What happens in Vegas... Click


What happens in Vegas...

Similar Content

Browse content similar to What happens in Vegas.... Check below for episodes and series from the same categories and more!

Transcript


LineFromTo

writing and selling malware code.

0:00:000:00:04

Now on BBC News it's time for Click.

0:00:040:00:05

This week, the Sun's the star as it defeats ice cream.

0:00:100:00:13

Powers roads.

0:00:130:00:14

And dazzles geeks.

0:00:140:00:18

Take them off guys, you're indoors.

0:00:180:00:20

They're ugly, huge and they ruin the landscape,

0:00:420:00:47

but we do kind of need them to get from A to B.

0:00:470:00:52

But sometimes a road can be more than just a road.

0:00:520:01:10

And that's the idea behind a French government backed initiative

0:01:100:01:12

using the massive space given over to the transport network

0:01:120:01:16

to also capture the Sun through solar roads.

0:01:160:01:18

I mean, look at this road, what's it doing right now?

0:01:180:01:21

It's looking straight up the sky.

0:01:210:01:22

And it's estimated that even busy roads can see the sky

0:01:230:01:26

for 70-90% of the time.

0:01:260:01:27

But it's not all plain... Sunning.

0:01:270:01:28

The problem with putting photovoltaic cells into roads

0:01:280:01:37

is the slightest bit of pressure, the slightest bend, and...

0:01:370:01:39

So the cells are stuck onto slabs and covered with crushed glass

0:01:390:01:43

and a translucent resin.

0:01:430:01:44

At the facility near Versailles, in France, these seven millimetre

0:01:440:01:46

thick panels are being tested for their strength and durability

0:01:470:01:49

so they can withstand heavy traffic as well as ensuring

0:01:490:01:52

that they aren't slippery.

0:01:520:01:54

We have the cell and on each face we added polymer to increase

0:01:540:01:57

the stiffness and the durability of the cells itself.

0:01:570:02:00

So do they bend or are they just, are they resistant to bending?

0:02:000:02:07

Yes, of course they bend, but just a little bit.

0:02:070:02:10

So it resist.

0:02:100:02:11

And they are pretty strong.

0:02:110:02:13

I'm a geek, I can't open a jar let alone bend a piece of road.

0:02:130:02:17

All right, OK, can I smack it on the...?

0:02:170:02:19

LAUGHTER

0:02:190:02:19

Uhhhh... Maybe not!

0:02:190:02:23

Not so in the corner you know?

0:02:230:02:25

The costs though are proving high.

0:02:250:02:30

Although the panels can be laid over existing roads,

0:02:300:02:36

this one-kilometre stretch in Normandy covering 2,800 square

0:02:360:02:38

metres came in at 5 million euros.

0:02:380:02:40

That's an estimated 4-6 times the price of covering the area

0:02:400:02:43

with conventional solar panels.

0:02:430:02:44

Currently, yes, of course the cost is quite high.

0:02:440:02:47

The aim is to divide by three the current cost.

0:02:470:02:50

It will be within at least one year.

0:02:500:02:56

After concerning the interest it's really a political approach.

0:02:560:02:59

Critics have questions about the viability of panels

0:02:590:03:03

on busy roads and the efficiency of laying panels down flat

0:03:030:03:06

on the road surface.

0:03:060:03:07

The angle or the tilt angle of the panels will also

0:03:070:03:10

influence the efficiency.

0:03:100:03:14

If we have them lying on the floor, on the road,

0:03:140:03:17

then we are influencing the tilt angle.

0:03:170:03:19

One possible advantage of having the panels flat on the ground

0:03:190:03:23

is that in the future they could be used to charge electric vehicles

0:03:230:03:27

as they move along the road.

0:03:270:03:28

And charging vehicles as they move is another idea on the horizon.

0:03:280:03:35

Developed by Qualcomm Technologies, this 100-metre stretch

0:03:350:03:39

of dynamically charging road is also being trialled in Versailles.

