Friday, March 20, 2026

Quantum encryption took a big step. Because of the Talbot effect.




“ Researchers at the University of Warsaw have demonstrated a new approach to quantum key distribution that leverages high-dimensional encoding and a classical optical phenomenon known as the Talbot effect. By exploiting time-bin superpositions of photons, the system can transmit more information while relying on a surprisingly simple experimental setup built from commercially available components. Credit: Shutterstock” (ScitechDaily, Scientists Harness 19th-Century Optics To Advance Quantum Encryption)

Quantum cryptography is a new tool for enhancing the security of communication. In that model, the system connects information to a physical object. It can share information on different routes. And that makes eavesdropping difficult. It can use a certain color. Or a certain image. As. The key that allows the receiving system to access information. 

 But it's also vital for cases where the binary system wants to transform data into a quantum mode. Without quantum cryptography, the system cannot exchange information between binary and quantum states. The thing called. The Talbot effect is the tool. That can make quantum cryptography more effective.  The quantum network can share information to travel on different routes. It can use certain images to encrypt and decrypt information. In a Talbot-effect-based quantum network, it is possible to create quantum superposition and entanglement between quantum dots. And that makes it possible to create a quantum network. But there are also many other ways to benefit from the Talbot effect. 





“Detection of time-bin superpositions with the temporal Talbot carpet. Credit: Maciej Ogrodnik, University of Warsaw” (ScitechDaily, Scientists Harness 19th-Century Optics To Advance Quantum Encryption)

“The Talbot effect is a diffraction effect first observed in 1836 by Henry Fox Talbot. When a plane wave is incident upon a periodic diffraction grating, the image of the grating is repeated at regular distances away from the grating plane. The regular distance. It is called the Talbot length. And the repeated images are called self-images or Talbot images. “ (Wikipedia, Talbot effect)

Furthermore, at half the Talbot length, a self-image also occurs, but phase-shifted by half a period (the physical meaning of this is that it is laterally shifted by half the width of the grating period). At smaller regular fractions of the Talbot length, sub-images can also be observed. At one-quarter of the Talbot length, the self-image is halved in size, and appears with half the period of the grating (thus twice as many images are seen). At one eighth of the Talbot length, the period and size of the images are halved again, and so forth, creating a fractal pattern. Of sub-images with ever-decreasing size, often referred to as a Talbot carpet. Talbot cavities are used for coherent beam combination of laser sets.” (Wikipedia, Talbot effect)





“The optical Talbot effect for monochromatic light, shown as a "Talbot carpet". At the bottom of the figure, the light can be seen diffracting through a grating, and this pattern is reproduced at the top of the picture (one Talbot length away from the grating). At regular fractions of the Talbot length, the sub-images form.(Wikipedia, Talbot effect)

The second image introduces the Talbot-effect, and there could be  millions of possibilities in the encryption key. As we see, the possibilities. It could be the number of quantum dots. The system is used for encryption. Also. Things like a wavelength (color). And the time at which the image remains could be the thing. That helps to create an encryption key. Also. The system can calculate. How many times? In a time unit, the image blinks can be used to create ultra-secure encryption keys. Also, the time between blinks can be a participant. In quantum encryption. The system can also share information between multiple data lines. And then it can collect that information in the points. Of those quantum dots. 

When we talk. About the effectiveness of quantum cryptography, the diversity of methods. It keeps those things safe. If the system uses multiple different ways to encode messages and other data. AI-based intelligent systems can use multiple things. And ways to secure data. In that kind of encryption, the image that the system transmits could be a teddy bear. Then the receiving system sees the dataset that matches the teddy bear image. When the system receives other information that is not delivered in the image form of a teddy bear, it denies that information. This means the image acts as a key that allows the receiving system to open the message. 


https://scitechdaily.com/scientists-harness-19th-century-optics-to-advance-quantum-encryption/


https://en.wikipedia.org/wiki/Talbot_effect


Sunday, March 15, 2026

The new Chinese radars can be a threat to stealth.


