Social Icons

Showing posts with label cyber security. Show all posts
Showing posts with label cyber security. Show all posts

Sunday, January 12, 2025

Why the NCSC (UK) is Cautious About Quantum Key Distribution (QKD) for Government and Military Use ?

1.    Quantum Key Distribution (QKD) is often hailed as a groundbreaking technology in the world of cybersecurity. By harnessing the principles of quantum mechanics, it promises secure key distribution between two parties, immune to eavesdropping. However, despite its potential, the UK’s National Cyber Security Centre (NCSC) had explicitly denied its endorsement for government and military applications  few years back. {Source: https://www.ncsc.gov.uk/whitepaper/quantum-security-technologies}. Here's why my opine:

  • Specialist Hardware Requirement: QKD relies on complex and expensive hardware, including photon detectors and optical fibers. This infrastructure is difficult to deploy and maintain, making it impractical for widespread use, especially in sensitive and large-scale applications like government and military communications.

  • Lack of Digital Signatures: Unlike traditional cryptographic systems, QKD doesn’t support digital signatures, which are crucial for verifying the authenticity of messages. Without this feature, QKD cannot fully replace current security systems that ensure data integrity and authentication.

    • Why doesn't QKD support digital signatures?

      • Nature of QKD: QKD’s purpose is to create a shared secret key between two parties. It does not provide the functionality of encrypting data or verifying identities, which is what digital signatures do.
      • Digital signatures require private keys to sign a message and verify it with a public key. While QKD can be used to securely exchange the private keys needed for traditional cryptographic schemes (e.g., for RSA or ECDSA), QKD itself is not designed to perform signing operations.

Source: https://www.ncsc.gov.uk/whitepaper/quantum-security-technologies

Integration with Traditional Systems

2.    While QKD doesn't support digital signatures directly, it can be used in conjunction with traditional cryptographic systems. For instance, after using QKD to securely share a key, the parties can use that key with a traditional system to perform tasks like encryption, decryption, or creating digital signatures.

  • Limited Range and Scalability: QKD's effectiveness is limited by the distance over which it can securely transmit keys. With current technology, it only works over relatively short distances and is not easily scalable, especially for large-scale, long-range communication networks.

  • Evolving Quantum Threats: While QKD is designed to withstand future quantum computer threats, quantum research is still advancing, and new vulnerabilities may emerge. Until these risks are fully understood, relying solely on QKD for critical infrastructure would be premature.

3.    In conclusion, while QKD holds promise for the future, its current limitations in hardware, functionality, and scalability make it an impractical solution for government and military use at this stage. For now, more established and reliable cryptographic methods are preferred to secure sensitive communications.

Tuesday, January 07, 2025

The Future of Thought Control: How fMRI, AI, and Orwell's "Thought Police" Could Converge

1.    In a world where technology is rapidly evolving, we find ourselves standing at the intersection of advanced neuroscience and artificial intelligence. While these innovations promise significant benefits, they also carry the potential for darker, more Orwellian applications. One such concern is the emerging convergence of fMRI (Functional Magnetic Resonance Imaging) technology and AI, which could one day allow us to "read" thoughts. This raises the haunting question: Are we headed towards a future where our thoughts themselves become subject to surveillance and control, echoing the totalitarian regime of Orwell's 1984? Let’s explore how fMRI, AI, and Orwell's Thought Police might come together in a dystopian roadmap.

What is fMRI + AI?

2.    fMRI technology has already made waves in neuroscience by providing insights into how our brains function. By detecting changes in blood flow, it can map brain activity, allowing researchers to understand which parts of the brain are engaged during specific tasks or thought processes. As this technology advances, the possibility of "decoding" thoughts becomes more plausible.

3.    Now, imagine combining fMRI with artificial intelligence. AI, with its sophisticated algorithms and pattern recognition abilities, can analyze complex data like brain activity. The potential is staggering: AI could one day "interpret" the mental states of individuals, recognizing patterns in neural activity and inferring specific thoughts, memories, or intentions. Though we're not there yet, the idea of extracting human thoughts is inching closer to reality.

The Thought Police and Newspeak: Orwell’s Warning

4.    In George Orwell’s 1984, the regime employed the Thought Police to monitor not just actions but also the thoughts of its citizens. Any deviation from the Party’s ideology, even in private thoughts, was punishable. Through pervasive surveillance, the Thought Police suppressed dissent by controlling what people could even think about—creating a society where true freedom was all but extinguished.