0:03:390:03:41

I do like the idea that although the road networks have

0:03:410:03:50

obviously been a major source of the planet's pollution problems,

0:03:500:03:52

they could also be, in the future, one of the solutions

0:03:520:03:55

to the planet's energy crisis.

0:03:550:03:58

And with the UK Government phasing out diesel and petrol vehicles,

0:03:580:04:02

renewable transport solutions like this might just be the ticket.

0:04:020:04:08

Stationery induction charging works like wirelessly charged phones,

0:04:080:04:10

producing a magnetic field that's converted to DC power.

0:04:100:04:14

Though this technology has been with us for a while, dynamic roads

0:04:140:04:17

are an exciting development.

0:04:170:04:19

How accurately do you have to park this thing so

0:04:190:04:22

the two pads are aligned?

0:04:220:04:23

At the moment we're talking about an area the size

0:04:230:04:27

of about a dinner plate, as long as that's aligned on both

0:04:270:04:30

sides you should be able to send the charge through that.

0:04:300:04:33

You have a line of these on a road and you simply connect them all up

0:04:330:04:37

and that would effectively give you a charging road.

0:04:370:04:40

As long as the car was obviously aligned with that,

0:04:400:04:43

and the technology was all linked and synced up, the car

0:04:430:04:46

could actually charge while it's driving along using exactly the same

0:04:460:04:49

principles and technology.

0:04:490:04:49

Critics though worry about the infrastructure costs

0:04:490:04:51

of dynamically charging roads.

0:04:510:04:52

Others point to the rapid developments in electric vehicle

0:04:520:04:55

battery capacity that may remove the need for electric cars

0:04:550:04:58

to charge while on the move.

0:04:580:04:59

But if solar roads can be made cheaply enough

0:04:590:05:02

and withstand heavy traffic, this could be one to watch

0:05:020:05:04

in the not too distant future.

0:05:040:05:11

It's not just roads that will be changing in the future,

0:05:110:05:14

the cars that travel on them will be changing to.

0:05:150:05:17

There's a good chance that lots of cars in the future

0:05:170:05:20

will be self driving.

0:05:200:05:23

The technology to allow this is improving all the time.

0:05:230:05:26

Autonomous cars use a suite of sensors to ensure that they drive

0:05:260:05:29

safely and one of the most important is lidar, light

0:05:290:05:32

detection and ranging.

0:05:320:05:32

By bouncing pulses of light from a sensor, the vehicles

0:05:320:05:35

autonomous systems can figure out how far away objects are, allowing

0:05:350:05:38

it to recognise its surroundings and avoid an accident.

0:05:380:05:41

Well now one US start-up has gone further, with a system

0:05:410:05:44

that can see further.

0:05:440:05:47

We're starting to look more like a camera image almost.

0:05:470:05:49

In 3-D, rather than just a few points.

0:05:500:05:52

And that's why as I'm zooming around here with this virtual camera,

0:05:520:05:55

we can start to make out objects like people and bikers

0:05:550:05:58

and those types of things.

0:05:580:06:10

You can see the sort of stripes on each object like a topographic

0:06:100:06:13

map of the scene around it.

0:06:130:06:15

The laser pulses reach up to 200 metres by using a 1550 nanometre

0:06:150:06:18

laser, that's far larger than the current standard of 905.

0:06:180:06:21

This means that at high speeds, the Luminar system will be able

0:06:210:06:24

to detect obstacles earlier and reduce the chance

0:06:240:06:26

of an accident.

0:06:260:06:36

What this whole games comes down to in the autonomous vehicle space

0:06:360:06:39

is all about these edge cases that happen.

0:06:390:06:41

It's easy to get an autonomous vehicle to work 99% of the time.

0:06:410:06:45

It's very difficult to get it to work that last 1%.

0:06:450:06:57

Those are the cases that we have to be able to take into account

0:06:570:07:01

and make sure we confidently see and understand.

0:07:010:07:03

And autonomous cars today cannot reliably see those

0:07:030:07:05

situations up ahead.

