Last modification by Nathan- 54 there is
submarine cables - GAFAM

Something fishyGAFAM and the control of submarine cables

Eel under the Rock - Jan 30, 2023

Riddle: how long are the nearly five hundred submarine cables through which most internet traffic passes? Answer: over 1,3 million kilometres. In which the GAFAM are furiously interested.

   

99% of digital data passes through the submarine cable

Or rather the submarine cables, the specialized site TeleGeography counted 486 of them, against less than half in 2009. The first cables were laid in the 1988th century between Europe and the American continent following the development of the telegraph. Since XNUMX the classic copper cables have been replaced by fiber optics. The geopolitical stakes are obvious, without cable more communication possible, and China and the United States clash openly via their operators.

Traditionally the major telephone operators were the operators of the submarine cables. Related to telephony, they manufactured them, installed them, maintained them, watched them and often operated them. These operators such as Alcatel Submarine Networks, Louis Dreyfus Travocean, Orange Marine, Telefonica, have become a minority or reduced to the rank of associates. Over the past fifteen years, silicone valley companies have invested heavily in it, meeting their growing needs for data transfers, reaching new markets in Third World countries and also enabling information control. . They openly pose a challenge to the digital sovereignty of States.

read the article

Last modification by Nathan- 54 there is
quantum computer: BM Quantum System One

Digital DawnWhat is the quantum apocalypse and should we be worried about it?

Digital Dawn - Jan 20, 2023

Some scientists believe that current forms of data security and encryption will soon be obsolete.

   

The so-called "quantum apocalypse" is not a typical end-of-the-world scenario, but a potential time when quantum computers become so powerful that existing encryption methods for everything from your password computer to your bank account, will become ineffective.

No matter how strong your password or how well it is encrypted, a sufficiently powerful quantum computer will be able to crack it in seconds.

"The evolution of quantum computers creates a significant threat to data security," Tim Callan, chief experience officer of cybersecurity firm Sectigo, told the Mail Online.

“Their immense processing power is capable of breaking encryption at high speed, leaving important data vulnerable, everything from bank account details to medical records to state secrets. »

But could such a scenario really happen and how much of an "apocalypse" would it be?

What those who warn of this possibility fail to take into account is the likelihood that encryption technologies will evolve and become more sophisticated as well.

Several years from now, it is likely that banks, for example, will use much more advanced security methods, or even take advantage of quantum computing themselves.

That said, outdated systems would certainly be vulnerable.

read the article

Last modification by Nathan- 54 there is
UK - Large Scale Surveillance

Digital DawnGreat Britain: Large-scale data collection and analysis

Digital Dawn - Nov 09, 2022

The UK government is teaming up with mobile operator O2 on a 'big data' project to monitor the behavior of millions of people.

   

In the United Kingdom, the National Security Centre, aka "SitCen", a government agency, has contracted with the Spanish telecommunications company Telefonica, with the aim of using mobile data to obtain "information" on a range wide enough range of people's behaviors. And it's millions of people. A third of the UK's population, in fact – if the telecoms are to be believed.

The deal is to give big data-hungry SitCen access to information from Telefonica's O2 Motion Data & Insights service in the UK.

During this period, the SitCen – created last year as a centralized place run by the Cabinet Office for emergency response – and O2 will work together to turn data extracted from users' phones into "insights" about their movements ( location), their mobility habits (mode of transport), as well as information related to behavior and demographics.

This data will be both real-time and anonymous, promise the project promoters.

read the article