{"id":1163,"date":"2024-02-21T16:16:22","date_gmt":"2024-02-21T16:16:22","guid":{"rendered":"https:\/\/hello.inherentknowledge.org\/2024\/2024\/02\/21\/apples-imessage-gains-industry-leading-quantum-security\/"},"modified":"2024-02-21T16:16:22","modified_gmt":"2024-02-21T16:16:22","slug":"apples-imessage-gains-industry-leading-quantum-security","status":"publish","type":"post","link":"https:\/\/hello.inherentknowledge.org\/2024\/2024\/02\/21\/apples-imessage-gains-industry-leading-quantum-security\/","title":{"rendered":"Apple\u2019s iMessage gains industry-leading quantum security"},"content":{"rendered":"<p>Apple is preparing for future threats to iMessage by introducing upgraded encryption for its messaging service by using quantum computers.<\/p>\n<p>Think of it as state-of-the-art quantum security for messaging at scale, the company says, resulting in Apple&#8217;s messaging system being more secure against both current and future foes.<\/p>\n<h2><strong>What is the protection?<\/strong><\/h2>\n<p>Announced on <a href=\"https:\/\/security.apple.com\/blog\/imessage-pq3\/\" target=\"_blank\" rel=\"noopener\">Apple\u2019s Security Research blog<\/a>, the new iMessage protection is called PQ3 and promises the \u201cstrongest security properties of any at-scale messaging protocol in the world.\u201d<\/p>\n<p class=\"jumpTag\"><a href=\"https:\/\/www.computerworld.com\/article\/3713081\/apples-imessage-gains-industry-leading-quantum-security.html#jump\">To read this article in full, please click here<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Apple is preparing for future threats to iMessage by introducing upgraded encryption for its messaging service by using quantum computers. Think of it as state-of-the-art quantum security for messaging at scale, the company says, resulting in Apple&#8217;s messaging system being more secure against both current and future foes. What is the protection? Announced on Apple\u2019s [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1163","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/hello.inherentknowledge.org\/2024\/wp-json\/wp\/v2\/posts\/1163","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hello.inherentknowledge.org\/2024\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hello.inherentknowledge.org\/2024\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/hello.inherentknowledge.org\/2024\/wp-json\/wp\/v2\/comments?post=1163"}],"version-history":[{"count":0,"href":"https:\/\/hello.inherentknowledge.org\/2024\/wp-json\/wp\/v2\/posts\/1163\/revisions"}],"wp:attachment":[{"href":"https:\/\/hello.inherentknowledge.org\/2024\/wp-json\/wp\/v2\/media?parent=1163"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hello.inherentknowledge.org\/2024\/wp-json\/wp\/v2\/categories?post=1163"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hello.inherentknowledge.org\/2024\/wp-json\/wp\/v2\/tags?post=1163"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}