0:07:050:07:06

But while the automotive industry tries to get up to speed on lidar,

0:07:060:07:10

it is being used for other, more portable purposes.

0:07:100:07:12

Here's Marc Cieslak.

0:07:120:07:13

There are lots of different industries which can take advantage

0:07:130:07:15

of lidar technology.

0:07:160:07:16

Industries like architecture and construction are very keen

0:07:160:07:18

to make use of accurate, quickly created 3-D models.

0:07:180:07:21

And the kit is getting smaller all the time.

0:07:210:07:23

Wade Sheen is from a US company called Kaarta and they make

0:07:230:07:27

hand-held lidar scanners.

0:07:270:07:27

Wade, how does the kit work?

0:07:270:07:33

Well, the Kaarta system uses a 360 degrees lidar scanner that's

0:07:330:07:36

gathering data in three dimensions, an IMU which detects our motion,

0:07:360:07:39

and an image sensor.

0:07:390:07:40

In combination we know exactly where we are within the environment

0:07:400:07:43

without using any other signals such as GPS or radio signal.

0:07:430:07:46

Because we know exactly where we are at all times,

0:07:460:07:48

within millimetres, we are gathering a point cloud, and that point cloud

0:07:480:07:52

can be used by architecture, engineering and construction

0:07:520:07:54

industry for them to build accurate 3-D models of their buildings

0:07:540:07:57

for both in construction, to verify what they are building

0:07:570:08:00

correctly and for older buildings to establish what is already there.

0:08:000:08:04

So can you demonstrate for me now, can you make a model

0:08:050:08:08

of the exterior of the BBC for me?

0:08:080:08:10

Absolutely.

0:08:100:08:10

OK, I'll let you take it away, Wade.

0:08:100:08:13

OK, and now we are building the model.

0:08:130:08:18

The red lines we can see on screen here are harmless laser pulses

0:08:180:08:22

from the scanner bouncing off the surfaces of the buildings.

0:08:220:08:25

The more that Wade walks, the more data he captures.

0:08:250:08:29

And that's all there is to it.

0:08:290:08:34

24 million point cloud dots pack together to make the finished 3-D

0:08:340:08:38

model which is a 100% accurate rendering of the area that is just

0:08:380:08:42

been walked through, made in just two minutes.

0:08:420:08:49

And then we'll start building the point cloud.

0:08:490:08:51

Then we're free to move.

0:08:510:08:56

While this scanner is designed for outdoor use, there

0:08:560:08:58

is a specially adapted version of the same tech used

0:08:580:09:01

for scanning indoors.

0:09:010:09:03

It builds internal 3-D models just as quickly as the person wielding

0:09:030:09:06

it's legs will carry them.

0:09:060:09:10

And while this technology has been designed for industrial use,

0:09:100:09:13

there's a certain beauty to the images it creates.

0:09:130:09:18

Hello and welcome to The Week in Tech.

0:09:180:09:31

It was the week that the script for an unseen episode of Game

0:09:310:09:35

of Thrones, as well as those from other HBO shows, was leaked

0:09:350:09:38

online by a group of hackers.

0:09:380:09:44

An new version of Bitcoin was mined for the first time as the crypto

0:09:440:09:48

currency split into two.

0:09:480:09:49

And the US Navy's launched its first fighter jet powered

0:09:490:09:52

by electromagnetic energy.

0:09:520:09:52

The high-tech, high speed, Hyperloop One has

0:09:520:09:54

completed its first journey.

0:09:540:10:04

A test that propelled this pod through a tube

0:10:040:10:07

in the Nevada desert at 192 mph, edging closer to its eventual aim

0:10:070:10:10

of one day transporting passengers at speeds of up to 650 mph.

0:10:100:10:13

Meanwhile a security researcher managed to hack an Amazon Echo,

0:10:130:10:16

making it possible to remotely stream audio from someone's device.

0:10:160:10:19

The attack could only work on pre-2017 versions though,

0:10:190:10:21

and physical access to the Echo is needed first.

