Media Search:



The young Aboriginal people inspiring their peers to reject welfare and strive for careers – ABC News

As a young teenager, PJ Crocombe had no idea about the career and life opportunities available outside his remote Northern Territory community of Wadeye.

But at age 13 he got a place on the Thamarrurr Youth Indigenous Corporation's programgiving boys and girls from the Daly River region the chance to go to Bright in regional Victoria to finish school.

"Bright has opened so many opportunities for me," he said.

"I did Year 7 and 8 there. Then in Year 9 I got offered a full scholarship at Scotch College in Melbourne, and now I'm atMelbourne Uni doing a Bachelor of Arts majoring in Indigenous studies."

He is now 21 and a director and mentor himself on he corporation's programhelping young people in Wadeye break out of a cycle of welfare dependence.

ABC News: Jane Bardon

While attending school in Bright the young people are caredfor and mentored by Aboriginal house parents in two group homes for girls and boys.

When they finish school their mentors help them prepare for and secure their first jobs.

Many of them start working in the Dumu Balcony training cafe in Bright.

"And also at the brewery, we had someone working there, and then at the school, two people graduated last year and they're working at the school. And then we have another one working in carpet laying," Mr Crocombe said.

ABC News: Jane Bardon

He said he and other young people from Wadeye had to learn basic life skills as part of their training.

"So, for example, time is a different concept in Wadeye, if you tell someone to show up, at say, one, they'll show up at three, or show up earlier and say: you weren't there," he said.

"So training them to really be on time is one of the key parts of the training, and then just work readiness."

Wadeye is one of the NT'slargest remote communities, with a population of 2,300, and half of working-age adults registered as unemployed.

The town is periodically riven by inter-clan violence.

Three of the program's mentors, with their Dumu cafe cook Benny Mullumbuk, recently rode motorbikes 3,800 kilometresfrom Bright to Darwin to raise the profile of the program.

Dallas Mugarra is among the program's mentors who completed the ride this week.

ABC News: Jane Bardon

"In our communities a lot of young people depend on dole and there's not enough jobs, so we're doing something that makes people understand how to not have to depend on someone else to solve your problem, you have to go and do it yourself, take control of your life," he said.

The ride included stops atremote communities along the way, where the mentorscomparedtheir programwith those run by other Aboriginal community groups.

"This ride was to raise awareness and send a message that anything is possible, to anyone out there who is struggling," Bright house parent and mentor Leon Kinthari said.

"On the way we saw and met some of the Indigenous people out there who are doing similar things, and to raise money for the programthat we have.

"Because in remote communities like Wadeye young people are not getting a chance.

"It's really hard for them to stay focused and understand about the western world that is out there."

Supplied:Thamarrurr Youth Indigenous Corporation

Mr Crocombe said even after starting university he saw how it easy it was to get sucked into violence between Wadeye's Aboriginal clans.

"I came back and I was in Wadeye working on a youth programduring the holidays and I got caught up in the family ruffles, and that was not good," he said.

"Then I thought, 'Ineed to get back to Melbourne', so I moved back down, got myself sorted.

"It is really easy to get sucked into it."

Withthe new perspective he hasgained from travelling around Australia and overseas, he has realisedhow limiting life can be for young people who never have the opportunity to leave Wadeye.

"It's really challenging, because where you grew up is all you know," he said.

The group can't offer enough places to families who want them.

Mr Kinthari is happy his son Marcus has now had the opportunity to go through the program.

ABC News: Jane Bardon

"He went through school, right up to Year 12 and then graduated, and he chose to be a PE teacher in [a] Bright school, so I'm really happy with him, I'm really proud, and I guess when he grows up, he's already focused on chasing his goal," he said.

Following their ride, the mentorsare continuing to share their message through social media.

"It's about staying focused, keep going to school, and just smile a lot," Mr Kinthari said.

See the rest here:
The young Aboriginal people inspiring their peers to reject welfare and strive for careers - ABC News

Putin says Russia would accept conditional handover of cyber criminals to U.S. – Reuters

Russian President Vladimir Putin attends a session of the St. Petersburg International Economic Forum (SPIEF) in Saint Petersburg, Russia, June 4, 2021. Sputnik/Vladimir Smirnov/Kremlin via REUTERS

MOSCOW, June 13 (Reuters) - President Vladimir Putin has said Russia would be ready to hand over cyber criminals to the United States if Washington did the same for Moscow and the two powers reached an agreement to that effect.

Putin made the comments in an interview aired in excerpts on state television on Sunday ahead of a June 16 summit with U.S. President Joe Biden in Geneva. Ties between the powers are badly strained over an array of issues.

The Russian leader said he expected the Geneva meeting to help establish bilateral dialogue and revive personal contacts, adding that important issues for the two men included strategic stability, Libya and Syria, and the environment.

