Samsung Galaxy S8: Release date, headphone jack, camera, code names and more

Samsung Galaxy S8: Release date, headphone jack, camera, code names and more

The Samsung Galaxy S8 is likely still almost six months away, so that means that everyone is talking about it now.
And with details about the upcoming phones making the rounds, why wouldn't they be? Already, information regarding screen size, the headphone jack (or lack thereof) and release date are out there for all to see, so we've rounded it all up here. 

1. According to reports...the Galaxy S8 will sport a 5.5-inch AMOLED screen with 4K display (806 ppi pixel density) and feature an iris scanner...the device will feature dual-rear camera -- a 12MP S5K2L2 sensor and a 13MP sensor made by Sony...and an 8MP front-snapper

2. There are also speculations...that Samsung's next-generation smartphone will come in two variants -- one with a 5.1-inch screen and another with a 5.5-inch screen. Both...are expected to have edge screens

3. Are the headphone jack wars upon us? A...report suggests that Samsung is "actively and aggressively" looking into the development of its own proprietary headphone jack...It is suggested the new headphone jack won’t be USB-C

4. Sources say it will...be incompatible with the iPhone...Samsung is supposedly of the hopes that...manufacturers will get behind this new no-Apple-allowed proprietary jack and give it preference over Lightning headphones...leaving iPhone users with older, less interesting audio products.

5. It appears as though the internal codenames for the two versions of the Galaxy S8 are simply Dream, and Dream2...These are the codenames, but the model numbers are said to be SM-G950 and SM-G955.

6. It has been anticipated that the smartphone will be launched on the 26th of February, 2017...Samsung usually announces their gen-next S series smartphones one day before...Mobile World Congress...It looks like the Samsung Galaxy S8 too, will follow the same trend.

7. It is likely...the next handset will have a similar price to its predecessor, meaning...the smaller version could be priced somewhere between $649 and $699...The larger version will likely sell for $749 to $799.


Read More

Apple Now fixes 'bricking' update flaw

Apple Now fixes 'bricking' update flaw

Apple says it has fixed a problem that was “bricking” people’s devices while updating to the latest operating system.
Complaints from iPhone and iPad users updating to iOS 10 flooded social media after the software was rolled out on Tuesday.
Discussion around the issue was trending on social media - but Apple said it was limited to a “small number of users”.
Bricking is a term used to describe devices that have been rendered unusable due to a software or hardware fault - as in, the device is now as useful to you as a brick.
The firm apologised to affected customers.
"We experienced a brief issue with the software update process, affecting a small number of users during the first hour of availability,” an Apple spokeswoman said in an emailed statement.
"The problem was quickly resolved and we apologise to those customers.
"Anyone who was affected should connect to iTunes to complete the update or contact AppleCare for help."

The roll out of iOS 10 comes a week before the iPhone 7 goes on sale. In the mean time, existing owners of Apple devices vented their frustration at the problem.
"Currently sitting here with a bricked iPhone full of photos with a recent family visit,” wrote Courtney Guertin on Twitter.
Teething
It is not the first time Apple has had teething problems in rolling out major updates.
When users tried to update to iOS 5 in 2011, high demand appeared to be behind users getting multiple error messages when trying to update.
More recently, in February this year, Apple faced criticism after an update started bricking devices if they had been repaired by a company other than Apple.
Apple apologised for the problem and issued a software update to fix the issue.
It said Error 53, as it became known, was in fact security measure designed to make sure the fingerprint sensor on the device had not been tampered with.

Read More

Russia are Making New Linux-based Mobile Operating System To Kill Android And iOS

Russia are Making New Linux-based Mobile Operating System To Kill Android And iOS

Royal Tech Info:  Russians are busy developing their own Linux-based mobile operating system to end the monopoly of Google’s Android and Apple’s iOS. Aimed at mass audience, this operating system is being developed by Open Mobile Platform on the top of Sailfish OS.
Unlike the rest parts of the world, the privacy and business laws are more stringent in Europe. While companies like Google and Facebook continue to do their business smoothly in USA, they have to walk on some uneven roads in Europe countries from time-to-time.
In a similar case, Google was on the losing side in an anti-monopoly case in Russia that alleged Google for forcing its services in Android. As another major development, Russia has announced that it’s working on a new mobile operating system to end the monopoly of Android and iOS.