0:10:210:10:27

And finally the team behind the hand-held spray

0:10:270:10:32

printer painting device, which we showed you a couple

0:10:320:10:35

of months ago, have developed a robotic version that made it

0:10:350:10:38

possible to paint this giant masterpiece on an abandoned power

0:10:380:10:41

station, using five different colours at once.

0:10:410:10:43

The sky's the limit.

0:10:430:10:48

Last week Kate and Dan were in Vegas at the meanest,

0:10:540:10:58

baddest Hackers Expo on the planet.

0:10:580:11:02

Well this week one of those hackers, Scott Helm, has offered to give

0:11:020:11:06

us his view of what goes on in Vegas during one crazy week each year.

0:11:060:11:10

I'm Scott Helm, here to give you a 101 to Black Hat,

0:11:100:11:13

BSides and DEF CON, which all happen during one crazy week in Las Vegas.

0:11:130:11:22

This is a very, very popular course, we've got some of the latest stuff

0:11:240:11:28

that we've found in our own hacking that we do for clients

0:11:280:11:31

and we put it into the class.

0:11:310:11:33

The good guys have got to learn it because the bad guys already do.

0:11:330:11:37

I've embedded some code into the page and then when you load

0:11:370:11:40

the page it puts that message up, that it's not supposed to do.

0:11:400:11:44

It was a nice introductory level course.

0:11:440:11:46

It was a nice introductory level course.

0:11:460:11:48

So obviously this could be used for harm and the flip side of this

0:11:480:11:52

is, if you were setting up to be a cybercriminal would you come

0:11:520:11:56

to a formal conference like this and register to do a training course

0:11:560:11:59

under your name?

0:11:590:12:00

Or would you go and learn how to do this on the dark web somewhere else?

0:12:000:12:04

I don't think we would really expect to see criminals coming

0:12:040:12:07

here to learn how to be criminals.

0:12:070:12:10

So we are in the vendor hall right now.

0:12:100:12:13

This is where all the different companies have their stands,

0:12:130:12:16

they can demo their products.

0:12:160:12:17

This represents what they do inside your network,

0:12:170:12:19

in that an attacker now doesn't know where the real target

0:12:190:12:22

is and which one to attack.

0:12:220:12:24

I don't know where to look.

0:12:240:12:25

Tell me if I'm doing it wrong.

0:12:250:12:27

This in the front?

0:12:270:12:28

Hang on, wait a minute...

0:12:280:12:30

One, two, three, go!

0:12:300:12:31

Top three tips?

0:12:310:12:33

We're in the desert, drink plenty of water.

0:12:330:12:35

Get a goodie bag and fill it with swag.

0:12:350:12:38

And don't use the Wi-Fi.

0:12:380:12:39

So we've just checked in B-Sides, I have my bag, everyone that attends

0:12:450:12:48

the conference gets a little bag of goodies so we're just

0:12:480:12:51

going to take a look.

0:12:510:12:53

Got a few stickers here, the little Hawaiian necklaces,

0:12:530:12:55

a BSides beach towel.

0:12:550:13:02

It's very corporate, it's very kind of official and formal.

0:13:020:13:05

This is like a much more relaxed setting, it's much more enjoyable.

0:13:050:13:08

The opening key note is taking place just behind me,

0:13:080:13:11

and we're going to go and take a look around the vendors around

0:13:110:13:14

the outside of the chill out room.

0:13:140:13:16

Scott, what did you just do?

0:13:160:13:18

So, the Wi-Fi network here is monitored,

0:13:180:13:20

and the screen behind me shows you things that people

0:13:200:13:23

are doing on the network.

0:13:230:13:25

So we managed to just get the BBC Click logo and Rory

0:13:250:13:28

up on the big screen.

0:13:280:13:29

This is a tool called a doppler.

0:13:290:13:31

The whole idea is it's analysing the network,

0:13:310:13:33

and then carving out images real time, and displaying them up

0:13:330:13:36

for everybody to see.