"Representative image of a Chinese Shenyang J-31, circa 2014." (Interesting Engineering)

The gallium oxide diodes can make it possible to create compact radars for stealth fighters. This system enables the creation of new shapes for stealth fighters' profiles. This allows free aerodynamic planning and the use of more accurate shapes.  But these kinds of systems. Makes it possible. To create more advanced radar systems than before. The simplest way is to install more radars on aircraft. Those radars and other sensors can observe the area around the craft. Those kinds of systems. They can search for incoming enemy missiles and aim the weapons. Into positions where they came. 

The system. It can be created by using multiple radar arrays. This means that the new jet-fighters can have radar systems. Those are like mosaics. Each of the pieces of the mosaic structure is an independently operating radar. This means that radar. This means that some of those radars can operate in passive mode. When some other radar illuminates that plane, those systems can track it. The problem with jammers is this. They must operate at the same frequency as radars. 

"By improving detection capabilities against drone swarms, the technology could strengthen air-defense networks."(Interesting Engineering)

That they must jam. So if the system sees that it’s jammed. It can shut down transmitters. And then the passive system. That is the radar receiver antenna. It can be used to track the jammer. In the same way. The radar-warning systems can have a triangular measurement system. That system can point the radar’s location with a very high accuracy. 

The mosaic-based arrays can scan an area using many radio frequencies. At the same time. Those kinds of systems can be more immune to jammers than old-fashioned radars. The radar operates as an entirety. The AI connects the data that the radar group gets. Then that AI. It can connect that data with the data flow. Which comes from other sources. Like optical sensors. Those sensors. They can be in other aircraft. Ground-based, or drones. 

Or they can operate onboard the plane. This means that those systems can get more data than ever before. And that makes those systems more intelligent and more effective than before. Those systems are based. On network-based solutions, which connect the entire battlefield. Into one entirety. The system shares data between multiple systems. 

The new radar systems use AI algorithms to analyze and sort information flow. Those new systems can detect drone swarms and then separate decoy drones from real drones. But the problem is that all drones can carry explosives. And they can all be devastating. The system. That AI can search and identify targets with new accuracy. The AI algorithms can also analyze threats with new accuracy. This thing makes the attackers and defenders deadlier than ever before. 


https://interestingengineering.com/innovation/chinas-semiconductor-enable-compact-radar


https://interestingengineering.com/military/chinese-radar-identify-decoy-drones-real-targets

Saturday, March 7, 2026

The new quantum devices offer more secure communication.



"Quantum computers typically require extreme conditions, including temperatures near absolute zero, which makes them difficult and expensive to operate. Researchers at Stanford have developed a nanoscale optical device that works at room temperature, using specially structured materials to link the spins of photons and electrons. Credit: Stock" (ScitechDaily, Room-Temperature Quantum Device Could Transform Future Communications)

Information plays a critical role in modern society. And this is why securing information is urgent. Without trusted and secure information. It’s impossible to share and receive trusted information. If someone can hack  mission-critical systems, it can cause complete chaos. Can you imagine a scenario where someone hacks the traffic lights? In the city? The hacker simply turns all traffic lights green. That causes complete chaos. Or what if somebody raises the lift bridge up? 

That is one of the things that can cause bad things. Because that blocks roads from ambulances and other emergency vehicles. And in a critical moment. Those kinds of roadblocks. They can be dangerous. Things like disinformation. Often delivered on the net. Disinformation is one of the reasons why we also need physical data security. We can, of course, transport information on USB sticks. But there is always a possibility. 

That somebody drops that stick from their pocket. The USB sticks are used to transport the decryption keys. The system that decrypts codes requires the right code key. That. It can calculate. Calculations. The encryption process is used backwards. The encryption system uses long binary numbers to encode data. So, the decryption system requires those binary numbers.

Another big problem is that the USB sticks are slow systems. Of course, we could encrypt data. Into those sticks in physical form. If we have the right systems, we could share every single file into the four parts. And store those parts in four different memory sticks. This means we can send those memory sticks with four couriers. The decryption process requires that the user have all four memory sticks. And then the decryption requires that those sticks be in the right order. 