The Russian minister of communication, Nikolai Nikiforov, told the world via Twitter that Open Mobile Platform, a Russian company, is building a Linux-based global operating system and the company is currently looking for developers and engineers.

In early 2016, Nikiforov talked about the possibility of an Android-alternative in Russia. He discussed the possible partnership with other BRICS (Brazil, Russia, India, China, and South Africa) members to develop this operating system.
It should be noted that the new operating system is not created from scratch. Instead, it’s being created on the top of Sailfish OS, which was developed by a Hong Kong-based start-up Jolla — a company formed by former Nokia employees.
Sailfish OS is based on open source Linux kernel and features Jolla’s open source Mer Core UI and other third party components.
This effort is aimed at making inexpensive smartphones based on the new OS for the mass audience, according to Open Mobile Platform President Grigory Berezkin.
If the new operating system comes with the functions good enough to challenge Android, a good marketing in the BRICS countries–countries with the half of the world’s population–can result in something great for the new Linux-based mobile OS.



Read More

Smartphone Monster With 18 GB Ram,1.2 TB Storage & Three Snapdragon 830s

Smartphone Monster With 18 GB Ram,1.2 TB Storage & Three Snapdragon 830s

Turing’s 2018 phone to have three Snapdragon 830s, 18GB RAM, 1.2TB storage


Turing Robotics Industries (TRI) with some more craziness after introducing the Turing Phone Cadenza last week. The company has just announced the Turing Monolith Chaconne, a smartphone with specs even stranger than its name, through an email newsletter.
The above announcement by TRI come two months after the firm finally managed to ship the pilot Turing Phone, a crowdfunded Android handset, to early backers, after much delay and some revisions.
Coming to Turing Monolith Chaconne, let’s have a look at its specifications at a glance:
• 6.4-inch 4K display with 2160×3840 pixel resolution
• 3 Qualcomm Snapdragon 830 processors
• 18GB of LPDDR4X RAM (or 3 x 6GB memory chips)
• 1.2TB of storage (3 x 256GB memory, 512GB via microSD card)
• 60MP quad rear camera with Triplet Lens/T1.2 and iMAX 6K
• 20MP dual front camera
• Swordfish OS with deep learning (AI) features based on Sailfish OSS
• 120 Wh battery based on 3,600mAh Graphene Super-capacitor + 2,400mAh Li-Ion + Hydrogen Fuel Cell wordfish Sailfish OS
• WiGig support, Marshall audio, A.L.A.N
• Advanced AI Voice-Authenticated Power On/Off
• Four Nano-SIM support
• Graphene Oxide composite bodywork with Liquid Metal 2.0 Structural Frame, Lightweight Metal Outer Frame, High Temperature Alloy Components
• 4G + VoLTE, 3G, GSM
• Augmented Reality: Parallel Tracking & Mapping API
Steve Chao, CEO of TRI, in an email newsletter explains how it is going to connect the three Snapdragon 830 SoCs in the smartphone:
“TRI plans on connecting multiple CPUs via WiGig by implementing an ad-hoc driver to the 60GHz channel via on-board USB3.0. This complicated computing process stores a transient matrix in SSD of CPU(1), then it recomputes and shares the transient matrix with the other SSD of CPU(2) simultaneously. This results in the CPUs sharing their computing power in parallel. Such proprietary technology enables TRI to achieve never-seen-before computing power on a mobile device. So what exactly is this technology intended for? The answer is – Computational Intelligence (CI).”
The Turing Monolith Chaconne is expected to release in 2018. Whether or not will the company be able to launch this device next year and keep its promise, only time will tell. TRI also says that it will make its presence felt in Salo, Finland and start building prototypes for the Turing Phone Cadenza in a manufacturing facility right where Nokia and Microsoft used to produce their mobile phone prototypes.

