OQC outlines bold 50,000 qubit quantum computing vision

Oxford Quantum Circuits (OQC) has revealed plans to develop a 50,000 qubit fault-tolerant quantum computer by 2034, using its proprietary ‘Dimon’ superconducting transmon technology.

Achieving such scale would require millions of physical qubits but promises to outperform global rivals, including Google and IBM, with real-world applications ranging from cyber threat detection to drug discovery.

The roadmap includes a significant push to reduce error rates and optimise chip materials, with recent breakthroughs enabling error detection at the hardware level. OQC claims it achieves a 99.8% gate fidelity in just 25 nanoseconds and a tenfold improvement in qubit efficiency compared to competitors.

Interim CEO Gerald Mullally said the roadmap marks a turning point, calling on finance and national security organisations to prepare for a quantum-driven future.

Now seeking $100 million in Series B funding, the firm plans to install its first quantum system in New York, later this year.

Would you like to learn more about AI, tech and digital diplomacy? If so, ask our Diplo chatbot!

How AI could quietly sabotage critical software

When Google’s Jules AI agent added a new feature to a live codebase in under ten minutes, it initially seemed like a breakthrough. But the same capabilities that allow AI tools to scan, modify, and deploy code rapidly also introduce new, troubling possibilities—particularly in the hands of malicious actors.

Experts are now voicing concern over the risks posed by hostile agents deploying AI tools with coding capabilities. If weaponised by rogue states or cybercriminals, the tools could be used to quietly embed harmful code into public or private repositories, potentially affecting millions of lines of critical software.

Even a single unnoticed line among hundreds of thousands could trigger back doors, logic bombs, or data leaks. The risk lies in how AI can slip past human vigilance.

From modifying update mechanisms to exfiltrating sensitive data or weakening cryptographic routines, the threat is both technical and psychological.

Developers must catch every mistake; an AI only needs to succeed once. As such tools become more advanced and publicly available, the conversation around safeguards, oversight, and secure-by-design principles is becoming urgent.

Would you like to learn more about AI, tech and digital diplomacy? If so, ask our Diplo chatbot!

Thailand advances satellite rules

The Thai National Broadcasting and Telecommunications Commission (NBTC) has recently proposed a draft regulation titled ‘Criteria for Authorisation to Use Frequency Bands for Land, Aeronautical, and Maritime Earth Stations in FSS Services’. The regulation specifically targets the operation of Earth Stations in Motion (ESIMs), which include land-based stations on vehicles, aeronautical stations on aircraft, and maritime stations on ships and offshore platforms.

It defines dedicated frequency bands for both geostationary (GSO) and non-geostationary (NGSO) satellites, aligning closely with international best practices and recommendations from the International Telecommunication Union (ITU). The primary objective of this draft is to streamline the process for using specific radio frequencies by removing the need for individual frequency allocation for each ESIM deployment.

That approach aims to simplify and accelerate the rollout of high-speed satellite internet services for mobile users across various sectors, thus promoting innovation and economic development by facilitating faster and broader adoption of advanced satellite communications. Overall, the NBTC’s initiative underscores the critical importance for regulators worldwide to continually update their spectrum management frameworks.

Why does it matter?

In a rapidly evolving technological landscape, outdated or rigid regulations can obstruct innovation and economic growth. Effective spectrum management must strike a balance between preventing harmful interference and supporting the deployment of cutting-edge communication technologies like satellite-based internet services.

Would you like to learn more about AI, tech and digital diplomacy? If so, ask our Diplo chatbot!

Chad aims to strengthen digital independence through regional connectivity reforms

Chadian authorities have unveiled a set of strategic policies aimed at strengthening the country’s digital infrastructure and reducing its dependence on Cameroon for international internet connectivity. Central to these reforms is the establishment of Internet Exchange Points (IXPs) in major cities to enhance local traffic handling and reduce latency.

Additionally, the government plans to create redundant international links with neighbouring countries such as Libya, Algeria, and Nigeria. These policies are designed to diversify connectivity routes, bolster digital resilience, and support Chad’s long-term goal of achieving greater digital sovereignty.