Quantum encryption means. The system can send information using many physical routes. This means that the system can send data using different data transportation lines. Or it can simply use different frequencies. 

The problem with encryption and decryption is that without those things. The GSM telephones and the entire internet. They will not work. The encryption. It makes it possible. For multiple systems to communicate on the same frequency. Every data package. That travel in the net has an identifier in front of it. Before data transmission starts, the devices change those identifiers or keys. If those identifiers are wrong, the system denies those data packages. 

If that process does not work. The thing that the user hears is the white noise. The situation turns into a case. Lots of people. Talk with each other in a small space. Suddenly, the case happens. That people start to yell at each other. The ability to separate words becomes impossible. 


https://scitechdaily.com/room-temperature-quantum-device-could-transform-future-communications/


Sunday, February 8, 2026

Neuroscientists say that it's possible to engineer dreams.


“A powerful way to investigate memory consolidation during sleep utilizes acoustic stimulation to reactivate memories. In multiple studies, Targeted Memory Reactivation (TMR) using sounds associated with prior learning improved later memory, as in recalling locations where objects previously appeared.” (APAPsycNet, Targeted memory reactivation during sleep to strengthen memory for arbitrary pairings). 

Reseachers say that the purpose of dreams is to analyze things that happened during the daytime, or wake-up time. Friedrich August Kekulé von Stradonitz (1829 – 1896) was the chemist who uncovered. The structure of benzene. Saw in a dream. Where the snake. To bite its tail. When he woke up, Kekulé von Stradonitz realized that benzene is composed of a ring of carbon atoms. Same way. Compositors are seen. When a devil or angel. Who played some composition. In dreams. 

The most well-known case is the case of Giuseppe Tartini (1692–1770), who saw. The devil played violin in his dreams, and then Tartini created his Devil's Trill Sonata by following. The things that he saw in his dreams. 

Those things support the theory that dreams are made. For solving problems. The problem with the dream analysis is that people don’t remember their dreams. But. A technology called targeted memory reactivation (TMR). The TMR uses acoustic waves to activate memory blocks after sleep. The opposite system is TMD, targeted memory deactivator. TMD deactivates memory. 

That system might. Help people. To remember their dreams. The TMR technology has uncovered that.

 “Seventy-five percent of participants reported dreams that contained elements related to the unsolved puzzles. Problems that appeared in dreams were later solved at a much higher rate than those that did not (42% vs 17%)”. (ScitechDaily, Can You Engineer a Dream? Neuroscientists Say Yes – and It Boosts Creativity) 




"Tartini's Dream" by Louis-Léopold Boilly (1761-1845). Illustration of the legend behind Giuseppe Tartini's "Devil's Trill Sonata". Caption: TARTINI'S DREAM. It is said that Tartini saw in a dream the Devil who offered him his services, and that, at his command, he performed a sonata on the violin, which Tartini had never heard before and which he tried to recall upon waking. He then composed that singular sonata that is still known today under the name of the Devil's Sonata.” (Wikipedia, Devil's Trill Sonata)

That means that dreams are meant to solve problems. Or they can help to solve them. The ability to send information into human brains just before people sleep. It can make people more productive. Maybe, things like AI can someday turn our dreams into mode. That we could project them on the computer screen. Things. Like a brain-computer interface, BCI systems. Which can also. Connect human creativity. Into a model that the AI can control and use in its training. The problem is how to send the right information. Into the brain. In the right moment. 

The BCI can also read those things from the electrodes or brain implants. The ability to control dreams makes people more creative. Or, the problem is. How we remember things. That we saw while we sleep. “Targeted Memory Reactivation (TMR) is a noninvasive technique from cognitive neuroscience that allows researchers to selectively influence which recent memories are strengthened during sleep. The method is based on the brain’s natural process of consolidating memories while a person is resting”. (Biologyinsights, How Targeted Memory Reactivation Works and Its Uses)


https://biologyinsights.com/targeted-memory-reactivation-how-it-works-and-its-uses/


https://www.eneuro.org/content/11/5/ENEURO.0285-23.2024


https://psycnet.apa.org/record/2019-01081-001


https://www.sciencedirect.com/science/article/abs/pii/S0028393218304482?via%3Dihub


Can You Engineer a Dream? Neuroscientists Say Yes – and It Boosts Creativity


https://en.wikipedia.org/wiki/August_Kekul%C3%A9


https://en.wikipedia.org/wiki/Devil%27s_Trill_Sonata

Thursday, January 29, 2026

Physicists have discovered a new method for stabilizing quantum chains using crystals.




