of conditional rendering, 248–49 evidence of consciousness, 248 evidence of negation, 248 evidence of pixels or computation, 249 Simulation point, 20, 25–26 simulation point, stages current stage, 49–52 definition of, 26–27 reaching stage 9, 92–94 stage 0: text adventures and game worlds (1970s to mid-1980s), 27–31 stage 1: graphic arcade and console games (1970s-1980s), 32–38 stage 2: graphical adventure / RPG games (1980s- 1990s), 38–42 stage 3: 3D rendered MMORPGs and virtual worlds (1990s-Today), 42–48 stage 4: immersion using virtual reality, 54–62 stage 5: photorealistic augmented and mixed reality (AR, MR), 62–66 stage 6: real-world rendering: light-field display and 3D printing, 66–72 stage 7: mind interfaces, 72–77 stage 8: implanted memories, 77–80 stage 9: artificial intelligence and NPCs, 82–84 stage 10: downloadable consciousness and digital immortality, 100 stage 11: reaching the simulation point, 107–8 simulation point, defining, 107–8t simulation point, stage 9 requirements ability to create further AI, 94 learning over time, 93–94 Natural Language Processing (NLP), 92 natural language response, AI/NPCs, 92 physical interactions, 94 spatial awareness, 94 voice output, AI/NPCs, 93 voice recognition, AI/NPCs, 93 simulations, 153–55 simultaneity between events, 12 single-player text adventures, 27–31 singularity, 82, 100–101 The Singularity is Near (Kurzweil, 2005), 101 Siri, 88 Six Yogas of Naropa (Tsongkhapa), 192, 198 skeptics: resource argument, 250–52 Skyfall, 70 SNLP (statistical NLP), 89–90 social media and AGI, 98 Sony PlayStation VR headset, 60 Sophia (robot), 91, 91f souls, 285–86 Space Invaders, 34, 35f, 36, 82, 87, 208, 273 space time, 181–82 space time, instant travel, simulation overview, 176 quantum entanglement, 176, 180–81 teleportation, 176–78 wormholes, 176, 178–180 SpaceWar!


pages: 480 words: 123,979

Dawn of the New Everything: Encounters With Reality and Virtual Reality by Jaron Lanier

4chan, air gap, augmented reality, back-to-the-land, Big Tech, Bill Atkinson, Buckminster Fuller, Burning Man, carbon footprint, cloud computing, collaborative editing, commoditize, Computer Lib, cosmological constant, creative destruction, crowdsourcing, deep learning, Donald Trump, Douglas Engelbart, Douglas Hofstadter, El Camino Real, Elon Musk, fake news, Firefox, game design, general-purpose programming language, gig economy, Google Glasses, Grace Hopper, Gödel, Escher, Bach, Hacker Ethic, Hans Moravec, Howard Rheingold, hype cycle, impulse control, information asymmetry, intentional community, invisible hand, Ivan Sutherland, Jaron Lanier, John Gilmore, John Perry Barlow, John von Neumann, Kevin Kelly, Kickstarter, Kuiper Belt, lifelogging, mandelbrot fractal, Mark Zuckerberg, Marshall McLuhan, Menlo Park, military-industrial complex, Minecraft, Mitch Kapor, Mondo 2000, Mother of all demos, Murray Gell-Mann, Neal Stephenson, Netflix Prize, Network effects, new economy, Nick Bostrom, Norbert Wiener, Oculus Rift, pattern recognition, Paul Erdős, peak TV, Plato's cave, profit motive, Project Xanadu, quantum cryptography, Ray Kurzweil, reality distortion field, recommendation engine, Richard Feynman, Richard Stallman, Ronald Reagan, self-driving car, Silicon Valley, Silicon Valley startup, Skinner box, Skype, Snapchat, stem cell, Stephen Hawking, Steve Bannon, Steve Jobs, Steven Levy, Stewart Brand, systems thinking, technoutopianism, Ted Nelson, telemarketer, telepresence, telepresence robot, Thorstein Veblen, Turing test, Vernor Vinge, Whole Earth Catalog, Whole Earth Review, WikiLeaks, wikimedia commons

At the top of a chain of primitive gods would be a more profound idea of God, which is just as accessible without thinking about all the intermediate gods. Ultimate reality is always right in front of you, so why even pay the middlemen any mind? Or: I predicted that the success of quantum cryptography would suggest we’re not being observed, that we’re not in VR in any consequential way. Quantum cryptography uses the most fundamental properties of nature to absolutely prove that a message hasn’t been read before. The act of observation changes a quantum system no matter who observes, man or god. Quantum cryptography turned out to work! So, if you believe that argument, there’s now less reason to worry that we might be in VR. Another line of argument is usually associated with the more recent work of philosophers like Nick Bostrom, but it was around back at the Little Hunan.16 Roughly: If there is a multitude of alien civilizations, a bunch of them would develop high-quality VR, so there would be many VR systems running, but only one real universe.

See also cephalopods Octopus Butler Robot Oculus Oculus Rift oil exploration olfaction Olympics Ono, Yoko open-source movement operating system, first commercial optical bench optical sensors optic nerve optimizing compiler options for action, biasing Oracle Organ Mountains organomania origami oscillators oscilloscope pain management Palestine, Charlemagne Palo Alto Paracomp paralyzed bodies paranoia Parrish, Maxfield Pascal’s Wager patents Patricof, Alan pattern recognition Patterson, Penny Pauline, Mark Pausch, Randy Pavlov, Ivan PDP-11 computer Peace Prize of the German Book Trade Pentland, Sandy perception pereiopods perfection peripheral vision Perlin, Ken Perry, Commodore personal computers personal data, commerce and personal thinking Pfizer Phantom device phantom limbs phenotropic programming Philco photography photons physical reality physical therapy physics Piaget, Jean piano Piestrup, Ann McCormick pinnae Pixar Pixel Planes pixels Plants as Inventors (book) Platonic images Platonic sizzle Platonic Solids Pleiades Pluto Pocket Big Brain pointing and selecting on screen Polhemus Porras Luraschi, Javier postsymbolic communication poverty Power Glove power relationships Prime Directive printers Prisoner’s Dilemma privacy productivity software Programmers at Work (book) programming. See also code culture; hackers programming languages. See also specific languages projected augmented reality proprioception protocols Prozac psychedelic drugs psychedelic magazines PTSD Punch and Judy avatars punch cards Pynchon, Thomas quantum computing quantum cryptography quantum field theory racism radio Radio Shack radio waves Ramachandran, V. S. Rand, Ayn Rathinavel, Kishore Rational thought RB2 (Reality Built for Two) Reagan, Ronald Réalité virtuelle reality. See physical reality reality distortion field Reality Engines Reality Masher Reality on Wheels real time 3-D computers real-time shadows Reddit redundancy refraction reincarnation religious tolerance REM sleep Rent-a-Mom Republican Party retina retinal displays Rheingold, Howard Rhemann, Christoph Rhythm Gimbal rights, abstract vs. economic Robinette, Warren robotic arm robotic broomstick robotic hand robotic Loch Ness-type creature robotic mimic of mimic octopus robots robust system rock climbing Rockwell, Norman Rocky’s Boots Roddenberry, Gene Roko’s Basilisk Rosedale, Philip Rosen, Joe Rosenberg, Scott Rosenthal, Sally Roswell, New Mexico rounds, startups and Royal portable typewriter Rumi Russian intelligence sales tax Salisbury, Ken Sandin, Dan San Francisco San Francisco Bay Bridge Santa Cruz Sante, Luc Satava, Rick Sault Ste.


pages: 855 words: 178,507

The Information: A History, a Theory, a Flood by James Gleick

Ada Lovelace, Alan Turing: On Computable Numbers, with an Application to the Entscheidungsproblem, Albert Einstein, AltaVista, bank run, bioinformatics, Bletchley Park, Brownian motion, butterfly effect, Charles Babbage, citation needed, classic study, Claude Shannon: information theory, clockwork universe, computer age, Computing Machinery and Intelligence, conceptual framework, crowdsourcing, death of newspapers, discovery of DNA, Donald Knuth, double helix, Douglas Hofstadter, en.wikipedia.org, Eratosthenes, Fellow of the Royal Society, Gregor Mendel, Gödel, Escher, Bach, Henri Poincaré, Honoré de Balzac, index card, informal economy, information retrieval, invention of the printing press, invention of writing, Isaac Newton, Jacquard loom, Jaron Lanier, jimmy wales, Johannes Kepler, John von Neumann, Joseph-Marie Jacquard, Lewis Mumford, lifelogging, Louis Daguerre, machine translation, Marshall McLuhan, Menlo Park, microbiome, Milgram experiment, Network effects, New Journalism, Norbert Wiener, Norman Macrae, On the Economy of Machinery and Manufactures, PageRank, pattern recognition, phenotype, Pierre-Simon Laplace, pre–internet, quantum cryptography, Ralph Waldo Emerson, RAND corporation, reversible computing, Richard Feynman, Rubik’s Cube, Simon Singh, Socratic dialogue, Stephen Hawking, Steven Pinker, stochastic process, talking drums, the High Line, The Wisdom of Crowds, transcontinental railway, Turing machine, Turing test, women in the workforce, yottabyte

Bennett and his research assistant John Smolin jury-rigged it in 1988 and 1989 with a little help from the machine shop: an aluminum box spray-painted dull black on the inside and further sealed with rubber stoppers and black velvet.♦ With a helium-neon laser for alignment and high-voltage cells to polarize the photons, they sent the first message ever to be encoded by quantum cryptography. It was a demonstration of an information-processing task that could be effectively accomplished only via a quantum system. Quantum error correction, quantum teleportation, and quantum computers followed shortly behind. The quantum message passed between Alice and Bob, a ubiquitous mythical pair.

♦ STRAIGHT AND NARROW OLD IBM TYPE: Charles Bennett, quoted by George Johnson in “Rolf Landauer, Pioneer in Computer Theory, Dies at 72,” The New York Times, 30 April 1999. ♦ “YOU MIGHT SAY THIS IS THE REVENGE”: Interview, Charles Bennett, 27 October 2009. ♦ BENNETT AND HIS RESEARCH ASSISTANT: J. A. Smolin, “The Early Days of Experimental Quantum Cryptography,” IBM Journal of Research and Development 48 (2004): 47–52. ♦ “WE SAY THINGS SUCH AS ‘ALICE SENDS BOB’ ”: Barbara M. Terhal, “Is Entanglement Monogamous?” IBM Journal of Research and Development 48, no. 1 (2004): 71–78. ♦ FOLLOWING AN INTRICATE AND COMPLEX PROTOCOL: A detailed explanation can be found in Simon Singh, The Code Book: The Secret History of Codes and Codebreaking (London: Fourth Estate, 1999); it takes ten pages of exquisite prose, beginning at 339

“Notes on Landauer’s Principle, Reversible Computation, and Maxwell’s Demon.” arXiv:physics 0210005 v2 (2003). ———. “Publicity, Privacy, and Permanence of Information.” In Quantum Computing: Back Action 2006, AIP Conference Proceedings 864, edited by Debabrata Goswami. Melville, N.Y.: American Institute of Physics, 2006. Bennett, Charles H., and Gilles Brassard. “Quantum Cryptography: Public Key Distribution and Coin Tossing.” In Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, 175–79. Bangalore, India: 1984. Bennett, Charles H., Gilles Brassard, Claude Crépeau, Richard Jozsa, Asher Peres, and William K. Wootters. “Teleporting an Unknown Quantum State Via Dual Classical and Einstein-Podolsky-Rosen Channels.”


pages: 416 words: 106,532

Cryptoassets: The Innovative Investor's Guide to Bitcoin and Beyond: The Innovative Investor's Guide to Bitcoin and Beyond by Chris Burniske, Jack Tatar

Airbnb, Alan Greenspan, altcoin, Alvin Toffler, asset allocation, asset-backed security, autonomous vehicles, Bear Stearns, bitcoin, Bitcoin Ponzi scheme, blockchain, Blythe Masters, book value, business cycle, business process, buy and hold, capital controls, carbon tax, Carmen Reinhart, Clayton Christensen, clean water, cloud computing, collateralized debt obligation, commoditize, correlation coefficient, creative destruction, Credit Default Swap, credit default swaps / collateralized debt obligations, cryptocurrency, disintermediation, distributed ledger, diversification, diversified portfolio, Dogecoin, Donald Trump, Elon Musk, en.wikipedia.org, Ethereum, ethereum blockchain, fiat currency, financial engineering, financial innovation, fixed income, Future Shock, general purpose technology, George Gilder, Google Hangouts, high net worth, hype cycle, information security, initial coin offering, it's over 9,000, Jeff Bezos, Kenneth Rogoff, Kickstarter, Leonard Kleinrock, litecoin, low interest rates, Marc Andreessen, Mark Zuckerberg, market bubble, money market fund, money: store of value / unit of account / medium of exchange, moral hazard, Network effects, packet switching, passive investing, peer-to-peer, peer-to-peer lending, Peter Thiel, pets.com, Ponzi scheme, prediction markets, quantitative easing, quantum cryptography, RAND corporation, random walk, Renaissance Technologies, risk free rate, risk tolerance, risk-adjusted returns, Robert Shiller, Ross Ulbricht, Salesforce, Satoshi Nakamoto, seminal paper, Sharpe ratio, Silicon Valley, Simon Singh, Skype, smart contracts, social web, South Sea Bubble, Steve Jobs, transaction costs, tulip mania, Turing complete, two and twenty, Uber for X, Vanguard fund, Vitalik Buterin, WikiLeaks, Y2K

