Update: The War on Privacy and Quantum Computing

blackphone-100247376-largeIt’s been nearly a year since Edward Snowden blew the lid of the American spy agency NSA and PRISM. The Internet world has changed substantively as a result with a rush on security technology seeing companies such as Astrill and CipherCloud in explosive growth mode. Encryption is the new product golden child and everyone is investing heavily in an effort to restore confidence in Cloud services.

The NSA has come under legal challenge in the U.S. from various federated law makers and States. Several years of legal wrangling are on the cards as the country debates, challenges, and seeks to pressure the U.S. agency. They’ve been accused of illegal tactics, breaking the American Constitution, and putting a severe damper on multi-national U.S. based ICT companies.

Any country that is not part of the “Five Eyes” spy network has complained, the European Union and South America the most vociferous. Multiple countries are in the process of balkanizing their Internet services and forcing the large U.S based multi-national ICT companies to relocate their services, physically, within their borders.

The NSA and PRISM debacle has spread beyond the argument that it is required to defend against terrorism, with allegations that the spying has been commercially driven and included targets such as embassies, the United Nations, banking systems, and individual world leaders private information.

Australian and Indonesian relations have taken a battering with revelations that spying has focussed on key Indonesian leaders, including the president, with a commercial bent over various contracts, companies, and resources. An allegation that Tony Abbott does not deny, does not apologise for, and remains unrepentant.

The impact on the Cloud Computing services that are based in the continental U.S. has been high. The Europeans, the Swiss in particular, are cashing in on the fact that the NSA, via PRISM and other methods, have outed giants such as Apple and Microsoft that have shown not only let the NSA in the back door, they’ve written code to allow access past their security and encryption services.

The Europeans and the Brazilians have started the process to build connections that circumvent the U.S. with Brazil looking at changing their international submarine cables to bypass the Northern Americans. Balkanization is well under way.

For the end consumer, the news is good. The amount of investment being poured into security is significant, with companies such as Microsoft deploying encryption, with the intention to do more, being a step toward privacy protection.

The end user has a range of products that now protect them from encryption of their devices, to encryption in flight, to encryption of Cloud services. Astrill is seeing a surge in growth. They encrypt all Internet communications in Stealth Mode from your end device. That means that everything is strongly encrypted as it leaves your device, enters their network, and as it exits, it spins your internet address changing it every few minutes.

The Blackphone, pictured above, released by Silent Circle, is a fully functioning phone with in-built encryption and security protections now entering the consumer market.

“It’s a phone whose existence is motivated by the need to protect your privacy,” said Zimmermann. “Geeksphone knows how to build phones, Silent Circle knows how to protect privacy. We’ve added in some apps, integrated it all in, tightened the Android settings down and hardened it against attacks.” – Source

Other companies, including Mega, promise encrypted storage and messaging for the masses. The days of text based email are dwindling with consumers wanting heavy encryption to protect their privacy.

CiperCloud and Fujitsu are well done the track of homomorphic encryption, the ability to process data and software as a service fully encrypted. That means that Cloud providers will only ever see encrypted data that the customer holds the key too.

The NSA lack the resource to crack encryption, especially given that the amount of data that is being encrypted, everywhere, over the Internet, has exploded. They are now banking on Quantum Computing to bring the processing power to be able to decrypt communications.

Known as Infinity Machines, Quantum Computers operate at near absolute zero, in a locked room, in order to bring massive, exponential computing power to bear on complex problems. Quantum Computing breaks the old rules of computing. Traditional computing operates with a state that is either on, or off. One, or zero. Quantum Computing allows for more states (Quantam Superposition). On, off, and something else. Believe it or not, Quantum Computing is theorized to operate in the multiverse.

“It promises to solve some of humanity’s most complex problems. It’s backed by Jeff Bezos, NASA and the CIA. Each one costs $10,000,000 and operates at 459 degrees below zero. And nobody knows how it actually works.” – Source

Hold on to your hats here. Quantum Mechanics theorizes that there are multiple universes, multiple dimensions, and as the Quantum Computer operates, it throws its calculations into multiple universes in order to allow for multiple processing streams to be completed at the same time, then bringing all the results back to the current reality.

Doctor Who eat your heart out.

Don’t believe me? Here’s the background.

Young’s experiment shows you some of the mind bending theory behind Quantum Computing.

The War on Privacy continues. At ten million a pop, Quantum Computers are not only available to the NSA, they are also available to the entrepreneur.

One thing is for certain, the NSA revelations are sparking a massive investment in computing power. Quantum Computing doesn’t just break Moore’s Law, it completely obliterates it.

That can only be good for the ICT industry as a whole.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.

%d bloggers like this: