We live and learn. How did the Chinese do it?
Probably cannot be intercepted or hacked. http://phys.org/news/2015-03-quantum-scheme-states-transmitting-physical.html From: [email protected] To: [email protected] Subject: RE: [agi] Couple thoughts Date: Thu, 5 Mar 2015 22:37:45 +0200 Ah! The law of averages. Well, technology, as data, is not human, but the Chinese are pretty human, I'd say. From: [email protected] To: [email protected] Subject: RE: [agi] Couple thoughts Date: Thu, 5 Mar 2015 08:35:10 -0800 "What if such encryption technology were used to get to Mars before the human contingent did, " Are you saying the Chinese are not human? What do you know that we don't know? If you read Asimov you'd know that the Chinese would develop Artificial Intelligence and colonize space firstbecause of the sheer number of people working on those problems. ~PM From: [email protected] To: [email protected] Subject: RE: [agi] Couple thoughts Date: Thu, 5 Mar 2015 14:41:39 +0200 Hi I read an interesting thing this morning, which triggered a thought on the Chinese quantum-encryption project in my mind. Maybe we missed their message to the world, or to specific nations? They were telling the world that they now had the ability to safely encode any data they wished to, and send it anywhere into space. Even if it was intercepted, it cannot be accessed. So what? They'll just send it again in a more-clever way. But where to? So this Mars-colony project then? What if such encryption technology were used to get to Mars before the human contingent did, and if such encrypted technology could decode itself and do its magic? It does become possible that by the time the Mars team arrived, they could be greeted by a Chinese flag carrying the words: Howdy! Welcome to Mars, proud province of China! And that proud moment for mankind could perhaps be streamed back to earth for the whole world to watch, copyright protected, even if it was somewhat delayed. This not-so humorous thought then, presents as the best-case scenario and perhaps has significance for why they went public, which by my reading they would usually never do unless they had an excellent point to make. Hype, or no hype, it's worth thinking about. Rob From: [email protected] To: [email protected] Subject: RE: [agi] Couple thoughts Date: Tue, 3 Mar 2015 17:50:54 +0200 Ah! Now I see. I was lost there for a second. You explain very well. Forever a student I am. Thank you John From: [email protected] To: [email protected] Subject: RE: [agi] Couple thoughts Date: Tue, 3 Mar 2015 10:40:46 -0500 The more accurate term is “quantum encryption network” verses “quantum network” since it’s not transmitting data by entanglement or other means it’s using quantum encryption (QKD). So some of it is hype. John From: Nanograte Knowledge Technologies via AGI [mailto:[email protected]] Sent: Tuesday, March 3, 2015 10:30 AM To: AGI Subject: RE: [agi] Couple thoughts @John Makes for very interesting, reading. Do you think the critical opinions in the article was justified? RobFrom: [email protected] To: [email protected] Subject: RE: [agi] Couple thoughts Date: Tue, 3 Mar 2015 17:21:58 +0200Oh goody! Thanks John. I'll go check it out.From: [email protected] To: [email protected] Subject: RE: [agi] Couple thoughts Date: Tue, 3 Mar 2015 10:17:53 -0500There’s the Chinese quantum network and they’re building a first leg between Beijing and Shanghai. The claim is unhackable, see:http://english.caixin.com/2015-02-06/100782139.html John From: Nanograte Knowledge Technologies via AGI [mailto:[email protected]] Sent: Monday, March 2, 2015 6:58 PM To: AGI Subject: RE: [agi] Couple thoughts @Mike There is something unhackable, but we'll need to build it first.> Date: Mon, 2 Mar 2015 14:22:08 -0800 > Subject: Re: [agi] Couple thoughts > From: [email protected] > To: [email protected] > > I get the feeling there is nothing left unhackable. Even a > typewriter, they can plant a effing video recorder somewhere and film > you typing. It used to be you made fun of the guy with tin foil on > his head to "block transmissions." > > On 3/2/15, John Rose via AGI <[email protected]> wrote: > >> -----Original Message----- > >> From: Matt Mahoney via AGI [mailto:[email protected]] > >> > >> Peers need to know when two messages are from the same source. If a peer > >> earns a reputation for being a reliable source of information (like Google > >> or > >> your bank), then malicious peers will try to spoof messages from them. To > >> prevent this, peers sign their messages using a mutually agreed secret > >> key > >> chosen at random. After an initial exchange (using e.g. Diffie-Hellman), > >> I > >> send you a message and a signature like SHA256(message + key). You > >> receive > >> the message, compute the signature, and compare it to the signature that > >> I > >> sent you. Since nobody else knows the key, and the hash is not invertible, > >> you > >> know the message must have come from me. > >> > > > > > > Well, that's the same as using HTTPS or another application layer protocol > > over TLS/SSL with certificates signed by a certificate authority no? Though > > in your communications protocol you control the signing and encryption > > algorithm and everyone need not get a CA signed cert I suppose. > > > > John > > > > > > > > > > > > > > ------------------------------------------- > > AGI > > Archives: https://www.listbox.com/member/archive/303/=now > > RSS Feed: https://www.listbox.com/member/archive/rss/303/11943661-d9279dae > > Modify Your Subscription: > > https://www.listbox.com/member/?& > > Powered by Listbox: http://www.listbox.com > > > > > ------------------------------------------- > AGI > Archives: https://www.listbox.com/member/archive/303/=now > RSS Feed: https://www.listbox.com/member/archive/rss/303/26941503-0abb15dc > Modify Your Subscription: https://www.listbox.com/member/?& > Powered by Listbox: http://www.listbox.comAGI | Archives | Modify Your > Subscription AGI | Archives | Modify Your SubscriptionAGI | Archives | Modify > Your SubscriptionAGI | Archives | Modify Your Subscription AGI | Archives | Modify Your Subscription AGI | Archives | Modify Your Subscription AGI | Archives | Modify Your Subscription AGI | Archives | Modify Your Subscription AGI | Archives | Modify Your Subscription ------------------------------------------- AGI Archives: https://www.listbox.com/member/archive/303/=now RSS Feed: https://www.listbox.com/member/archive/rss/303/21088071-f452e424 Modify Your Subscription: https://www.listbox.com/member/?member_id=21088071&id_secret=21088071-58d57657 Powered by Listbox: http://www.listbox.com
