Don’t see your question here? Send us a note at support@lightriderinc.wpengine.com.
What are the products available now?
Products available for purchase today are Light Rider’s Gen 1 and Gen 1 Quantum bulbs. Enterprise software solutions are custom tailored through Light Rider’s IP Program with applications currently open through the intake process here on our website.
How is Light Rider’s encryption technology different than current encryption technologies?
Light Rider’s encryption is different from classical encryption entirely. Classical encryption relies on software-derived repetition of numbers, quantum encryption derives its randomness from the physical behavior of photons. Our quantum terminals are independent Entropy sources that do not need to be connected to the internet. It’s all-natural!
What’s the capacity related to encryption at the enterprise level?
Light Rider’s quantum processing capabilities allow for massive scalability. In only half a second a 1k block can be created from the totally random quantum super stream which is integrated from 6 different sources of quantum entropy. Each terminal can stream quantum keys infinitely.
Does it encrypt your Internet connection? Or just files or both?
Light Rider’s quantum encryption secures any files or computer systems but is not intended to encrypt an Internet connection to a remote host. LiFi + Light Rider however creates a closed, secure, and invisible wireless connection when used for connectivity (coming summer 2021).
What is Li-Fi?
Light Fidelity or Li-Fi is a wireless communication technology which utilizes light to transmit data between devices.
In technical terms, Li-Fi is a light communication system that can transmit data at very high speeds over the visible light, ultraviolet, and infrared spectrums. Li-Fi is the wireless version of fiber optic communications.
In terms of its end use, the technology is similar to Wi-Fi — the key technical difference being that Wi-Fi uses radio frequency to induce a voltage in an antenna to transmit data, whereas Li-Fi uses the modulation of light intensity to transmit data. Li-Fi’s ability to safely function in areas otherwise susceptible to electromagnetic interference (e.g. aircraft cabins, hospitals, military) is an advantage. The technology is being developed by several organizations across the globe.
How does Li-Fi work?
Li-Fi works by switching the power current to the light bulb “Off (0)” and “On (1)” at a very high speed, too quick to be noticed by the human eye, thus, it does not present any flickering. Although Li-Fi bulbs would have to be kept on while transmitting data, they are dimmed below human visibility while still emitting enough light to carry data.
The technology allows roaming between various Li-Fi bulbs, also known as “Handover,” allowing seamless transition between bulb to bulb. The light waves cannot penetrate walls which translates to a much shorter range, and a lower hacking potential, relative to Wi-Fi. Direct line of sight is not necessary for Li-Fi to transmit a signal; the light is reflected off walls.
What’s QRNG?
Random Number Generators (RNG) can be hardware or software that produce sequences of random numbers. There are three distinct types of random number generators (RNG): Pseudo-RNGs, True RNGs, and Quantum RNGs. Random numbers are essential for several applications:
- Encrypted data transmission
- Quantum Key Distribution (QKD)
- Medical clinical trials
- Generating secure passwords
- Gambling machines
- Simulating virus outbreak behaviors, such as, COVID-19
- Perform simulations to predict the weather
The above images show two different streams of encrypted code. Within both images there are tiny white and black blocks. The white blocks represent “0” and the black blocks represent “1.” These are binary digits commonly referred to as “Bits.” Bits are the foundation of modern-day computing and are the most basic unit of information in computing and digital communications.
Which of the above images is not truly random? It’s the one on the left. You can tell because of the vertical pattern of lines that are observed. A hacker with specialized software would collect, analyze, target, and exploit those lines to break the encryption; gaining access to computer software, emails, cell phones, cell phone calls, Wi-Fi and Li-Fi systems, etc.
The sample on the right has no geometric patterns and does not repeat. A hacker would not be able to distinguish a starting point in the code to break the encryption because there is none. This code is in fact produced by a Quantum Random Number Generator (QRNG).
Light Rider uses “Quantum Shot Noise” to create the quantum randomness seen in the image to the right.
What is Quantum Li-Fi?
What is Quantum Li-Fi?
By using a process similar to Morse Code, “Quantum Li-Fi” transmits three or more bits. Comprised of the two standard bits plus quantum bits which are represented by sequences of flickering of the light to represent quantum information in both encryption and computing. This information cannot be identified or realized by conventional (non-quantum) software or computing systems because there is no repetition in the code. Since quantum bit encryption is combined with standard data during all transmissions; the communications method is inherently secure. Standard Li-Fi systems can only send “2” bits representing single binary values of either 0 or 1; Quantum Li-Fi can transmit substantially larger amounts of secure data by utilizing “3” or more bits.
Table 1- Quantum Li-Fi encryption scheme. Bits #1 and #2 are used by standard computers and communications systems. Quantum Li-Fi uses extra bits (bits #3 and #4) to transmit inherently secure data.
Bit # |
Light Flicker Status |
Binary Data |
Data Source |
Channel |
1 |
Lights OFF |
0 |
TX |
Li-Fi |
2 |
Lights ON |
1 |
TX |
Li-Fi |
3 |
Lights ON, Then OFF |
“0,1” |
Quantum Random Number Generator |
Quantum |
4 |
Lights OFF, Then ON |
“1,0” |
Quantum Random Number Generator |
Quantum |
Does it have updates or software installed?
Light Rider’s encryption products provide you a sandbox environment to apply true quantum randomness wherever you desire in your own infrastructure. Light Rider’s team works with every enterprise user to correctly configure, deploy, and maintain the quantum environment in a client’s own network stack.
How come I’ve never heard of LiFI?
If you’re in the United States then chances are that LiFi is completely new to you. However, LiFi as a technology has been around for years with many quality LiFi technology manufacturers around the world. For a variety of reasons, LiFi has yet to reach the US consumer market even though it will most likely be the new wireless global standard in coming years.
Is there an app?
For control of Light Rider encryption solutions there is an app that runs at the local level to manage devices and encryption settings. Light Rider has also created a Quantum Arcade app that utilizes a quantum generation super stream to give users the ability to leverage quantum randomness in games of chance. This is perfect for users desiring heads/tails or lottery number generation or who desire to intend an outcome using the supernatural behavior of quantum physics. The Quantum Arcade app is currently available in the iOS and Android app stores.
Is any data stored on Light Rider servers?
Since information from your network is never broadcast back to Light Rider’s servers there is never any of your data stored.
If the encryption stream comes via software, how quantum can it really be?
Light Rider’s quantum encryption doesn’t come from software, it is only transmitted by software. Where typical encryption schemes are generated in binary using software, Light Rider’s quantum randomness is generated at the physical level (light) and then transmitted through software.
Can’t I just make my own encryption stream using a quantum chip?
Access to a quantum processor alone will not translate into an application. Light Rider has spent a significant amount of time developing proprietary code and through research has leveraged quantum technologies.
What else is Light Rider working on?
Light Rider has 4 product lines:
- Portable Encryption: Leveraging quantum physics to encrypt and unlock information and communications/computing systems on demand.
- Quantum Storage: Storage devices that utilize quantum encryption for an ultra-secure storage environment.
- Quantum Networking: Communications technologies (LiFI, routers, etc) that create a quantum secure communications system to replace traditional WiFi.
- Quantum Infrastructure: Applications of quantum communications, encryption, and security at the municipal, campus, or critical infrastructure layers.