Read More

Don't Buy Apple's AirPods

Don't Buy Apple's AirPods

You've probably heard by now, but the new iPhone 7 does not have a headphone jack. This is going to be a pain for all kinds of reasons, but if you pick up a pair of Bluetooth headphones you should do just fine. And hey, what do you know, Apple announced a pair of those! The new "AirPods" are completely wireless!

Don't buy them. You'll regret it.
For the past several years, Bluetooth headphones have been called "wireless," but there is only one specific wire they've eliminated: the wire that goes from the headphones to the phone. This is a good wire to eliminate! It gets caught on doorknobs and sometimes shorts out due to bending around the plug. Another wire, however, has been permitted to stay. Over-the-head Bluetooth headphones still have an obvious band (with a wire inside) connecting the two speakers, and more stripped-down Bluetooth earbud designs usually have a wire running between the two buds, one you can just throw behind your neck.

If this seems like a natural step forward, don't be fooled; it's actually a big step back. The wire that connects your earbuds together isn't some annoyance that needs to be eliminated. It is actually a great feature with a few nice benefits. This wire prevents you from misplacing one tiny bud by ensuring the two are connected. These wire-paired buds are easy to fish out of your bag or pocket, for instance.
But most importantly, the wire also gives you an easy way to hang the buds around your neck when you're not using them so you don't have to set them down in the first place. With completely wireless buds, you'll not only have to deal with buds that are easy to lose, but you'll have to deal with them every time you take them out of your ears. Want to take off your headphones and talk to someone for a few minutes? I hope you have fun holding a stray AirPod in your hand, or fishing a loose one out of your pocket a minute later, or have the carrying case on you literally at all times.


Read More

Here Comes iPhone 7 Adapter You Really Want

Here Comes iPhone 7 Adapter You Really Want

There was a pleasant surprise at Apple's big event yesterday. Yes, the headphone jack is going away on the iPhone 7, but at least the folks who killed it are being kind enough to include a Lightning port-to-headphone jack converter with every phone, so you can still use your old wired buds. It's a much better situation than when Apple was selling 30 Pin-to-Lightning adapters for $30 a pop a few years ago.
But there's bad news. Since the iPhone 7 only has one Lightning port, that means you can use it for headphones or for charging but not both at the same time, which is an extremely handy thing you used to be able to do.
Fortunately there is an adapter that can do this, but it has its fair share of drawbacks. First off it's not in the box. Second, it comes in the form of a stationary dock for your desk, instead of something more mobile that you could leave attached to your phone on the go. Lastly, it's 50 bucks. If you want to pick one up, it's now available on Apple's online store, but there's a good chance some third-party option that is cheaper and more mobile might come out down the line.
In the meantime I recommend switching to Bluetooth, but just don't buy those stupid AirPods when you do it.

Read More

Bootstrap 4 Rapid web development framework Using (HTML,CSS,JS) Effective Learning

Bootstrap 4 Rapid web development framework Using (HTML,CSS,JS) Effective Learning


Bootstrap 4 enables you to create websites quicker and easier than ever!
Let us introduce you to using Bootstrap to create websites and show you whats new with Bootstrap 4!
Here is What You Will Learn In our Complete Course!
  • Examples of how to setup Bootstrap within your webpages
  • Source Code included to work along with the course content
  • Examples of New Bootstrap 4 changes
  • Its easier than ever to create Bootstrap themes with Bootstrap 4
  • Grid system which is the heart of Bootstrap – with examples of the new improved functionality of Bootstrap 4 grid system
  • Wells and thumbnails are now replaced with Cards – new extendable container
  • Core fundamental concepts of Bootstrap
  • How to create websites with Bootstrap
  • The new and improved navigation bar for Bootstrap
  • More background options and how to apply them to your web pages


With the right mindset, understanding, and application of the teachings in this course, you will instantly begin to move towards mastering Bootstrap 4 To Build Your Own Website!