Putin also praised Biden for having shown "professionalism" when the United States and Russia agreed this year to extend the New START nuclear arms control treaty.

The White House has said Biden will bring up ransomware attacks emanating from Russia at the meeting. That issue is in the spotlight after a cyber attack disrupted the North American and Australian operations of meatpacker JBS USA.

A Russia-linked hacking group was behind that attack, a U.S. source familiar with the matter said last week.

Asked if Russia would be prepared to find and prosecute cyber criminals, Putin said Russia's behaviour here would depend on formal agreements being reached by Moscow and Washington.

Both sides would have to commit to the same obligations, he said.

"If we agree to extradite criminals, then of course Russia will do that, we will do that, but only if the other side, in this case the United States, agrees to the same and will extradite the criminals in question to the Russian Federation," he said.

The question of cyber security is one of the most important at the moment because turning all kinds of systems off can lead to really difficult consequences, he said.

Reporting by Tom BalmforthEditing by David Goodman

Our Standards: The Thomson Reuters Trust Principles.

View post:
Putin says Russia would accept conditional handover of cyber criminals to U.S. - Reuters

Clearing the way toward robust quantum computing – MIT News

MIT researchers have made a significant advance on the road toward the full realization of quantum computation, demonstrating a technique that eliminates common errors in the most essential operation of quantum algorithms, the two-qubit operation or gate.

Despite tremendous progress toward being able to perform computations with low error rates with superconducting quantum bits (qubits), errors in two-qubit gates, one of the building blocks of quantum computation, persist, says Youngkyu Sung, an MIT graduate student in electrical engineering and computer science who is the lead author of a paper on this topic published today in Physical Review X. We have demonstrated a way to sharply reduce those errors.

In quantum computers, the processing of information is an extremely delicate process performed by the fragile qubits, which are highly susceptible to decoherence, the loss of their quantum mechanical behavior. In previous research conducted by Sung and the research group he works with, MIT Engineering Quantum Systems, tunable couplers were proposed, allowing researchers to turn two-qubit interactions on and off to control their operations while preserving the fragile qubits. The tunable coupler idea represented a significant advance and was cited, for example, by Google as being key to their recent demonstration of the advantage that quantum computing holds over classical computing.

Still, addressing error mechanisms is like peeling an onion: Peeling one layer reveals the next. In this case, even when using tunable couplers, the two-qubit gates were still prone to errors that resulted from residual unwanted interactions between the two qubits and between the qubits and the coupler. Such unwanted interactions were generally ignored prior to tunable couplers, as they did not stand out but now they do. And, because such residual errors increase with the number of qubits and gates, they stand in the way of building larger-scale quantum processors. The Physical Review X paper provides a new approach to reduce such errors.

We have now taken the tunable coupler concept further and demonstrated near 99.9 percent fidelity for the two major types of two-qubit gates, known as Controlled-Z gates and iSWAP gates, says William D. Oliver, an associate professor of electrical engineering and computer science, MIT Lincoln Laboratory fellow, director of the Center for Quantum Engineering, and associate director of the Research Laboratory of Electronics, home of the Engineering Quantum Systems group. Higher-fidelity gates increase the number of operations one can perform, and more operations translates to implementing more sophisticated algorithms at larger scales.

To eliminate the error-provoking qubit-qubit interactions, the researchers harnessed higher energy levels of the coupler to cancel out the problematic interactions. In previous work, such energy levels of the coupler were ignored, although they induced non-negligible two-qubit interactions.

Better control and design of the coupler is a key to tailoring the qubit-qubit interaction as we desire. This can be realized by engineering the multilevel dynamics that exist, Sung says.

The next generation of quantum computers will be error-corrected, meaning that additional qubits will be added to improve the robustness of quantum computation.

Qubit errors can be actively addressed by adding redundancy, says Oliver, pointing out, however, that such a process only works if the gates are sufficiently good above a certain fidelity threshold that depends on the error correction protocol. The most lenient thresholds today are around 99 percent. However, in practice, one seeks gate fidelities that are much higher than this threshold to live with reasonable levels of hardware redundancy.

The devices used in the research, made at MITs Lincoln Laboratory, were fundamental to achieving the demonstrated gains in fidelity in the two-qubit operations, Oliver says.

Fabricating high-coherence devices is step one to implementing high-fidelity control, he says.

Sung says high rates of error in two-qubit gates significantly limit the capability of quantum hardware to run quantum applications that are typically hard to solve with classical computers, such as quantum chemistry simulation and solving optimization problems.

Up to this point, only small molecules have been simulated on quantum computers, simulations that can easily be performed on classical computers.

In this sense, our new approach to reduce the two-qubit gate errors is timely in the field of quantum computation and helps address one of the most critical quantum hardware issues today, he says.