"NV qubits aligned along a dislocation in diamond. Credit: UChicago Galli Group" (ScitechDaily, Physicists Discover a New Way To Connect Qubits Using Crystal Imperfections)

“The nitrogen-vacancy center (N-V center or NV center) is one of numerous photoluminescent point defects in diamond. It consists of a nearest-neighbor pair of a nitrogen atom, which substitutes for a carbon atom, and a lattice vacancy.” (Wikipedia, Nitrogen-vacancy center)

“NV centers enable nanoscale measurements of magnetic and electric fields, temperature, and mechanical strain with improved precision. External perturbation sensitivity makes NV centers ideal for applications in biomedicine—such as single-molecule imaging and cellular process modeling.”(Wikipedia, Nitrogen-vacancy center)

“In crystallography, a vacancy is a type of point defect in a crystal where an atom is missing from one of the lattice sites. Crystals inherently possess imperfections, sometimes referred to as crystallographic defects.” (Wikipedia, Vacancy defect)

The image of Bravais lattices explains how electrons interact around the atom. There is, of course, a ball-shaped field around atoms, but between electrons. There is also a straight energy string. Those strings are energy flows that travel between those electrons. The atom’s shell pulls those electrons into it. And that keeps electrons and atoms. In one entirety. And the energy bridges between them, the electromagnetic push between negative electrons tries to push those electrons away. 




“The seven lattice systems and their Bravais lattices in three dimensions” (Wikipedia, Bravais lattice)


In natural diamonds, the NV centers form randomly. But. There is a possibility of creating artificial NV centers. And putting them in line. This allows information to travel through that line. Those NV centers can be used as the transmitters in the quantum radars. This means that the diamonds there have the NV state line in them. Those NV-states can be used in high-resolution quantum Doppler radars. The system transmits electricity to those NV states. And then they act as the transmitting dipoles. 

In the image above, a method is introduced for stabilizing the qubit chain in the diamonds. Qubits, or their nitrogen vacancy (NV) states, are chained in the diamond.  The diamond presses that qubit chain, and keeps it in form. When information is transported into the qubit’s transmitting side, it allows the wave to travel through those NV states. In a qubit chain, the qubits form an energy staircase. There, they can transport information. Step by step. The system can adjust energy levels on those stairs. Very accurately. This means that lasers can be used to transport energy into those NV states or NV steps. The system can transport information in the static NV-state system. 




“Simplified atomic structure of the NV center”. (Wikipedia, Nitrogen-vacancy center)


When we think of this system as the tool that transports qubits through air or quantum channels, we must remember that diamond can be used as a phonon. First, the system makes the phonon. That creates the acoustic tunnel through the air. Then the information is sent to the NV states. The NV states send that wave movement into the receiver, and there, the receiving NV state starts to resonate. Another version is that the diamond takes the one NV state to its sharpest point. The system can use the corners of the pyramid-shaped diamond. To make the energy tweezers that lock the ion in front of that NV state line. Then the qubit line stores information in that NV state. And the higher energy level in that system pushes the qubit through the quantum channel. These types of systems are very interesting. They can be used to transport information in a highly secure mode. 