For More Bootstrap Video CLICK HERE
Read More

Ethical Hacking With Kali Linux Step by Step

Ethical Hacking With Kali Linux Step by Step

This course is simply amazingly clear! I`ve never used any other os apart from Windows and Kali always was a mistery to me let alone installing it on my virtual machine. BUT this course solved it, I just followed the instructions and less than 10 minutes later kali is installed and working! The whole course is presented super clear, great video quality and no steps missed!

Kali Linux is one of the most versatile penetration testing platforms favored by ethical hackers.
This course will introduce you to Kali Linux and explain step by step how to install Kali Linux in a virtual environment on a Windows 10 machine.
You will learn how to install Kali Linux, set up the root username and password, install VirtualBox guest additions, Linux kernels and much more!


What are the requirements?

  • Fast and Reliable Internet Connection
  • Wireless Card

What am I going to get from this course?

  • Install Kali Linux in a Windows 10 Environment
  • Understand Step By Step Instructions of Enabling Wireless Hacking in Kali Linux
  • Understand the Use of NMAP for Security Scanning and Network Exploring

What is the target audience?

  • Anyone Wanting To Learn How To Set Up a Proper Ethical Hacking Environment
  • Anyone Wanting To Learn The Basics of Ethical Hacking

For More Ethical Hacking With Kali Linux Step by Step Videos Click Here
Read More

Google Adsense Training Make Money

Google Adsense Training Make Money

This course Google Adsense Training Make Money will clearly define you that how you can make money with google adsence and also tell you high paying keyword who you lot of money by click there ads

What are the best topics for Adsense:
1) Technology (Blogging, Web Development, SEO etc)
2) Forex
3) Business
4) Web Hosting & Domains
5) Fashion
6) Travel & Tourism
7) eCommerce
8) USA, UK & Canada related topics
9) Charity
10) Insurance
These topics won't make well money:
1) Celebrities
2) Bollywood
3) Wallpaper
4) Poetry & Jokes
5) Topics related to India, Pakistan, Bangladeshetc





For More Google Adsence videos Click Here
Read More

Hacking & Securing PHP Applications (Secure Your Code)

Hacking & Securing PHP Applications (Secure Your Code)

This course teaches the programmers on how to exploit(hack) and defend against various attacks on PHP language. The course is designed around OWASP Top10 which is common standard which is used in design, architecture, testing of web applications. The course contains video/audio lectures. It has Theory on PHP programming(Exploit, Defense) . It also has Demos of exploitation and Defense. It gives students practical insight into coding web application in PHP securely. We recommend students to study the course over a period of 15 days and attempt the quiz at the end of the period. we also recommend students to study various resource material available on the internet in various forums including OWASP official website. The course is structured according to OWASP Top 10 from A1 to A10. In each of the OWASP Top10 sessions we have categorized presentation, exploitation, defense. Any programmer who is programming in PHP, should take this course. Secure PHP programmers are prefered by organisations across the globe.




For More PHP Security Video  Click Here
Read More

CodeIgniter Tutorial PHP MVC Framework for Beginners Project

CodeIgniter Tutorial PHP MVC Framework for Beginners Project

CodeIgniter is a powerful PHP framework that can help you greatly speed up the development of your web applications. It is has a small performance footprint due to the modular approach to loading its libraries and does a great job separating logic from presentation by using a Model-View-Controller (MVC) dynamic.
In this tutorial, you will learn how to create a very simple application that displays content from the database. It is not meant to provide the solution to building your own CMS, but rather to illustrate how CodeIgniter can be used. Additionally, it seeks to put in practice some of the lessons learned in theprevious article and assumes you already have CodeIgniter installed on your development environment and have configured it as described in the first tutorial.



