Quantum Light Introduction

We are at the threshold of a real revolution in computer technology, one that will literally change how our society currently functions and interacts with the machines and systems we operate now in ways we can only imagine.

This technology is quantum computing and its key aspects, namely security. This computing system is so named for it operates on the very foundations and principles of quantum physics. Utilizing the seemingly magical properties of the quantum state in our macroscopic world, quantum computing offers the ability to store data in quantities that may seem as unbelievable to us as a modern laptop holding terabytes of information would to someone at the start of the Computer Age in the mid-Twentieth Century.

Protecting the New Gold Standard: Information

In the often prescient 1992 film Sneakers, the character of Cosmo explains what has become the true ultimate commodity of the modern technological era:

“The world isn’t run by weapons anymore, or energy or money. It’s run by ones and zeroes, little bits of data. It’s all just electrons.

“There’s a war out there, old friend, a world war. And it’s not about who’s got the most bullets. It’s about who controls the information …what we see and hear, how we work, what we think. It’s all about the information.”

Our civilization runs on information of all sorts every second of every day. Most of this information is now stored, analyzed, filtered, and run through our elaborate systems of computers and the networks that deliver and collect them.

While much of the information our society needs to function is widely available, there is also a plethora of data that requires being protected for reasons ranging from personal privacy to national security. While current computers have a wide range of methods to secure the information placed on them, it is not always enough. Someone always seems ready and able to find a way to break through even the most sophisticated security cyphers and codes.

Quantum computers can change all this. Using the rules of quantum physics, more information could be stored on such a system than would ever be possible on a machine in the macrorealm. These same physics can also provide encryption protection that would make it virtually impossible to decode or otherwise break both stored data and its transmission from one computer system to another.

This medium is new and pioneering. There are many obstacles to overcome. Nevertheless, quantum computing and cryptography are real and offer possibilities that could transform our world and our species in ways we now only think of as science fiction.

Quantum Light is leading the way in this incredible tomorrow.

Learn how here.

Quantum Light Article by Lawrence Klaes


A New Age of Optical Cyber Security

Can you Imagine if we could use the Laws of Physics to create perfect cyber security? What if we told you a small start-up company based in the United Kingdom and Europe has developed such secrets? What if together we could protect our digital world and enable the next generation of cyber security?

Are you ready for perfect cyber-security?

Today, our world-wide-web or Internet cannot be effectively secured from hacking, while most embedded IoT devices remain unprotected and open to hacking in the Internet-of-Things. Therefore, we propose to deploy and scale our IoT secure end-to-end system platform. Quantum Light has created “Light Key” a pervasive 2nd factor of authentication service that exploits the natural properties of light and is to be delivered as an IBM Business Partner product.

The Founder of Quantum Light has worked on different kinds of wireless optical communications systems for the last 18 years, and has recently validated our technical theory and demonstrated our prototypes at the Cavendish Laboratory in Cambridge University as part of the amazing Impulse Program for technology innovators. We are now able to use the Laws of Physics in order to create “perfect optical cyber security” in a revolutionary and disruptive “game-changing” way. This is a remarkable new invention.

Quantum Light is the best option for Internet security. Our first product and API application uses our technology to secure an entirely innovative and new kind of Financial trading platform that is virtually unhackable. After you visit our product link below, please read on to find out more about LightKey and how we are using it to secure the Internet with our LightKey technology.

Summary of Internet-of-Things Vulnerabilities

The security architecture of the Internet’s TCP/IP packet and DNS routing networks has largely been exceeded in terms of current capabilities to secure the Internet-of-Things. It may come as a shocking suprise to you, or you may be well aware – depending on the level of your technical expertise and cyber security experience. But look around, everything is vulnerable to hacking.

  1. Network traffic of encryption keys and sensitive plaintext credentials.
  2. IoT data firmware updates are not generally encrypted before upload.
  3. Firmware exposed in unencrypted network traffic transmissions.
  4. Identity of servers exposed by TCP/IP protocols for authentication.
  5. Misconfigured SSL/TLS by many network users leave open ports
  6. Credentials at risk by downloadable MCU/CPU firmware extraction.
  7. SQL injection, cross-site scripting, request forgery, TLS implicit trust.

