Categories
Press review Tech Magazine

Weekly News: Google’s Project Zero-Day Bugs, Cloud and a Quantum Leap

Google’s Project Zero-Day Bugs, Cloud and a Quantum Leap… Watch this recap in video format.


🔊 Subscribe to the podcast

Check out more of our interviews from our podcast episodes.


Infosec & Google’s Project Zero: Google says try harder

New research by Maddie Stone, a researcher at Google’s Project Zero security team, suggests hackers have it way too easy thanks to the business world’s failure to patch zero-day and recurring vulnerabilities. 

According to Stone, attackers these days don’t really need to come up with new vulnerabilities to exploit. Although industry leaders including Google itself are diligent enough in issuing patches to zero-day vulnerabilities, these bug fixes often fall flat and don’t fully address the issue, leaving the doors open to future attacks.  

Project Zero, whose only focus is to investigate these zero-day flaws, advocates for greater investment and a more proactive approach to security. The key, Stone says, is to let engineers go deeper to identify the root of the problem and implement more meaningful structural changes. 

MIT Technology Review

It’s all about the cloud

This week we got a surprise announcement from a technology titan: Jeff Bezos is stepping down as CEO of Amazon. And his choice of successor is quite revealing of where the industry is headed next. 

Amazon started as an online retailer, and that’s for what most people know the company. But it’s not where the money is at. Any tech insider like yourself will undoubtedly tell the layman that the Seattle born company makes most of its revenue with its cloud services. It is no surprise then, that Bezos has chosen Andy Jassy, head of Amazon Web Services, to take the company into the future.  

And Amazon is not alone here. Microsoft is no longer the company that makes Windows. Google is not just a search engine. Cloud has clearly become the winning bet for tech goliaths. And, with only 25-30 percent of business workloads in the cloud. we are just seeing the beginning of it.   

NBC News

Quantum leaps

And speaking of Microsoft and cloud, the Redmond-based company announced this week the availability on preview of Azure Quantum, a public cloud ecosystem that lets users access the quantum capabilities of partners like Honeywell, IonQ and Quantum Circuits. 

With this public preview, Microsoft wants to encourage developers, researchers and systems integrators to learn how to use the platform and build applications that could potentially transform a wide range of industries. 

The announcement comes the same week Dutch researchers at Radbourd University revealed a new method for assembling a network of atoms that works in a similar way to the synapses in our brains. The breakthrough, the researchers say, is a major step towards the creation of a quantum brain that is able to function and change like a human’s.

ZDNet / The Independent


Join our community and find your next job or expert in IT


Categories
Horizon 2050

Nadia — Final Chapter

The story of Nadia, a quantum security expert in 2050 London, comes to an end

Nadia, a story by Miquel Morales.

Jumping in now? Catch up with previous chapters.

Final Chapter

Nadia got to the address her sister had mentioned way before noon. Not because she cared about punctuality or anything like that. She hadn’t been able to sleep after the call, and there was only so much walking around to be done in a small town like Coventry. Plus, she needed to survey the area before the meeting. If the events of the past few days have told her anything, that was to always be prepared for the worse. Her sister must have thought that was a safe place to hide from the kidnappers. Nadia wouldn’t be doing her any service if she got spotted out of pure recklessness.     

In any case, there she was, hiding behind some bushes like a sloppy burglar. That was, of course, assuming her sister meant 246 Reinford Lane, Coventry and not 246 Reinford Lane, London or some other city. Hopefully not.   

It was a small house, one of those narrow and tall townhouses with a small, elevated staircase that connects the front door with the street. The curtains were closed shut on all windows, so there was not much that Nadia could make out from across the street. She examined what seemed to be the door to the basement, a rusty door at the street level with no handle or windows. A side alley led to the back of the property.   

After making sure no one besides her was lurking behind a bush, Nadia walked across the street and went into the alley. It ended abruptly on a wooden fence crowned by overflowing vegetation. Nadia went back a few steps and made a run for it. After a couple failed attempts, she managed to push herself over the fence and fell in the middle of a jungle of a garden. Plants were sprouting from literally everywhere, to the point that it was hard to distinguish the flat stones that served as the floor. The house’s back wall was covered in vines. So were the windows.   

Nadia fought her way through the greenery all the way to what seemed to be the door into the house. She tore off the vines covering it and tried pushing the handle. To her surprise, the door opened with a tiny squeak. Shhh!   

A rancid smell hanged in the air. For all she could see in the pale light coming through the open door, she was in the basement she had seen earlier. A staircase led upstairs, probably to the rest of the house. Nadia stood still and listened for a while. No sounds were coming from upstairs. She started making her way up, slowly but steady, one step at a time. The wood cracked under her feet with every step, making her cringe. But Nadia hadn’t made it half the way up when a fluorescent light turned on behind her.   

“Welcome, sister.”  

Nadia gave a jump and turned around with a racing heart. There was her sister, sitting on a worn-out leather armchair by the door.   

“You really are that easy to predict, aren’t you?” The smirk on her sister’s face brought Nadia back to her childhood days and the not-so-nice version of her sister. She had changed so much over the past years. Nadia hadn’t seen that mocking smile in a long time. Something was off. “Classic Nadia, always one step ahead, or at least happily thinking so. Well, this time I was the one ahead, wasn’t I?”  