We will go deeper into the specifics of the process in the proof-of-work section that follows, but for now here’s the takeaway: cryptography allows the computers building Bitcoin’s blockchain to collaborate in an automated system of mathematical trust. There is no subjectivity as to whether a transaction is confirmed in Bitcoin’s blockchain: it’s just math. For a deep dive on cryptography, we highly recommend The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography by Simon Singh. Immutable The combination of globally distributed computers that can cryptographically verify transactions and the building of Bitcoin’s blockchain leads to an immutable database, meaning the computers building Bitcoin’s blockchain can only do so in an append only fashion.

See also Yuan (China) Bitcoin and, 126–128 exchanges in, 126, 217 Christensen, Clayton, 264–265, 267, 273–274 Classification, 199 of assets, 108 ICO and, 258–261 CME. See Chicago Mercantile Exchange CMOs. See Collateralized mortgage obligations Code, 7, 223 lines of, 197–198 The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography (Singh), 15 Code Repository Points, 195–197 Coinbase, 111, 114, 201, 221, 292n11 as web wallet, 225 CoinCap, 286 CoinDance, 286 Coindesk.com, 198, 199, 202, 207, 209, 286 CoinMarketCap.com, 286 CoinWarz, 215 COINXBT. See Bitcoin Tracker One Cold storage, 221–222 Collaboration, 111 community and, 56 platforms for, 159 Collateralized mortgage obligations (CMOs), 4–5 Colored coins, 53 Commodities, 80, 172, 276–277 Commodities Futures Trading Commission (CFTC), 107, 112, 224, 276 Communication, 14 Communication Nets, xxiii Community, 57, 62 collaboration and, 56 of computers, 18 developers and, 182 Companies, 28, 63, 118 as incumbents, 264–273 interface services by, 113 OTC by, 216 as peer-to-peer, 13 perspective of, 249–250 risk and, 75 support and, 198–200 technology and, 264–265 value of, 152 venture capitalism for, 248 Competition, 16, 214 Compound annual growth rate (CAGR), 118–119 Compound annual returns, 87, 88, 103–104 Computer scientists, 60 Computers blockchain technology and, 26, 186 community of, 18 as miners, 16 for mining, 212 private keys on, 226 supercomputers as, 59 Consortium, 272–273 Consumable/Transformable (C/T) Assets, 109–110 Content, 174 Corbin, Abel, 164–165 Cornering, 163–166 cryptoassets and, 166–168 Correlation coefficient, 101 Correlation of returns, 74–76 Correlations, 122 assets and, 74 Bitcoin and, 133 cryptoassets and, 101–102 market behavior and, 132–135 Counterparty, 53–54 CPUs.


pages: 409 words: 112,055

The Fifth Domain: Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats by Richard A. Clarke, Robert K. Knake

"World Economic Forum" Davos, A Declaration of the Independence of Cyberspace, Affordable Care Act / Obamacare, air gap, Airbnb, Albert Einstein, Amazon Web Services, autonomous vehicles, barriers to entry, bitcoin, Black Lives Matter, Black Swan, blockchain, Boeing 737 MAX, borderless world, Boston Dynamics, business cycle, business intelligence, call centre, Cass Sunstein, cloud computing, cognitive bias, commoditize, computer vision, corporate governance, cryptocurrency, data acquisition, data science, deep learning, DevOps, disinformation, don't be evil, Donald Trump, Dr. Strangelove, driverless car, Edward Snowden, Exxon Valdez, false flag, geopolitical risk, global village, immigration reform, information security, Infrastructure as a Service, Internet of things, Jeff Bezos, John Perry Barlow, Julian Assange, Kubernetes, machine readable, Marc Benioff, Mark Zuckerberg, Metcalfe’s law, MITM: man-in-the-middle, Morris worm, move fast and break things, Network effects, open borders, platform as a service, Ponzi scheme, quantum cryptography, ransomware, Richard Thaler, Salesforce, Sand Hill Road, Schrödinger's Cat, self-driving car, shareholder value, Silicon Valley, Silicon Valley startup, Skype, smart cities, Snapchat, software as a service, Steven Levy, Stuxnet, technoutopianism, The future is already here, Tim Cook: Apple, undersea cable, unit 8200, WikiLeaks, Y2K, zero day

The Chinese government has what: Stephen Chen, “China Building World’s Biggest Quantum Research Facility,” South China Morning Post, September 11, 2017, www.scmp.com/news/china/society/article/2110563/china-building-worlds-biggest-quantum-research-facility. quantum-resistant encryption standard: “Post-Quantum Cryptography,” National Institute of Standards and Technology, CSRM.NIST.com, accessed January 4, 2019, csrc.nist.gov/projects/post-quantum-cryptography. Chapter 17: 5G and IoT quarter trillion dollars: Hillol Roy, “Tackling the Cost of a 5G Build,” Accenture, August 3, 2018, www.accenture.com/us-en/insights/strategy/5G-network-build. publicly published 132 questions: “Promoting Unlicensed Use of the 6 Ghz Band,” Notice of Proposed Rulemaking, Federal Communications Commission, October 2, 2018, https://docs.fcc.gov/public/attachments/DOC-354364A1.pdf.


pages: 589 words: 147,053

The Age of Em: Work, Love and Life When Robots Rule the Earth by Robin Hanson

8-hour work day, artificial general intelligence, augmented reality, Berlin Wall, bitcoin, blockchain, brain emulation, business cycle, business process, Clayton Christensen, cloud computing, correlation does not imply causation, creative destruction, deep learning, demographic transition, Erik Brynjolfsson, Ethereum, ethereum blockchain, experimental subject, fault tolerance, financial intermediation, Flynn Effect, Future Shock, Herman Kahn, hindsight bias, information asymmetry, job automation, job satisfaction, John Markoff, Just-in-time delivery, lone genius, Machinery of Freedom by David Friedman, market design, megaproject, meta-analysis, Nash equilibrium, new economy, Nick Bostrom, pneumatic tube, power law, prediction markets, quantum cryptography, rent control, rent-seeking, reversible computing, risk tolerance, Silicon Valley, smart contracts, social distancing, statistical model, stem cell, Thomas Malthus, trade route, Turing test, Tyler Cowen, Vernor Vinge, William MacAskill