“Natural NV centers are randomly oriented within a diamond crystal. Ion implantation techniques can enable their artificial creation in predetermined positions as follows.” (Wikipedia, Nitrogen-vacancy center)

“Nitrogen-vacancy centers are typically produced from single substitutional nitrogen centers (called C or P1 centers in diamond literature) by irradiation followed by annealing at temperatures above 700 °C. A wide range of high-energy particles is suitable for such irradiation, including electrons, protons, neutrons, ions, and gamma photons. Irradiation produces lattice vacancies, which are a part of NV centers. Those vacancies are immobile at room temperature, and annealing is required to move them. Single substitutional nitrogen produces strain in the diamond lattice; it therefore efficiently captures moving vacancies,[producing the NV centers.” (Wikipedia, Nitrogen-vacancy center)


https://scitechdaily.com/physicists-discover-a-new-way-to-connect-qubits-using-crystal-imperfections/


https://en.wikipedia.org/wiki/Bravais_lattice



https://en.wikipedia.org/wiki/Nitrogen-vacancy_center



https://en.wikipedia.org/wiki/Vacancy_defect

Sunday, December 14, 2025

Drones are the most considerable new weapon systems.


Above: MQ-28 "Ghost Bat" launches AMRAAM. These types of drones. It can also carry air-to-ground missiles and anti-radiation missiles. Like. AGM-88 HARM and other smaller drones. 

Drones are a new and effective threat. The reason why drones are so hard for defense is that their development cycle is much faster than that of any manned systems. Drones are cheap to build. And their operators' training. It is fast. And cheap. A drone doesn’t need life support systems. 3D printing systems. Make it possible for drones. To be customized for each mission. 3D printing systems can be installed in ships or trucks. And they can create drones from plastic, carbon fiber, or metal wires. This means those drones require only microchips. And engines. And explosives to make effective surprise attacks. 

The fact is that drones don’t need any explosives to be dangerous. They can roll metal wires around high-voltage power lines. Those systems can also have Kevlar whips. They have a metal bite at their end. And those whips can hit targets with supersonic speed. The Shahed-136 and Geran-3 type drones can strike targets from 1000 km distances. Those drones are used to drop mines in Ukraine. Those drones can also drop other drones whose mission is to cause damage and suppress air defense. The AI-based programming makes those drones very independent. And that makes it possible. Those drones are left behind enemy lines. And then they can be activated remotely. This means those drones can sit and wait for their orders. A drone can attack things like submerged targets. This means they can be dangerous. To full-size submarines. And it's possible. 

That the full-size nuclear submarines can be converted into sea drones. A submarine’s nuclear reactors. Can deliver energy. For. A full-size supercomputer. This type of system can drive complex algorithms. Things like torpedo tubes are easy to convert for automatic reload. Torpedoes and missiles can be stored in long tubes. The system mimics the firestorm system, but it uses torpedoes. And that allows the submarine to launch them at a very high rate. Large-sized submarine drones can carry large nuclear warheads. And that means. The system. Can carry. 4-5 “Tsar bomba”-type warheads (50mt.) along with torpedoes and missiles. That means the Russian “Poseidon” system can be a child’s game. Compared to systems that are coming. 



"China’s heavyweight jet-powered Jiutian drone, said to have a maximum takeoff weight of around 17.6 tons (16 metric tons), has flown. A key mission for the design is expected to be acting as a mothership for swarms of smaller uncrewed aerial systems, as TWZ has explored in the past. It has also been shown previously armed with various air-to-surface and air-to-air munitions, and could perform a variety of other missions, including airborne signal relay and logistics." (TWZ.com, China’s High-Flying Swarm Mothership Drone Has Flown)

Things like large-sized drone motherships are also coming into service. Those systems. It can be a new threat and system for dominating battlefields. Those systems can carry kamikaze-drones. But also UCAVs that can operate against other aerial targets. 

Aerial drones. They are classified as unmanned aerial vehicles (UAVs) and unmanned combat aerial vehicles (UCAV). The difference between those drones is not big. Things like kamikaze-drones. Can attack both ground and aerial targets. They can transmit intelligence information from their route. Those drones can also return to base if their weapon systems are not needed. 



"A British MQ-9A Reaper operating over Afghanistan in 2009" (Wikipedia, Unmanned combat aerial vehicle)

The kamikaze drone can also carry things like small air-to-air or anti-radiation missiles. A drone can use those missiles to attack radars and jet fighters. Even a small air-to-air missile can damage the jet fighter. The UCAV can also carry an internal warhead. And that gives them the ability to cause more damage. Internal data links allow the transmission of target information to drones. Remotely. 

