Quantum random number generator combines small size and high speed

Researchers have developed a chip-based quantum random number generator that provides high-speed, high-quality operation on a miniaturized platform. This advance could help move quantum random number generators closer to being built directly into everyday devices, where they could strengthen security without sacrificing speed.

True randomness is essential for secure online banking, private messaging, and protecting from hackers, and the rising need for stronger digital protection is driving fast-growing demand for high-quality random numbers generated at high speeds.

“The quantum properties of light make it possible to produce numbers that are truly random, unlike the numbers generated by computer algorithms, which only imitate randomness,” said research team leader Raymond Smith from Toshiba’s Cambridge Research Laboratory in the United Kingdom. “However, making this technology practical for real-world use requires the that create these to be as small as possible so they can fit inside other systems.”

In the journal Optica Quantum, the researchers describe a new quantum design that can recover the quantum signal even when it’s buried in noise, which has been challenging to accomplish with chip-integrated devices. The new device can generate unpredictable random numbers at a rate of 3 gigabits per second, fast enough to support the security needs of large-scale data centers.

“A major application of random number generators is in protecting sensitive data and communications using encryption keys,” said Smith. “Our technology can generate those keys at high speed and with strong security guarantees. High-speed random numbers are also critical for scientific simulations and and for ensuring fairness in applications like online gaming or digital lotteries.”

[…]

Source: Quantum random number generator combines small size and high speed

Viral pay to record calls for AI app Neon takes itself down after exposing users’ phone numbers, call recordings, and transcripts to world + dog

A viral app called Neon, which offers to record your phone calls and pay you for the audio so it can sell that data to AI companies, has rapidly risen to the ranks of the top-five free iPhone apps since its launch last week.

The app already has thousands of users and was downloaded 75,000 times yesterday alone, according to app intelligence provider Appfigures. Neon pitches itself as a way for users to make money by providing call recordings that help train, improve, and test AI models.

But Neon has gone offline, at least for now, after a security flaw allowed anyone to access the phone numbers, call recordings, and transcripts of any other user, TechCrunch can now report.

TechCrunch discovered the security flaw during a short test of the app on Thursday. We alerted the app’s founder, Alex Kiam (who previously did not respond to a request for comment about the app), to the flaw soon after our discovery.

Kiam told TechCrunch later Thursday that he took down the app’s servers and began notifying users about pausing the app, but fell short of informing his users about the security lapse.

 The Neon app stopped functioning soon after we contacted Kiam.

[…]

Source: Viral call-recording app Neon goes dark after exposing users’ phone numbers, call recordings, and transcripts | TechCrunch

Shark bite resistant wetsuits actually work

Shark bites on humans are rare but can have substantial consequences for local coastal communities and businesses, often prompting pressure to implement effective mitigation measures. Wetsuits that incorporate bite-resistant materials have emerged as a new mitigation strategy that aims to reduce fatalities from shark bites, by reducing the severity of injuries inflicted from bites (e.g. lacerations, punctures, tissue and blood loss)

[…]

Key results

All bite-resistant materials reduced the proportional area of bites in substantial and critical damage categories, the categories associated with haemorrhaging and major vascular injury. However, there were limited to no differences in substantial and critical damage categories across the bite-resistant materials. Shark length also influenced the proportion of damage from tiger shark bites, but not from white shark bites.

Conclusions

Although internal and crushing injuries might still occur, bite-resistant materials offer an improved level of protection that can reduce severe wounds and blood loss, and should be considered as part of the toolbox and measures available to reduce shark-bite risk and resulting injuries.

Source: CSIRO PUBLISHING | Wildlife Research

EU becomes a little more fascist and starts collecting fingerprints at the border

The new Entry/Exit System (EES) will start operations on 12 October 2025. European countries using the EES will introduce the system gradually at their external borders. This means that data collection will be gradually introduced at border crossing points with full implementation by 10 April 2026.

Source: What is the EES?

You need to provide your personal data each time you reach the external borders of the European countries using the EES. For more information – see What does progressive start of the EES mean? 
The EES collects, records and stores: 

  • data listed in your travel document(s) (e.g. full name, date of birth, etc.)
  • date and place of each entry and exit 
  • facial image and fingerprints (called ‘biometric data’)
  • whether you were refused entry.

On the basis of the collected biometric data, biometric templates will be created and stored in the shared Biometric Matching Service (see footnote).

If you hold a short-stay visa to enter the Schengen area, your fingerprints will already be stored in the Visa Information System (VIS) and will not be stored again in the EES.

Depending on your particular situation, the system also collects your personal information from:

[…]

If you refuse to provide your biometric data, you will be denied entry into the territory of the European countries using the EES.

Who can access your personal data?

  • Border, visa and immigration authorities in the European countries using the EES for the purpose of verifying your identity and understanding whether you should be allowed to enter or stay on the territory.
  • Law enforcement authorities of the countries using the EES and Europol for law enforcement purposes. 
  • Under strict conditions, your data may be transferred to another country (inside or outside the EU) or international organisation (listed in Annex I of Regulation (EU) 2017/2226 – a UN organisation, the International Organisation for Migration, or the International Committee of the Red Cross) for return (Article 41(1) and (2), and Article 42) and/or law enforcement purposes (Article 41(6)).
  • Transport carriers will only be able to verify whether short-stay visa holders have already used the number of entries authorised by their visa and will not be able to access any further personal data.

[…]

Your data cannot be transferred to third parties – whether public or private entities – except in certain cases. See Who can access your personal data

[…]

So lots of data collected, and loads of people who can access this data – exceptions are absolutely everywhere. And for what? To satisfy far right fantasies about migration running rampant.