These initiatives come in response to persistent vulnerabilities in the country’s current connectivity framework. Chad, being landlocked, lacks direct access to submarine cables and relies heavily on a single route through Cameroon.

The dependence has led to frequent service disruptions, including a major 24-hour outage in October and a recent suspension of connectivity due to unpaid dues. The country also faces challenges such as uneven fibre optic coverage, high access costs, and limited interconnection between networks, all of which have negatively impacted the quality and reliability of internet services.

By pursuing these reforms, Chadian authorities aim not only to stabilise and modernise the national digital infrastructure but also to integrate more effectively into regional projects like the Trans-Saharan Optical Fibre Backbone, which includes Algeria and Nigeria.

Would you like to learn more about AI, tech and digital diplomacy? If so, ask our Diplo chatbot!

Buterin proposes RISC-V to improve Ethereum’s speed

Vitalik Buterin has suggested replacing Ethereum’s Virtual Machine (EVM) with RISC-V to simplify the network and improve its performance. In a 3 May blog post, he stated that Ethereum could become as simple as Bitcoin within five years.

RISC-V is an open-source instruction set that would allow Ethereum to run faster. By cutting out extra translation steps, it could make operations up to 100 times quicker. Unlike the EVM, RISC-V would allow applications to work directly on the execution layer.

Buterin also believes the switch to RISC-V would reduce infrastructure costs and minimise risks, like bugs and security breaches. However, the change could break backwards compatibility and require retraining developers.

Despite these challenges, some experts are optimistic. Thad Pinakiewicz from Galaxy Research says Ethereum’s success lies in its foundational technology, not just its price.

Would you like to learn more about AI, tech and digital diplomacy? If so, ask our Diplo chatbot!

Fibocom’s AI mobile hotspot promises faster, smarter connectivity

Fibocom has launched its new 5G AI Mobile Hotspot Solution, combining next-generation 5G connectivity with advanced AI-driven voice interaction.

The intelligent mobile hotspot, powered by Fibocom’s customised AI app, supports multilingual voice control, real-time document retrieval, and an AI translation engine covering more than 20 languages with up to 95% accuracy, making it an ideal tool for international communication and travel.

The solution is built on Qualcomm’s QCM4490 platform, featuring an 8-core 4nm CPU with speeds up to 2.4GHz. It supports dual SIM standby, USB 3.1, Ethernet, and boasts 15W fast and reverse charging capabilities.

Fully compliant with 3GPP Release 16, the device achieves downlink speeds up to 2.33Gbps on Sub-6GHz bands and supports Android and Linux operating systems, external cameras, and 1080P displays for broad application use.

Significantly, the mobile hotspot integrates Qualcomm’s next-generation Wi-Fi 7 chipset, offering concurrent dual-band modes and speeds up to BE5800.

Ralph Zhao, Vice President of Fibocom’s MC Product Management Department, said the launch transforms mobile hotspots into intelligent companions, driving forward the integration of 5G, AI, and edge computing technologies.

Would you like to learn more about AI, tech and digital diplomacy? If so, ask our Diplo chatbot!

India seeks tech parity and trade concessions in US pact talks

India is preparing to urge the United States to ease export controls and grant it access to critical technologies under the proposed bilateral trade agreement. India is aiming for treatment similar to that received by key US allies such as Australia, the UK, and Japan.

Sectors including telecom equipment, biotechnology, AI, pharmaceuticals, quantum computing, and semiconductors are expected to be part of India’s demands, sources said.

Alongside tech access, India plans to request duty concessions for its labour-intensive industries. Key sectors like textiles, gems and jewellery, leather goods, garments, plastics, chemicals, shrimp, oil seeds, grapes, and bananas are high on India’s agenda for reduced tariffs.

These sectors are seen as vital to boosting India’s exports and supporting its domestic workforce. The United States, in return, is seeking tariff reductions for its exports of industrial goods, electric vehicles, wines, petrochemical products, dairy items, and agricultural produce such as apples and tree nuts.

