How IBM Is Making Your Passwords Useless

How IBM Is Making Your Passwords Useless

By Alexander Rader

For years, quantum computing has been hailed as a technology that could change the way the modern world works, but a long-standing technical issue has kept that potential from being realized. Now, in a paper published in the journal Nature last week, IBM scientists have taken a big step (see how I avoided the temptation to make a pun there?) toward solving that problem — and while it could represent progress toward making quatum computers real, it also could mean that current cybersecurity standards will soon be much easier to crack. In other words, your passwords could be obsolete soon.

The power of quantum computing has some obvious appeal: The increase in processing power could speed up research, especially in big data applications. Problems with large datasets, or those that need many millions (or billions, or more) of simulations to develop a working theory, would be able to be run at speeds unthinkable today. This could mean giant leaps forward in medical research, where enhanced simulations can be used to test cancer treatments or work on the development of new vaccines for ebola, HIV, malaria and the other diseases. High-level physics labs like CERN could use the extra power to increase our understanding of the way the universe at large works.

But the most immediate impact for the regular person would be in the way your private information is kept safe. Current encryption relies on massively large prime numbers to encode your sensitive information. Using combinations of large prime numbers means that anyone trying to crack such encryption needs to attempt to factor at least one of those numbers to get into encrypted data. When you buy something from, say, Amazon, the connection between your computer and Amazon is encrypted using that basic system (it's more complicated than that, but that's the rough summary). The time it would take a digital computer to calculate these factors is essentially past the heat death of the universe. (Still, this won't help you if your password is password, or monkey, or 123456. Please, people, use a password manager.)

Quantum computing, however, increases processing speed and the actual nature of the computation so significantly that it reduces that time to nearly nothing, making current encryption much less secure. 

The IBM researcher that could make that happen is complicated, and it requires some background explanation. For starters, while a "traditional" computing bit can be either a 0 or a 1, a quantum computing bit can have three (or infinite, depending on how you want to interpret the concept) states. More specifically, a qubit can be 0, 1, or both.

Up until now, the both part of that caused some problems in realizing the power of quantum computing. 

Apparently — and you'll have to take this on faith a bit, as it hurts my head to think about it — the both state can switch back to either 0 or 1 at any given point, and sometimes incorrectly, based on the logic in the programming. Think about when your phone freezes up for a second or two while you're matching tiles. This is its processor handling vast amounts of information and filtering out the operations that fail for any number of reasons, from buggy code to malware to basic electrical noise. When there are only the two binary states, this is a process that usually happens behind the scenes and quickly.

The hold-up with quantum computing up until now is that the vastly greater potential for errors has stymied attempts to identify and nullify them. One additional wrinkle in this reading quantum states is familiar to anyone with basic science fiction knowledge, or perhaps just the ailurophobics. What if the action of reading the qubit actually causes it to collapse to 0 or 1?

The very smart people at IBM think they've solved this. The actual technical explanation is involved, and well beyond my ability to fully follow, but the gist is that instead of just having the qubits arrayed in a lattice on their own, they are arranged such that neighbors essentially check each other, producing the ability to check the common read problems.

That opens the door to further quantum computing developments, including ones that will make your password a thing of the past. So, does this mean that you need to start hoarding gold? No, not yet. And hopefully before quantum computing reaches commercial, or even simply industrial/governmental levels, a better cyber security method will be in place. Or the robots will have already taken over. I for one welcome them.

The $2.6 Billion Gay Wedding Boom

REUTERS/Enrique Castro-Mendivil
By Beth Braverman

States in the Southeast that had banned gay marriage prior to last week’s Supreme Court decision legalizing it stand to gain the most from the ruling financially, according to a report compiled at the end of last year by the Williams Institute at UCLA and Credit Suisse.   

The study found that states in the Southeast could see a total economic benefit of $733 million in the first three years after legalization of gay marriage, thanks to pent up demand and increased spending on weddings and tourism.

Researchers estimated that gay marriage spending nationwide could reach $2.6 billion over the next three years. Gay couples tend to have smaller weddings, with an average of less than 80 guests, according to TheKnot.

Related: How Gay Marriage Can Help Reduce the Deficit

Men spend an average of $15,992 on their wedding, while women spend an average of $13,055. More than 20 percent of gay couples spend more than $20,000 on their nuptials. The average opposite-sex marriage costs more than $31,000.

In addition to boosting consumer spending, which helps GDP, the ruling may also be a boon to federal coffers. While married couples now benefit from the financial protections of marriage, they also now have to pay the tax penalty.