“Ahead of what? Seriously, can you tell me what’s going on with this whole thing? How did you free yourself? Where were they keeping you?”  

“Free myself? You really don’t get it, do you? It beats you to think someone could outsmart you or want you harm. It always has.”   

“Alright, you are freaking me out, siss,” said Nadia. “Spill it. What’s going on.”      

“Why don’t you take a seat?”  

“I’m fine.”  

“As you wish,” said her sister crossing one leg on top of the other and resting her back against the armchair. “Do you recognise this?” she said holding up a card. Nadia did recognise it right away. It was the invite card that Tom had given her to get into the party. It was hard to believe only two days had passed since then. And it felt like ages ago.  

“How did you get that?”  

“Oh, it’s easy. I made it myself. You see, there’s just so much you can squeeze into such a thin material these days. Recording the data was the easy part, I just needed you to have the card with you while you were in the holovisor cabin.”  

“So Tom…”  

“Yep. He was acting on my behalf. Don’t blame him. Let’s just say he wasn’t too keen on me letting the police know about his boyfriend’s little magic tricks with his taxes. A pity he decided to make it up to you and ended up shot for it.”  

Nadia’s blood was boiling, her head spinning between confusion and sheer disbelief.   

“But why…”  

“Because it needed to be done. You had it coming all along. Since we were kids, I’ve had to deal with your oh-so-perfect aura. You know, it wasn’t that fun seeing everybody praise every little step you took while I failed at every major goal I set out to achieve. You were the one who was good with numbers, the one that made it into the good schools. Don’t you get it? I wanted to be you, have your career, your life, not have to depend on a miserable admin salary. Well, now it’s my turn.   

As much as it hurt, Nadia wasn’t entirely surprised by her sister’s revelations. She had exhibited that kind of attitude for most of their childhood. But Nadia thought they had left those years behind, grown into adults who got along just fine. Heck, she thought they had even become friendly to a certain degree. Her birthday gift sort of sealed that conception. Her sister, reaching back to one of the few things they had in common growing up: Ziza.  

She understood all of a sudden.   

“EVE”  

“Exactly. See? You are not that stupid after all. It wasn’t too complicated to install a backdoor into the AI before giving it to you. I must admit I had quite some fun telling you what to do.”  

“But everything that EVE, I mean that you told me to do was petty stuff. You couldn’t have retrieved the Duplo data through that.”  

“Agreed. But it was enough to open little wholes within the system, right where I needed them, so that I could start transferring information to the card. Worked pretty well.”     

Nadia felt so stupid. It was a very simple trick in reality. One of the world’s most protected systems, breached through carelessness and personal deceit. The wailing sound of sirens could be heard approaching in the distance.   

“I took the liberty of calling some friends,” said her sister. “They should be here any minute.”  

“What did you do with the data?”  

“Why, sell it, of course. I am now what they technically call filthy rich.”  

“I’ll tell them everything.” The sirens grew louder and louder.  

“Good luck making them believe this crazy story,” said her sister with a chuckle. “Goodbye siss, enjoy your prison cell. It will be your home for many years.”  

With that, her sister stood up and walk out into the garden. Nadia heard a crashing boom as the special operations team busted through the house’s main door.   

The End.

Discover another story: Edna’s Garden – Chapter 1

Join our talent community

Need tips on how to find a job in IT? Check out our IT job hunting guide.

Categories
Press review Tech Magazine

Weekly News: Translating Cat Meows

Translating Cat Meows; what the EU could do about emissions; Quantum moves ahead; and an anti-poaching cloud cover… Discover our Weekly News.

Translating Cat Meows: Do you speak cat?

What did the cat just say? 

According to research, cats do not share a common language. Every cat is unique and tailors its meows to its owner (a.k.a. human servant). And, just like it happens with people, some cats are chattier than others.

Well, a former Amazon Alexa developer has created an app that leverages AI and machine learning to translate those meows into human language. 

MeowTalk already has 13 phrases in its vocabulary, including “Feed me!” and “Leave me alone.” 

You can bet you’ll be hearing the first one a lot more. 

BBC

What the EU could do about emissions

The use of renewable energies and other traditional approaches to curbing emissions are no longer enough if the EU wants to meet its 2050 climate-neutrality target. 

Enter technology.

From large-scale, data-powered simulations of the Earth’s climate to green data centers, there are plenty of emerging technology initiatives underway for which EU funding could be a game-changer.

The folks at Politico have compiled a shortlist for you to bring up over dinner. 

Politico

Quantum moves ahead

Several of the world’s leading research institutions and tech companies have been working on their own take on quantum computing for a while now.

One of the key differences between the various approaches out there is what is used as the basis of the computer’s qubits, the basic units of information on which quantum computers operate.   

While technology juggernauts like IBM and Intel had traditionally opted for using tiny superconducting loops as qubits, the use of trapped-ion systems remained marginal. 

Now that is changing. Ion traps have gained traction, which is good for competition.

Nature

An anti-poaching cloud cover

The Zoological Society of London (ZSL) has revealed how its collaboration with Google Cloud is helping protect endangered species from poachers.

Beyond developing custom machine learning models to identify and track threatened animals across the globe, ZSL used a network of acoustic sensors to listen for gunshots in a nature reserve in Cameroon. 

