Nokia 3.1 will release in August, becoming Australia's cheapest Android One phone

Announced for international release in May, the new and affordable Android One-sporting Nokia 3.1 handset now has official Australian pricing and release date details.

On sale from August 2, 2018, the new Nokia 3.1 will be available from JB Hi-Fi and Harvey Norman for only $249, officially making it the cheapest Android One handset on the

Write comment (98 Comments)
Firmware reveals more details about how the Note 9 S Pen will workFirmware reveals more details about how the Note 9 S Pen will work

It's been a weekend of Samsung-related leaks and rumors – see also news of a fresh color for the Note 9 and a wireless charging pad that's on the way – and to round everything off we've got some updates on the upgraded S Pen that's going to come with the Note 9.

The fine folks at XDA Developers have been digging into the firmware for the upcoming Ga

Write comment (91 Comments)

The world stands at the cusp of one of the greatest breakthroughs in information technology. Huge leaps forward in all fields of computer science, from data analysis to machine learning, will result from this breakthrough. But like all of mantechnological achievements, from the combustion engine to nuclear power, harnessing quantum comes with potential dangers as well. Quantum computers have created a slew of unforeseen vulnerabilities in the very infrastructure that keeps the digital sphere safe.

The underlying assumption behind nearly all encryption ciphers used today is that their complexity precludes any attempt by hackers to break them, as it would take years for even our most advanced conventional computers to do so. But quantum computing will change all of that.

Quantum computers promise to bring computational power leaps and bounds ahead of our most advanced machines. Recently, scientists at Google began testing their cutting edge 72 qubit quantum computer. The researchers expect to demonstrate with this machine quantum supremacy, or the ability to perform a calculation impossible with traditional computers.

The quantum meltdown of encryption

Chink in the Armor

Todaystandard encryption techniques are based on whatcalled Public Key Infrastructure or PKI, a set of protocols brought to the world of information technology in the 1970&s. PKI works by generating a complex cipher through random numbers that only the intended recipient of a given message, the one in possession of the private key, can decode.

As a system of encoding data, PKI was sound and reliable. But in order to implement it as a method to be used in the real world, there was still one question that needed to be answered: how could individuals confirm the identity of a party reaching out and making a request to communicate This vulnerability left the door open for cybercriminals to impersonate legitimate servers, or worse, insert themselves into a conversation between users and intercept communications between them, in whatknown as a Man-in-the-Middle (MITM) attack.

The industry produced a solution to this authentication problem in the form of digital certificates, electronic documents the contents of which can prove senders are actually who they claim to be. The submission of certificates at the initiation of a session allows the parties to know who it is they are about to communicate with. Today, trusted third party companies called Certificate Authorities, or CAs, create and provide these documents that are relied upon by everyone from private users to the biggest names in tech.

The problem is that certificates themselves rely on public-key cryptographic functions for their reliability, which, in the not too distant future, will be vulnerable to attack by quantum machines. Altered certificates could then be used by cyber criminals to fake their identities, completely undermining certificates as a method of authentication.

The quantum meltdown of encryption

Intel17-qubit superconducting test chip for quantum computing has unique features for improved connectivity and better electrical and thermo-mechanical performance. (Credit: Intel Corporation)

Decentralizing the Threat

This isn&t the first time we&ve had to get creative when it comes to encryption.

When Bitcoin creator Satoshi Nakamoto, whose true identity is still unknown, revealed his revolutionary idea in a 2008 white paper, he also introduced the beginnings of a unique peer-to-peer authentication system that today we call blockchain. The brilliantly innovative blockchain system at its core is an open ledger that records transactions between two parties in a permanent way without needing third-party authentication. Blockchain provided the global record-keeping network that has kept Nakamotodigital currency safe from fraudsters. Blockchain is based on the concept of decentralization, spreading the authentication process across a large body of users. No single piece of data can be altered without the alteration of all other blocks, which would require the collusion of the majority of the entire network.

For years, blockchain and Bitcoin remained one and the same. About five years ago, innovators in the industry began to realize that blockchain could be used for more than just securing cryptocurrency. Altering the original system designed for Bitcoin could produce programs to be applied in a wide range of industries, from healthcare, to insurance, to political elections. Gradually, new decentralized systems began to emerge such as those of Ripple and Litecoin. In 2015, one of the original contributors to the Bitcoin codebase Vitalik Buterin released his Ethereum project also based on blockchain. What these new platforms added to the picture was the ability to record new types of data in addition to currency exchanges, such as loans and contractual agreements.

The advantages of the blockchain concept quickly became apparent. By 2017, nearly fifteen percent of all financial institutions in the world were using blockchain to secure aspects of their operations. The number of industries incorporating decentralized systems continues to grow.

The quantum meltdown of encryption

Saving PKI

The best solution for protecting encryption from our ever-growing processing power is integrating decentralization into Public Key Infrastructure.

What this means essentially, is that instead of keeping digital certificates in one centralized location, which makes them vulnerable to being hacked and tampered with, they would be spread out in a world-wide ledger, one fundamentally impervious to alteration. A hacker attempting to modify certificates would be unable to pull off such a fraud, as it would mean changing data stored on enumerable diversified blocks spread out across the cyber sphere.

Decentralization has already been proven as a highly effective way of protecting recorded data from tampering. Similarly, using a blockchain-type system to replace the single entity Certificate Authority, can keep our digital certificates much safer. It is in fact one of the only foreseeable solutions to keep the quantum revolution from undermining the foundation of PKI.

Write comment (96 Comments)
Why NASA's new supersonic X-plane needs to beat the boom

Main image: An artist’s concept of the X-59 QueSST. Credit: Lockheed Martin

It may dramatically reduce travel time, but supersonic air travel barely exists. However, there's now a new race to produce the first ‘Concorde' for the 21st century, thanks to new tech that's allowing aircraft engineers to overcome the one thing that has so far rendered

Write comment (98 Comments)
Samsung launches the budget friendly Galaxy J8 in the UAE

Samsung has finally announced the launch the new budget friendly Galaxy J8 in the UAE. The new handset joins Samsung's other mid-ranged devices such as the Galaxy A6 and A6 Plus that were launched earlier this year.

Samsung Galaxy J8 Specifications

The Samsung Galaxy J8 runs on Android 8.0 Oreo with Samsung’s custom UI skinned on top. It comes with a

Write comment (90 Comments)
Samsung Wireless Charger Duo

August 9 should be quite the day for Samsung fans, because we're expecting the arrival of the Galaxy Note 9 and very possibly a Galaxy Watch as well. Now there's a new leak of a Wireless Charger Duo pad that shows how both devices can be charged up wirelessly.

Courtesy of seasoned tipster Roland Quandt on Twitter (via accessory retailer MobileFun)

Write comment (91 Comments)