


Meticulous quantum computing could pose security risks that are even greater than artificial intelligence.
In recent years, controversy surrounding the risks of artificial intelligence has been widespread. Tesla CEO Elon Musk once publicly warned that computer systems may possess human intelligence as early as 2029. If the government does not regulate and intervene in it, this technology may become mankind's "biggest existential threat." In fact, regardless of whether artificial intelligence technology can truly acquire autonomous thinking capabilities similar to those of humans, the negative effects of its application have already emerged: it has been widely used to illegally monitor public spaces, monitor social media, conduct deep fakes, and create lethal weapons. All have affected and harmed people's lives.
When mankind cannot effectively respond to the crisis of artificial intelligence, similar mistakes should not be allowed to happen again! But some researchers say there is a more powerful emerging technology that could cause even more serious damage - quantum computing. There is no doubt that quantum computing technology can bring benefits, but just like two sides of a coin, humans still do not know enough about the destructive effects it will cause. Quantum computing can be used for good as well as for evil. Even when used in good faith, potential security risks must be considered.
Quantum computing operates on a completely different basis than current semiconductor-based computing technology. With their ability to process large amounts of data quickly, quantum computers can easily crack private records, private communications and passwords on any computing device in the world. Especially once quantum computing is combined with artificial intelligence technology, this destructiveness will increase exponentially, and then the catastrophic consequences that Musk warned will most likely occur.
Although it is still in the initial stage of application, the whole society urgently needs to understand all possible security impacts of this technology before its large-scale application, and respond in advance. We must not repeat the past mistakes that were detrimental to the management and control of artificial intelligence technology. Recently, security experts from the Forbes Technology Committee discussed the risks that human society may face in the application of quantum computing.
Risk 1. Modern encryption methods will be ineffective
Today’s cryptography is to encode data in large number combinations, using regular It is impossible for computing technology to crack these passwords in a reasonable amount of time. But quantum computers may use quantum mechanics principles, such as superposition, entanglement and uncertainty, to crack encryption instantly through brute force. Any modern password or key can be compromised by a brute force attack and rendered useless, and the industry currently has no idea how to combat this problem.
Risk 2. Internet infrastructure will be disrupted
Since quantum computers can quickly crack current encryption keys, all existing Internet information transmission is at risk, and attackers can use quantum computers to intercept various data information transmitted on the network. When information transmission is no longer secure, the existing Internet infrastructure will be subverted.
Risk 3. DNN models are more difficult to evaluate
If quantum computing is used for machine learning to form enhanced quantum machine learning, it may It will bring about the ultimate security black box problem. It is well known that deep neural network (DNN) models are not transparent. Although there are tools to monitor how the algorithm layers in DNN are working, once quantum machine learning is implemented, it will become more difficult to evaluate the DNN and judge the decision-making process, which may cause the machine learning process and results to lose control.
Risk 4. Now encrypted data will be decrypted in advance
A new threat called "collect first, decrypt later" is This refers to an attacker's attempt to steal encrypted data and potentially hold the data for years so that it can be decrypted using future quantum computing technology. Because even years later, much of the encrypted content may still be valuable to attackers.
Risk 5. The cost of enterprise digitalization will further increase
The cost of quantum computing is a potential risk. In a recession, environmental, social and governance issues are top of mind for most organizations, and starting and maintaining quantum computing projects is expensive. Quantum computing power will be expensive for a long time to come, but organizations should carefully consider their reasons for adopting quantum technology before investing too much in the technology.
Risk 6. The digital divide is sharply widening
A huge social risk of quantum computing is the sharp widening of the digital divide. The high cost of quantum computing means that only institutions and organizations with financial capabilities can enjoy powerful computing power, which may be used to further widen the gap between rich and poor and undermine social equality. As quantum computing takes off, one risk companies may face is that competitors will use the technology to outdo themselves, as quantum computers will be able to solve problems that traditional computers cannot. This could lead to a kind of "arms race" in which companies are forced to Upgrade your system or face crisis.
Risk 7. Damage to ecological resources
The stable operation of quantum computing relies on helium cooling to keep particles static. However, helium is a very scarce resource, and both quantity and price in its supply chain are at risk. First, organizations must ensure that they have enough access to helium to maintain the operation of quantum computing equipment; second, due to the temptation of huge commercial interests, there is a risk that quantum computing resources will be monopolized and concentrated in a few privileged operators.
Risk 8. Blockchain technology will be cracked
The rise of quantum computing may bring new challenges to the emerging blockchain and cryptocurrency economy bring risks. Blockchain relies on asymmetric key encryption algorithms (RSA and EC). These algorithms can also be broken through quantum computing, leading to malicious manipulation of the blockchain. This is a significant risk for companies and consumers investing in blockchain technology.
Risk 9. Risk of amplifying existing security vulnerabilities
Quantum computing is expected to disrupt technology as we know it today due to its powerful computing power . The biggest risk is that quantum computing will bring unforeseen risks to today's computing systems, as attackers can use the new computing power to find previously undiscovered security holes. This will pose challenges to existing vulnerability management programs.
Risk 10. Increase the risk of military confrontation between countries
While quantum computing promises to solve extremely complex problems in today’s society, it can also Used maliciously by national governments in war. If some countries' militaries have access to quantum computing but another's cannot, this information asymmetry could put the latter at a disadvantage in a war. Once the balance of military power between countries is broken, the risk of global military conflict will increase.
The above is the detailed content of Meticulous quantum computing could pose security risks that are even greater than artificial intelligence.. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics



This site reported on June 27 that Jianying is a video editing software developed by FaceMeng Technology, a subsidiary of ByteDance. It relies on the Douyin platform and basically produces short video content for users of the platform. It is compatible with iOS, Android, and Windows. , MacOS and other operating systems. Jianying officially announced the upgrade of its membership system and launched a new SVIP, which includes a variety of AI black technologies, such as intelligent translation, intelligent highlighting, intelligent packaging, digital human synthesis, etc. In terms of price, the monthly fee for clipping SVIP is 79 yuan, the annual fee is 599 yuan (note on this site: equivalent to 49.9 yuan per month), the continuous monthly subscription is 59 yuan per month, and the continuous annual subscription is 499 yuan per year (equivalent to 41.6 yuan per month) . In addition, the cut official also stated that in order to improve the user experience, those who have subscribed to the original VIP

Improve developer productivity, efficiency, and accuracy by incorporating retrieval-enhanced generation and semantic memory into AI coding assistants. Translated from EnhancingAICodingAssistantswithContextUsingRAGandSEM-RAG, author JanakiramMSV. While basic AI programming assistants are naturally helpful, they often fail to provide the most relevant and correct code suggestions because they rely on a general understanding of the software language and the most common patterns of writing software. The code generated by these coding assistants is suitable for solving the problems they are responsible for solving, but often does not conform to the coding standards, conventions and styles of the individual teams. This often results in suggestions that need to be modified or refined in order for the code to be accepted into the application

Large Language Models (LLMs) are trained on huge text databases, where they acquire large amounts of real-world knowledge. This knowledge is embedded into their parameters and can then be used when needed. The knowledge of these models is "reified" at the end of training. At the end of pre-training, the model actually stops learning. Align or fine-tune the model to learn how to leverage this knowledge and respond more naturally to user questions. But sometimes model knowledge is not enough, and although the model can access external content through RAG, it is considered beneficial to adapt the model to new domains through fine-tuning. This fine-tuning is performed using input from human annotators or other LLM creations, where the model encounters additional real-world knowledge and integrates it

To learn more about AIGC, please visit: 51CTOAI.x Community https://www.51cto.com/aigc/Translator|Jingyan Reviewer|Chonglou is different from the traditional question bank that can be seen everywhere on the Internet. These questions It requires thinking outside the box. Large Language Models (LLMs) are increasingly important in the fields of data science, generative artificial intelligence (GenAI), and artificial intelligence. These complex algorithms enhance human skills and drive efficiency and innovation in many industries, becoming the key for companies to remain competitive. LLM has a wide range of applications. It can be used in fields such as natural language processing, text generation, speech recognition and recommendation systems. By learning from large amounts of data, LLM is able to generate text

Machine learning is an important branch of artificial intelligence that gives computers the ability to learn from data and improve their capabilities without being explicitly programmed. Machine learning has a wide range of applications in various fields, from image recognition and natural language processing to recommendation systems and fraud detection, and it is changing the way we live. There are many different methods and theories in the field of machine learning, among which the five most influential methods are called the "Five Schools of Machine Learning". The five major schools are the symbolic school, the connectionist school, the evolutionary school, the Bayesian school and the analogy school. 1. Symbolism, also known as symbolism, emphasizes the use of symbols for logical reasoning and expression of knowledge. This school of thought believes that learning is a process of reverse deduction, through existing

Editor |ScienceAI Question Answering (QA) data set plays a vital role in promoting natural language processing (NLP) research. High-quality QA data sets can not only be used to fine-tune models, but also effectively evaluate the capabilities of large language models (LLM), especially the ability to understand and reason about scientific knowledge. Although there are currently many scientific QA data sets covering medicine, chemistry, biology and other fields, these data sets still have some shortcomings. First, the data form is relatively simple, most of which are multiple-choice questions. They are easy to evaluate, but limit the model's answer selection range and cannot fully test the model's ability to answer scientific questions. In contrast, open-ended Q&A

Editor | KX In the field of drug research and development, accurately and effectively predicting the binding affinity of proteins and ligands is crucial for drug screening and optimization. However, current studies do not take into account the important role of molecular surface information in protein-ligand interactions. Based on this, researchers from Xiamen University proposed a novel multi-modal feature extraction (MFE) framework, which for the first time combines information on protein surface, 3D structure and sequence, and uses a cross-attention mechanism to compare different modalities. feature alignment. Experimental results demonstrate that this method achieves state-of-the-art performance in predicting protein-ligand binding affinities. Furthermore, ablation studies demonstrate the effectiveness and necessity of protein surface information and multimodal feature alignment within this framework. Related research begins with "S

According to news from this site on August 1, SK Hynix released a blog post today (August 1), announcing that it will attend the Global Semiconductor Memory Summit FMS2024 to be held in Santa Clara, California, USA from August 6 to 8, showcasing many new technologies. generation product. Introduction to the Future Memory and Storage Summit (FutureMemoryandStorage), formerly the Flash Memory Summit (FlashMemorySummit) mainly for NAND suppliers, in the context of increasing attention to artificial intelligence technology, this year was renamed the Future Memory and Storage Summit (FutureMemoryandStorage) to invite DRAM and storage vendors and many more players. New product SK hynix launched last year