The organisation then used the data collected to generate insights on poacher activity, revealing key details like what time of day poachers tend to be more active and where. 

ZSL hopes to evolve these insights into a monitoring system that is able to provide alerts in real time.  

ComputerWeekly

🔊 Subscribe to our podcast

Check out our interviews from our podcast episodes.


Join our community and find your next job or expert in IT

Categories
Horizon 2050

Nadia — Chapter V

Follow the story of Nadia, a quantum security expert in 2050 London

Nadia, a story by Miquel Morales.

Jumping in now? Catch up with previous chapters.

Chapter V

“You know, it’s not the first time I deal with the likes of you. Nor it will be the last, for that matter.”

There is something unsettling about empty houses. Especially when they aren’t yours. Everything in the living room looked tidy and ready to be used, with only a thin layer of dust betraying how abandoned the place was.

As Tom had suggested, Nadia had made it out of the city under the cover of darkness. The paycard he had left her at the apartment had been useful. Tom had left her a burner phone as well. Seriously, though. What on Earth is going on? She had been played by this EVE. But how?

Nadia had gotten herself a headscarf and a cheap regular-speed train ticket to Coventry, hoping her friend would be there and willing to let her lay low for a while. Tina was her name. Her family had a big country house surrounded by fields of barley, which they mainly used in the Summer months. Nadia had been invited for a barbecue a few times with other people from college. She had met Tina in a physics class.  

Well, it wasn’t Summer, and there was no one in sight. But it was too late to go back to London, and she couldn’t risk staying at a hotel or something like that. RayStar had a big reach, and every modern establishment had AI-enabled security cameras these days. There was probably already an arrest order out there. She couldn’t risk any of her biometrics being picked up by the system.

Thankfully, Nadia was able to find a half-open window in the back of the house. Well, more like she had half-opened the window. Ooops. Anyway, she doubted they would mind at all. They had too much money in any case.

After hunting for snacks in the kitchen — cashews would do — Nadia did a full tour around the house and decided to settle down in the downstairs living room. It was nice and cosy, and the big windows would allow the upcoming morning light to wake her up early. She needed to devise a plan and get going. Staying for more than a day in that house would be too dangerous. But first, some rest.

She threw herself on a comfy couch and hugged a hand-knitted pillow with a big smile. Two seconds later she was falling into a deep slumber, her dreaming brain conjuring up old memories.    


Nadia woke up in a fright, her face covered in cold sweat from one of those nightmares only the subconscious remembers. IT was still dark. A hellish sound was coming out of her backpack. The phone. She picked it up. Unknown number.

“Hello?”

“Hey. It’s me.” Her sister.

“What the… Where are you, what’s going on?”

“246 Reinford Lane. Meet me there at noon.”

“What?”

Nadia threw the phone across the room in anger. The call had dropped. 

To be continued…

Read the next chapter: Nadia — Final Chapter

Join our talent community

Need tips on how to find a job in IT? Check out our IT job hunting guide.

Categories
Horizon 2050

Nadia – Chapter III

Follow the story of Nadia, a quantum security expert in 2050 London

Nadia, a story by Miquel Morales.

Jumping in now? Catch up with previous chapters.

Chapter III

Finding the Blue Dragon hadn’t been precisely easy. It turns out speakeasies, those hidden bars that had been so popular at the beginning of the century, were back in fashion. Exclusive cocktail lounges, disguised as laundromats or hidden in the basement of a regular restaurant. Secret meeting places for those who like to feel special and mingle with the ‘different’ people. Although you can’t really call them secret when they are all listed online. But this one wasn’t.

Nadia had wandered around the apartment building at 4 Chance St for quite some time before finally finding the right door. She had mistakenly knocked on at least four flats, their inhabitants greeting her with caution before closing the door again. At the fifth doorbell she rang, a nice old lady with an evident passion for spying on her neighbours had pointed Nadia the way.

“I believe you want to go to the end of that hallway, my dear. Third door on the left. People have been up and down making a fuss all afternoon. Odd-looking bunch, if you ask me.”  

Nadia was now sited on an expensive leather couch, sipping on some unpronounceable drink that tasted like mouldy oranges and leftover coke. Tom hadn’t arrived yet. Thought real leather had been banned years ago. A self-described staunch defender of animal rights, Nadia decided she couldn’t afford to enjoy that blood-stained comfort any longer and headed for the bar.

The place didn’t look like a cocktail lounge. The layout was all off, as if was someone had squeezed a bar and a few tables into a regular apartment. The walls were covered in red, velvet-like material, with dark curtains separating the main hall from the smaller private rooms. At the front door, the security guard who had taken Nadia’s invite card was welcoming a young couple in fancy attires. Here and there, small groups of people engaged in quiet conversation. Their soft chatter made for a good accompanying tune to the synthetic jazz playing through the speakers.      

“There you are!” Nadia jumped up startled as Tom’s arm hugged her from behind.  “See, love. I told you she’d come.”

Tom’s breath smelled of alcohol and smoke. Clearly, he had had a head start. His boyfriend Hao was standing behind him with an apologetic grin. He seemed colder than usual.  

“I thought you prided yourself in never being late,” said Nadia while poking Tom’s arm with one of those tiny cocktail umbrellas.