Strong barriers might separate hardware that runs em minds from hardware that runs most other software, and visible rituals involving the participation of other trusted ems might be required to copy em minds, especially when moving to distant hardware. When ems must move their brains, such as to meet with a fast em who lives far away, they might prefer to use strongly encrypted communication channels. It might help to use quantum cryptography, which takes advantage of the fact that it is physically impossible to copy quantum states. The value of doing so is disputed, however (Stebila et al. 2010). Ems may also discourage mind theft by limiting the resale value of the skills held in any one em’s mind. This might be accomplished by acquiring skills that are tied to small unique organizational contexts, and that are less valuable outside those contexts.

If quantum computing became feasible on large scales, then a few kinds of important calculations could be done faster and cheaper, including factoring, certain kinds of search, and simulations of small-scale physical systems (Viamontes et al. 2005). While this allows and perhaps forces a switch to quantum cryptography, it appears to have little impact on most other forecasts in this book. While it is possible to create quantum states that cannot be copied, this is unlikely to typically be a useful way to prevent mind theft; the many practical gains from easy copying seem too large to forego. A variation with substantial implications is where some method is found to usefully merge two em minds that had once split from a common ancestor, with the combined mind requiring not much more space and processing power than did each original mind, yet retaining most of the skills and memories of both originals.


pages: 262 words: 65,959

The Simpsons and Their Mathematical Secrets by Simon Singh

Albert Einstein, Andrew Wiles, Apollo 13, Benoit Mandelbrot, Bletchley Park, cognitive dissonance, Donald Knuth, Erdős number, Georg Cantor, Grace Hopper, Higgs boson, Isaac Newton, John Nash: game theory, Kickstarter, mandelbrot fractal, Menlo Park, Norbert Wiener, Norman Mailer, P = NP, Paul Erdős, probability theory / Blaise Pascal / Pierre de Fermat, quantum cryptography, Richard Feynman, Rubik’s Cube, Schrödinger's Cat, Simon Singh, Stephen Hawking, Wolfskehl Prize, women in the workforce

BY THE SAME AUTHOR Fermat’s Enigma: The Epic Quest to Solve the World’s Greatest Mathematical Problem (US edition) Fermat’s Last Theorem: The Story of a Riddle that Confounded the World’s Greatest Minds for 358 Years (UK edition) The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography Big Bang: The Origin of the Universe Trick or Treatment: The Undeniable Facts about Alternative Medicine First published in Great Britain 2013 This electronic edition published in 2013 by Bloomsbury Publishing Plc Copyright © 2013 by Simon Singh The moral right of the author has been asserted All rights reserved You may not copy, distribute, transmit, reproduce or otherwise make available this publication (or any part of it) in any form, or by any means (including without limitation electronic, digital, optical, mechanical, photocopying, printing, recording or otherwise), without the prior written permission of the publisher.


pages: 661 words: 185,701

The Future of Money: How the Digital Revolution Is Transforming Currencies and Finance by Eswar S. Prasad

access to a mobile phone, Adam Neumann (WeWork), Airbnb, algorithmic trading, altcoin, bank run, barriers to entry, Bear Stearns, Ben Bernanke: helicopter money, Bernie Madoff, Big Tech, bitcoin, Bitcoin Ponzi scheme, Bletchley Park, blockchain, Bretton Woods, business intelligence, buy and hold, capital controls, carbon footprint, cashless society, central bank independence, cloud computing, coronavirus, COVID-19, Credit Default Swap, cross-border payments, cryptocurrency, deglobalization, democratizing finance, disintermediation, distributed ledger, diversified portfolio, Dogecoin, Donald Trump, Elon Musk, Ethereum, ethereum blockchain, eurozone crisis, fault tolerance, fiat currency, financial engineering, financial independence, financial innovation, financial intermediation, Flash crash, floating exchange rates, full employment, gamification, gig economy, Glass-Steagall Act, global reserve currency, index fund, inflation targeting, informal economy, information asymmetry, initial coin offering, Internet Archive, Jeff Bezos, Kenneth Rogoff, Kickstarter, light touch regulation, liquidity trap, litecoin, lockdown, loose coupling, low interest rates, Lyft, M-Pesa, machine readable, Mark Zuckerberg, Masayoshi Son, mobile money, Money creation, money market fund, money: store of value / unit of account / medium of exchange, Network effects, new economy, offshore financial centre, open economy, opioid epidemic / opioid crisis, PalmPilot, passive investing, payday loans, peer-to-peer, peer-to-peer lending, Peter Thiel, Ponzi scheme, price anchoring, profit motive, QR code, quantitative easing, quantum cryptography, RAND corporation, random walk, Real Time Gross Settlement, regulatory arbitrage, rent-seeking, reserve currency, ride hailing / ride sharing, risk tolerance, risk/return, Robinhood: mobile stock trading app, robo advisor, Ross Ulbricht, Salesforce, Satoshi Nakamoto, seigniorage, Sheryl Sandberg, Silicon Valley, Silicon Valley startup, smart contracts, SoftBank, special drawing rights, the payments system, too big to fail, transaction costs, uber lyft, unbanked and underbanked, underbanked, Vision Fund, Vitalik Buterin, Wayback Machine, WeWork, wikimedia commons, Y Combinator, zero-sum game

The Building Blocks The quoted text is from Satoshi Nakamoto, “Bitcoin Open Source Implementation of P2P Currency,” Satoshi Nakamoto Institute (blog), February 11, 2009, https://satoshi.nakamotoinstitute.org/posts/p2pfoundation/1/. Cryptography For an engaging tour of cryptography, ranging from the ancient past to modern quantum cryptography, see Singh (1999). For a more comprehensive overview, see Kahn (1996). Some historians argue that the Polish code breakers did not receive sufficient credit for their accomplishments. See, for instance, Craig Bowman, “Polish Codebreakers Cracked Enigma in 1932, before Alan Turing,” War History Online, May 30, 2016, https://www.warhistoryonline.com/featured/polish-mathematicians-role-in-cracking-germans-wwii-codesystem.html.