The legalization of gay marriage in New York in 2011 led to an estimated $259 million in spending and $16 million in revenues for New York City, according to the mayor’s office.

Hillary Too Expensive? Get Chelsea Clinton at a Discount

Graduating seniors line up to receive their diplomas during Commencement at Wellesley College in Wellesley, Massachusetts, U.S., May 26, 2017.   REUTERS/Brian Snyder
Brian Snyder
By Eric Pianin

If you’re turned off by the astronomical speaking fees commanded by the former Secretary of State and her former president husband, you have an option: You can go Clinton shopping.

Hillary and Bill Clinton earned in excess of $25 million for delivering 104 speeches between 2014 and the first three months of 2015, including $11 million that Hillary Clinton collected delivering 51 speeches, according to reports filed with the Federal Election Commission.

Related:  Hillary Clinton’s Achilles' Heel: Trust

While Hillary’s fees varied, they typically exceeded a quarter-million-dollars a pop and went as high as $300,000, although she generally donated the funds to the Clinton family’s global foundation.

But at least one sticker-shocked university balked at her price and settled for a bargain basement alternative – daughter Chelsea Clinton.

As The Washington Post recounted on Tuesday, officials of the University of Missouri at Kansas City were in the market for a celebrity speaker to headline a gala luncheon marking the opening of a women’s hall of fame in early 2014. Initially, they thought of inviting Clinton’s 34-year old daughter to deliver brief remarks at the event.

When Chelsea’s speaking agency responded that she probably wouldn’t be available, university officials decided to “shoot for the moon” and invite her mother, the presumptive 2016 Democratic presidential candidate, to appear instead. However, they were stunned when the answer came back that Hillary Clinton indeed would be available but it would cost them $275,000.

Related: College Students Outraged over Hillary Clinton’s Massive Speaking Fees   

University officials regrouped and resumed their hunt for a speaker. Then word came back that Chelsea Clinton was available to speak after all – and for the relatively modest fee of $65,000. Likely still reeling from the Hillary demand,  university officials jumped at the offer.

Chelsea Clinton appeared at the luncheon on Feb. 24, 2014, and here’s what her schedule called for:  a 10-minute speech followed by a 20-minute, moderated question-and-answer session and a half-hour posing for pictures with VIPs off-stage. As with Hillary Clinton’s paid speeches at universities, Chelsea Clinton directed her fee to the Bill, Hillary and Chelsea Clinton Foundation.

School officials said Chelsea’s appearance, which was covered by private donations, was well worth the money. Reactions to the story on social media were less positive, with anti-Clinton commentators having a field day mocking America’s one-time and perhaps future first family.  

The Washington Post Closes a Window on Hackers and Big Government

A lock icon, signifying an encrypted Internet connection, is seen on an Internet Explorer browser in a photo illustration in Paris April 15, 2014.  REUTERS/Mal Langsdon
Mal Langsdon
By Millie Dent

The Washington Post is pushing back against government surveillance, hackers and other nosy folks trying to get a peek at you and your data.

Starting Tuesday it will begin to encrypt parts of its website to make it more difficult to track the reading habits of visitors. The encryption will apply to the Post’s homepage, stories on the site’s national security page and The Switch, its technology policy blog.  

A display icon of a small lock in the web address bar will signal readers that pages are encrypted. In addition, the secure pages will start with the letters “https,” rather than the standard “http.”

The encryption also has the potential to make it tougher for governments to censor content. If censors are monitoring website traffic, they can see only the domain a person is visiting, not the specific page. A country would have to block the entire website if it wanted to block content.

The Post acknowledges that the additional security measures could make online advertising less attractive to companies. Advertisers might also be driven away by having to make sure their content is also secure, an extra step some companies might not be willing to take. 

The Post is the first major news organization to introduce such security measures. Last fall, The New York Times published a blog post imploring websites to implement secure connections, but it has yet to follow through on its own challenge.

However, other smaller news sources, such as the Intercept and TechDirt, use https technology by default.

Encrypted traffic is becoming increasingly common for many sites, including online banking and web-based email services. Earlier this month, the Obama administration ordered all public federal websites to begin using https technology by the end of 2016.

The social media giant Facebook announced in early June that users could encrypt notifications sent from the website to a user’s personal email address, protecting potentially sensitive emails. Facebook – as well as hackers, spies and others -- will be denied access to the user’s private encryption key.

This move prevents hackers who have accessed a user’s email inbox from being able to understand emails from Facebook without knowing their private key. While a user’s activity on the actual site will not be encrypted, this announcement could be the first in a series of moves to protect Facebooks’ user privacy.

