Tuesday, July 1, 2025

The quantum network is more secure but harder to make than a binary network.


"The universe now has an open, quantum-powered dice roll—free, provable, and ready for anyone to use. Credit: Shutterstock" (ScitechDaily,Spooky Action, Real Results: Turning Quantum Weirdness Into Secure Random Numbers)


"NIST’s CURBy beacon transforms quantum “spooky action” into certified random numbers, guarded by a blockchain-like Twine protocol and broadcast for public use—from jury selection to cryptography."(ScitechDaily,Spooky Action, Real Results: Turning Quantum Weirdness Into Secure Random Numbers)

Researchers created an 11-mile (17,7 km.) long quantum wire that transports data between two systems. This kind of thing makes quantum systems interesting. That photonic quantum highway is the beginning of the more powerful quantum computers and high-power and secure data transmission. 

Because data that is stored in the photon that travels in the network must be well protected, these kinds of experiments act as pathfinders for many other systems like antimatter tools and antimatter and ion weapons. The key element in successful quantum data transmission is that the photon will not interact with quantum fields. 

And the walls of the quantum channel. The same technology is suitable for transporting antimatter particles like positrons and anti-protons. Those tracks can also make it possible to transport antimatter particles to the rocket engines or across the air to selected targets. 

The main difference between quantum and regular networks is this: In quantum networks data that travels in the quantum network is connected with physical particles. The quantum network requires systems that can turn the data that travels in the network into a universal form. And the second thing is that data that travels in the quantum network must be protected. 

The main problem is how to use one quantum channel for transporting multiple data types with multiple destinations. Without the ability to deny data that doesn’t mean anything, that system will turn very busy. The GSM system can send data packages to multiple receivers and guarantee privacy with simple tricks. Every data package that travels in the GSM network is equipped with a small code. 

That code opens the lock to the precise right receiver. At the beginning of the data transmission, the GSM systems like cell phones make key exchange operations. In those processes, those systems exchange keys that allow only selected receivers to open those data packages. The process itself has three stages. First, the transmitter sends a query to the general broadcast address. There, the transmitter asks if the receiver is in the net. Then those systems start to communicate using fixed keys. And in the final step, those systems start to use single-use keys. When data transmission is over those single-use keys will be crushed. 

That should secure privacy. And the other thing is that it makes the receiving system’s operations easier. The meaningless data stays out of the gate because the receiving system rejects that unnecessary data. If that process is done in the system itself that will require lots of data capacity. The system uses single-used keys in that process. The random number generator will make those prime numbers that those GSM phones use in data transportation. The quantum system also requires random numbers. 

The main problem is that the simplest possible quantum systems where the transmitter sends the wire or frequency where it sends data the hijacker can steal data is that the hostile operator knows the data line. The random number generator allows us to solve the right frequency. The random numbers are required in short-term keys. The main problem with the normal random number generators is that they can create virtual random numbers. Those virtual random numbers are generated with computers that use certain types of calculation series. And if the attacker can have the source code for those generators they can break the entire system.

The system must have the capacity to see the right data transporters or qubits before they reach the receiving sensor. That system must have the capacity to aim the wrong qubits, or qubits that involve the wrong dataset to another track. 


https://scitechdaily.com/researchers-build-11-mile-long-quantum-highway-using-photons/


https://scitechdaily.com/spooky-action-real-results-turning-quantum-weirdness-into-secure-random-numbers/



China and Russia boost hypersonic technology.


"Illustration of the Feitian 2 hypersonic vehicle demonstrating advanced flight capabilities. Image generated by AI." (Rude Baquette, “China Just Went Hypersonic”: Feitian 2 Test Stuns the World With Blistering Speeds That Could Redefine Global Airpower)



The Chinese hypersonic jet makes a great advance in flight and it will revolutionize commercial- and military operations. The Feitian 2 drone is a great advance for hypersonic missiles and aviation technology. That drone launched from a spaceport using a regular rocket and that system gives more information about how to solve problems that the hypersonic systems face when they travel across the atmosphere. Those systems are ultimate tools for use against ships and hardened targets. The Mach 10 capable missile that flies at quite a low altitude is a hard target for defense. Those systems can use stealth technology and those smooth shapes that the hypersonic systems need are suitable for stealth systems. 

The hypersonic cruise missile can jump out of the atmosphere and then dive back. That allows them to ignite scramjet engines. If those hypersonic missiles are quite small, they can be installed on the ballistic missile along with regular warheads. So in that kind of system, the hypersonic missile can strike with regular warheads. The thing is that the hypersonic systems can also use regular rocket engines. The thing that makes them dangerous is this. They create very strong pressure cones. And that cone can also cause damage. The kinetic energy system doesn’t require a warhead at all. When a 1000 kg vehicle hits a target with speed Mach 10 it causes a very strong impact. 


"Illustration of the Oreshnik hypersonic missile, a key element in Russia's military strategy. Image generated by AI."(Rude Baquette, Illustration of the Oreshnik hypersonic missile, a key element in Russia's military strategy. Image generated by AI)



The real strike capacity of the Oreshnik missile depends on the warheads. If those warheads are designed to act as hypersonic gliders, HGS or that system carries scramjet-driven cruise missiles that can be very powerful weapons. Those HGS systems can look a little bit like spearheads. And that gives them the smooth flight profile that allows those systems to strike with variable angles. 

For comparison, the GAU-8 Avenger cannon’s uranium ammunition hits targets with a speed of Mach 1,5 and that is enough to destroy the main battle tank. So what if the Mach 10 drone is equipped with GAU-8? The normal muzzle velocity for that ammunition is 1,013 m/s. And the aircraft's speed increases at the same rate as the aircraft travels.  When that ammunition takes Mach 10 speed with it that rises the muzzle velocity to a level that is many times higher than if it is connected to an aircraft that travels at 600 km/h That thing gives extremely powerful impact energy to that ammunition. So what happens if Mach 10 aircraft open fire with GAU-8 against the city? 

The Russian researchers are working with a new Mach 10 missile called “Oreshnik”. The weapon is classified as an IRBM (Intermediate range ballistic missile. That thing makes them easier to install on mobile launchers than the strategic missiles. The missile itself finds targets independently. There is also the possibility of creating hypersonic cruise missiles or hypersonic gliders for the larger missiles. 

Those missiles can destroy ships and ground targets from a great distance. Strategic anti-ship missiles that can attack targets from thousands of kilometers are frightening tools. Those systems are following the Russian doctrine where political security is in the primary role. Hypersonic missiles that lay in silos or mobile launchers are always under the observation of the security troops. The long-range anti-ship missiles can threaten NATO surface battle units and convoys. Basically, the RS-28 (Sarmat) or older RS-36 (SS-18 “Satan”) can carry those missiles against the fleet and other targets like command centers. 

https://www.euractiv.com/section/politics/news/russia-could-launch-another-hypersonic-missile-at-ukraine-soon-us-official-says/

https://www.rudebaguette.com/en/2025/06/china-just-went-hypersonic-feitian-2-test-stuns-the-world-with-blistering-speeds-that-could-redefine-global-airpower/


https://www.rudebaguette.com/en/2025/06/putin-orders-mach-10-missile-surge-russia-escalates-hypersonic-arsenal-with-terrifying-new-strike-capabilities-ready-for-deployment/



The quantum network is more secure but harder to make than a binary network.

"The universe now has an open, quantum-powered dice roll—free, provable, and ready for anyone to use. Credit: Shutterstock" (Scite...