New Haven, CT: Yale University Press. Sidrauski, Miguel. 1967. “Inflation and Money Growth.” Journal of Political Economy 75, no. 6: 796–810. Sims, Christopher A. 2013. “Paper Money.” American Economic Review 103, no. 2: 563–584. Singh, Simon. 1999. The Code Book: The Evolution of Secrecy from Mary Queen of Scots to Quantum Cryptography. New York: Doubleday. Soman, Dilip. 2003. “The Effect of Payment Transparency on Consumption: Quasi-experiments from the Field.” Marketing Letters 14, no. 3: 173–183. Sorkin, Andrew Ross. 2010. Too Big to Fail: The Inside Story of How Wall Street and Washington Fought to Save the Financial System—and Themselves.


pages: 254 words: 76,064

Whiplash: How to Survive Our Faster Future by Joi Ito, Jeff Howe

3D printing, air gap, Albert Michelson, AlphaGo, Amazon Web Services, artificial general intelligence, basic income, Bernie Sanders, Big Tech, bitcoin, Black Lives Matter, Black Swan, Bletchley Park, blockchain, Burning Man, business logic, buy low sell high, Claude Shannon: information theory, cloud computing, commons-based peer production, Computer Numeric Control, conceptual framework, CRISPR, crowdsourcing, cryptocurrency, data acquisition, deep learning, DeepMind, Demis Hassabis, digital rights, disruptive innovation, Donald Trump, double helix, Edward Snowden, Elon Musk, Ferguson, Missouri, fiat currency, financial innovation, Flash crash, Ford Model T, frictionless, game design, Gerolamo Cardano, informal economy, information security, interchangeable parts, Internet Archive, Internet of things, Isaac Newton, Jeff Bezos, John Harrison: Longitude, Joi Ito, Khan Academy, Kickstarter, Mark Zuckerberg, microbiome, move 37, Nate Silver, Network effects, neurotypical, Oculus Rift, off-the-grid, One Laptop per Child (OLPC), PalmPilot, pattern recognition, peer-to-peer, pirate software, power law, pre–internet, prisoner's dilemma, Productivity paradox, quantum cryptography, race to the bottom, RAND corporation, random walk, Ray Kurzweil, Ronald Coase, Ross Ulbricht, Satoshi Nakamoto, self-driving car, SETI@home, side project, Silicon Valley, Silicon Valley startup, Simon Singh, Singularitarianism, Skype, slashdot, smart contracts, Steve Ballmer, Steve Jobs, Steven Levy, Stewart Brand, Stuxnet, supply-chain management, synthetic biology, technological singularity, technoutopianism, TED Talk, The Nature of the Firm, the scientific method, The Signal and the Noise by Nate Silver, the strength of weak ties, There's no reason for any individual to have a computer in his home - Ken Olsen, Thomas Kuhn: the structure of scientific revolutions, Two Sigma, universal basic income, unpaid internship, uranium enrichment, urban planning, warehouse automation, warehouse robotics, Wayback Machine, WikiLeaks, Yochai Benkler

,” Medium, March 17, 2014, https://medium.com/@austinhill/on-your-permanent-record-f5ab81f9f654#.ak8ith7gu. 21 Felix Martin, Money: The Unauthorized Biography (New York: Knopf Doubleday Publishing Group, 2015). 22 Ibid., 43. 23 Ibid., 55–60. 24 Simon Singh, The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography (New York: Knopf Doubleday Publishing Group, 2011). Kindle Edition, chapter 1: “The Cipher of Mary, Queen of Scots.” 25 Ibid. 26 Pierre Berloquin, Hidden Codes & Grand Designs: Secret Languages from Ancient Times to Modern Day (New York: Sterling Publishing Company, Inc., 2008). 27 Singh, The Code Book. 28 Ibid. 29 Singh, The Code Book, chapter 2: “Le Chiffre Indéchiffrable”; Richard A.


pages: 339 words: 94,769

Possible Minds: Twenty-Five Ways of Looking at AI by John Brockman

AI winter, airport security, Alan Turing: On Computable Numbers, with an Application to the Entscheidungsproblem, Alignment Problem, AlphaGo, artificial general intelligence, Asilomar, autonomous vehicles, basic income, Benoit Mandelbrot, Bill Joy: nanobots, Bletchley Park, Buckminster Fuller, cellular automata, Claude Shannon: information theory, Computing Machinery and Intelligence, CRISPR, Daniel Kahneman / Amos Tversky, Danny Hillis, data science, David Graeber, deep learning, DeepMind, Demis Hassabis, easy for humans, difficult for computers, Elon Musk, Eratosthenes, Ernest Rutherford, fake news, finite state, friendly AI, future of work, Geoffrey Hinton, Geoffrey West, Santa Fe Institute, gig economy, Hans Moravec, heat death of the universe, hype cycle, income inequality, industrial robot, information retrieval, invention of writing, it is difficult to get a man to understand something, when his salary depends on his not understanding it, James Watt: steam engine, Jeff Hawkins, Johannes Kepler, John Maynard Keynes: Economic Possibilities for our Grandchildren, John Maynard Keynes: technological unemployment, John von Neumann, Kevin Kelly, Kickstarter, Laplace demon, Large Hadron Collider, Loebner Prize, machine translation, market fundamentalism, Marshall McLuhan, Menlo Park, military-industrial complex, mirror neurons, Nick Bostrom, Norbert Wiener, OpenAI, optical character recognition, paperclip maximiser, pattern recognition, personalized medicine, Picturephone, profit maximization, profit motive, public intellectual, quantum cryptography, RAND corporation, random walk, Ray Kurzweil, Recombinant DNA, Richard Feynman, Rodney Brooks, self-driving car, sexual politics, Silicon Valley, Skype, social graph, speech recognition, statistical model, Stephen Hawking, Steven Pinker, Stewart Brand, strong AI, superintelligent machines, supervolcano, synthetic biology, systems thinking, technological determinism, technological singularity, technoutopianism, TED Talk, telemarketer, telerobotics, The future is already here, the long tail, the scientific method, theory of mind, trolley problem, Turing machine, Turing test, universal basic income, Upton Sinclair, Von Neumann architecture, Whole Earth Catalog, Y2K, you are the product, zero-sum game

When he initially proposed it, quantum computation seemed practically impossible. But the explosion in the construction of simple quantum computers and quantum communication systems never would have taken place without his work. He has made many other important contributions in areas such as quantum cryptography and the multiverse interpretation of quantum theory. In a philosophic paper (with Artur Ekert), he appealed to the existence of a distinctive quantum theory of computation to argue that our knowledge of mathematics is derived from, and subordinate to, our knowledge of physics (even though mathematical truth is independent of physics).


