{"id":176545,"date":"2017-02-10T03:19:23","date_gmt":"2017-02-10T08:19:23","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/quantum-cloning-machine-reveals-clues-that-could-protect-against-hacking-photonics-com\/"},"modified":"2017-02-10T03:19:23","modified_gmt":"2017-02-10T08:19:23","slug":"quantum-cloning-machine-reveals-clues-that-could-protect-against-hacking-photonics-com","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/cloning\/quantum-cloning-machine-reveals-clues-that-could-protect-against-hacking-photonics-com\/","title":{"rendered":"Quantum Cloning Machine Reveals Clues That Could Protect Against Hacking &#8211; Photonics.com"},"content":{"rendered":"<table border=\"0\" cellpadding=\"2\" cellspacing=\"7\" style=\"vertical-align:top;\"><tr><td width=\"80\" align=\"center\" valign=\"top\"><font style=\"font-size:85%;font-family:arial,sans-serif\"><a href=\"http:\/\/news.google.com\/news\/url?sa=t&amp;fd=R&amp;ct2=us&amp;usg=AFQjCNF9ifZJDtcX63ITFfDpYxUkeovzPQ&amp;clid=c3a7d30bb8a4878e06b80cf16b898331&amp;cid=52779370595028&amp;ei=Z3edWOD0IsXT3QHXvLLwDA&amp;url=https:\/\/www.photonics.com\/Article.aspx?AID%3D61667\"><img loading=\"lazy\" decoding=\"async\" src=\"\/\/t1.gstatic.com\/images?q=tbn:ANd9GcTd0EusehJShwDmUg9wV1mM3poOuwG9rUWb30MR7bwYwwVEAmxDxQ4rVk9gnf5ezDGzc57eQqi8\" alt=\"\" border=\"1\" width=\"80\" height=\"80\" style=\"padding-left:10px; padding-right: 10px;\"><br><font size=\"-2\">Photonics.com<\/font><\/a><\/font><\/td><td valign=\"top\" class=\"j\"><font style=\"font-size:85%;font-family:arial,sans-serif\"><div style=\"padding-top:0.8em;\"><img alt=\"\" height=\"1\" width=\"1\" style=\"padding-left:10px; padding-right: 10px;\"><\/div><div class=\"lh\"><a href=\"http:\/\/news.google.com\/news\/url?sa=t&amp;fd=R&amp;ct2=us&amp;usg=AFQjCNF9ifZJDtcX63ITFfDpYxUkeovzPQ&amp;clid=c3a7d30bb8a4878e06b80cf16b898331&amp;cid=52779370595028&amp;ei=Z3edWOD0IsXT3QHXvLLwDA&amp;url=https:\/\/www.photonics.com\/Article.aspx?AID%3D61667\"><b>Quantum <b>Cloning<\/b> Machine Reveals Clues That Could Protect Against Hacking<\/b><\/a><br><font size=\"-1\"><b><font color=\"#6f6f6f\">Photonics.com<\/font><\/b><\/font><br><font size=\"-1\">Feb 2017 OTTAWA, Ontario, Feb. 7, 2017  Universal optimal quantum <b>cloning<\/b> of high-dimensional photonic states has been achieved using the symmetrization method. The work has led to the discovery of information that could help system administrators&nbsp;...<\/font><br><font size=\"-1\"><a href=\"http:\/\/news.google.com\/news\/url?sa=t&amp;fd=R&amp;ct2=us&amp;usg=AFQjCNFD6fanNJ0D5YUWyxU7q3tgJ-Gxag&amp;clid=c3a7d30bb8a4878e06b80cf16b898331&amp;cid=52779370595028&amp;ei=Z3edWOD0IsXT3QHXvLLwDA&amp;url=http:\/\/www.theinquirer.net\/inquirer\/news\/3004118\/boffins-create-quantum-cloning-machine-to-intercept-secure-messages\">Boffins create quantum cloning machine to intercept 'secure ...<\/a><font size=\"-1\" color=\"#6f6f6f\"><nobr>The INQUIRER<\/nobr><\/font><\/font><br><font size=\"-1\"><a href=\"http:\/\/news.google.com\/news\/url?sa=t&amp;fd=R&amp;ct2=us&amp;usg=AFQjCNGBWZN4p_fdR-alZQy1UzvolmEPmg&amp;clid=c3a7d30bb8a4878e06b80cf16b898331&amp;cid=52779370595028&amp;ei=Z3edWOD0IsXT3QHXvLLwDA&amp;url=http:\/\/www.latinpost.com\/articles\/134325\/20170207\/quantum-computing-researchers-build-the-1st-ever-high-dimensional-quantom-cloning-machine-protects-next-gen-computing-networks-from-hackers.htm\">Quantum Computing: Researchers Build The 1st ever High ...