A place of Bile & other Humours.
BlogRoll
Bloglines Blogroll feed currently *broken*
Subscribe to
Posts [Atom]bloglines
The quantum cryptography system consisted of a transmitter (Alice) at Vienna's City Hall and a receiver (Bob) at the headquarters of an Austrian bank. The sites were linked by 1.45 km of singlemode optical fiber.
The team used an entangled-state quantum cryptography system that relies on entangled photon pairs. Entangled photons are unpolarized while they travel and only assume a polarization state when measured. Due to their entangled nature, a measurement of the polarization of one photon determines the polarization of the other.
According to the authors, one advantage of their system is that the key comes into existence at both Alice and Bob and does not have to be transferred between the two. With the key safely in hand, the team was able to securely wire money from the City Hall to the bank.
Online Principles
1. Human beings are naturally inclined towards trust and collaboration. Policies of intermediaries or governments that frustrate trust and collaboration should be viewed with suspicion.
2. The world is a complex and diverse place. Conflicting values can coexist online. Policies of intermediaries or governments that attempt to impose unitary values -- and, in particular, that attempt to build such values into low levels of the protocol stack -- should be viewed with suspicion.
3. Any group or government that attempts to impose its values online on another group or government should be viewed with suspicion.
4. As much as possible, decisions about what should happen online should be implemented at the edge of the network.
5. As much as possible, decisions about what individuals should be able to do online should be made by those individuals themselves.
6. Netizens want to widen their contacts with people who are distant from them in time and space. Policies of intermediaries or governments that frustrate this contact should be viewed with suspicion.
7. Any machine or device should be allowed to connect to the internet as long as it respects basic protocols. Policies of intermediaries or governments that frustrate this connection should be viewed with suspicion.
8. Online access should not be conditioned on provision of government-mandated identifying information.
9. Individuals should have a choice of modes of online access available to them, at reasonable prices. One of those choices must allow individuals to host content themselves.
10. Individuals who subscribe to these principles should be ready to act collectively when necessary.
1 1.5 Mb
2 3.5 Mb
3 5.5 Mb
4 7.5 Mb
5 10 Mb
6 15 Mb
Post Links
Previous Posts
... not a complete waste if taxes then!
Stupid Charges are not customer service.
The first Sacrifice of Spring.
Apparently it's what separates men from women ...
Archives
May 2004
June 2004
July 2004
August 2004
September 2004
October 2004
November 2004
December 2004
January 2005
February 2005
March 2005
April 2005
May 2005
June 2005
July 2005
August 2005
September 2005
October 2005
November 2005
December 2005
January 2006
February 2006
March 2006
April 2006
May 2006
June 2006
July 2006
August 2006
September 2006
October 2006
December 2006
January 2007
February 2007
March 2007
April 2007
May 2007
June 2007
July 2007
August 2007
September 2007
November 2007
January 2008
February 2008
March 2008
April 2008
May 2008
July 2008
August 2008
October 2008
January 2009
February 2009
April 2009
June 2009
November 2009
December 2009
January 2010
March 2010
April 2010
May 2010
August 2010
October 2010
November 2010
December 2010
January 2011
February 2011
March 2011
April 2011
May 2011
June 2011
July 2011
August 2011
September 2011
October 2011
April 2012
July 2012
August 2012