pages: 761 words: 231,902

The Singularity Is Near: When Humans Transcend Biology by Ray Kurzweil

additive manufacturing, AI winter, Alan Turing: On Computable Numbers, with an Application to the Entscheidungsproblem, Albert Einstein, anthropic principle, Any sufficiently advanced technology is indistinguishable from magic, artificial general intelligence, Asilomar, augmented reality, autonomous vehicles, backpropagation, Benoit Mandelbrot, Bill Joy: nanobots, bioinformatics, brain emulation, Brewster Kahle, Brownian motion, business cycle, business intelligence, c2.com, call centre, carbon-based life, cellular automata, Charles Babbage, Claude Shannon: information theory, complexity theory, conceptual framework, Conway's Game of Life, coronavirus, cosmological constant, cosmological principle, cuban missile crisis, data acquisition, Dava Sobel, David Brooks, Dean Kamen, digital divide, disintermediation, double helix, Douglas Hofstadter, en.wikipedia.org, epigenetics, factory automation, friendly AI, functional programming, George Gilder, Gödel, Escher, Bach, Hans Moravec, hype cycle, informal economy, information retrieval, information security, invention of the telephone, invention of the telescope, invention of writing, iterative process, Jaron Lanier, Jeff Bezos, job automation, job satisfaction, John von Neumann, Kevin Kelly, Law of Accelerating Returns, life extension, lifelogging, linked data, Loebner Prize, Louis Pasteur, mandelbrot fractal, Marshall McLuhan, Mikhail Gorbachev, Mitch Kapor, mouse model, Murray Gell-Mann, mutually assured destruction, natural language processing, Network effects, new economy, Nick Bostrom, Norbert Wiener, oil shale / tar sands, optical character recognition, PalmPilot, pattern recognition, phenotype, power law, precautionary principle, premature optimization, punch-card reader, quantum cryptography, quantum entanglement, radical life extension, randomized controlled trial, Ray Kurzweil, remote working, reversible computing, Richard Feynman, Robert Metcalfe, Rodney Brooks, scientific worldview, Search for Extraterrestrial Intelligence, selection bias, semantic web, seminal paper, Silicon Valley, Singularitarianism, speech recognition, statistical model, stem cell, Stephen Hawking, Stewart Brand, strong AI, Stuart Kauffman, superintelligent machines, technological singularity, Ted Kaczynski, telepresence, The Coming Technological Singularity, Thomas Bayes, transaction costs, Turing machine, Turing test, two and twenty, Vernor Vinge, Y2K, Yogi Berra

., "Long-Distance Teleportation of Qubits at Telecommunication Wavelengths," Nature 421 (January 2003): 509–13; John Roach, "Physicists Teleport Quantum Bits over Long Distance," National Geographic News, January 29, 2003; Herb Brody, "Quantum Cryptography; in "10 Emerging Technologies That Will Change the World," MIT Technology Review, February 2003; N. Gisin et al., "Quantum Correlations with Moving Observers," Quantum Optics (December 2003): 51; Quantum Cryptography exhibit, ITU Telecom World 2003, Geneva, Switzerland, October 1, 2003; Sora Song, "The Quantum Leaper," Time, March 15, 2004; Mark Buchanan, "Light's Spooky Connections SetNew Distance Record," New Scientist, June 28, 1997. 82.


pages: 571 words: 106,255

The Bitcoin Standard: The Decentralized Alternative to Central Banking by Saifedean Ammous

"World Economic Forum" Davos, Airbnb, Alan Greenspan, altcoin, bank run, banks create money, bitcoin, Black Swan, blockchain, Bretton Woods, British Empire, business cycle, capital controls, central bank independence, Charles Babbage, conceptual framework, creative destruction, cryptocurrency, currency manipulation / currency intervention, currency peg, delayed gratification, disintermediation, distributed ledger, Elisha Otis, Ethereum, ethereum blockchain, fiat currency, fixed income, floating exchange rates, Fractional reserve banking, full employment, George Gilder, Glass-Steagall Act, global reserve currency, high net worth, initial coin offering, invention of the telegraph, Isaac Newton, iterative process, jimmy wales, Joseph Schumpeter, low interest rates, market bubble, market clearing, means of production, military-industrial complex, Money creation, money: store of value / unit of account / medium of exchange, moral hazard, Network effects, Paul Samuelson, peer-to-peer, Peter Thiel, price mechanism, price stability, profit motive, QR code, quantum cryptography, ransomware, reserve currency, Richard Feynman, risk tolerance, Satoshi Nakamoto, scientific management, secular stagnation, smart contracts, special drawing rights, Stanford marshmallow experiment, The Nature of the Firm, the payments system, too big to fail, transaction costs, Walter Mischel, We are all Keynesians now, zero-sum game

Forty Centuries of Wage and Price Controls: How Not to Fight Inflation. Ludwig von Mises Institute, 1979. Schumpeter, Joseph A. Capitalism, Socialism and Democracy. Routledge, 2013. Simon, Julian. The Ultimate Resource. Princeton University Press, 1981. Singh, Simon. The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography. Anchor, 2000. Skousen, Mark. “The Perseverance of Paul Samuelson's Economics.” Journal of Economic Perspectives 11, no. 2 (1997): 137–152. Smith, Vernon. Rationality in Economics. New York: Cambridge University Press. 2008. Steil, Benn. The Battle of Bretton Woods: John Maynard Keynes, Harry Dexter White and the Making of a New World Order.


pages: 437 words: 113,173

Age of Discovery: Navigating the Risks and Rewards of Our New Renaissance by Ian Goldin, Chris Kutarna