<\/a><font size=\"-1\" color=\"#6f6f6f\"><nobr>Latin Post<\/nobr><\/font><\/font><br><font size=\"-1\"><a href=\"http:\/\/news.google.com\/news\/url?sa=t&amp;fd=R&amp;ct2=us&amp;usg=AFQjCNFY7sp_gRftMFsvcb1A1vKdAMCzaw&amp;clid=c3a7d30bb8a4878e06b80cf16b898331&amp;cid=52779370595028&amp;ei=Z3edWOD0IsXT3QHXvLLwDA&amp;url=http:\/\/www.dnaindia.com\/scitech\/report-how-to-make-quantum-computers-hackproof-decoded-2312802\">How to make quantum computers hackproof decoded<\/a><font size=\"-1\" color=\"#6f6f6f\"><nobr>Daily News &amp; Analysis<\/nobr><\/font><\/font><br><font size=\"-1\" class=\"p\"><a href=\"http:\/\/news.google.com\/news\/url?sa=t&amp;fd=R&amp;ct2=us&amp;usg=AFQjCNERbNwrIJzxqxgVh4NhjWlUprWXKw&amp;clid=c3a7d30bb8a4878e06b80cf16b898331&amp;cid=52779370595028&amp;ei=Z3edWOD0IsXT3QHXvLLwDA&amp;url=https:\/\/scienceblog.com\/491860\/protecting-quantum-computing-networks-hacking-threats\/\"><nobr>ScienceBlog.com (blog)<\/nobr><\/a>&nbsp;-<a href=\"http:\/\/news.google.com\/news\/url?sa=t&amp;fd=R&amp;ct2=us&amp;usg=AFQjCNGuKBdlBER034vKQqaP7fOov9uOeA&amp;clid=c3a7d30bb8a4878e06b80cf16b898331&amp;cid=52779370595028&amp;ei=Z3edWOD0IsXT3QHXvLLwDA&amp;url=http:\/\/www.indiatvnews.com\/business\/india-how-to-make-quantum-computers-hackproof-decoded-367827\"><nobr>India TV<\/nobr><\/a>&nbsp;-<a href=\"http:\/\/news.google.com\/news\/url?sa=t&amp;fd=R&amp;ct2=us&amp;usg=AFQjCNGsRGYbP_PcZU8qxAqZZbwvm3WDRA&amp;clid=c3a7d30bb8a4878e06b80cf16b898331&amp;cid=52779370595028&amp;ei=Z3edWOD0IsXT3QHXvLLwDA&amp;url=http:\/\/www.ibtimes.co.uk\/researchers-discover-clues-protect-quantum-computing-networks-being-hacked-1605015\"><nobr>International Business Times UK<\/nobr><\/a><\/font><br><font class=\"p\" size=\"-1\"><a class=\"p\" href=\"http:\/\/news.google.com\/news\/more?ncl=dbQMx0O_fGzWouM0KzLphNmt4-_YM&amp;authuser=0&amp;ned=us\"><nobr><b>all 39 news articles&nbsp;&raquo;<\/b><\/nobr><\/a><\/font><\/div><p><\/p><\/font><\/td><\/tr><\/table><p><!-- Auto Generated --><\/p><p>Read the original:<\/p><p><a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/www.photonics.com\/Article.aspx?AID=61667\" title=\"Quantum Cloning Machine Reveals Clues That Could Protect Against Hacking - Photonics.com\">Quantum Cloning Machine Reveals Clues That Could Protect Against Hacking - Photonics.com<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p> Photonics.com Quantum Cloning Machine Reveals Clues That Could Protect Against Hacking Photonics.com Feb 2017 OTTAWA, Ontario, Feb. 7, 2017 Universal optimal quantum cloning of high-dimensional photonic states has been achieved using the symmetrization method.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/cloning\/quantum-cloning-machine-reveals-clues-that-could-protect-against-hacking-photonics-com\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":9,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[187749],"tags":[],"class_list":["post-176545","post","type-post","status-publish","format-standard","hentry","category-cloning"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/176545"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=176545"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/176545\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=176545"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=176545"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=176545"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}