Apple and Google have also implemented more security measures for user privacy over the last year.

The Sweet Credit-Card Perk You Have But Don’t Know About

REUTERS/Lisi Niesner
By Beth Braverman

You know that your credit card offers rewards like cash back and airplane miles, but many cards also offer automatic travel insurance, which could prove valuable on your next trip. 

Nearly 90 percent of reward credit cards offer accident insurance while you’re on vacation and 63 percent cover luggage if you use you card to pay for the trip, according to a new report by CardHub. On nearly a quarter of cards that offer travel accident insurance, coverage is more than $300,000. 

Almost three-quarters of cards that cover luggage will pay you for lost bags, while nearly half cover delayed luggage. 

Related: Credit Cards Can Be Your Best Friend—or Worst Enemy 

The report found that the Chase Sapphire Preferred Rewards Card offered the best travel insurance, followed by Discover It, Wells Fargo Propel 365 and Citi Prestige. 

Coverage amounts vary and restrictions apply, so check in with your issuer to get the details of what your card offers. 

Travel insurance isn’t the only time credit cards come in handy for travel. Some cards also offer roadside assistance. If your car breaks down, runs out of gas, or you lock your keys inside most credit cards will send roadside assistance to help you out. 

That perk, while convenient, isn’t free. The issuers usually charge you a discounted rate for the service and bill it directly to your credit card. Discover, for example, charges $70 per incidence but covers 24-hour towing, assistance and locksmith services.

Jeb Bush Wasn’t Bashful About Trading on Family Name

Republican presidential candidate Jeb Bush waves as he arrives to address a legislative luncheon held as part of the "Road to Majority" conference in Washington
REUTERS/Carlos Barria
By Eric Pianin

While Jeb Bush frequently is touted as both a two-term governor and a successful businessman, his often dubious record as an entrepreneur and investor has been widely documented over the past three decades. 

The 62-year-old scion of a powerful political family and now an announced candidate for the 2016 GOP presidential nomination was involved in a myriad business ventures dating back to the mid-1980s, The Washington Post noted on Monday in the latest media examination of Bush’s entrepreneurial exploits as he tried to amass his fortune. 

Related: Jeb Bush Shows Some Fire in Campaign Launch 

Bush brokered numerous real estate deals in Miami, helped to arrange bank loans in Venezuela, marketed shoes in Panama, sought out Mexican investors for a building-materials company, advised transnational financial services firms — you name it. He also made a boatload of money by sitting on a handful of corporate boards. And ever since he left the Florida governor’s office in 2007, Bush — like Democrat Hillary Clinton — has raked in substantial income by giving speeches while also consulting and managing investments for others. 

“Jeb Bush had a successful career in commercial real estate and business before serving as Florida’s governor,” Kristy Campbell, a spokeswoman for Bush, told the Post. “He has always operated with the highest level of integrity throughout his business career.” 

And yet the Post’s lengthy review of Bush’s business career — culled from records, lawsuits, interviews and newspapers accounts dating back more than 30 years — reveals a picture of a young man on the make who “often benefited from his family connections and repeatedly put himself in situations that raised questions about his judgement and exposed him to reputational risks.” 

Related: Can Jeb Bush Unite the GOP’s Establishment and Religious Wings?   

Five of Bush’s former business associates have been convicted of crimes; one remains an international fugitive on fraud charges. Bush has disavowed any knowledge of the wrongdoing and conceded that some of the businessmen he met in Florida took advantage of his relative youth and naiveté. 

One thing that comes through loud and clear in the Post report is that Jeb Bush had no compunction about trading on his family name in trying to make a buck. 

Major case in point: In early 1989, seven weeks after his father, George H.W. Bush, took office as president, Jeb Bush took a trip to Nigeria with the executive of a Florida company called Moving Water Industries. Bush had just been hired to help market the firm’s water pumps. 

With no less than a special escort from the U.S. ambassador to Nigeria, Bush and his new boss met with the nation’s political and religious leaders as part of the company’s effort to land a deal that would be worth $80 million. 

“My father is the president of the United States, duly elected by people that have an interest in improving ties everywhere,” the young Bush told the group. “The fact that you have done this today is something I will report back to him very quickly when I get back to the United States.” 

Just days after Bush returned to the U.S., his father sent the president of Nigeria a handwritten note thanking him for hosting his son. Not surprisingly, Moving Water Industries eventually landed the deals it was seeking, according to the Post.