0:13:360:13:37

So anything that anybody is looking at on the network,

0:13:370:13:40

we can see as well.

0:13:400:13:42

I found some friends.

0:13:420:13:44

I found some ex-colleagues of mine from England.

0:13:440:13:46

So which talks are you going to?

0:13:460:13:48

I'm going to the banking on insecurity nets,

0:13:480:13:50

which you are banned from.

0:13:500:13:51

As members of the press.

0:13:520:13:55

Yes, so being members of the press at BSides,

0:13:550:13:57

we can't go into the underground track, which is no

0:13:570:14:00

press, no filming.

0:14:000:14:01

Most people don't even use their real names in the schedule,

0:14:010:14:04

and unfortunately we're banned, we can't go in there.

0:14:040:14:06

It's like a party in here.

0:14:060:14:15

I can't hear anything.

0:14:150:14:18

It's a tech conference, it's a hacker conference.

0:14:180:14:20

People often think it might be less sociable,

0:14:200:14:22

but this is where most of us do our networking.

0:14:220:14:26

We're in the middle of filming and somebody has just hacked the PA

0:14:260:14:29

system in the hotel.

0:14:290:14:30

Yes. Thank you.

0:14:300:14:40

We made it, we got one.

0:14:400:14:41

Effectively, this badge is like a tiny computer,

0:14:410:14:44

and I can make it do like really cool stuff.

0:14:440:14:47

Flames.

0:14:470:14:49

Yeah, we have come to the chill out zone just to take a little break.

0:14:490:14:56

I bumped into an old work colleague and friend of mine, Andy.

0:14:560:14:59

He's a goon here, at DEF CON this year.

0:14:590:15:02

Most people probably won't know what being a goon is, so...

0:15:020:15:04

So being a goon is basically the enforcement of fun.

0:15:040:15:07

So we were walking the corridors earlier today, and we heard some

0:15:070:15:11

numbers being thrown around, in the region of 50-60,000

0:15:110:15:13

attacks a day are launched against the DEF CON network,

0:15:130:15:16

is that accurate?

0:15:160:15:19

It's what you would expect of a hacking conference's network.

0:15:190:15:21

There's no official challenge, but hackers going to hack.

0:15:210:15:24

Federal agents attend the Conference dressed in plain clothing.

0:15:240:15:26

There's 30,000 people here.

0:15:260:15:27

It's easy for them to blend in, and there's a running competition

0:15:270:15:31

every year to try and spot and identify federal agents.

0:15:310:15:39

My guesses would be they're looking out for people they may

0:15:390:15:42

need to keep an eye on, and the other side of

0:15:420:15:45

that is talent acquisition.

0:15:450:15:46

So we were watching somebody get their first implant.

0:15:460:15:49

Are you nervous?

0:15:490:15:59

Yes, a little bit.

0:15:590:16:00

I'm kind of wondering, how much it will hurt.

0:16:000:16:03

Oh, that felt weird!

0:16:030:16:04

I am going for the NFC chip.

0:16:040:16:06

I'm going to apply a little bit of pressure.

0:16:060:16:08

It was literally like something poking around inside my hand.

0:16:080:16:11

My front door lock at home, I'm going to replace

0:16:110:16:14

it with an NFC lock, and it will sense the chip in my

0:16:140:16:17

hand and unlock my door for just me.

0:16:170:16:19

When you're at DEF CON, you just never know

0:16:200:16:23

what is going to happen next, it could be a complete surprise.

0:16:230:16:25

Welcome, gentlemen.

0:16:330:16:35

It's through here.

0:16:350:16:37

Scott and I have been exclusively invited for a first

0:16:370:16:40

look at this black box.

0:16:400:16:56

A box allowing anyone to go undercover on the net.

0:16:560:17:08

So what we have created is a VPN and Wi-Fi hotspot

0:17:080:17:11

which is the size of a match box.

0:17:110:17:13

What it also has the ability to do, is mask your location

0:17:140:17:17

and the person you might be communicating with's location.