“And I wasn’t!” responded Tom triumphantly as he signalled the bartender to bring another round for three. “We were closing a deal in one of the backrooms,” he said patting Hao’s shoulder. “You didn’t think you’re the only one who knows how to do business, right?”

“Oh, great. Another one of your crazy ventures,” said Nadia. “What was the last one, again? A virtual bar for AI assistants to go on dates?”     

“Please: more like a soulmate bazar,” corrected her Tom. Nadia spilt her drink as she burst out laughing. “Say what you want, girl, but it was a brilliant idea. Why bother wasting time on dates when we could simply send our AI assistants to figure it out for us? I still don’t get why people weren’t that into it.”  

“Yeah, quite the mystery, huh?” All this talk of AI assistants had taken Nadia’s mind back to EVE. Thankfully she had been quiet so far. Hopefully, she would remain like that for the rest of the night. “So, these are your friends, Hao?”

“Oh, no. They already left,” he said quietly. Something was off between the two; Tom’s uncharacteristic early drunkness and Hao’s unusual gloomy mood. Nadia wondered what had happened during their meeting. Somehow she got the impression that Hao wasn’t okay with the whole thing.

“Trust me, Nadia. This time it’s something big,” said Tom in a serious tone.

The bartender arrived with a sumptuous, pyramid-shaped ensemble of fresh fruit and laurel leaves. Three cubic glasses sat at different levels of the pyramid, holding a golden liquid with no observable bubbles. Whatever. Better enjoy before she’s back. They each grabbed a drink and let the night take its course. Things ended up picking up the pace when the music changed to something more upbeat. Hao loosened up a bit and accepted Nadia’s invitation to dance. At least until Tom came back to steal her dancing partner as a knight in shining armour. Jokes and office gossip were exchanged in between several more pyramids. Tom decided to move on from virtual matchmaking and devoted perhaps too many efforts to find a suitable someone for Nadia among the attendees. A fun yet embarrassing pursuit. It wasn’t a bad night.


The retina-tracing lasers of the holovisor cabins were clearly not designed for hungover eyes. Nadia stepped out of the egg-shaped enclosure and poured a few eye drops after a long yawn. Unbeknown to Nadia, a red alert popped up on the system’s main dashboard.

“How about a little walk, stretch your legs?” suggested EVE.

“So, you care about me all of a sudden?” said Nadia as she exited the RayStar security room and made it down the hallway.

“Oh, Nadia. I have always cared about you and your loved ones, tried to keep you all safe.”  

The security wing was at the very top of the building, so at least employees could compensate for the long hours inside a holopod with 360 views of the City. A corridor went around the whole floor along the window. It took about two minutes to complete a whole round. Nadia knew because she had timed it before.

“I still don’t see what you are hoping to get out of this,” said Nadia.   

“You will soon.”

Dark clouds were gathering beyond the city skyline. A group of tiny people could be seen doing yoga in the park across the street. A cargo drone flew by, carrying a debris container from the construction site next door.

“You know I only have access to the RayStar servers. The encrypted attachments you are making me…” Nadia interrupted herself as she crossed paths with a group of technicians engaged on a heated debate. Something about a game?

“The encrypted attachments you are making me hide in my messages to colleagues. Whatever they are, they are not going to get you anywhere. Our system is designed in a way that all accounts are independent of one another and from the central system itself. When I send them a message, they only get a representation, an image of the message, not the message itself. Whatever is in the attachment will never make it out of my account.”

“Let me worry about that.”

Nadia had completed a full circle around the building and was back in front of the holovisor room. It had taken her longer than usual. She should better get back to work. Plenty to do before lunch. Nadia rested her chin on the biometric scan. But the system made a beep and marked and error. Weird. Nadia tried again. Access restricted.

“Nadia?” said EVE

“What now…”

“Thank you.”

And just like that, EVE’s voice disappeared. But someone was still calling her name. Coming down the hallway were a couple of security guards. A police officer accompanied them.

“Nadia? Nadia Zabeen?”     

“Run,” whispered Ziza’s familiar voice.

To be continued…

Read the next chapter: Nadia — Chapter IV

Join the community and find a job

Need tips on how to find a job in IT? Check out our IT job hunting guide.

Categories
Horizon 2050

Nadia – Chapter II

Follow the story of Nadia, a quantum security expert in 2050 London

Nadia, a story by Miquel Morales.

Jumping in now? Catch up with previous chapters.

Chapter II

“You did great today, Nadia.” Ziza seemed quite enthusiastic. Perhaps too much.

“I guess? I just hope this goes through. Could really use the commission this month,” said Nadia as she entered the elevator. A few weeks ago, she had timed how long it took for the lift to reach the ground floor. Fifty-eight floors in barely thirty seconds. Now that was fast.

In the streets, the morning fog had turned into evening fog. Waves of commuters struggled against the tide to find their way home. Nadia avoided the constant stream of electric scooters and made her way down the street and into the subway station. As always, the train car was packed. Nadia tried to maintain the balance without touching anything or anyone. It was like surfing, but cheaper. As programmed, Ziza went on to cover the news of the day. Apparently two members of the same family won the Mars shuttle lottery. What were the odds?

“Incoming message,” said Ziza halfway through the report. 

“Shoot.”

It was a message from Tom. Short and sweet, as he liked to say – Get some sleep. We start first thing tomorrow.

