Social leakage and information security problems are growing fiercer in the era of Big Data.
Since 2015, big data has swept the world, plenty of users’ information data is stored and flowed in the network, and the information security leakage events are increasing day by day. Globally, in the first half of 2016, the total number of data leakage increased by 15%, the number of data breaches disclosed was up to 974, and the total number of data breaches exceeded 554 million. In China, the survey report of Internet users’ rights protection shows that 37% of Internet users suffered financial losses due to various types of deceitful messages, and 84% of Internet users were adversely affected by the disclosure of personal information in 2016.
In January 2016, 320 thousand users’ data information of Time Warner, a US cable television company, was stolen.
In April 2016, a major data breach occurred in Turkey, and the personal information of President Erdogan was actually sold on a dark web platform.
In May 2016, ultra 65 million mailbox accounts’ password of the United States light blog site Tumblr was leaked
Up to 65,469,298 email accounts and passwords were revealed in Tumblr, a light-blog site in New York City. The leakage started as early as 2013, but it was not until 2016 that Tumblr discovered the flaw. According to a hacker group that launched the cyber attack on Tumblr, Tumblr uses the SHA-1 algorithm in user data, which is not highly secure. It is the underlying flaws of its traditional mathematical algorithms that make Tumblr’s data security even worse.
In May 2016, A surpassed 167 million accounts of LinkedIn was sold on the black market
On May 19th, 2016, LinkedIn, a professional social networking site in the United States, announced that hackers publicly sold 167m LinkedIn users’ log in information with 5 bitcoin($ 2,200) in the black market, of which 117 million accounts include both email and password.
In early June 2016, user account data leakage of MySpace has become the worst data leakage of Internet history
MySpace, the world’s second-largest social networking site, had 360 million user accounts and 427 million accounts’ password for sale on the dark web at a price of 6 bitcoin($ 2,800),making it the largest Internet password leakage event in the Internet history.
In November 2016, 1.6 million users of PayPal were hacked
PayPal found that there were hackers visited a server that stored information for 1.6 million users.
An average of 10.5 million records were stolen each day due to the breach of the encryption algorithm. Data stolen in the first half of 2017 alone exceeded the total amount of data stolen in 2016. More alarming and frightening data security and disclosure incidents are taking place:
In America, artificial intelligence can capture information on social software to simulate real people
In the United States, Eterntime has developed a suite of AI-like programs that combine data-based intelligence with artificial intelligence based on the individual’s previously published information on social media, person’s picture and his idea which could create another “he or she “to interact with relatives and friends, it sounds terrifying.
Website security hole and social networking software are the culprit of serious information disclosure
From the source, in the era of Internet, diversification of data presentation mode and information channels, every operation we conduct on the Internet through computers, mobile phones and other electronic devices is recorded by the server and all our privacy is exposed, and the interest chain which constitute by illegal access of data, online peddling and even the unauthorized use of information, also,the personal information in social networking sites has become a major focus of business gaming in the era of big data.
At present, most websites of design platforms require and encourage the real-name register system. When registering, the website requires you to fill in your name, gender, birthday, location, and email address in detail to ensure that individual information’s authenticity and accuracy.Though most websites are very different in positioning, goals, and implementation，but the fundamental purpose of social networking is to provide users with a platform for online interaction. Whether it is the MSN, QQ of PC era, or the WeChat and Facebook of the mobile phone era.Due to the network propagation restrictions of this two communication generations, most of the information are exposed in the format of text which could be stored for a long time, and its encryption algorithm can be easily intercepted by targeted attacks or collected by brute force to steal and utilize it.
The first is: Users have a “user profile” that represents their online identities and as a basis to interact with other users. For example, QQ Zone, Blog, WeChat; In this situation,personal information has a decisive role, and online relations has backed to a second place.
The second is: online record / share websites, such as Red, douban; the user will focus more on reading / share. In fact, personal information can be found and exploited even if it is “completely hidden” as most social networking websites have vulnerabilities.
At present, software encryption can be used to protect information security. Although it is difficult to crack, will have faster but the password deciphering will get a faster method due to those hackers’ high-performance workstation computers and cloud-cracking technologies, or future quantum computers. Therefore, the current communication technology security has irreparable defects.
How to prevent information leakage in the era of Big data? Quantum communication is the only way!
