Secure Mobile Phone

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Wednesday, 27 November 2013

TUMs Solves Wireless Security Headache. Warning: explanation gives headache.

Posted on 11:19 by Unknown
Researchers at the Technische Universität München (TUM) have proven that wireless communications can be made more secure through a novel approach based on information theory."
The method is counter-intuitive and involves information theory and zero capacity channels. "The scheme uses two physical channels – that is, frequency bands in a wireless system – that are inherently useless, each being incapable of securely transmitting a message," says TUM.

Intuitively, combining one zero-capacity with another zero-capacity should result in zero capacity. “But in this case,” Schaefer explains, “it’s as if we’re getting a positive result from adding zero to zero. We find that we are able to ‘super-activate’ the whole system, meaning that combining two useless channels can lead to a positive capacity to transmit confidential messages securely.”

Superactivation is not unknown in quantum theory. It's the combining of zero capacity quantum channels to produce a channel with positive capacity; but is not yet applicable to current technology. But what Boche and Schaefer have achieved "is," says Boche, "the first example of super-activation – where zero plus zero is greater than zero – in classical communication scenarios.”

Huh?
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in cell phone, counterespionage, encryption, FutureWatch, weird, wiretapping | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • The Ratters - men who spy on women through their webcams
    The woman is visible from thousands of miles away on a hacker's computer.   The hacker has infected her machine with a remote administr...
  • Google Glass Hacked - Everything You See and Hear Transmitted to Anyone
    Google's Glass wearable computer have been hacked so video and audio can be transmitted online to anyone. Hackers have been able to remo...
  • This Week in Spy News
    The chairman of Stow College in Glasgow has resigned after a row over a recorded conversation on a device branded a "spy-pen". ( m...
  • The US classification system
    (Updated: October 12, 2013) Top Level Telecommunications often involve information that has to be kept secret. To ensure that, governments h...
  • Bugging Boss for a Raise Lands Three Employees in Jail
    China - Three public officials were each sentenced to 20 months in jail for illegally wiretapping a county Communist Party chief of central ...
  • Holiday Shopping Safety Infographic
    Click to enlarge . Click to enlarge .
  • New York Times - Quote of the Day - Tapped Out On Taps
    "I'm so jaded at this point that I'm not surprised. And from my perspective, let them all wear wires. Let's catch everybody...
  • From BULLRUN to NOCON and LACONIC
    On September 5, The Guardian , The New York Times and ProPublica jointly revealed that NSA has a top secret program to break encryption sy...
  • Spybusters Tip # 723 - Be Smart - Use a Dumb Phone to Thwart Spyware
    Sometimes you just need a dumb phone that can't spy on you.   inKlien Global's tiny phone 6.5mm Ultra Thin AIEK M3 Cool Card Cell Ph...
  • CONTEST (ENDED) - Who Is This Man?
    We have a winner! Congratulations!! Answer below. Clues... • Born 1897. • Died 1973. • Expert wiretapper.  • Good high speed driver.  • Shar...

Categories

  • advice
  • aerial
  • amateur
  • Android
  • App
  • Apple
  • art
  • biometric
  • BlackBerry
  • blackmail
  • Bluetooth
  • Boeing
  • book
  • business
  • BYOD
  • CALEA
  • cartoon
  • cautionary tale
  • CCTV
  • cell phone
  • CIA
  • Classification
  • Clothing
  • computer
  • contest
  • counterespionage
  • Darwin
  • data
  • detection
  • drone
  • dumb
  • eavesdropping
  • email
  • employee
  • encryption
  • ERII
  • espionage
  • extortionography
  • FBI
  • fiber-optic
  • find
  • food
  • FREE
  • fun
  • FutureWatch
  • General Dynamics
  • Germany
  • Gold Phone
  • government
  • GPS
  • GSM
  • Hack
  • historical
  • Hotline
  • humor
  • IAPSC
  • IMCPB
  • Infrared
  • Internet
  • ISAF
  • Israel
  • IST
  • IT
  • just coincidence?
  • KDM
  • keystroke
  • KGB
  • Kremlin
  • laser
  • law
  • lawsuit
  • leaks
  • malware
  • marketing
  • MI6
  • mind reading
  • miscellaneous
  • mores
  • movie
  • nature
  • Netherlands
  • North Korea
  • NSA
  • Obama
  • optics
  • OSS
  • password
  • PI
  • police
  • political
  • poll
  • POTUS
  • PRISM
  • privacy
  • product
  • quiz
  • quote
  • Ra-parents
  • Ray-Gun
  • recording
  • Red Phone
  • religion
  • RFID
  • Russia
  • sabotage
  • satire
  • scam
  • shredder
  • Situation Room
  • social engineering
  • software
  • sports
  • Spy Museum
  • spy school
  • spybot
  • spycam
  • spyware
  • SpyWarn
  • statistics
  • STE
  • steganography
  • STU-II
  • STU-III
  • surveillance
  • survey
  • telephone
  • TEMPEST
  • Tips
  • toy
  • tracking
  • trade secret
  • TSCM
  • Twitter
  • UMTS
  • USA
  • USB
  • USSR
  • Vatican
  • VoIP
  • voyeurism
  • Watergate
  • weird
  • White House
  • Wi-Fi
  • Wireless
  • wiretapping
  • X-Ray Vision