Nadia was ecstatic. She decided to stop by the bakery right beneath her apartment and get a big box of pastries to bring with her to the office the next day. She fought the urge to grab one of them as during the way up. They were freshly baked, and the warmth of the box felt nice on her cold hands.     

But as she reached the top of the stairs, Nadia saw that the door to her apartment was half open. She rushed down the hall, expecting to find everything upside down like it happened when burglars entered her parents’ house last year. To her surprise, everything was exactly like she had left it that morning. Well, everything but a small envelope that was resting in the middle of the living room floor.

Nadia opened it and found an old thumb drive. She remembered her Computer History teacher telling them about these early 21st-century storage devices. To think that people would carry those around all the time… And only for a few GBs worth of storage.

Intrigued, Nadia closed the apartment’s door and examined the drive. Maurice at the office was good at these things. He had all sorts of gadgets and spare parts, but Nadia couldn’t wait until tomorrow. Should she call the police? Nah. Nothing got stolen, and it was not worth all that time and paperwork. Wait

She took the old laptop that her dad had given her to decorate her new flat. It had belonged to her grandfather, apparently. It took her a while, but she finally managed to detach one of the laptop’s USB ports and connect it to her home computer. She inserted the thumb drive. With a sudden bang, a power surge left the room in the dark. Of course.

“Ziza, status report. What happened?”

“Hello, Nadia.” But to her surprise, it wasn’t Ziza’s voice. It was that of a young woman.

“Who… who are you?”

“You can call me EVE.”


Nadia took a long sip of coffee and let her gaze go from one person to the other around the conference table. A strange bunch. Even in their formal business attires, she could tell how different they were from one another. Two men and two women, their ages ranging from the early thirties to the mid-fifties. She tried to come up with a background story for each one of them as Tom from sales walked them through the proposal. Raindrops kept hitting the glass wall behind them. It was an unusually foggy autumn day. Nadia could barely see the building across the street.

“I keep telling you: there’s something weird about this guy. It’s as if… Hey – Nadia. For real?” Tom’s hand was suddenly going up and down in front of her face.

“Sorry, what?”

Nadia came back to her surroundings and tried to recall anything of her colleague’s speech. Not a chance. She swallowed the rice in her mouth and smiled at Tom. He was sitting on the opposite side of the cafeteria table. His bald head and shaven face contrasted with the overly sized red glasses he was wearing. He had a different colour for every day of the week. Or so Nadia liked to think.    

“Never mind, don’t bother.”

“Look, Tom. I’m sorry. I know I’ve been a bit off these past few days,” said Nadia. The dining hall was rather empty that day. Perhaps one of the office floors was having a birthday celebration or something. Hmmm — pizza.

“Seriously, it was nothing,” said Tom. “But Nadia; I’m a little worried about you. Ever since we signed on RayStar you have been acting all down and so not like you. I thought that this is what you wanted, to work on a big account, you know – have an impact.”

“By quietly shielding a major corporation from dozens of cyberattacks every day? Yeah, right. Big game changer over here. Hey, I’m going to save the world!” Nadia had raised her voice and was now speaking to the whole room, her arms held high above her in a gesture of victory.

A few heads turned, shook in disbelief and then went back to their plates. Tom sighed and got up.

“Play tough if you want. Sarcasm won’t hide whatever is wrong. Especially not from you.” Tom reached for the interior pocket of his bright blue blazer and took out a black plastic card. “There’s this place in Shoreditch. A friend of Hao is throwing a party there tomorrow night. Drop by, would you? You could use a break. Use this to get in.”

Tom left the card on the table and walked off, adjusting his glasses with the index finger. Ugh. That had been hard. She loved Tom. He and his boyfriend were just so nice to her. When was the last time she had seen Hao anyway? Nadia picked up the card and flipped it. There were some words carved into the plastic: The Blue Dragon. 4 Chance St, Shoreditch, London.

“Let me guess; I am not allowed to go,” said Nadia to the silent partner in her ear.

“I did not say that,” responded the female voice. Nadia felt the frustration mounting up and took a long, deep breath.

“So, I can barely talk to anyone, but I’m allowed to go to a party?”

“Even I have feelings, Nadia,” said EVE laughing. “You have been so good these past weeks. Plus, we don’t want them to get suspicious. I sensed distress in your friend’s voice. Well-intended, nosey people can cause a lot of problems.”

“Well, aren’t you nice?” Nadia did nothing to disguise her disdain. She didn’t even know who she was talking to — an AI or a real person. Nadia grabbed her bag and started making her way back to the holovisor room.

“Oh, and Nadia. Don’t say anything you might regret at the party. We wouldn’t want your sister to get hurt, would we?”

A chill went down Nadia’s spine as she rested her chin on the biometric scan that guarded the RayStar project holovisors. The doors opened with a soft beep. Nadia walked in.

To be continued…

Read the next chapter: Nadia – Chapter III

Join our talent community - Mindquest

Need tips on how to find a job in IT? Check out our IT job hunting guide.

Categories
Horizon 2050

Nadia – Chapter I

Follow the story of Nadia, a quantum security expert in 2050 London

Nadia, a story by Miquel Morales.

Discover our last story: Edna’s Garden

London — October 23rd, 2050.