"World Economic Forum" Davos, 2013 Report for America's Infrastructure - American Society of Civil Engineers - 19 March 2013, 3D printing, Airbnb, Albert Einstein, AltaVista, Asian financial crisis, asset-backed security, autonomous vehicles, banking crisis, barriers to entry, battle of ideas, Bear Stearns, Berlin Wall, bioinformatics, bitcoin, Boeing 747, Bonfire of the Vanities, bread and circuses, carbon tax, clean water, collective bargaining, Colonization of Mars, Credit Default Swap, CRISPR, crowdsourcing, cryptocurrency, Dava Sobel, demographic dividend, Deng Xiaoping, digital divide, Doha Development Round, double helix, driverless car, Edward Snowden, Elon Musk, en.wikipedia.org, epigenetics, experimental economics, Eyjafjallajökull, failed state, Fall of the Berlin Wall, financial innovation, full employment, Galaxy Zoo, general purpose technology, Glass-Steagall Act, global pandemic, global supply chain, Higgs boson, Hyperloop, immigration reform, income inequality, indoor plumbing, industrial cluster, industrial robot, information retrieval, information security, Intergovernmental Panel on Climate Change (IPCC), intermodal, Internet of things, invention of the printing press, Isaac Newton, Islamic Golden Age, Johannes Kepler, Khan Academy, Kickstarter, Large Hadron Collider, low cost airline, low skilled workers, Lyft, Mahbub ul Haq, Malacca Straits, mass immigration, Max Levchin, megacity, Mikhail Gorbachev, moral hazard, Nelson Mandela, Network effects, New Urbanism, non-tariff barriers, Occupy movement, On the Revolutions of the Heavenly Spheres, open economy, Panamax, Paris climate accords, Pearl River Delta, personalized medicine, Peter Thiel, post-Panamax, profit motive, public intellectual, quantum cryptography, rent-seeking, reshoring, Robert Gordon, Robert Metcalfe, Search for Extraterrestrial Intelligence, Second Machine Age, self-driving car, Shenzhen was a fishing village, Silicon Valley, Silicon Valley startup, Skype, smart grid, Snapchat, special economic zone, spice trade, statistical model, Stephen Hawking, Steve Jobs, Stuxnet, synthetic biology, TED Talk, The Future of Employment, too big to fail, trade liberalization, trade route, transaction costs, transatlantic slave trade, uber lyft, undersea cable, uranium enrichment, We are the 99%, We wanted flying cars, instead we got 140 characters, working poor, working-age population, zero day

Since then, they’ve been steadily boosting the reliability and distance of the quantum jump, with the idea of one day building a quantum Internet. (As of 2015, the distance record is 150 km—a useful theoretical milestone, since that’s also the minimum distance between the ground and orbiting satellites.) In the 2000s, quantum cryptography became real: it is now possible to generate a truly random passcode that is physically impossible to predict, to transmit it some 300 km, and for the recipient to know with absolute certainty whether it was intercepted en route.20 Commercial versions of such systems have already secured bank transfers and the transmission of national election results.


pages: 381 words: 120,361

Sunfall by Jim Al-Khalili

airport security, artificial general intelligence, augmented reality, Bletchley Park, Carrington event, cosmological constant, cryptocurrency, dark matter, David Attenborough, Fellow of the Royal Society, Higgs boson, imposter syndrome, Intergovernmental Panel on Climate Change (IPCC), Internet of things, invisible hand, Kickstarter, lockdown, mass immigration, megacity, MITM: man-in-the-middle, off grid, pattern recognition, quantum cryptography, quantum entanglement, Silicon Valley, smart cities, sorting algorithm, South China Sea, stem cell, Stephen Hawking, Turing test

He leaned forward and grabbed her by the shoulders. For a brief moment she wondered whether he was going to try and shake some sense into her. Instead, he said, ‘But the whole point of quantum key distribution is that you can’t eavesdrop without giving yourself away! I may not be as smart as you, Reenie, but I know enough from my quantum cryptography classes that this is the whole fucking point of the system. Any attempt to break the code disturbs the delicate quantum entangled state and sends an alert to the source, which then immediately switches to a different encryption key. Wasn’t that the subject of last week’s lecture – something about the Ekert 91 protocol?’


pages: 588 words: 131,025

The Patient Will See You Now: The Future of Medicine Is in Your Hands by Eric Topol

23andMe, 3D printing, Affordable Care Act / Obamacare, Anne Wojcicki, Atul Gawande, augmented reality, Big Tech, bioinformatics, call centre, Clayton Christensen, clean water, cloud computing, commoditize, computer vision, conceptual framework, connected car, correlation does not imply causation, creative destruction, crowdsourcing, dark matter, data acquisition, data science, deep learning, digital divide, disintermediation, disruptive innovation, don't be evil, driverless car, Edward Snowden, Elon Musk, en.wikipedia.org, Erik Brynjolfsson, Firefox, gamification, global village, Google Glasses, Google X / Alphabet X, Ignaz Semmelweis: hand washing, information asymmetry, interchangeable parts, Internet of things, Isaac Newton, it's over 9,000, job automation, Julian Assange, Kevin Kelly, license plate recognition, lifelogging, Lyft, Mark Zuckerberg, Marshall McLuhan, meta-analysis, microbiome, Nate Silver, natural language processing, Network effects, Nicholas Carr, obamacare, pattern recognition, personalized medicine, phenotype, placebo effect, quantum cryptography, RAND corporation, randomized controlled trial, Salesforce, Second Machine Age, self-driving car, Silicon Valley, Skype, smart cities, Smart Cities: Big Data, Civic Hackers, and the Quest for a New Utopia, Snapchat, social graph, speech recognition, stealth mode startup, Steve Jobs, synthetic biology, the scientific method, The Signal and the Noise by Nate Silver, The Wealth of Nations by Adam Smith, traumatic brain injury, Turing test, Uber for X, uber lyft, Watson beat the top human players on Jeopardy!, WikiLeaks, X Prize

The Federal Trade Commission needs to be charged with proscribing the selling of an individual’s medical data without their unconditional consent.73 If we cannot provide the absolute maximal assurance of privacy and security for each individual’s medical data, or if the government decides to effectively tolerate hacking, medical emancipation will never get started. New technologies to achieve this critical goal, such as quantum cryptography,74a deserve careful consideration. The Food and Drug Administration, while paying lip service to innovation, has done little to alter its regulatory approval processes to catalyze the ways that each individual can assume a greater role in their medical care. That’s why your smartphone isn’t as smart as it could be74b in an ambiguous regulatory landscape.74c It will be a hard and slow slog to new medicine without marked changes in the way innovation is recognized and encouraged, such as by faster reviews, conditional approval, and tight post-market electronic surveillance.


pages: 468 words: 137,055

Crypto: How the Code Rebels Beat the Government Saving Privacy in the Digital Age by Steven Levy

Albert Einstein, Bletchley Park, Claude Shannon: information theory, cognitive dissonance, Compatible Time-Sharing System, computer age, disinformation, Donald Knuth, Eratosthenes, Extropian, Fairchild Semiconductor, information security, invention of the telegraph, Jim Simons, John Gilmore, John Markoff, John Perry Barlow, Kevin Kelly, knapsack problem, Marc Andreessen, Mitch Kapor, MITM: man-in-the-middle, Mondo 2000, Network effects, new economy, NP-complete, quantum cryptography, Ronald Reagan, Saturday Night Live, Silicon Valley, Simon Singh, Stephen Hawking, Steven Levy, Watson beat the top human players on Jeopardy!, web of trust, Whole Earth Catalog, zero-sum game, Zimmermann PGP, éminence grise

