|||
Though this experiment marks an end to hidden variables, Dr Hanson says it is also a beginning: that of unassailably secure, quantum-enabled cryptography. It was shown in 1991 that the very Bell tests used to probe hidden variables could also serve as a check on quantum cryptography. A loophole-free Bell test, then, could unfailingly reveal if a hacker had interfered with the fundamentally random, quantum business of generating a cryptographic key. So-called device-independent quantum ciphers would, Dr Hanson says, be secure from hackers "even if you don't trust your own equipment—even if it's been given to you by the NSA". —

The (further) verification that spooky physics has important implications for cryptography.

From http://www.economist.com/news/science-and-technology/21676733-one-weirdest-bits-physics-proved-beyond-doubt-almost-hidden-no-more

    Next → → Levchin, Thiel, and Garry Kasparov, the former world chess champion, had planned a book, to be titled The Blueprint, that would “explain where the world’s innovation has gone Why we can’t solve big problems ← Previous → Starting a podcast for people who don’t want their lives taken over by podcasting — Dispatches from Paul Jarvis
    Latest posts
    Design management for wicked problems - ADMC 2020
    → Intuition is confident abductive-inferential thinking
    The Verge → Researchers detail huge hack-for-hire campaigns against environmentalists
    Conversations, cybernetics, and Theory of Mind
    → Why are we exceeding the Earth’s carrying capacity?
    IDEO U's Creative Confidence Podcast → Roger Martin, Bianca Andreescu, and systemic strategy
    Reuters → Systemic lessons from South Korea’s Patient 31
    Axle → Divide & conquer
    FSG → Can Snow Clearing Be Sexist?
    The Verge → As Lambda students speak out, the school’s debt-swapping partnership disappears from the internet
    The Talk Show → “Bring It On, Haters”, With Special Guest Ben Thompson
    Facebook → Starting the Decade by Giving You More Control Over Your Privacy
    Motherboard → Leaked Documents Expose the Secretive Market for Your Web Browsing Data
    The Verge → Google’s ads just look like search results now
    MacMillan → Interference by Sue Burke
    Systemics and design principles in support of Tiago Forte’s PARA framework
    → Microsoft wants to capture all of the carbon dioxide it’s ever emitted
    → US announces AI software export restrictions for China
    → Science Conferences Are Stuck in the Dark Ages
    → This wireless power startup says it can charge your phone using only radio waves
    → Segway’s newest self-balancing vehicle is an egg-shaped wheelchair
    → Twitter announces Bluesky: a team seeking and developing an open standard for social media
    → Elon Musk attempts to explain Twitter to normal people in court
    → TED and YouTube launch global climate initiative
    → Embracing multilingualism to enhance complexity sensitive research
    → The ‘Amazon effect’ is flooding a struggling recycling system with cardboard
    → John Kerry, Arnold Schwarzenegger wage ‘World War Zero’ on climate change
    → Combining semantic and term frequency similarities for text clustering
    → Bad RCS implementations are creating big vulnerabilities, security researchers claim
    → 2019 Tech Trends Report — The Future Today Institute
    → Medical Crowdsourcing: Harnessing the “Wisdom of the Crowd” to Solve Medical Mysteries