5.    Orwell’s concept of Newspeak, a controlled language designed to limit freedom of thought, served as an additional layer of thought control. By reducing vocabulary and removing words that could express subversive or rebellious ideas, Newspeak made it difficult, if not impossible, for individuals to conceptualize alternative ways of thinking. In such a world, the government didn’t just control what people said or did—it controlled their very ability to think freely.

The Dark Road Ahead: A Dystopian Intersection

6.    When we bring together the potential of fMRI + AI with Orwell’s chilling vision of thought control, a disturbing roadmap begins to emerge. Imagine a future where governments or corporations not only observe your physical actions but also access your very thoughts. With the evolution of brain-imaging technology and AI, a society could theoretically develop where people are not only punished for actions but for thoughts deemed undesirable or "dangerous."

7.    This isn’t just science fiction. As fMRI and AI continue to improve, we may reach a point where our thoughts are no longer private. The line between public and private will blur even further, and we may see thought crimes—ideas, beliefs, or opinions that challenge the established order—criminalized in ways that were once thought impossible. Social conformity could become so entrenched that dissent is eradicated not just by force, but by a subtle, insidious monitoring of minds.

8.    Moreover, the potential for manipulation through AI and brain imaging could make modern versions of Newspeak a reality. In a world where thoughts can be decoded, we may find ourselves facing a future where ideas are not only censored but actively shaped by those in power, ensuring that only acceptable thoughts can be conceived or expressed.

A Call for Thoughtful Governance

9.    The convergence of fMRI, AI, and Orwellian concepts highlights a critical need for vigilance in how these technologies are governed. As powerful as these advancements are, they come with the potential for misuse, and unchecked surveillance could usher in an era of social control far beyond what Orwell could have imagined.

10.    Governments, organizations, and tech companies must be held accountable to ensure that technologies designed to improve our lives do not also become tools of oppression. Privacy, personal freedom, and the sanctity of thought should be safeguarded, not eroded. As we move forward, we must be aware of these emerging risks and ensure that policies are in place to protect individual rights while still advancing our understanding of the mind. {Alas...just a thoughtful dream...will never be}

11.    We stand at a critical juncture: The dystopian future envisioned by Orwell could come to pass if we’re not thoughtful in our approach to technology and governance. It’s up to us to ensure that the advancements in brain science and artificial intelligence remain tools for progress, not instruments of control.

12.    The road ahead is not predetermined. We can steer it in a direction that respects human autonomy and freedom, but only if we are vigilant, thoughtful, and proactive in the governance of these powerful technologies. The future of thought—our most personal realm—should remain ours to control.

Friday, March 29, 2024

Inside the Drone: A Chip Odyssey

In this post, we're diving into the fascinating world of drone technology as we explore the tiny yet mighty chips that power these remarkable flying machines.

In this short 4 min YouTube video, we take a closer look at the multitude of chips found within drones. From micro-controllers to GPS modules, each chip plays a vital role in ensuring smooth flight, precise navigation, and stunning aerial captures.

Watch the Video:

List discussed:

    1. Microcontrollers
    2. IMU (Inertial Measurement Unit) chips
    3. GPS modules
    4. Wireless communication chips
    5. Vision Processing Units (VPUs)
    6. Battery Management System (BMS) chips
    7. Motor controllers (ESCs - Electronic Speed Controllers)
    8. Power Management ICs
    9. Onboard camera chips
    10. Barometer sensor chips
    11. Magnetometer sensor chips
    12. Optical flow sensors
    13. Ultrasonic sensors
    14. LiDAR sensors
    15. Microphones
    16. Thermal imaging sensors
    17. FPV (First Person View) transmission chips
    18. Memory chips
    19. Temperature sensors
    20. Encryption and security chips
    21. Flight controllers
    22. Telemetry transceivers
    23. Gimbal controllers
    24. LED drivers
    25. Air quality sensors
    26. Biochemical sensors
    27. Radio frequency (RF) filters and amplifiers
    28. Digital signal processors (DSPs)
    29. Microelectromechanical systems (MEMS)
    30. Radar sensors
    31. Spectroscopy sensors
    32. Hydrophones
    33. Geiger-Müller counters
    34. Custom ASICs (Application-Specific Integrated Circuits)
    35. FPGA (Field-Programmable Gate Array)
    36. Bioacoustic sensors
    37. Laser rangefinders
    38. Electrochemical sensors
    39. Microfluidic chips
    40. Cybersecurity chips

Friday, June 09, 2023

Talk on Blockchain Intersection with Space Threats : 07 Jun 2023

 


Talk on Blockchain Intersection with Space Threats : Geointelligence Conference 2023: CYBER SECURITY"

Date 07 June 2023








Monday, May 03, 2021

TALLINN MANUAL & GLOBAL ATTEMPTS IN CYBER WARFARE POLICIES

The presentation is one unique presentation peculiar to TALLINN MANUAL version 1.0 and 2.0. Along with is discussed cyber policy attempts of other countries.The Tallinn Manual has long been the flagship research initiative of the NATO CCDCOE. The original Tallinn Manual (published in 2013 by Cambridge University Press) addressed the most severe cyber operations followed by version 2.0. The presentation cover the origin details of why this manual arrived at the global scene and what followed around at the global attempts for framing the global cyber policy.