The Electronic Privacy Papers: Documents on the Battle for Privacy in the Age of Surveillance. New York: Wiley Computer Publishing, 1997. Simmons, Gustavus J., ed. Contemporary Cryptography: The Science of Information Integrity. New York: IEEE Press, 1992. Singh, Simon. The Code Book: The Evolution of Secrecy from Mary Queen of Scots to Quantum Cryptography. New York: Doubleday, 1999. Sterling, Bruce. The Hacker Crackdown. New York: Bantam, 1993. Wallace, Jonathan D., and Mark Mangan. Sex, Laws, and Cyberspace. New York: Holt, 1996. Wrixon, Fred B. Codes and Ciphers. Englewood Cliffs, NJ: Prentice-Hall, 1992. Zim, Herbert T. Codes and Secret Writing.


Principles of Protocol Design by Robin Sharp

accounting loophole / creative accounting, business process, discrete time, exponential backoff, fault tolerance, finite state, functional programming, Gödel, Escher, Bach, information retrieval, loose coupling, MITM: man-in-the-middle, OSI model, packet switching, quantum cryptography, RFC: Request For Comment, stochastic process

General reviews can also be found in many books on the architecture and design of distributed systems, such as reference [98]. Brassard’s monograph “Modern Cryptology” [18] is a good modern review of cryptographic methods, which discusses not only the well-known DES and RSA methods, but also methods based on newer research, such as keyless cryptography and quantum cryptography. Schneier’s book “Applied Cryptography” [113] gives a comprehensive review of cryptographic methods and a detailed presentation of concrete algorithms. More mathematical aspects of cryptography are dealt with in the “Handbook of Applied Cryptography”, edited by Menezes, van Oorschot and Vanstone [89].


pages: 420 words: 219,075

Frommer's New Mexico by Lesley S. King

Albert Einstein, clean water, company town, Day of the Dead, El Camino Real, machine readable, off-the-grid, place-making, post-work, quantum cryptography, Ronald Reagan, SpaceShipOne, sustainable-tourism, trade route, Virgin Galactic, X Prize

Currently Los Alamos National Laboratory is building a limited number of replacement plutonium pits for use in the enduring U.S. nuclear weapons stockpile. The lab has the only plutonium-processing facility in the United States that is capable of producing those components. An unusual town, Los Alamos has the highest per capita Ph.D. population in the nation—22 percent. If you listen closely you may hear people talk of such complexities as quantum cryptography, trapdoor functions of polynomial integers, reciprocal space and heterogeneous multicores. With researchers convening here from all over the world, the accents range from Russian to French to Japanese and even a Texas twang or two. 7 SANTA FE LOS ALAMOS & BANDELIER NATIONAL MONUMENT Orientation/Useful Information Los Alamos is about 35 miles west of Santa Fe and about 65 miles southwest of Taos.


Engineering Security by Peter Gutmann

active measures, address space layout randomization, air gap, algorithmic trading, Amazon Web Services, Asperger Syndrome, bank run, barriers to entry, bitcoin, Brian Krebs, business process, call centre, card file, cloud computing, cognitive bias, cognitive dissonance, cognitive load, combinatorial explosion, Credit Default Swap, crowdsourcing, cryptocurrency, Daniel Kahneman / Amos Tversky, Debian, domain-specific language, Donald Davies, Donald Knuth, double helix, Dr. Strangelove, Dunning–Kruger effect, en.wikipedia.org, endowment effect, false flag, fault tolerance, Firefox, fundamental attribution error, George Akerlof, glass ceiling, GnuPG, Google Chrome, Hacker News, information security, iterative process, Jacob Appelbaum, Jane Jacobs, Jeff Bezos, John Conway, John Gilmore, John Markoff, John von Neumann, Ken Thompson, Kickstarter, lake wobegon effect, Laplace demon, linear programming, litecoin, load shedding, MITM: man-in-the-middle, Multics, Network effects, nocebo, operational security, Paradox of Choice, Parkinson's law, pattern recognition, peer-to-peer, Pierre-Simon Laplace, place-making, post-materialism, QR code, quantum cryptography, race to the bottom, random walk, recommendation engine, RFID, risk tolerance, Robert Metcalfe, rolling blackouts, Ruby on Rails, Sapir-Whorf hypothesis, Satoshi Nakamoto, security theater, semantic web, seminal paper, Skype, slashdot, smart meter, social intelligence, speech recognition, SQL injection, statistical model, Steve Jobs, Steven Pinker, Stuxnet, sunk-cost fallacy, supply-chain attack, telemarketer, text mining, the built environment, The Death and Life of Great American Cities, The Market for Lemons, the payments system, Therac-25, too big to fail, Tragedy of the Commons, Turing complete, Turing machine, Turing test, Wayback Machine, web application, web of trust, x509 certificate, Y2K, zero day, Zimmermann PGP

Another thing you may notice about this book is that there’s no mention of your favourite piece of cool security technology. In fact there’s no mention of lots of cool security technology, because there’s an awful lot of it out there and much of it will never really benefit anyone except the stockholders of the companies peddling it, if that. An example of this is quantum cryptography, a not-entirely-secure, short-range and above all extraordinarily expensive way of achieving what we’ve been doing using Diffie-Hellman key exchange since the mid-1970s. It uses physics, or magic, or something like that so it’s got to be good. There really isn’t room to cover all of these fashion-statement technologies (although I’ve made passing reference to a few in places where I wanted to illustrate something), so if you find that I’ve omitted to mention your pet technology then it’s most probably because I feel that it’s unlikely to have much, if any, effect on the bad guys, and because this book is already long enough as it is.

In any case if an attacker is really that keen to get at the data then they can always go for more practical approaches like directly targeting the communicating devices rather than investing in blind signal demodulation equipment. A generalisation of this is the concept of tamper-evident pairing, which uses the same general principles as quantum key distribution from quantum cryptography. This works by exchanging information over a potentially public channel on which it’s possible to detect attempts to interfere with the exchange. If there’s no interference, the exchange was successful. If there’s interference, it wasn’t successful and needs to be repeated. In the worst case it can never complete, but that’s no different from a denial-of-service attack on a more conventional exchange.