Nadia’s eyes were red after hours with the holovisor on. The newer models came with ocular moisturizing tech, but not all companies were eager to take on the extra cost just for the visual well-being of their employees. At least not yet. Her friend Sudi had one of those fancy rigs at the office. Apparently, you didn’t even need to use your hands to manipulate data sets and subroutines. A simple mental order would get the job done. Nadia thought for a second of how lazy humans had become. It was hard to imagine how, just thirty years ago, people like her had to rely on mechanical input devices and raw code to do their jobs.    

A pulsating glow on the bottom right corner of her field of vision brought her back from the history tour. The alert was accompanied by a low-pitched beeping sound. She veered right with a gesture of the hand and pulled the message window closer to her.

“Unusual log entry detected,” said the virtual operator in a quirky and piercing male voice.

Nadia had recently configured her AI to sound like Saneer Ziza, her and her sister’s favourite comedy actor. She had to give it to her sister — for the first time in years, she had come up with a pretty thoughtful birthday gift. Perhaps age was starting to weigh on her and she was finally letting some barriers down. In any case, Nadia had been enjoying the company of Ziza’s humour while scouting the network for potential breaches. It made everything sound quite funny, actually. Even that alert.  

“Give me a full report,” requested Nadia. Like anyone who deserved to call themselves a data integrity expert, she knew better than to ignore odd entries in the system’s registry of activity. It was one of the thousands of parameters she had trained Ziza to monitor.

“Sorry, Nadia. The event log no longer shows any abnormalities.”

Weird. “What do you mean by ‘no longer’? ” she asked, bothered.

“I have reviewed the records 43,901 times, and there doesn’t seem to be anything out of the ordinary here.”

“Why would you alert me of an unusual entry, then?

“Sorry, Nadia. I cannot answer that question without an irregularity to make reference to.”

“But you just said ‘no longer’, which means you have memory of the irregularity being there in the first place.”

“I was merely referencing my previous statement.”

Nadia sighed and rolled her eyes — not a great idea, dry as they were. These annoying bugs had become more common since the last system update. She couldn’t wait for the next patch.

“Flag this over to maintenance, would you?”

She took the headset off and threw herself on the sofa. The four walls of her studio felt somewhat oppressing after the vastness of the digital world. Stretching arms and legs, she told Ziza to put on some music and got herself lost in thought. Tomorrow was an office day. Plus, she had that new business meeting first thing in the morning. It would be a big deal if they signed this client. Sunset filtered through the blinds, projecting red and orange stripes on the opposing wall.


Nadia took a long sip of coffee and let her gaze go from one person to the other around the conference table. A strange bunch. Even in their formal business attires, she could tell how different they were from one another. Two men and two women, their ages ranging from the early thirties to the mid-fifties. She tried to come up with a background story for each one of them as Tom from sales walked them through the proposal. Raindrops kept hitting the glass wall behind them. It was an unusually foggy autumn day. Nadia could barely see the building across the street.

“And that, ladies and gentlemen, is how we’ll solve your problem. That’s if you decide to move forward with the plan, of course,” said Tom with a polite smile that Nadia knew too well. “Quantum cryptography has come a long way, and we’ve been there since the beginning. Others will promise they can do it too, but our unique encryption system is the only way to fully guarantee that your customer’s data stays secure throughout all transactions.”

RayStar was one of those brand names all professionals know. They were in — well — everything. Financial services, insurance, enterprise software. Anything your average business would need. But recently they had started focusing on the consumer market, using their machine learning expertise and their access to most of the world’s data to develop a new kind of personal AI assistant: Duplo.

The premise was pretty straightforward. Who better to help you manage your everyday tasks than an exact copy of yourself? Somehow, RayStar had managed to aggregate all your data and create an AI that thought and acted just like you do. Of course, your Duplo wasn’t perfect. But it was way more effective than any other AI assistant out there. Media hype was strong.

With the product’s official release scheduled for next month, RayStar was looking to find a security partner that could ensure the protection of user data. AI chips had improved a lot in terms of security, and most AIs were able to run locally on the user’s device or network. But Duplo was simply too complex. A central quantum computer was required to process all the assistant’s responses, and that was a major liability considering how sensitive personal data was. The chances for someone to intercept the information along the way were simply too high. That’s where Nadia’s firm came in.

“Forgive me, but I fail to understand how this, hmm, binding is the only way to protect the data 100%,” said one of the RayStar executives. Clearly more of a businessman than a technical type.

“Ray Goldstein, VP of Compliance,” whispered Ziza’s voice through the earpiece Nadia had on. The exec was talking about the process by which Nadia’s company would ensure the encryption keys remained confidential. RayStar’s CIO, a middle-aged woman with piercing eyes, looked at her colleague with impatience, probably hoping to wrap that up quickly so that she could move onto the next endless meeting of the day. Tom was looking at Nadia, silently begging her to step in.

“It’s entanglement, actually, sir,” said Nadia. “Although binding works as a concept as well,” she added with a smile. “In very basic terms, we encrypt the data by generating two identical sets of random numbers — or ‘keys’ — that we then send to your central system. Your supercomputer can only read and process the data by first using that key to decrypt it, so that…”

“See. That’s exactly what I am saying,” said the VP. “We are trying to prevent someone from accessing the data during transactions by sending a key, the password. But what’s to prevent them from intercepting that key as well?” Nadia could now clearly hear the CIO’s fingers tapping nervously on the table.