The Internet-of-Things is highly vulnerable to hacking threats. This is due to the fact a number of structural vulnerabilities exist – some still “zero-day” and others were inadvertently incorporated into the architecture for example of x86 chipsets. Many computer processors can be accessed via MINIX-3 types of utilities in order to easily obtain plain-text user-credentials dumps, directly from most types of x86 chipsets and exposing many mission critical devices to hacking threats. Basically, the Internet is fundamentally hackable. The good news is that we can do something about it together.

Quantum Light research estimated figures

Billions Growth Millions
Internet Users Worldwide 3.773 10% 354
Social Media Users 2.789 21% 482
Unique Mobile Subscribers 4.917 5% 222
Social Media Mobile Users 2.549 30% 581

When it comes to “mission critical” assets (like cars) the risk posed by fundamentally insecure wireless communications is magnified and given the more realistic “threat model” of comprising user credentials on-line, instead of the very hard wireless brute-force hacking threat model being used by Automotive companies in their “penetration testing” and in order to falsely assure consumers.

The typical “connected car” even at level 1 of automation presents over 16 attack vectors and has in excess of 100 microprocessor ECU components available to hack. The most worrisome “threat-model” is that of compromising user-credentials on-line and this has been manifest by an increasing number of “connected car” robberies and car hijackings using user compromised-credentials from typical hacks of mobile or laptop devices. In addition, the automotive industry is ill prepared to respond to this threat, as the “controller area network” (CAN) of cars is wide-open by necessity since there are no standards among many participants in the OEM electronics make-up of modern cars.

Quantum Light Ltd – Cyber Security Solutions for IoT

LightKey (TM) is our Optical 2nd factor of authentication service for end-user devices delivered via an API (software cloud service) which utilizes the LED in most mobile and other types of user devices.

AEBIS” or “Autonomous Electronic Blockchain Information System” is an independent vehicular computer that is designed to address the architectural flaw of current automotive ECU electronics – which have NO protection, nor are they able to ever have one, for existing vehicular fleets. OEM and manufacturers may one day solve this problem by introducing new integrated systems from the factory. We are most interested in the existing vehicular fleet that is currently not compliant with existing and prospective EU and UK legislation. Our products are available as easy retro-fit installations for legal compliance and deliver the functionalities and software certifications required by current 2018 Electric and Automated Vehicle Act.

IBM Registered Business Partner mark
The IBM logo and the IBM Registered Business Partner
mark are trademarks of International Business Machines
Corporation, registered in many jurisdictions worldwide

Maxwell Centre’s Impulse Program

Impulse Program for Tech Innovators
Maxwell Centre – Cavendish Laboratory, Cambridge University

“Chance encounters make amazing ideas possible”

Quantum Light and Helios Energia are proud Alumns of the 2018 program. The Impulse Entrepreneurship Programme at the Maxwell Centre serves as a catalyst for entrepreneurship in individuals and organisations. Impulse is an exciting opportunity of collaborations for innovators and entrepreneurs from a variety of disciplines, industries and countries who are passionate in helping a new generation of science and tech entrepreneurs succeed.

The programme is targeted to tech innovators across different fields of Physical Sciences and Technology, including Life Sciences. Through Impulse, the participants will get the opportunity to develop commercialisation strategies for their novel ideas and receive additional follow-up mentoring and master classes. They receive expert advice and mentoring from successful entrepreneurs, innovators and investors, and benefit from networking with over 80 contributors from the Cambridge entrepreneurial community and Maxwell Centre’s industry partners. Develop high-potential business cases Provide expert-mentoring Relevance to individual projects Learn directly from 80+ entrepreneurs, innovators, investors and industry experts Intense but time-limited, steep learning-curve experience.

The programme is comprised of two intensive residential modules and individual assignments in-between over a period of three months. Both mentoring and regular clinics (one-to-one discussions with business professionals) happen over three months.

Maxwell Program Overview Video