Both sides are aiming to strike a mutually beneficial deal, although balancing these competing priorities could present a major challenge in the negotiations.

Would you like to learn more about AI, tech and digital diplomacy? If so, ask our Diplo chatbot!

Researchers report espionage campaign targeting government and critical sectors in Southeast Asia

Symantec has reported that the China-linked espionage group known as Billbug—also referred to as Lotus Blossom, Lotus Panda, Bronze Elgin, and Thrip—conducted a sustained intrusion campaign against multiple organizations in a Southeast Asian country between August 2024 and February 2025. The campaign involved the use of several custom tools, including loaders, credential stealers, and a reverse SSH utility.

According to Symantec, this activity appears to continue a series of operations previously observed in late 2023, which targeted various government and critical infrastructure organisations across Southeast Asia. While Chinese attribution has been suggested, specific attribution to an individual actor remains inconclusive. Identified targets include a government ministry, an air traffic control organisation, a telecommunications provider, and a construction company.

Additional intrusions were reported against a news agency and an air freight company in neighbouring countries. The campaign leveraged DLL sideloading techniques, utilising legitimate executables from Trend Micro and Bitdefender to load malicious code.

Symantec’s analysis detailed how these binaries were used to sideload malicious DLLs, which decrypted and executed payloads designed to maintain persistence and enable further compromise of targeted systems. Billbug has been active since at least 2009, with a documented history of targeting government, defence, telecommunications, and critical infrastructure sectors in Southeast Asia and beyond.

Symantec and other cybersecurity researchers have tracked the group across multiple campaigns, including previous operations involving backdoors like Hannotog and Sagerunex. The recent report also references related findings from Cisco Talos, which provided indicators of compromise connected to the same campaign.

Symantec noted that Billbug continues to adapt its techniques, including the use of compromised legitimate software and custom malware, to conduct espionage operations across the region.

Would you like to learn more about AI, tech and digital diplomacy? If so, ask our Diplo chatbot!

Dutch Ministry of Defence expands recruitment of cyber reservists to support national cybersecurity efforts

The Dutch Ministry of Defence has announced plans to expand its cyber defence capabilities by recruiting additional cyber reservists, according to NOS. The initiative is part of the Ministry’s strategy to strengthen cybersecurity expertise within its armed forces, with recruitment efforts scheduled to intensify after the summer. Several reservist positions have already been advertised online.

Cyber reservists are civilian professionals with digital security expertise who contribute part-time to the military’s cyber operations. Typically employed under zero-hour contracts, they may be called upon to support defence activities during evenings, weekends, or specific operational periods, while continuing their civilian careers.

The reservist units are part of the Defence Cyber Command (DCC), which currently consists of six platoons. Reservists may also participate in military exercises in the Netherlands or internationally, including NATO operations, with voluntary deployments.

Recruitment targets for cyber reservists were set at 150 over a ten-year period, but this number has not yet been achieved. According to Defence Ministry officials, interest in these positions has increased following the escalation of global cyber threats, particularly after the Russian invasion of Ukraine, though exact figures remain undisclosed for operational security reasons.

Cybersecurity expert Bert Hubert highlighted the distinct nature of cyber reserve work compared to traditional military reservist roles, emphasising the complexity of effective cyber defence operations.

Would you like to learn more about AI, tech and digital diplomacy? If so, ask our Diplo chatbot!

Commission seeks simpler, harmonised telecom rules

EU Tech Commissioner Henna Virkkunen has voiced support for using a Regulation, rather than a Directive, in the upcoming Digital Networks Act.

She says this would ensure consistent implementation across all member states, avoiding the patchwork seen under current telecom rules.

Virkkunen also hinted at easing merger rules and reducing ex-ante regulation within the existing framework, the European Electronic Communications Code.

These changes, she noted, could encourage investment and help the EU meet its goal of full 5G and fibre coverage by 2030.

She criticised slow national efforts to phase out high-risk Chinese components from 5G networks, calling for stronger action.

Her stance follows pressure from MEPs concerned about ongoing cybersecurity risks and lack of enforcement.

For more information on these topics, visit diplomacy.edu.