The Plan

In this article, you will see how to use some of CodeIgniter’s classes and functions to query a database table containing news items and displaying them individually on the page. For this we will create a Controller, a Model and a View, as well as the database to hold the information (although the latter part will also be assumed since there are many resources available where you can brush up on your MySQL skills).
The database requirements are as follows: a table called news which contains 3 columns: id (primary and auto incremented), title, and body. Of course you can add more, but this is enough for the example. And then create a couple of rows in the table with some dummy news items. You can use this great tutorial to help you create your database if you don’t know how. Additionally, make sure that you configured CodeIgniter to use this database.

The Model

Now that we have the database properly set up and CodeIgniter is aware of it, it’s time to create a Model class that will query it for information. Navigate to the application/models folder of your CodeIgniter installation and create a new php file called news_model.php (You can name the file whatever you want). Add a php opening tag to the top of the file and create the Model class by extending the default CI one (remember that class names begin with capital letters):
class News_model extends CI_Model {

}
Inside this class, you have to then create a function (called a method) to query the database. CodeIgniter uses the Active Record pattern that makes working with the database very easy. All you have to do is load the database class in the constructor function (if you have not autoloaded it already in the autoload.phpfile under the application/config folder) and you are good to go. To load it, paste the following function into the class:
public function __construct() {
  $this->load->database(); 
}
This will make it that all methods within this class will be able to make use of the database functions. Next, you need the above mentioned method in the Model class to read the information from your database table:
public function get_news($id) {
  if($id != FALSE) {
    $query = $this->db->get_where('news', array('id' => $id));
    return $query->row_array();
  }
  else {
    return FALSE;
  }
}
It simply checks that an ID is passed to it before retrieving from the news table the row with the ID passed and returning it as an associative array containing all the columns in the table. If no ID is passed, the function will return FALSE.
So that takes care of retrieving the information. Now it’s time to handle the request from the client that demands this information. Save the file and exit.

The Controller

Navigate to the application/controllers folder and create a new php file called news.php (The name of this file must correspond to the name of the class you are about to give). Within the file, start again by opening the php tag and creating the Controller class by extension:
class News extends CI_Controller {

}
Now it’s time to work inside this class to handle the requests and display the relevant piece of news. All the heavy lifting happens in the Model class so all we have to do here is load it and pass it to the ID argument of the piece of news we want displayed. So let’s create a function called show() that will handle this:
public function show($id) {
    $this->load->model('news_model');
    $news = $this->news_model->get_news($id);
    $data['title'] = $news['title'];
    $data['body'] = $news['body'];
    $this->load->view('news_article', $data);
}
What this method does is the following: the first line loads the news_model we just created. The second one uses it and stores the query result (which is an associative array containing all the columns in the row) in the $news variable. The third and fourth lines store in the $data array the title and body of the retrieved news and the fifth one loads the View we want to use to display them and passes the information along. Each key in the $data array will represent a variable to be printed out in the View file. So let’s see how we build that.

The View

Navigate to the application/views folder and create a php file called news_article.php (This must be the same name as the one you loaded in the Controller. Note that you do not need to include the php extension when loading it there.). In this file copy the following lines:

As you can see, the $title and the $body variables are being passed to the View from the Controller via the $data array. You can add all sorts of markup to display the page in any way you want but for our purposes, an H1 tag for the title and a paragraph for the body are enough. Save the file and point your browser to the Controller you just created:
http://example.com/news/show/1
If the browser makes this request, CodeIgniter will now look for a Controller named news (in a php class file called news.php), call a method within it named show(), and pass it the parameter 1. This method will then load the news_model that queries the database and returns the piece of news which then the Controller passes to the View for display. Very simple and logical. If you go tohttp://example.com/news/show/2, it will display the piece of news with the ID equal to 2.
And here you have it: a basic but dynamic application that queries the database for information and displays it to the client. Now you may ask, why use 3 files and all these functions and configuration for this? Well the answer to this will be more than obvious when you build complex applications for which functional programming becomes difficult to manage and not using a framework like CodeIgniter will force you to define all these libraries yourself.
Read More

