Back to home
Technology

Quantum computing firm dangles $22,500 Bitcoin prize — all you have to do is uncover a private key hidden inside a quantum-optimized problem

Source

Tom's Hardware

Published

TL;DR

AI Generated

BlueQubit has launched the Quantum Advantage Challenge, offering a 0.25 BTC prize to prove quantum advantage in solving a real-world cryptography problem. The challenge involves finding a hidden bitstring in a 256 search space, a task quantum computers can do in hours compared to years for classical supercomputers. The problem is designed around peaked circuits, with a verification protocol that doesn't require exponential classical computation. Success by a classical computer would disprove BlueQubit's claims of Quantum Advantage.

Read Full Article

Similar Articles

Linux exploit instantly grants administrator access on most distributions since 2017 — cryptography optimization snafu grants root privileges to local users

Linux exploit instantly grants administrator access on most distributions since 2017 — cryptography optimization snafu grants root privileges to local users

A recent Linux exploit, CVE-2026-31431, allows local unprivileged users to gain root access instantly on most Linux distributions since 2017. The exploit affects popular distros like Ubuntu, RHEL, Suse, and Amazon Linux, as well as Windows' WSL2. The vulnerability, discovered by Xint Code researchers, involves a cryptography optimization flaw that grants administrator privileges through a devious attack on the AF_ALG socket. While a patch has been released, some distributions may still be vulnerable, requiring mitigation methods like disabling AF_ALG sockets. The exploit occurs in memory without leaving detectable traces on disk, making it challenging to detect with security software.

Tom's Hardware
Scientists create electronic devices that function reliably at extreme temperatures from 500 degrees Celcuis to absolute zero — advanced semiconductor material unlocks new possibilities in space tech and quantum computing

Scientists create electronic devices that function reliably at extreme temperatures from 500 degrees Celcuis to absolute zero — advanced semiconductor material unlocks new possibilities in space tech and quantum computing

Scientists at KAUST have developed electronic devices made of gallium oxide that can function reliably in extreme temperatures from near absolute zero to 500°C. These devices have potential applications in space tech and quantum computing due to their ability to withstand extreme temperature swings. By using ultrawide-bandgap semiconductor beta-gallium oxide and heavily doping it with silicon atoms, the researchers created devices that can maintain electrical conduction even in cryogenic conditions. The team built transistors and logic inverters that operated reliably at temperatures as low as 2K, paving the way for the development of temperature-resistant devices for various technological applications.

Tom's Hardware
Yong Wang Turns Information Into Insights

Yong Wang Turns Information Into Insights

Yong Wang, a recipient of the IEEE Visualization and Graphics Technical Community Significant New Researcher Award, is recognized for his work in using artificial intelligence to revolutionize data visualization. Wang presented his insights at IEEE VIS 2025 in Vienna, emphasizing the importance of rethinking how data is visualized. His focus on human-computer collaboration, quantum computing, and AI showcases his innovative approach to transforming information into actionable insights.

IEEE Spectrum
In a first, a ransomware family is confirmed to be quantum-safe

In a first, a ransomware family is confirmed to be quantum-safe

A new ransomware family named Kyber claims to be quantum-safe by using ML-KEM encryption, a post-quantum cryptography standard. This encryption method is designed to be resistant to attacks by quantum computers, unlike traditional methods like Elliptic Curve and RSA. Security firm Rapid7 confirmed that Kyber uses the highest strength version of ML-KEM to encrypt victims' data with AES-256, making it the first known case of ransomware utilizing post-quantum cryptography. This development highlights the evolving tactics of cybercriminals to enhance the security of their malicious activities.

Ars Technica

We use cookies

We use cookies to ensure you get the best experience on our website. For more information on how we use cookies, please see our cookie policy.