“Because the encryption key of traditional communications are based on sophisticated mathematical algorithms that people can crack by computing as long as they are encrypted by algorithms, the only cryptosystem that has proven to be” absolutely secure “in traditional communication methods is “One-Time Pad” which means the key is random and will only be used for once, also,it requires that the length of the key used for encryption should be the same as the length of the encrypted plaintext, so a large number of keys will be required to achieve this encryption standard. Of course, quantum communication technology, it can perfectly solve the security problems in the process of information transmission, and truly achieve”absolutely” security.
As a pioneer leader in the quantum field, its core founding team of NBG Group (New BLOCK GROUP) are all well-known scientists from Eastern Europe. They are the first team in the world to carry out theoretical research and technological development of quantum dots and quantum field theory. This team has proposed Quantum confinement effect, quantum energy transfer to standing wave and other subversive quantum ideas. After nearly a decade of in-depth research, NBG pioneered a One-Time Pad, random change, never repeated quantum bit code standard. Through this standard, the quantum key distribution is carried out, and the encryption rule is sent in the form of photon bearer to ensure that the key can be allocated between the two person A and B, and then, it can ensure the unassigned third party can not access the key content during the allocation process.
Because of the inseparability of photons. In the case of a single photon emission, the eavesdropper can not cut the photon in half and take half the key and transmit it to the receiver. Because photons can not be accurately reproduced, eavesdroppers can not obtain information by copying photons. Also,photons can not be accurately measured, so the eavesdroppers can not produce exactly the same photons by accurately measuring photons. The eavesdropper can not change one photon into exactly the same two photons, or can not read the photon information and then send out the photon again. An unknown quantum state is unique, and if the receiver receives the exact photon, then the eavesdropper can not get any information. Quantum Key uses a non-clonable quantum state to generate a binary code that establishes an unbreakable quantum secure communication for classic bits. The quantum communication password is randomly generated during communication and can not be tapped or cracked.
In the past, quantum has always been a tool of comparative competition at the national level. All the countries in the world have been competing in the fields of satellite, spaceflight, supercomputer and military deterrence, trying hard to establish their own quantum hegemony. NBG’s quantum technology research focuses more on civilian areas which aims at achieving openness, fairness, freedom and security. It plans to launch the world’s first civilian quantum communication tool “Gulu Gulu” by 2018, it is based on the Quantum Bit Code Standards, using pet block encryption, quantum key distribution and photon transfer encryption rules to achieve One-time Pad, random changes, never repeated, and it won’t in be controlled by operator in the field of personal accounts, data records and the game asset ownership, so it can not be changed, deleted and cracked, which could make it absolutely safe and permanent retention; and in the process of sharing and circulation, it is uninfluenced by one or any person as its automatic implementation and intelligent performance.
NBG will guide the creation of an absolutely secure information world, and open up a never-leakage data era
Gulu Gulu, a quantum communications tool based on such kind of safety standards, NBG will be the world’s first group which realize the absolute security and never leakage of personal information, account passwords, chatting records and transaction data. Also, the fiercer network data security problem and social information leakage problem will also be effectively curbed, and the horror brought by a fake person will cease to exist. Finally，a completely new era of secure social era will start! The fusion of quantum communication network and existing electronic communication network is the best development strategy. The concept of quantum mobile phones, quantum signatures, and quantum meters also begin to emerge. By then, social software, online bank, mobile payments, credit cards, etc., will bid farewell for being hacked or divulged.
In addition, Gulu Gulu’s quantum communication tool which based on the successful implementation of the absolute safe and reliable transfer of information and value streams, will affect and guide more and more areas in breaking the security barrier, and revolutionary changes will take place in areas such as secret data, bills, telecommunications, finance and cloud data area. Wall Street investment banking institutions expect that the scale of quantum communication is expected to continue to expand and flourish in various fields and have broad prospects for application in the future. By 2020, the scale of the quantum communication market will reach 21 billion yuan in China alone, of which the private network will be 10.5 billion and the public network 7.5 billion, and 3 billion in other fields. With the continuous penetration of quantum communication in various fields around the world, the potential market size for quantum encryption will reach over 100 billion U.S. dollars in 2020.
Company Name: FINANCE NEWS CO., LTD.
Contact Person: JANE SMITH
Address:SUITE 2701, 1398 MARKET STREET
State: PA 19100
Country: United States