Uncharted 4 Trailer: A Thief's End: Prince of Thieves

Uncharted 4 Trailer: A Thief's End: Prince of Thieves

Uncharted 4: A Thief's End gets its final trailer ahead of its 10 May worldwide release on PS4 .
Given the game's numerous delays - it was originally set for release in 2015 - fans' expectations are through the roof, with developer Naughty Dog claiming Nathan Drake's latest outing will be "his greatest adventure yet."
This hotly anticipated instalment will be the last one to be made by Naughty Dog, but with Sony owning the rights to the franchise it might not necessarily be the last time we see Drake in action.



With The Last of Us, I argued that Naughty Dog had created the game of the generation. With Uncharted 4, let’s see where they go next
Read More

Call of Duty Black OPs III Multiplayer Gameplay | Gameplay 2016

Call of Duty Black OPs III Multiplayer Gameplay | Gameplay 2016

Black Ops 3 adds a lot of new movement capabilities for players to use in competition — but that doesn’t mean sprinting around the map and running on walls is the right way to play for everyone, or even most people. In fact, in most situations, a more traditional approach to ,
multiplayer is called for: stay low, stay in cover, and try to avoid getting flanked out. Just because you




Black Ops 3  changes up multiplayer pretty significantly with “Specialists,” characters you can choose to play that replace the standard soldier characters that you could previously use and customize in earlier games. Each of the specialists is pretty similar to the others, with the exception of their special abilities, which you get to use a few times each match — some are suited to close-quarters combat, others have armor or sniping weapons, still others use explosives.
Read More

Tom Clancy's Ghost Recon Wildlands | GamePlay 2016 | First Look

Tom Clancy's Ghost Recon Wildlands | GamePlay 2016 | First Look

Ubisoft has just released a brand new trailer for its upcoming game, Tom Clancy’s Ghost Recon Wildlands. The trailer shows the character and weapon customization options. In Ghost Recon Wildlands, you decide how to take down the cartel. Watch now to see how you can customize your character’s appearance and gear, and use the Gunsmith to craft weapons to take on any enemy in any environment.




Watch now to see how you can customize your character’s appearance and gear, and use the Gunsmith to craft weapons to take on any enemy in any environment.



Read More

FAA Warns Against Using Explosion-Prone Samsung Note 7 In Flight

FAA Warns Against Using Explosion-Prone Samsung Note 7 In Flight

U.S. aviation safety officials took the extraordinary step late Thursday of warning airline passengers not to turn on or charge a new-model Samsung smartphone during flights following numerous reports of the devices catching fire.
The Federal Aviation Administration also warned passengers not to put the Galaxy Note 7 phones in their checked bags, citing "recent incidents and concerns raised by Samsung" about the devices. It is extremely unusual for the FAA to warn passengers about a specific product.
Last week, Samsung ordered a global recall of the jumbo phones after its investigation of explosion reports found the rechargeable lithium batteries were at fault. In one case, a family in St. Petersburg, Florida, reported a Galaxy Note 7 phone left charging in their Jeepcaught fire, destroying the vehicle.
Samsung launched the latest version of the Note series in August. The Note series is one of the most expensive lineups released by Samsung, and the devices usually inherit designs and features of the Galaxy S phones that debut in the spring. Samsung also added an iris scanner to the Note 7, which detects patterns in users' eyes to unlock the phone.
Before the issue of battery explosions emerged, supplies were not keeping up with higher-than-expected demand for the smartphone.
The Note 7 isn't the only gadget to catch fire thanks to lithium-battery problems, which have afflicted everything from laptops to Tesla cars to Boeing's 787 jetliner.
Rechargeable lithium batteries are more susceptible to overheating than other types of batteries if they are exposed to high temperatures, are damaged or have manufacturing flaws. Once the overheating starts, it can lead to "thermal runaway" in which temperatures continue escalating to very high levels. Water can put out the flames, but doesn't always halt the thermal runaway. Flames will often reappear after initially being quenched.
Lithium batteries have become ubiquitous in consumer electronic devices. Manufacturers like them because they weigh less and pack considerably more energy into the same space than other types of batteries.
Earlier this year, the International Civil Aviation Organization, a U.N. agency that sets global aviation safety standards, banned bulk shipments of rechargeable lithium-ion batteries as cargo on passenger planes until better packaging can be developed to prevent a fire from spreading and potentially destroying the plane.