Saturday, February 06, 2021

BRAVE Web Browser : How much advertisements I blocked in a week ?

Hello friends, herewith first I am sharing screen shots of my brave browser dashboard that I captured over a week from 30 Jan 2021 to 6 Feb 2021.The screen shots I have taken pertain to morning hours whenever I login for the day. I am generally on my PC for about 8-9 hours a day. I majorly watch YouTube videos and surf across multiple sites in a day that range from 50-100 at times. So what I am bringing out here that how many ads Brave browser has blocked in this duration and whilst this surfing times.

30 Jan 2021 : 70517 blocked : Counter 0

 31 Jan 2021 : 77744 blocked : Counter 7227  in day( i.e. 30 Jan 2021)

01 Feb 2021 : 92342 blocked : Counter 14598  in day( i.e. 31 Jan 2021)

02 Feb 2021 : 97440 blocked : Counter 5098  in day( i.e. 01 Feb 2021)

03 Feb 2021 : 105386 blocked : Counter 7946  in day( i.e. 02 Feb 2021)

04 Feb 2021 : 108354 blocked : Counter 2968  in day( i.e. 03 Feb 2021)

05 Feb 2021 : 112036 blocked : Counter 3682  in day( i.e. 04 Feb 2021)

06 Feb 2021 : 114870 blocked : Counter 2834  in day( i.e. 05 Feb 2021)


So,total ads blocked over a week is 44353 that deduces to approx average of 6336 ads/day. That's phenomenal to say. Each of these trackers would be definitely linked to thousands of other trackers also giving them unrestricted access to all the user behavior ,privacy and profiles. While there is not much a normal user can do about these trackers, I feel just blocking these thousands of ads will not make any one absolutely free of tracking,but still better than surfing without blockers. Because if the ad companies know that users are blocking by means of plugins and such browsers,they would have already found ways to still track you. After all that's their means of living and minting economy.

Thursday, January 14, 2021

CQ 100: Meet India’s Most Influential Cyber Warriors

First post in this year...though little delayed comes as a pleasant surprise from the cyberosphere.....Sharing here the link of a post that has identified India’s most influential cyber warriors  and has listed me too....

https://www.the420.in/cq-100-meet-indias-most-influential-cyber-warriors-top-cyber-experts/

Screenshot as below:

Sunday, October 18, 2020

CYBER SECURITY : A Mathematical attempt to understand and interpret the mechanics behind

Well..after a long time of around few years I gave a talk that was exclusive to CYBER SECURITY otherwise I have generally hovered around Blockchain and bitcoin for quiet some time now.The unique thing about this presentation is the take on that I attempted. The difference between the usual presentations and this one is that I have tried to explain the technicals behind data collection and prediction through regression. While the common men isn't largely bothered about surfing anything, anywhere, anytime, believing what harm can one do if he has nothing to loose. But alas he should understand why is the need so.The strange patents that IT giants like facebook ,google ,MIcrosoft are currently holding and developing is worrisome to realise. The links below give the presenation download google drive link and the scribd direct link.

Google drive link at :

 https://drive.google.com/file/d/1zwo88ljDaJxJ8S7obKXkICtGDUGGVHZx/view?usp=sharing


Cyber Security : An attempt... by Anupam Tiwari

Workshop on Blockchain Technology and e-Governance: GNLU Center for Law and Technology

A one day Workshop on Blockchain Technology and e-Governance was organized by GNLU,Ahmedabad University through its GNLU Center for Law and Technology in collaboration with Gujarat Council on Science and Technology &  Department of Science and Technology, Government of Gujarat on 19 Sept 2020. The webinar link for the same is as below:

The presentation is available for download at the following link:

https://drive.google.com/file/d/1RT79-r5LhFXdbi2D_ZKgkwu8eH9v5225/view?usp=sharing

while also the scribd direct link for viewing is available as below:


Blockchain Technology and e-Governance by Anupam Tiwari on Scribd

Summer Internship Gurugram Police : Talk on Blockchain basics and Bitcoin crimes

Blockchain basics: Mechanic... by Anupam Tiwari

 