Read more from the original source:
Clearing the way toward robust quantum computing - MIT News

Here’s How Quantum Computers Will Really Affect Cryptocurrencies – Forbes

Cryptocurrency

Theres been a lot of focus recently on encryption within the context of cryptocurrencies. Taproot being implemented in bitcoin has led to more cryptographic primitives that make the bitcoin network more secure and private. Its major upgrade from a privacy standpoint is to make it impossible to distinguish between multi-signature and single-signature transactions. This will, for example, make it impossible to tell which transactions involve the opening of Lightning Network channels versus regular base layer transactions. The shift from ECDSA signatures to Schnorr signatures involves changes and upgrades in cryptography.

Yet these cryptographic primitives might need to shift or transition in the face of new computers such as quantum computers. If you go all the way back down to how these technologies work, they are built from unsolved mathematical problems something humans havent found a way to reduce down to our brains capacity for creativity yet limited memory retrieval, or a computers way of programmed memory retrieval. Solving those problems can create dramatic breaks in current technologies.

I sat down with Dr. Jol Alwen, the chief cryptographer of Wickr, the encrypted chat app, to talk about post-quantum encryption and how evolving encryption standards will affect cryptocurrencies. Heres a summary of the insights:

Despite all of the marketing hype around quantum computing and quantum supremacy, the world isnt quite at the stage where the largest (publicly disclosed) quantum computer can meaningfully break current encryption standards. That may happen in the future, but commercially available quantum computers now cannot meaningfully dent the encryption standards cryptocurrencies are built on.

Quantum computer and encryption experts are not communicating with one another as much as they should. This means that discrete advances in quantum computing may happen with a slight lag in how encryption would operate. Its been the case that nation-states, such as China, have been going dark on research related to quantum this has the effect of clouding whether or not serious attempts can be made on the encryption standards of today, and disguising the sudden or eventual erosion of encryption a sudden break that might mean devastation for cryptocurrencies and other industries that rely on cryptography.

Its been known that many encryption schemes that defeat classical computers may not be able to defeat a sufficiently powerful quantum computer. Grovers algorithm is an example. This is a known problem and with the continued development of quantum computers, will likely be a significant problem in a matter of time.

Encryption standards being diluted now is not only a risk for the future, but also an attack on the conversations and transactions people will have to remain private in the past as well. Past forms of encryption that people relied upon would be lost the privacy they assumed in the past would be lost as well.

Cryptographic primitives are baked into cryptocurrencies regardless of their consensus algorithm. A sudden shift in encryption standards will damage the ability for proof-of-work miners or those looking to demonstrate the cryptographic proof that theyve won the right to broadcast transactions in the case of proof-of-stake designs such as the one proposed by Ethereum. Digital signatures are the common point of vulnerability here, as well as the elliptic curve cryptography used to protect private keys.

Everything here breaks if the digital signatures are no longer valid anybody with access to public keys could then spend amounts on other peoples behalf. Wallet ownership would be up for grabs. says Dr. Alwen. Proof-of-work or proof-of-stake as a consensus algorithm would be threatened as well in all cases, the proof would no longer be valid and have it be authenticated with digital signatures anybody could take anybody elses blocks.

While proof-of-work blocks would have some protection due to the increasingly specialized hardware (ASICs) being manufactured specifically for block mining, both systems would have vulnerabilities if their underlying encryption scheme were weakened. Hashing might be less threatened but quantum compute threatens key ownership and the authenticity of the system itself.

Post-quantum encryption is certainly possible, and a shift towards it can and should be proactive. Theres real stuff we can do. Dr. Alwen says here. Bitcoin and other cryptocurrencies may take some time to move on this issue, so any preparatory work should be regarded as important, from looking at benefits and costs you can get a lot of mileage out of careful analysis.

Its helped here by the fact that there is a good bottleneck in a sense: there are only really two or three types of cryptographic techniques that need replacement. Digital signatures and key agreement are the two areas that need the focus. Patching these two areas will help the vast majority of vulnerabilities that might come from quantum computation.

Its important to note that a sudden and critical break in encryption would affect other industries as well and each might have different reasons why an attack would be more productive or they might be more slow to react. Yet if there were a revolution tomorrow, this would pose a clear and direct threat to the decentralization and security promises inherent in cryptocurrencies. Because of how important encryption and signatures are to cryptocurrencies, its probable that cryptocurrency communities will have many more debates before or after a sudden break, but time would be of the essence in this scenario. Yet, since encryption is such a critical part of cryptocurrencies, there is hope that the community will be more agile than traditional industries on this point.

If a gap of a few years is identified before this break happens, a soft fork or hard fork that the community rallies around can mitigate this threat along with new clients. But it requires proactive changes and in-built resistance, as well as keeping a close eye on post-quantum encryption.

It is likely that instead of thinking of how to upgrade the number of keys used or a gradual change, that post-quantum encryption will require dabbling into categories of problems that havent been used in classical encryption. Dr. Alwen has written about lattice-based cryptography as a potential solution. NIST, the National Institute of Standards and Technology currently responsible for encryption standards has also announced a process to test and standardize post-quantum public-key encryption.

Hardware wallets are in principle the way to go now for security in a classical environment Dr. Alwen points out, having done research in the space. The fact that theyre hard to upgrade is a problem, but its much better than complex devices like laptops and cell phones in terms of the security and focus accorded to the private key.

In order to keep up with cryptography and its challenges, MIT and Stanford open courses are a good place to start to get the basic terminology. There is for example, an MIT Cryptography and Cryptanalysis course on MIT OpenCourseWare and similar free Stanford Online courses.

There are two areas of focus: applied cryptography or theory of cryptography. Applied cryptography is a field that is more adjacent to software engineering, rather than math-heavy cryptography theory. An important area is to realize what role suits you best when it comes to learning: making headway on breaking cryptography theory or understanding from an engineering perspective how to implement solid cryptography.

When youre a bit more advanced and focused on cryptography theory, Eprint is a server that allows for an open forum for cryptographers to do pre-prints. Many of the most important developments in the field have been posted there.

Forums around common cryptography tools help with applied cryptography as well as some of the cryptography theory out there: the Signal forums, or the Wickr blog are examples.

Cryptocurrencies are co-evolving with other technologies. As computers develop into different forms, there are grand opportunities, from space-based cryptocurrency exchange to distributed devices that make running nodes accessible to everybody.

Yet, in this era, there will also be new technologies that force cryptocurrencies to adapt to changing realities. Quantum computing and the possibility that it might eventually break the cryptographic primitives cryptocurrencies are built on is one such technology. Yet, its in the new governance principles cryptocurrencies embody that might help them adapt.

Follow this link:
Here's How Quantum Computers Will Really Affect Cryptocurrencies - Forbes

Is quantum computing about to change the world? – BroadbandDeals

Quantum computing potential extends beyond simply processing things faster, offering scope to create entire new consumer services and product offerings

Neil Cumins Thursday, 17 June, 2021

Its common for new technologies to be treated with a healthy degree of scepticism when theyre first unveiled.

From the internet to social media, it often takes a while for potential to become reality.

Today, theres excitable talk about the blockchains potential, or how light-powered LiFi may supplant WiFi in the nations homes. Talk, but not much action as yet.

Quantum computing potential may be unmatched in terms of transforming our world even more so than the Internet of Things, or fully automated robotics.

And while you dont need a degree in quantum physics to understand quantum computing, its important to appreciate the basics of this highly complex (and unstable) technology.

Regardless of what theyre being asked to do, electronic devices only understand binary inputs. Zero or one, on or off. Thats it.

Every FIFA tournament, CAD package, Netflix marathon and email is composed of immense strings of zeroes and ones the binary data bits computers can process and interpret.

Quantum computing potentially subverts this by allowing bits to be both zeroes and ones at the same time.

This status fluidity involves holding data in whats called a superposition state a coin spinning on its side rather than landing heads-up or tails-up.

Superpositions grant a single bit far more potential, offering exponentially more processing power than a modern (classical) computer can deliver.

Quantum computers are theoretically capable of achieving feats todays hardware couldnt manage in a hundred lifetimes.

Google claims to own a quantum computer which can perform tasks 100,000,000 times faster than its most powerful classical computer.

Indeed, computer scientists have already demonstrated that quantum processing can encrypt data in such a way it becomes impossible to hack.

This alone could transform online security, rendering spyware and most modern malware redundant, while ensuring a far safer world for consumers and businesses.

Quantum computing may be able to process the vast repositories of digital information being generated by billions of AI devices, which would otherwise result in huge data siloes.

It could unlock the secrets of our universe, helping us to achieve nuclear fusion or test drugs in ways wed never be able to accomplish with classical computing and brainpower alone.

Unfortunately, there are certain obstacles in the way of achieving full quantum computing potential.

The molecular instability involved in superpositions requires processors to be stored at cryogenic temperatures as close to absolute zero (-273C) as possible.

Devices need to be stored and handled with exceptional care, which in turn makes them incredibly expensive and unsuitable for domestic deployment.

And while the ability to develop uncrackable encryption algorithms is appealing, a quantum processor could also unlock almost any existing encryption method.

The havoc that could wreak in the wrong hands doesnt bear thinking about, and scientists are struggling to develop quantum-resistant algorithms for classical computers.

Like all emerging technologies, quantum computing has some way to go before it achieves mainstream adoption and acceptance.

When it does, the world will be a very different place.

Follow this link:
Is quantum computing about to change the world? - BroadbandDeals