Blog Archive

  • ▼  2013 (455)
    • ▼  November (47)
      • Columbia Engineers Make World’s Smallest FM Radio ...
      • DRTBOX and the DRT surveillance systems
      • U.N. - End Excessive Electronic Spying
      • TUMs Solves Wireless Security Headache. Warning: e...
      • Why Care About the NSA?
      • Protesters Capture Government Surveillance Van
      • Indonesia Posts Truth About Government Spying
      • Smart TVs Lie to You
      • DIY Surveillance in India Shows Eye-Popping Growth
      • Not to be Out-Spooked by the NSA...
      • Shop Owner Installs Surveillance Cameras to... wat...
      • Help The OSS Society Pass a Law (It's easy.)
      • Bond Car Submarines at Auction
      • Screenshots from BOUNDLESSINFORMANT can be misleading
      • REPORT: Corporate Espionage Against Nonprofit Orga...
      • Corporate Espionage Infographic
      • Recent Technological Innovations Have Completely C...
      • Audio Surveillance Laws (Party Consent) by State
      • Mass Surveillance Is Big Business: Corporations Ar...
      • Business Espionage - IKEA Snooping Investigation C...
      • Snooping on Credit Cards with Shopping Carts
      • Five Eyes, 9-Eyes and many more
      • Seattle, where a java junkie hanging on a light po...
      • Vegas, where a drunk hanging on a light pole won't...
      • Economic Espionage: Competing For Trade By Stealin...
      • Corporate espionage: The spy in your cubicle
      • Private Investigator + Software Firm = Cell Phone ...
      • More Kinds of Corporate Spies Target More Kinds of...
      • Secret Agent Suits - Odds Are You Live to See Tomo...
      • Hacker Who Helped Catch Cheating Lovers in FBI's S...
      • The Current State of Cyber Security in Latin America
      • NSA Spy Scandal - The Final Word?
      • Security Director Alert - Draft a 'No Recording' P...
      • The Wall of Sound Meets its Match - Sono - An Acou...
      • A Brief Spy Technology Retrospective
      • How a Slight Movement Can ID Your Smartphone
      • When Paranoids Collide they Blow the Whistle on Te...
      • Last Week on Halloween
      • This Judge is a Surveillance Expert. He has Cred.
      • 10 Most Audacious Eavesdropping Plots
      • What Corporations Can Learn from the Vatican
      • Can a Perv Skirt Privacy Laws by Raising The First...
      • Music to Spy By
      • High School Football Spying?!?! - Four Destrehan C...
      • Encryptor's Unite! - From Those Wonderful Folks Wh...
      • In the Days Before Spread Spectrum Communications ...
      • Mobile Phone Use a Significant Security Risk for C...
    • ►  October (53)
    • ►  September (31)
    • ►  August (50)
    • ►  July (50)
    • ►  June (47)
    • ►  May (35)
    • ►  April (40)
    • ►  March (29)
    • ►  February (33)
    • ►  January (40)
  • ►  2012 (84)
    • ►  December (33)
    • ►  November (33)
    • ►  October (12)
    • ►  June (2)
    • ►  May (2)
    • ►  February (1)
    • ►  January (1)
Powered by Blogger.

About Me

Unknown
View my complete profile