IT in 2109: Quantum Entanglement, Mini Black Holes and Nanotech: Part 1

What will the Information Technology world look like in a hundred years? Here are five predictions for the state of data transport, storage, e-commerce, and security in the year 2109. Each prediction is soundly based on our current scientific theories and understandings plus a healthy dose of imagination. I’ll be posting this as a two part series. The first part includes: Unhackable Payment and Identification Solution and Secure Spontaneous Data Transport. The second part includes: Secure Data Storage, Extinction of viruses, worms, and malware and Brain waves and bio-chips replace the keyboard and mouse. These predictions are the original work of myself and my buddy and fellow security collaborator Eddie Mize. The underlying premise we used to come up with these predictions is “How would a credit card transaction be secured, transmitted, and stored in the future?”. We used this premise to help guide our ideas and keep us focused on what the digital future just might look like in two generations!

Unhackable Payment and Identification Solution

Future credit cards, driver’s licenses, birth certificates, personal health information and even cash will be replaced by cell-based Nonomachine human implants. The implant and the systems it talks to validate and encrypt all information using the live tissue DNA code of its human host. Using the unique human genome/DNA code, or blueprint, as the security mechanism results in the creation of an ultra secure payment/information system.

The nanomachine implant communicates with scanners (store payment scanners for example) in the outside world using an ultra-violet beam of invisible light that penetrates through the skin. The light beam from the implant to the receiving scanner is encrypted using quantum encryption technology. The quantum scanner would be the replacement for today’s credit card swipe terminals. Quantum Encryption is an unhackable technology. A person would activate their nanomachine implant by simple thought. The implant would pick up these distinct brainwave patterns and activate its communication mechanism. Of course for this new system to be truly secure the implant would need to protect itself from intrusion and tampering. To that end the nanomachine implant would be able to detect a change in body temperature and detect human duress by monitoring brain wave activity that signals the subjects imminent death or incapacitation.

The nanomachine implant is designed to sample its human hosts blood stream every millisecond for a living DNA match. The nanomachine incorporates a monolithic comb drive, which makes it possible for the implant to defend against and detect a change in host DNA, viruses and other biological hacks against it. The self-defense mechanism of the Nanomachine can even use self-destruction as a last resort.

Secure Spontaneous Data Transport

In the future, data will be transmitted at near instantaneous speeds no matter the distance between the communicators. This is achieved by using technology that is able to transmit data at speeds of 10,000+ times the speed of light, almost approaching infinity. This radical new data transport technology is based on the theories of quantum mechanics mixed with the phenomenon of quantum entanglement. Wikipedia describes quantum entanglement this way:

Quantum entanglement is a quantum mechanical phenomenon in which the quantum states of two or more objects are linked together so that one object can no longer be adequately described without full mention of its counterpart — even though the individual objects may be spatially separated. This interconnection leads to correlations between observable physical properties of remote systems. When two members of an entangled pair are measured, one will always be spin-up and the other will be spin-down. The distance between the two particles is irrelevant.

Take a look at the second to last sentence in the quote; specifically “one will always be spin-up and the other will be spin-down”. Remind you of anything? Binary. The zero could be represented by the spin-up state while the one is represented by the spin-down state. This characteristic of quantum entanglement allows it to fit nicely into today’s binary centric digital computing world. So how do we create these pairs of quantum entangled particles for use in future data transport? Well first, here is the definition of how you assemble a pair of particles that are quantumly entangled:

When pairs of particles are generated by the decay of other particles, naturally or through induced collision, these pairs may be termed "entangled", in that such pairs often necessarily have linked and opposite qualities, i.e. of spin or charge.

So, what the quote above is basically saying is that all particles that come from the same source are connected to each other through a kind of quantum fabric. Now the problem is where can we find a single source of particles that all of the computers in the world can connect to for data transport? To give you a hint, this source would also provide a single source for all computers in our solar system. You got it, the sun. All of the photons and radiation coming from our sun are quantumly entangled. The particles from the sun will provide our data transport network.

