There’s another domain in Quantum Computing (QC) which periodically attracts headlines – Quantum Key Distribution (QKD). I thought this worth covering because it does not depend on the ability to do parallel computation on superposition states, so may not be as much at the mercy of limited coherence times. And ultimately… Read More
Apple Google FaceBook and Person of Interest!
Apple, Google, and FaceBook are making significant investments in artificial intelligence (deep learning) and other advertising (snooping) enabling technology to better serve (exploit) their customers (us) and make trillions of dollars for their offshore accounts. This reminds me (in a very creepy way) of the TV series “Person… Read More
Should terrorists prefer iPhone (thanks to privacy)?
The case between Apple and the FBI may not be as limpid as it could be. If you ask me if Apple, or any US or Europe based supplier of high tech system should help the FBI (or any similar organization) and provide the technical support needed to extract information belonging to a terrorist, my answer would be definitely YES.
I don’t know… Read More
Why Apple’s Fight is Fruitless!
The article suggested by LinkedIn is titled “Should Apple fight a court order to unencrypt iPhones? #unlockiPhone”. However, my question is this, why didn’t the FBI just go to the NSA for what they needed? Why didn’t the FBI just hire the latest hacker who was able to hack the iphone and give him the same deal other hackers… Read More
Quantum Computing – A Quick Review
This topic comes up periodically but for me had always been one of those things I’d get around to understanding better someday. A recent blog in SemiWiki got me looking a little harder and determined to write a blog to get this out of my system, if for no other reason than getting rid of excess tabs on my browser. So here’s my quick review.… Read More
Complexity And Security
From time to time when talking about security, it is useful to look at the big picture, but not to further lament the imminent collapse of the sky. We all know that the problem is big and we’re really not on top of it. A more productive discussion would be about what we can do to reduce the scope of the problem. And that has to start … Read More
Crypto Key Exchange …like taking candy from a digital baby
For those among you who have read my previous SemiWiki articles, you will no doubt see a theme: the security of our connected world is badly broken, and for the bad guys, violating our online lives – both business and personal – is as easy as taking candy from the proverbial baby.… Read More
Why IoT Security is a Market for Lemons
Concerns around the security of connected devices are continuing to rise. This is illustrated by July’s issue of The Economist where there are two articles on this theme outlining the perils of connected devices in the home, and more generally amongst the Internet of Things.
In “Home, Hacked Home: The perils of connected… Read More
Your Car Will Never be Secure
The automotive cybersecurity forum put on by the National Highway Traffic Safety Administration (NHTSA) yesterday in Washington, DC, surfaced a wide range of issues and conflicts at the heart of the connected car industry. One clear takeaway from the event was that cars will never be secure.
… Read More
IoT Markets: let’s get real about the numbers
I am not sure about you but whenever I see those big market forecasts for IoT (and I’ve seen a lot)… my brain takes a short cut to “ok, I get it, it’s big”. And I believe it will be. But is “it’s big” that helpful? Or, to put it another way, does it hurt?
Robin Duke-Woolley of Beecham … Read More
Semiconductors Slowing in 2025