Read More

This USB Stick Murders Any Hardware You Plug it Into

This USB Stick Murders Any Hardware You Plug it Into
Copy machines, laptops—it's all the same to the flash drive of death.

If you were worried that your electronic devices were too secure, you can rest easy knowing that a Hong Kong company is selling a simple USB stick that has the power to instantly destroy almost any hardware system. USBkill.com calls its creation "brutally efficient".
The method of attack is not a virus or other programmable means, but an electrical onslaught—charging and discharging the device's capacitors via the USB power supply, "instantly and permanently disabl[ing] unprotected hardware", say the device's makers in apress release.
This is all in order to teach you that your devices aren't safe, even if you have the latest antivirus software installed. Physical damage is an easy way to destroy a computer without needing to meddle with the software. "Any public-facing USB port should be considered an attack vector," the makers write. "In data security, these ports are often locked down to prevent exfiltration of data, or infiltration of malware, but are very often unprotected against electrical attack."
The murderous stick can now be purchased on USBkill.com for about $56, while the protection needed to test it comes at an additional $16. If you have an Apple computer, don't worry—they have protection built in. Everyone else, take note.

Read More

Your Next Phone Could Have Quantum Security

Your Next Phone Could Have Quantum Security

Researchers have developed a "quantum entropy source" for random number generation that can fit into a phone or tablet, potentially offering new levels of safety and encryption for mobile transactions.
Random number generators today are not entirely random because every "random" number starts somewhere. A computer takes a random "seed" number, like the time that the computer last rebooted, and then does some other math to it to shake it up. This is generally good enough for most purposes, but it means that a random number generated this way can actually be reproduced if you know the starting point and the math that happened afterwards. If hackers can figure out even one of those two things, they've got a leg up on stealing data.
That's where quantum mechanics comes in, as shown in a research paper published inOptica. Quantum mechanics, as developed by Planck, Einstein, and Heisenberg, is based on the behavior of energy at the scale of atoms. Electrons, it turns out, absorb random amounts of energy from impact with photons. Truly random. The seed number a computer used to generate a number is discoverable, but these aren't due to the laws of nature. "We have previously shown that the quantum processes taking place exhibit true randomness," saidValerio Pruneri of the Institute of Photonic Sciences in Barcelona (ICFO), who led the research team.
Using that measure of quantum randomness, researchers have been able to develop true random number generators, but none have been particularly fast or small. The devices developed by Pruneri his team, however, run fast enough that they can encrypt gigabytes of data every second, fast enough to encrypt things like voice calls, video, or financial data in real time. And they're small enough that two of the generators put together only measure 6 by 2 millimeters, small enough to conceivably include in a phone without considerably bulking up its size.
To do this, researchers used photonic integrated circuits, which incorporate lasers, to keep the size small. "We've managed to put quantum-based technology that has been used in high profile science experiments into a package that might allow it to be used commercially," said the paper's first author, Carlos Abellan, a doctoral student at ICFO."This is likely just one example of quantum technologies that will soon be available for use in real commercial products. It is a big step forward as far as integration is concerned."
The battle between codemakers and codebreakers has gone on for centuries, dating as far back as the Babington Plot in 1586 to assassinate Queen Elizabeth. With hacking ofgovernment agenciesmajor corporations, and personal information becoming a daily occurrence, it's easy to think that the codebreakers are winning this war. But this new research could offer a new weapon on the side of security.
Read More