All of the particles the sun sends out are connected to a common quantum fabric allowing us to predict the quantum state of all particles, in a given exact moment in time, by simply measuring just one particle connected to the fabric. Given that this process happens at over 10,000 times the speed of light virtually eliminates the practical possibility that two computers would ever try to measure a particle at the same time, resulting in a collision. Nevertheless, a collision avoidance mechanism would be added to all computers QEC (Quantum Entanglement Card; pronounced “quec”) network cards.

In the future a QEC will serve the same purpose as today’s Ethernet network cards. One more data transport problem is also solved in 2109, achieving near instantaneous data communication throughout the galaxy. Like most technologies in IT, there is always a competing standard. Data transport mechanisms in 2109 is no different. The competing technology to the QEC network is the MSC-NB network (mini super collider – nano black hole). To transmit data from point to point using MSC-NB technology all computers would be connected to all other computers via nano black holes, sometimes called mini black holes.

The nano black holes will be created using a miniature super collider (MSC) card. The MSC card would only be a few inches big but would operate much like the Large Hadron Collider (LHC) built by CERN does today. Today’s LHC can create these nano black holes but requires massive amounts of space, 17 mile circle, massive amounts of energy, 120 Megawatts, and massive compute resources, 100,000 processors, to run. The MSC card is able to condense these requirements into a space only a few inches big. To accomplish this the MSC card uses very small amounts of dark matter for power production, quantum computing processors for compute resources, and a break through in particle acceleration techniques to reduce the space needed.

How will it all work? The MSC card will create a nano black hole during each super collider particle collision. This black hole is opened up to the destination computer’s mini super collider card. The data to be sent is then sucked through the black hole to the other side. This technology is based on today’s research that indicates that, rather than holding captured matter forever, black holes may slowly leak a form of thermal energy called Hawking radiation and may well have a finite life. It is this Hawking radiation that the receiving computer interprets in order to put the data stream back together again. This technology results in near instantaneous communication between two computers no matter their distance apart in the universe. For multiple destinations the source computer would introduce multiple collisions to create multiple nano black holes between itself and other.

As these black holes are created, they are then learned and used to create a complex space-time map of the fabric of the universe. This allows subsequent multi-destination transmissions to happen with only a single collision and single nano black hole. These nano black holes introduce the ultimate in data in motion security and result in instant data transmission with no latency. One thing is for sure; Information Technology will be drastically different in the year 2109 than it is today.

If we can develop just a fraction of the technologies Eddie and I mention in part one of our predictions the world will be a better place. Not only will IT be revolutionized but also humanity itself will be transformed forever. We’d love to hear your comments about our predictions and what predictions you have of the future.

Read Part 2 Here.

Bio: Eddie Mize has over 26 years in the Computer Industry. Over 10 years in InfoSec. He is an integration specialist with years of experience integrating multiple platforms and systems to provide comprehensive "best of class" solutions. He is a DefCon Goon with a big imagination and also an accomplished artist. His specialties include real-world pen testing, social engineering-foo, PCI/DSS Assessment and Remediation, HIPAA Assessment and Remediation, E-Dicovery, Red Flad Rules, as well as psychotic and thought provoking art. He is the CISO for a major healthcare organization in Denver Colorado and his art work can be seen all over the front range of Colorado at many art shows. Eddie’s Art - http://eddietheyeti.deviantart.com/

The opinions and information presented here are my personal views and not those of my employer.

More from Jamey Heary: Credit Card Skimming: How thieves can steal your card info without you knowing it Cisco enters the crowded AV and DLP client marketCisco's new ASA code allows you to securely take your Cisco IP Phone with you anywhereCisco targets Symantec, McAfee with its new antivirus clientGoogle's Chrome raises security concerns and tastes like chicken feet a>Go to Jamey’s Blog for more articles on security.

*

*

*

*

*

Join the Network World communities on Facebook and LinkedIn to comment on topics that are top of mind.
Now read: Getting grounded in IoT