Sharing here a webinar presentation I gave in the Gurugram police summer internship on 27 June 2020.The webinar was attended by 400 plus participants. The link to the presentation pdf is given below:

https://drive.google.com/file/d/1K13ljAstX4oCqd4iMtGROqseyMJ8Rp8R/view?usp=sharing

and the certificate I got as below:



Saturday, May 02, 2020

Installation Bitcoin core on UBuntu 18.0.4 LTS : Bitcoin Mechanics -1

With this first post special to Bitcoin core,over next few months I intend to do some exploring on the bitcoin mechanics part.This basically means playing with the blocks and blockchain vide few python based scripts.Will start from the installation part followed by other posts on extracting info from bitcoin blockchain. This post basically is straight forward installation with the following commands.Screen shots for info :

Firstly install snapd with the following commands

sudo apt update
sudo apt install snapd

 
 click green button install

after this installation of snapd,one single command as follows:

sudo snap install bitcoin-core

The effected screenshots are seen below :


Once installed ,you can check on the terminal...should see three bitcoin applications by tabbing


While the GUI shows as below


When you run for the first time,the GUI notification pops for asking for location of default directory for storing blocks.


Thereafter the blocks start getting downloaded with status of files downloaded visible....


Blocks downloaded status is seen below...this downloading around 287 GB as on date will take time as per download speed available.


The location of the blocks being downloaded will be at /home/bitcoin_scripts/snap/bitcoin-core/common/.bitcoin/blocks where bitcoin_scripts is the user name.

Next post we will see whats inside the block....

Sunday, December 01, 2019

Blockchain Technology Workshop : IIIT Raipur

Dr. SPM IIIT-Naya Raipur, established by the International Institute of Information Technology University Act,2013 of the Government of Chhatissgarh, is a joint venture by Chhattisgarh State Government and National Thermal Power Corporation (NTPC).A workshop on Blockchain Technology was organized from 28-30 Nov 2019 at the campus with the following aims:

(a) To disseminate the knowledge of Blockchain technology among students, researchers and academicians.

(b) To discuss the current status of the Blockchain development and research work in India and across the world.

The material and slides presentation is shared at link https://drive.google.com/open?id=1s9mZtR7hnyQF4YQ5VYAxgKUiCMenWxlf

Few pics shared below



















Saturday, November 02, 2019

HYPERLEDGER FABRIC ON UBUNTU 18.04 LTS : INSTALLATION STEPS WITH TERMINAL COMMANDS

Hyperledger is an umbrella project of open source blockchains and related tools, started in December 2015 by the Linux Foundation, and has received contributions from IBM, Intel and SAP Ariba, to support the collaborative development of blockchain-based distributed ledgers.The following post ahead will see through the screenshots and steps for installation of Hyperledger Fabric on Ubuntu 18.04 LTS. The installation basically first creates the required environs and then the actual installation of.

The actual terminal history I got after the installation is placed below.Between 11-13 terminal commands,if you get an error,please reboot and proceed.

    1  sudo apt-get update
    2  sudo apt-get install curl
    3  sudo dpkg --configure -a - i ran this owing to an error in between
    4  sudo apt-get install curl
    5  sudo apt --fix-broken install - i ran this owing to an error in between
    6  sudo apt-get install curl
    7  sudo apt-get install npm
    8  sudo apt-get install docker
    9  curl -fsSL https://download.docker.com/linux/ubuntu/gpg | sudo apt-key add -
   10  sudo add-apt-repository "deb [arch=amd64] https://download.docker.com/linux/ubuntu $(lsb_release -cs) stable"
   11  apt-cache policy docker-ce - might need a reboot if error seen
   12  sudo apt-get install -y docker-ce
   13  docker info
   14  sudo docker info
   15  sudo apt-get install -y docker-ce
   16  sudo apt-get install docker-compose
   17  sudo apt-get upgrade
   18  sudo curl -sSL https://goo.gl/6wtTN5 | sudo bash -s 1.1.0
   19  history
   20  sudo chmod 777 -R fabric-samples
   21  cd fabric-samples/first-network
   22  sudo ./byfn.sh generate
   23  sudo ./byfn.sh up


The following applications and software's need to be installed first for Hyperledger Fabric:

  • CURL
  • GO Programming Language
  • Docker
  • Docker Compose
  • Node.js Runtime
  • NPM
  • PYTHON

The following is the set of commands used for the entire installation.These commands are followed by the respective screen shots of the executed commands.


















So...all good and the fabric is installed...
Powered By Blogger