Multinode Quantum Network, an important step toward quantum internet

November 12, 2020

Multiple projects across the world are working to create a “quantum internet,” a network where quantum computers can share and exchange information. One such project, a collaboration between Brookhaven National Lab and Stony Brook University in New York, recently hit a major milestone: demonstrating that quantum bits, or qubits, from two distant quantum computers can be entangled in a third location. This is a critical step in creating a quantum internet, and significantly, the researchers did it over standard internet cables.

Main Article:

4 MAY 2021

Researchers at the QuTech research center in the Netherlands created the system, which is made up of three quantum nodes entangled by the spooky laws of quantum mechanics that govern subatomic particles.

Unlike classical networks, you cannot amplify quantum signals. If you try to copy the qubit, you destroy the original copy,” Pompili said, referring to physics’ “no-cloning theorem,” which states that it is impossible to create an identical copy of an unknown quantum state.

“This really limits the distances we can send quantum signals to the tens of hundreds of kilometers. If you want to set up quantum communication with someone on the other side of the world, you’ll need relay nodes in between.”

To solve the problem, the team created a network with three nodes, in which photons essentially “pass” the entanglement from a qubit at one of the outer nodes to one at the middle node. The middle node has two qubits – one to acquire an entangled state and one to store it.

Once the entanglement between one outer node and the middle node is stored, the middle node entangles the other outer node with its spare qubit. With all of this done, the middle node entangles its two qubits, causing the qubits of the outer nodes to become entangled.

Main Article: 


Signal: Quantum Internet is close

It will dramatically change cybersecurity paradigms, and it requires new planning and standards. Many Pre-Quantum Internet techniques would not apply to Post-Quantum Internet World.





an AI Attack to Free World

On one of the hot days of summer in 2031, a confidential report leaked on social media caused massive protests in the midwest. The report stated that the AI judgment algorithm sentenced 112 black people to life imprisonment wrongly in the past year. Protestors tried to burn the state buildings. Another group attacked the offices of AI Companies in silicon valley. They chanted, ” Burn racist computers.”

The intelligence community believes that Russian state-sponsored hackers shared the report. But who cares? Many innocent people prisoned unfairly. The country is divided, and different ethnic groups are fighting with each other. The whole country is in chaos. People want their dream country, but a young computer scientist thinks protestors and the intelligence community are on the wrong track.

He had developed a special Data Anomaly Detector; he ran the program to scan AI system open data. After one month, He found out that some hackers altered the data and made AI sensitive to certain words. His report surprised the public opinion. It was an AI input attack. Who is behind this attack?

After one year, the intelligence community found that CCP sponsored hackers altered the African American suspect cases to deepen the racial divide. The other goal of the hackers was to undermine the free world institutions. And at the end, the young computer specialist of our story launched his unicorn startup.


Learn more about AI Attacks.

AI Attack

Phishing, ransomware, DDoS, Viruses, and Attack vectors are the most common cyber attack type(1). With the expansion of using AI in It’s predictable, we see more and more AI attacks shortly. 

These “AI attacks” are fundamentally different from traditional cyberattacks(2), and current approaches are using against current cyberattacks that may not be appliable. AI Attacks may follow below goals:

  • Cause Damage: the attacker wants to cause damage by having the AI system malfunction. An example of this is an attack to cause an autonomous vehicle to ignore stop signs.
  • Hide Something: the attacker wants to evade detection by an AI system.
  • Degrade Faith in a System: the attacker wants an operator to lose faith in the AI system

Currently, The most common method used in AI Attacks is input attack, which makes a compromised AI system. It refers to manipulating what is fed into the AI system to alter the system’s output to serve the attacker’s goal(2).

We may see the following products in the near future:

  • Data Anomaly Detector made by computer security companies
  • AI training security certificate that ensures the quality of the AI System. (Five Star AI System ).






Input Attack to make Compromised AI