0:17:170:17:19

Additionally, we have the ability to take this VPN and connect it

0:17:190:17:26

to a server, your laptop, a desktop, a smartphone

0:17:260:17:28

or any IOT device.

0:17:280:17:37

It's so new, the company doesn't even know what they are

0:17:370:17:40

going to call it yet.

0:17:400:17:42

A few days ago, it bought up start up Casala, which makes the box,

0:17:420:17:45

a new version of which Silent will put on sale in

0:17:450:17:48

the next few months.

0:17:480:17:49

There are other boxes like this out there -

0:17:500:17:52

Shellfire, for example, and VPN software for routers, though

0:17:520:17:54

these can be fiddly to set up, but this nameless cube comes

0:17:540:18:12

from a recognised brand.

0:18:130:18:14

Silent Circle made its name with the Blackphone,

0:18:140:18:16

the first, it's claimed, to be built with security in mind

0:18:160:18:19

from the ground up and NSA proof.

0:18:190:18:21

The box's launch could be of the moment, as Apple succumbs

0:18:210:18:24

to Chinese Government pressure to withdraw VPN apps

0:18:240:18:26

from its online store last week - the very ones that would allow users

0:18:260:18:30

to circumvent China's great firewall.

0:18:300:18:31

Big claims come with the box, but Silent Circle is being

0:18:310:18:34

Secret Squirrel about how they work.

0:18:340:18:36

What is Government grade encryption, exactly?

0:18:360:18:37

No answer.

0:18:370:18:38

And will its estimated $500 plus price tag be

0:18:380:18:40

justified by the claim it's completely snoop free?

0:18:400:18:42

We have specifically designed a device to not allow anyone

0:18:420:18:45

in the outside world, or our company, to access any

0:18:450:18:48

of the data or box itself.

0:18:480:18:49

Our response to any Government inquiry is to push it

0:18:490:18:52

back to the end user.

0:18:520:19:01

After the exclusive reveal to Click, was our security

0:19:010:19:04

man Scott buying in?

0:19:040:19:05

It offers the same level of security as any VPN provider in that

0:19:050:19:08

from you to the VPN end point you are secure.

0:19:080:19:11

As the provider, though, the service provider,

0:19:110:19:13

they have the ability to inspect and monitor your traffic.

0:19:130:19:25

So they do.

0:19:260:19:26

They can intercept it?

0:19:260:19:28

Yes, they are the service provider, they have to be able to see

0:19:280:19:31

the traffic because they're handling it and routing it.

0:19:310:19:33

It would be down to them to choose not to do that and respect

0:19:330:19:37

their customer's privacy.

0:19:370:19:38

Which, for a firm like Silent Circle, I think we could have

0:19:380:19:41

faith in them that they wouldn't do that, but at a purely

0:19:410:19:45

technical level that is a capability they have.

0:19:450:19:47

We went back to Silent Circle, which told us that it was able

0:19:470:19:51

to monitor customers' traffic, but added it would only hand over

0:19:510:19:54

data to a government if forced to by law.

0:19:540:19:56

This room is full of people trying to break the encryption

0:19:560:19:59

we rely on every day.

0:19:590:20:02

But in the next 15 years or so, these clever exploits might be

0:20:020:20:06

superseded by a new type of computer that can breakthrough current

0:20:060:20:09

security barriers 100 million times faster than even the fastest

0:20:090:20:11

supercomputer in use today.

0:20:110:20:20

With this new threat comes a new type of encryption that

0:20:200:20:23

using particles of light and makes it impossible for for hackers

0:20:230:20:26

to cover their tracks.

0:20:260:20:31

The Chinese government think this tech is so important,

0:20:320:20:34

it's already testing satellites in orbit.

0:20:340:20:36

During the next three minutes I'm going to explain this futuristic

0:20:360:20:57

technology using ice-cream.

0:20:570:20:58

Because - well, why not?

0:20:580:20:59

Today's computers send data using electricity,

0:20:590:21:01

which can only exist in two states.