Those kamikaze drones can carry other smaller drones, which they can drop into their route. The AI and afterburner will give those drones. An ability to attack aerial objects. Those drones can also operate from any platform, from trucks, potholes, and aircraft. Small drones can be effective against soft targets. Like. Aircraft and helicopters. If. We think about a situation. These small-sized kamikaze drones can slip into the aircraft carriers' hangars. Or drones can also damage aircraft carriers, electronics, and their steam catapults. 

Those weapons can be dropped from other drones or missiles. Or small, remote-controlled speed boats can transport them near those aircraft carriers. Drones can also wait on the beach. They can carry things like missiles, bazookas, and internal explosives. They can close their targets underwater. Rise from the sea. And then slip into the aircraft elevators. Or they can aim their weapons at the radars or the ship’s own missiles. The drone that can drop a bomb into the ship’s missile hatch can detonate the hatch. And then dive itself into that hole, and detonate in the missile tube. 




"The two Global Autonomous Reconnaissance Craft (GARC) assigned to Unmanned Surface Vessel Squadron 3 (USVRON 3) seen here are indicative of the US Navy’s separate ongoing work on smaller USVs. USN" (TWZ.com, Crew Optional Designs Could Be Barred By Law From Navy’s Drone Ship Program)

A drone. Can fly into the air intakes of jet engines. The drone that has image recognition can land from the sky and wait for its target. When a drone. Sees an aircraft or some other target. The AI can give it an order to make a kamikaze mission. The drone can have many types of explosives and warheads. And it can act like mines. A drone can fly through the protective fences and wait near airfields. When it recognizes its target, it can make an attack. The target can be a certain aircraft, tank, other vehicle, or even a person. The image recognition. Doesn’t make a difference between a vehicle and a certain human. 

Drone systems are many times more effective than manned systems. There is no crew; they don’t need things like toilets, water, or food.  Unmanned surface vehicles (USV) and unmanned underwater vehicles (UUV). Those tools that can carry other drones or missiles. Even a small drone can carry anti-tank or other missiles. The USV can have a kamikaze capacity. And it can have a small quadcopter. It can be used for. Search. Targets. 

The small quadcopter that hangs above the USV or unmanned ground vehicle (UGV). The small quadcopter that hovers above them can be wire-guided. That drone can also show targets. For. The drone itself. Or it's laser-guided ammunition. The laser-homing rockets. With. Many types of warheads are installed on jet fighters. But the surface drones can also operate with those rockets. The drone that can point targets to those rockets can make. Precise accuracy. With those rockets. That drone allows operators to shoot those rockets from behind the visual obstacle. And that can make those systems more effective. 


https://www.twz.com/air/american-made-shahed-136-kamikaze-drone-clones-being-tested-by-marines


https://www.twz.com/air/chinas-high-flying-swarm-mothership-drone-has-flown


https://www.twz.com/air/mq-28-ghost-bat-has-fired-an-aim-120-amraam-missile


https://www.twz.com/air/russias-shahed-long-range-drones-are-now-dropping-anti-tank-mines


https://www.twz.com/sea/crew-optional-designs-could-be-barred-by-law-from-navys-drone-ship-program


https://en.wikipedia.org/wiki/Unmanned_aerial_vehicle


https://en.wikipedia.org/wiki/Unmanned_combat_aerial_vehicle


https://en.wikipedia.org/wiki/Unmanned_ground_vehicle


https://en.wikipedia.org/wiki/Poseidon_(unmanned_underwater_vehicle)


https://fi.wikipedia.org/wiki/Tsar-Bomba


https://en.wikipedia.org/wiki/Unmanned_surface_vehicle


https://en.wikipedia.org/wiki/Unmanned_underwater_vehicle




Saturday, December 13, 2025

The BCI gives new types of metaverse experiences.



The Neuralink BCI (Brain-computer Interface uses an implanted microchip. That system allows. The brain controls computers using EEG waves. This implant can send to the computer. There is also planned a system where the microchip is in the middle of the brain, just like in the Neuralink system. The system sends electromagnetic waves to the helmet. That covers the head. And then that system can send an echo from that helmet. That makes it possible to create a system that turns brains into a biocomputer. The new BCI systems don’t need implants to communicate with computers. 

