
It was not related to the quantum portion of the solution, but to another component.

Needless to say, a vulnerability was discovered in a quantum crypto system a few months after the presentation (disclosure: I can’t remember if it was the same vendor, probably not). “So this car was driven by a single mother, only to commute the kids to the school?” Have you ever bought a used car? I got the same kind of feeling when listening to the presentation that I might get from the semi bold, sweaty, 70’s shirt wearing, XL dad body carrying used car dealer. But now… their solution was impossible to hack. At one point the presenter told us that in the 90’s when fibre optics were introduced, the companies selling fibre solutions claimed it was impossible to physically hack – but now you could buy a simple repeater. This is 100% SecureĪ couple of years back when I was working for the EU Commission Research Centre, I was invited to a presentation by a company that delivers quantum cryptography solutions. These 2 high profile vulnerabilities sparked me to write a few lines about basics of information security. The Intel AMT flaw opened up complete access to (some) Intel servers and an old (as in undisclosed, now fixed in the latest updates) vulnerability MS17-010 resulted in the Wann圜ry epidemic. Today it requires a bit more to breach the threshold of news as there’s plenty to choose from. In recent weeks we’ve seen plenty of headlines about vulnerabilities. This blog is a step away from our usual Identity and Access Management topics and talks about a few points that people should do, or know, to be better equipped in this modern world of 1s and 0s.