0:21:010:21:03

On or off.

0:21:030:21:04

One or zero.

0:21:040:21:04

Quantum technology uses quantum bits, or qubits.

0:21:040:21:06

In one form, these can be particles of light,

0:21:060:21:09

smaller than an atom, which, like conventional bits,

0:21:090:21:11

can be a one or a zero, but they can also be both

0:21:110:21:18

at the same time.

0:21:180:21:19

To understand why, you would have to understand quantum physics, and -

0:21:190:21:23

well, good luck with that.

0:21:230:21:36

For the rest of us mere mortals, all we'd to know is because of this

0:21:360:21:40

while a collection of regular bits can represent only a single number

0:21:400:21:43

at one time, the same number of qubits can

0:21:430:21:46

represent many numbers.

0:21:460:21:46

Making them vastly more complex and powerful.

0:21:470:21:48

Another feature of quantum physics is that the mere act of observing

0:21:480:21:52

a particle changes its state.

0:21:520:22:04

And that is the really important thing for cyber security.

0:22:040:22:07

It makes it physically impossible for a hacker to hide the fact

0:22:070:22:10

they have looked at the data, because doing so changes

0:22:100:22:13

it permanently.

0:22:130:22:13

So, if I want to create a secure communications link with Scott,

0:22:130:22:17

I send him a quantum key that only he and I will know.

0:22:170:22:20

I don't need to lock the box I send it in,

0:22:200:22:23

because if someone intercepts it and looks inside,

0:22:230:22:25

its state will change.

0:22:250:22:30

When the key reaches Scott, he will know it's been hacked,

0:22:300:22:33

so we can throw it away, and try again until it

0:22:330:22:36

gets through safely.

0:22:360:22:37

We will then know we have the only two copies of a completely secret

0:22:370:22:41

quantum key, to unlock encrypted messages between us,

0:22:410:22:43

making them incredibly secure.

0:22:430:22:54

Until recently quantum communications was limited to hops

0:22:540:22:56

of a couple of kilometres at a time because light signal breaks down

0:22:560:23:00

when travelling great distances through fibre cables.

0:23:000:23:01

Much like I would if I had to walk all the way back to Vegas in this

0:23:010:23:06

heat without taking a break.

0:23:060:23:07

But last month, the Chinese reported successful tests covering 1,200

0:23:070:23:10

kilometre using a dedicated low orbit satellite.

0:23:100:23:12

North America, European, Australia and Japan are other big

0:23:120:23:14

players in the race.

0:23:150:23:16

Given the development in the last five years,

0:23:160:23:18

it's impressive to see how much better the systems have got

0:23:180:23:21

and how much more powerful the technologies have become,

0:23:210:23:23

so it's not impossible, in my opinion, we could

0:23:230:23:26

have a quantum computer in the next five to ten, or maybe 20 years.

0:23:260:23:29

It's an exciting advance, and has massive implications

0:23:290:23:39

for securing channels that carry sensitive information,

0:23:390:23:41

like banking or health records.

0:23:410:23:42

It could even revolutionise democracy, as it opens

0:23:420:23:44

the possibility of digital voting, in way that cannot be tampered

0:23:450:23:47

with without someone knowing.

0:23:470:23:48

That's our team in Las Vegas, demystifying some of the darker

0:23:490:23:52

realms of cyber security and the sort of things we might be

0:23:520:23:55

talking about in the coming years.

0:23:550:23:56

And you will find plenty more on hacking, privacy and security

0:23:560:23:59

at our website and on our social media, as part of the BBC's

0:23:590:24:03

cyber hack season.

0:24:030:24:07

You can follow us on Twitter, at BBC Click and Facebook too.

0:24:070:24:11

Thanks for watching and we'll see you soon.

0:24:110:24:27

Thanks for watching and we'll see you soon.

0:24:270:24:35

Whatever you have in mind this particular weekend,

0:24:350:24:37

be it some rest for some play or for some, just more work,

0:24:370:24:41

Download Subtitles

SRT

ASS