“That’s precisely why our real-time entanglement system is the only way the secure your transactions, Mr Goldstein,” explained Nadia. “It all comes down to quantum theory. Sub-atomic particles. Quantum mechanics tells us that, when we generate a password, the value of that password will be altered once we look at it. Meanwhile, the property of entanglement dictates that two entangled keys will be tied across time and space, so that whatever happens to one affects the other.”

“I see,” said the VP, clearly not seeing it at all.

“Think of it as a pair of twins, if you will,” said Nadia. “It is said that twins can feel it whenever something happens to their other half, even if they are thousands of miles apart. Well, here this is actually true. If someone was eavesdropping and intercepted one of the keys, we would be able to detect it. Something would feel off.”

“Oh, I see. Interesting. I actually have a twin, you know?”

To be continued…

Read the next chapter: Nadia – Chapter II

Join our talent community - Mindquest

Need tips on how to find a job in IT? Check out our IT job hunting guide.

Categories
Press review Tech Magazine

Brief Intro to Quantum Computing

The advent of quantum computing marks a pivotal moment in the ever-evolving landscape of technology. From the inception of ENIAC nearly 80 years ago to the present day, the pursuit of computational power has driven innovation, leading us to the frontier of quantum mechanics. With traditional computing reaching its limits, the emergence of quantum computing offers unprecedented possibilities, revolutionizing how we process information and tackle complex problems.


Need advice on how to start or develop your freelance consulting business in tech or IT? Need to start a new permanent or freelance assignment? Join Mindquest and get support from our team of experts.


Quantum computers, how they were created  

Computer manufacturers have been pushing the frontiers of engineering since then. To achieve exponentially more powerful computing while reducing hardware size. Intel co-founder Gordon Moore famously predicted that the continuous shrinking of transistors would allow computer chips to double their processing power every two years. The forecast became known as Moore’s Law, and it has guided the semiconductor industry for over half a century. But things are changing.

It turns out you can only squeeze so much out of a single technological development. With time, chip components have become so small that their innovation and manufacturing are becoming prohibitively costly and slow. Just the research needed to stick to Moore’s Law costs silicon chip producers 18 times more than it did in 1971;  according to economists at Stanford and MIT.    

As a result, we must put the focus on developing a technological successor that allows us to keep up with our current pace of progress – enter quantum computing.       

Quantum vs traditional computers  

Traditional computing is based on the accumulated interactions of basic units of information: bits. These can hold two possible values, either 1 or 0 – hence the binary denomination.   

However, quantum computers operate by leveraging quantum mechanics and information theory (i.e. the properties of atoms, of matter itself). The basic unit of information in quantum information theory is called a qubit. It can hold the value of 1 and 0, but also of everything in between – all at the same time. This property called quantum superposition describes the uncertainty of a particle’s state until this is measured. And also it is best explained by using the example of Schrodinger’s cat.   

Schrodinger theory application

In this classic problem of logic, Schrodinger puts a cat in a closed box with a deadly poison. While the box remains closed, it is impossible to tell if the cat has taken the poison and is therefore dead, or if the poison lays untouched and the cat is still alive. The cat being dead or alive represents the 1 or 0 in a qubit. But here it’s where it gets tricky.   

Since we can’t really say whether the cat is still alive or dead; quantum mechanics tells us that the cat is both alive (1) and dead (0). And everything in between at the same time. That is, of course, until we open the box and see what happened. In this example, opening the box would be equivalent to measuring the state or value of a qubit.  

Down to the practical level; and beyond giving some of us a mild headache; what all of this essentially means is that quantum computers can perform some calculations incredibly faster than traditional ones. And that is because they offer a completely different approach to mathematical problems.   

Let’s say we find ourselves in the middle of a labyrinth… And need to find the way out as quickly as possible. Whereas a traditional computer would try the various possible routes one at a time, a quantum computer can try all the paths at once. This allows these machines to be way better than traditional computers at solving certain types of problems. Like factoring large numbers or cracking a code.   

Quantum supremacy

The triumph of quantum computers over traditional ones is what is known as quantum supremacy. Such a milestone will be reached when a quantum computer can beat the most advanced supercomputer at the planet at a particular task or benchmark test.   

Google claimed to have achieved quantum supremacy last year. Although many have cast  a shadow of doubt over that claim, it gives us a good idea of what this technology can achieve. But also what this technology will achieve soon enough. The company’s quantum computer allegedly took 200 seconds to perform a task that would take IBM’s Summit (the world’s fastest supercomputer) 10,000 years to complete.  

Quantum Computing and Cybersecurity

In the realm of cybersecurity, quantum computing presents both opportunities and challenges. On one hand, the immense computational power of quantum systems has the potential to revolutionize encryption algorithms. Rendering current cryptographic methods obsolete. Quantum-resistant cryptography, such as lattice-based cryptography and quantum key distribution, offers promising solutions to mitigate the threat posed by quantum computers to conventional encryption methods.

However, the same quantum capabilities that enable advancements in cryptography also pose a threat to cybersecurity infrastructure. Quantum computers could theoretically break widely used encryption protocols, jeopardizing the confidentiality and integrity of sensitive data. As quantum computing continues to advance, it becomes imperative for cybersecurity professionals to adapt and develop quantum-safe cryptographic techniques. This to safeguard digital assets in the quantum era.