Those systems use an EEG that the AI hacked to control computers. The same systems can also control things like prostheses. And also human-shaped robots. This kind of system may already be installed with the new jet fighters. And those systems make it possible. To create synthetic biological brains. Those brains in a vat. It can be created using cloned neurons. Those biological computers can communicate with computers using the BCI. And that makes those systems even more interesting. Than. They used to be. 



The new wireless brain-computer interface systems mean the next-generation communication. Between. Human and computer. This is one of the most interesting and also frightening tools that humans can create. The extremely thin brain implants that can be put on the skull or on the skin don’t necessarily need any advanced brain surgery to bring the BCI to regular users. Even in cases. Where those systems need surgery. Those systems. It might be put on the skull. 

Below the skin, using a regular daytime surgeon. The person who puts those implants must know the point, what the implant must listen to. Another way is to use a helmet. Or. Some kind hat. This helps the user. To put. Those electrodes. Into the right positions. The BCI can turn into a new sense. Today reseachers test the paper-thin chip. That turns light into a new sense for people. 



The BCI system. Transforms EEG into text. And that text can be driven into artificial intelligence. Or algorithms. In those systems, the text-to-speech application was transformed. To use the EEG to create text. The wireless information can be shared through. BlueTooth. The system can use similar communication with an intelligent wristwatch. And that would be the next level. In the human mind. And computer interactions. 

BCI is the tool. That means the human singularity with the machine. The BCI and the AI are tools that allow back-and-forth communication. Straight. With computers and brain shells. This means that the brain will not separate information. That computer transmits into them. From. Real information. And that thing will be the ultimate metaverse experience. This causes a theorem. Maybe in the future, the person. Those who use those BCI systems can get lost in the multiple internal virtual worlds. This brings a new dimension into human life, and that thing is the synthetic digital universe. 



This kind of metaverse is introduced in the Sci-Fi movie “The Matrix”. A metaverse that is created. Using computers is an ultimate platform. It can interconnect people in new ways. And one of those ways is that. The BCI opens the path to the human mind deeper than ever before. The BCI system is one of the things. That can be the next-generation tool for space missions. And the next-generation tool to control human-shaped robots. The metaverse offers a layer between people. Interconnects them together. That layer is a powerful tool. For hackers, a metaverse allows the platform. They can. Use those platforms for their own purposes? 



When we think about the wireless BCI. These kinds of systems. It can be mistakenly connected to the wrong devices. That means hackers can cheat the user. They can. Make a connection with a honeypot, and they can hack that person’s mind.  The BCI is a new tool with strong possibilities. But the threats. The misuse of those systems causes. It is also big. The BCI allows the creation of realistic fake memories. Or the transport of EEG waves. Between people. This thing makes ultimate entertainment possible. But the ability to transmit things. Like remote senses of touch and pleasure. 

Make new ways. To boost the entertainment industry, it can also be used for remote extortion. The ultimate freedom can turn into ultimate slavery. And that is one thing that we must realize. We must realize that laws are not things. That can control the system development. The laws that limit the installation of those components to people other than for medical reasons do not exist in places like Pattaya. There, the boy can get silicone implants in 15 minutes. So what do those doctors do in their back offices?  Some people who are willing to do those surgeries for people who are willing to pay can make them in some places where the police are unable to operate. 


https://www.brown.edu/news/2021-03-31/braingate-wireless


https://www.emergentmind.com/topics/wireless-brain-computer-interactions-bci


https://research.gatech.edu/new-wearable-brain-computer-interface


https://scitechdaily.com/new-paper-thin-brain-implant-could-transform-how-humans-connect-with-ai/


https://scitechdaily.com/scientists-teach-the-brain-to-read-light-as-a-new-sense/


Quantum encryption took a big step. Because of the Talbot effect.

“ Researchers at the University of Warsaw have demonstrated a new approach to quantum key distribution that leverages high-dimensional encod...