Breakthrough Discovery: Loophole Enables Quantum Cloning Technology

Challenges of Quantum Information Backup

Ruslanas Baranauskas/Science Photo Library/Alamy

In the realm of quantum mechanics, the principle of no duplication for quantum information is considered an unbreakable rule. However, a novel technique for backing up qubits—the fundamental units of quantum computers—may potentially challenge this foundational aspect of physics.

Initially identified in the 1980s, the no-cloning theorem asserts that a quantum state, which encapsulates all information about a quantum system, cannot be duplicated. Attempts to copy this information typically compromise the fragility of the quantum properties being assessed. This principle is crucial for advancements in quantum technologies, including cryptography, enabling secure communication protocols that effectively prevent information duplication and interception.

Researchers from the University of Waterloo in Canada have introduced an unexpected breakthrough: the ability to clone a quantum system, provided the information is encrypted and accompanied by a unique one-time decryption key.

Achim Kemp states, “This method allows for the creation of numerous copies to enhance redundancy, yet all copies must remain encrypted, and each decryption key may only be utilized once.” This compliance with the no-cloning theorem assures that only a singular, unambiguous, readable copy of a qubit exists at any point.

Through an exploration of how quantum Wi-Fi and radio stations could function, Kemp and his team stumbled upon this astonishing revelation. Traditional no-cloning principles would inhibit multiple receivers from accessing identical quantum information.

While delving into the impact of random fluctuations and noise on information copying, the team discerned that these disturbances might inadvertently undermine the no-cloning theorem, prompting the question, “Why does quantum noise seem to confuse the no-cloning theorem?”

Upon thorough investigation, they concluded that noise could inadvertently serve as an encryption mechanism, disrupting the original signal, yet remaining reversible. When utilized intentionally, this phenomenon can act as a tool for secure information dissemination.

After validating this concept theoretically, the team successfully implemented the protocol on an actual IBM Heron 156-qubit quantum computing processor.

This innovative approach exhibits a level of resilience against the errors and noise characteristic of contemporary quantum computers, enabling the production of hundreds of encrypted clones of a single qubit. “In fact, we maximized our capacity on the IBM processor. Despite housing only 156 qubits, we estimated we could produce over 1,000 clones before triggering error messages,” Kemp explains.

This advancement to the no-cloning theorem holds promise for the future of quantum cloud storage and computing services. “Similar to how Dropbox ensures a file’s safety by storing it across three distinct geographical servers, this method offers a viable solution for duplicating quantum data,” Kemp adds.

Alex Kissinger from the University of Oxford remarks, “It’s a fascinating quantum cryptographic protocol with ample potential in quantum communications, where redundancy in transmitted information can be invaluable.” However, he emphasizes that this technique should not be misconstrued as cloning. “It signifies a method of dissemination rather than replication,” Kissinger clarifies. “It’s about distributing information so that one recipient can later retrieve it.”

Kemp concurs, asserting, “This isn’t cloning; it’s encrypted cloning—merely a refinement of the no-duplication theorem.”

Topics:

  • Quantum Mechanics/
  • Quantum Computing

Source: www.newscientist.com

Apple finally closes loophole allowing children to bypass parental controls

Apple has acknowledged a persistent bug in its parental controls that allowed children to bypass restrictions and access adult content online.

This bug, which enabled kids to evade controls by entering specific nonsensical phrases in Safari’s address bar, was initially reported to the company in 2021.

Despite being ignored, a recent Wall Street Journal report has shed light on this issue, prompting Apple to commit to addressing it in the next iOS update.

This loophole effectively disabled the Screen Time parental control feature for Safari, allowing children unrestricted access to the internet.

While the bug doesn’t seem to have been widely exploited, critics argue that it reflects Apple’s disregard for parents.

iOS developer Mark Jardine expressed frustration, stating, “As a parent who relies on Screen Time to keep my kids safe, I find the service buggy with loopholes persisting for over a decade.”

When Screen Time was introduced in 2018, it was promoted as a tool for parents to monitor their kids’ device usage and manage their own screen time habits.

Over time, parents have become heavily reliant on Screen Time to control features, apps, and usage times for their children.


Following the release of Screen Time, Apple implemented restrictions on third-party services that offered similar functionalities, citing security concerns. However, this move faced criticism for anticompetitive behavior.

Five years later, critics argue that Apple’s monopoly has led to neglect in improving parental controls. Apple blogger Dan Mollen highlighted concerns raised by parents disillusioned with Screen Time.

Apple responded by saying, “We take reports of issues with Screen Time seriously and have continually made improvements to give customers the best experience. Our work isn’t done yet, and we will continue to provide updates in future software releases.”

Source: www.theguardian.com