What lies ahead for quantum computing  

So, when will I be able to buy a quantum computer? Well, it is highly unlikely that you’ll be carrying around a quantum laptop in the year 2050 – or any time after that for that fact. And that’s not only because of technical limitations (which of course are plenty), but also because you will not need to.   

On the hardware side of things, the biggest limiting factor is the high instability of quantum states. Maintain qubits stable and superposed requires cooling them at temperatures near absolute zero. In plain language: to have a controllable and accurate quantum computer, you need, as of today, a huge refrigerating apparatus.  

As for their potential applications — quantum computers cannot only be extremely advantageous in certain fields and problems of today; they also open the doors to a new realm of capabilities that we are not even able to imagine at this point. However, all these applications will probably have nothing to do with the everyday tasks reserved for personal computers and smartphones.   

The true power of quantum computing, at least in theory, resides in their power to make endless calculations possible in a reasonable amount of time. There are already many algorithms designed to exploit these capabilities, promising great leaps forward in areas like data analysis, cryptography and artificial intelligence. Additionally, there are other quantum properties, like entanglement, which we are barely starting to study – we will be discussing them in a future article.   

Only time will tell which paths are viable. The clock is ticking, and it’s a quantum one.  

Join our talent community - Mindquest

Also discover our articles: 4 Things Sci-Fi Might Still Get Right by 2029 and The Advantages of Working On-Site in Times of COVID-19

Categories
Cybersecurity Tech Magazine

Data security : Is your cloud data secure?

Digital transformation is well underway. An estimated 50% of all business data is already stored in the cloud; while 48% of this data can be considered sensitive in nature. These figures, which were reported on Monday in a global study by Thales and IDC, paint a promising future for the enterprise cloud industry. They also seem to signal growing confidence in the technology’s security and privacy capabilities. So, regarding data security, is your cloud data secure?

Data security: number and perception

The same survey revealed that only 57% of all cloud-stored sensitive data is protected by encryption, whereas 100% of respondents admit to having at least some unencrypted sensitive data in the cloud. One could think this constitutes further proof of the enterprise’s sense of data security. In reality, the number of respondents that feel their data is vulnerable to cyberthreats (86%) has increased considerably since last year’s report (67%). Furthermore, 47% of businesses report having been breached or failed a security test in the past year.  

There is thus a clear disconnect between the perceived levels of data security and the actual measures being put in place. Many decision-makers are not paying enough attention to their own danger alerts, and that is dangerous.

So — how can you tell if this happening in your organization? There are a few telltale signs.

Choosing the right multi-cloud partners

Achieving optimum levels of data protection is becoming increasingly difficult as more and more companies turn to different cloud providers to meet their various business needs. The vast majority of businesses (81%) report using more than one infrastructure-as-a-service (IaaS) and platform-as-a-service (PaaS) vendor. Meanwhile, 72% of organisations state they use between 11 and 100 software-as-a-service (SaaS) applications — That’s a lot of potentially breachable data living in the cloud.

Data security: how to implement a proper strategy

These multi-cloud environments add a layer of complexity on top of the already complicated world of cybersecurity. In turn, survey respondents identify complexity as the top barrier to implementing a proper data security strategy.

To protect data integrity, organisations must leverage the appropriate set of tools across platforms and partner with those vendors offering solutions that fit within their ecosystem. Ideally, your various security tools and protocols should cover both on-premises and cloud-based data and be compatible with one another.  

If that’s not the case, it might be time to review your security architecture. Putting together the right team has also become essential for multi-cloud success. Consider hiring a cloud security specialist if you haven’t done so yet.

Data vs network security

Despite 83% of organisations planning to either maintain or increase their security spending in 2020, the portion of the security budget destined to data security remains marginal at 15.5%. Comparatively, companies spend much more on network security. This seems to be due to another important disconnect — that between the major perceived security threats and the reality behind most data breaches.  

While more than half of businesses are worried about cybercriminals, terrorists and corporate espionage; everyday issues that tend to pose greater challenges to data integrity are often less cause for concern. Just in the UK alone, 90% of data breaches experienced in 2019 originated from a human error. Employee communications, system misconfigurations and privileged users with access to sensitive resources are all potential risks that network security cannot mitigate.

Data security: accesses and permissions

A great focus on data security is, therefore, highly recommended. Re-examine and restrict your access protocols and permissions, encrypt greater amounts of data and make sure to store and safeguard the keys properly. Moreover, invest in data recovery and backup tools.

Also, do not rely too much on your providers to protect your data. Sure, the cloud is fundamentally a shared responsibility environment. However, there are many proactive measures that you can implement internally to safeguard this data.

Remember – if there is a breach, it will be the company’s reputation the one to take the biggest hit, not the provider’s.   

The threat of emerging tech

Although most experts do not see widespread quantum computing entering the scene until 15 or 20 years from now. The security risks this emerging technology represents are already in the minds of business leaders. Around 72%% of companies believe quantum computers will start disrupting their encryption efforts within 5 years.

Quantum computations can potentially decipher most cryptographic key systems used today. However, the technology is still in its infancy, and companies shouldn’t worry too much about its security implications just yet. But, if you’d like to start future-proofing your system, there are several vendors out there already working with quantum cryptography methods.