logo
Scientists achieve 'magic state' quantum computing breakthrough 20 years in the making — quantum computers can never be truly useful without it

Scientists achieve 'magic state' quantum computing breakthrough 20 years in the making — quantum computers can never be truly useful without it

Yahoo6 days ago
When you buy through links on our articles, Future and its syndication partners may earn a commission.
In a world first, scientists have demonstrated an enigmatic phenomenon in quantum computing that could pave the way for fault-tolerant machines that are far more powerful than any supercomputer.
The process, called "magic state distillation," was first proposed 20 years ago, but its use in logical qubits has eluded scientists ever since. It has long been considered crucial for producing the high-quality resources, known as "magic states," needed to fulfill the full potential of quantum computers.
Magic states are quantum states prepared in advance, which are then consumed as resources by the most complex quantum algorithms. Without these resources, quantum computers cannot tap into the strange laws of quantum mechanics to process information in parallel.
Magic state distillation, meanwhile, is a filtering process by which the highest quality magic states are "purified" so they can be utilized by the most complex quantum algorithms.
This process has so far been possible on plain, error-prone physical qubits but not on logical qubits — groups of physical qubits that share the same data and are configured to detect and correct the errors that frequently disrupt quantum computing operations.
Because magic state distillation in logical qubits has not so far been possible, quantum computers that use logical qubits have not been theoretically able to outpace classical machines.
Related: What is quantum superposition and what does it mean for quantum computing?
Now, however, scientists with QuEra say they have demonstrated magic state distillation in practice for the first time on logical qubits. They outlined their findings in a new study published July 14 in the journal Nature.
"Quantum computers would not be able to fulfill their promise without this process of magic state distillation. It's a required milestone." Yuval Boger, chief commercial officer at QuEra, told Live Science in an interview. Boger was not personally involved in the research.
The path to fault-tolerant quantum computing
Quantum computers use qubits as their building blocks, and they use quantum logic — the set of rules and operations that govern how quantum information is processed — to run algorithms and process data. But the challenge is running incredibly complex algorithms while maintaining incredibly low error rates.
The trouble is that physical qubits are inherently "noisy," which means calculations are often disrupted by factors like temperature changes and electromagnetic radiation. That's why so much research has centered on quantum error correction (QEC).
Reducing errors — which occur at a rate of 1 in 1,000 in qubits versus 1 in 1 million, million in conventional bits — prevents disruptions and enables calculations to happen at pace. That's where logical qubits come in.
"For quantum computers to be useful, they need to run fairly long and sophisticated calculations. If the error rate is too high, then this calculation quickly turns into mush or to useless data," study lead author of the study Sergio Cantu, vice president of quantum systems at QuEra, told Live Science in an interview. "The entire goal of error correction is to lower this error rate so you could do a million calculations safely."
Logical qubits are collections of entangled physical qubits that share the same information and are based on the principle of redundancy. If one or more physical qubits in a logical qubit fail, the calculation isn't disrupted because the information exists elsewhere.
But logical qubits are extremely limited, the scientists said, because the error-correction codes applied to them can only run "Clifford gates" — basic operations in quantum circuits. These operations are foundational to quantum circuits, but they're so basic that they can be simulated on any supercomputer.
Only by tapping into high-quality magic states can scientists run "non-Clifford gates" and engage in true parallel processing. But generating these is extremely resource-intensive and expensive, and has thus far been unachievable in logical qubits.
In essence, relying on magic state distillation in physical qubits alone would never lead to quantum advantage. For that, we need to distill magic states in logical qubits directly.
Magic states pave the way for capabilities beyond supercomputing
"Magic states allow us to expand the number and the type of operations that we can do. So practically, any quantum algorithm that's of value would require magic states," Cantu said.
Generating magic states in physical qubits, as we have been doing, is a mixed bag — there are low-quality and high-quality magic states — and they need to be refined. Only then, can they fuel the most powerful programs and quantum algorithms.
In the study, using the Gemini neutral-atom quantum computer, the scientists distilled five imperfect magic states into a single, cleaner magic state. They performed this separately on a Distance-3 and a Distance-5 logical qubit, demonstrating that it scales with the quality of the logical qubit.
"A greater distance means better logical qubits. A Distance-2, for instance, means that you can detect an error but not correct it. Distance-3 means that you can detect and correct a single error. Distance-5 would mean that you can detect and correct up to two errors, and so on, and so on," Boger explained. "So the greater the distance, the higher fidelity of the qubit is — and we liken it to distilling crude oil into a jet fuel."
RELATED STORIES
—Small, room-temperature quantum computers that use light on the horizon after breakthrough, scientists say
—'Quantum AI' algorithms already outpace the fastest supercomputers, study says
—Scientists forge path to the first million-qubit processor for quantum computers after 'decade in the making' breakthrough
As a result of the distillation process, the fidelity of the final magic state exceeded that of any input. This proved that fault-tolerant magic state distillation worked in practice, the scientists said. This means that a quantum computer that uses both logical qubits and high-quality magic states to run non-Clifford gates is now possible.
"We're seeing sort of a shift from a few years ago," Boger said. "The challenge was: can quantum computers be built at all? Then it wasL can errors be detected and corrected? Us and Google and others have shown that, yes, that can be done. Now it's about: can we make these computers truly useful? And to make one computer truly useful, other than making them larger, you want them to be able to run programs that cannot be simulated on classical computers."
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Leaping sturgeon provide a show for nature lovers on Maine rivers
Leaping sturgeon provide a show for nature lovers on Maine rivers

Associated Press

time44 minutes ago

  • Associated Press

Leaping sturgeon provide a show for nature lovers on Maine rivers

AUGUSTA, Maine (AP) — The Kennebec River in Maine's capital city of Augusta is known for its population of Atlantic and shortnose sturgeon. The fish sometimes leap completely from the water, as at least one did on Wednesday. The shortnose population on the river nearly doubled from about 5,100 in the late 1970s to more than 9,400 around 2000, and it has likely grown since, state biologists have said. The ancient fish have also shown signs of recovering elsewhere in Maine, such as the Saco River further south. Scientists have proposed a number of reasons why sturgeon jump out of the water, including regulating their swim bladder, communicating with other sturgeon, shedding parasites and avoiding predators. Shortnose sturgeon can weigh up to 60 pounds (27 kilograms), while Atlantic sturgeon can be much larger, with some weighing as much as 800 pounds (363 kilograms). The fish thrill nature lovers who are fortunate to catch their sudden leaps along Maine rivers. Catching a glimpse of them is often a matter of luck.

This Android malware poses as real apps to take you to dangerous sites and flood your phone with spam
This Android malware poses as real apps to take you to dangerous sites and flood your phone with spam

Yahoo

timean hour ago

  • Yahoo

This Android malware poses as real apps to take you to dangerous sites and flood your phone with spam

When you buy through links on our articles, Future and its syndication partners may earn a commission. A new version of the Konfety malware that attacks the best Android phones now uses distorted APK files as well as other methods in order to avoid being detected and analyzed. As reported by Bleeping Computer, this latest Konfety malware strain, which is neither spyware nor a remote access trojan, can pretend it is a legitimate app by copying both the branding and names of real apps from the Google Play Store. Konfety mimics real products available on the Play Store, though it does not reproduce the same functionality of those apps. Likewise, it's distributed and promoted through third-party stores. This is a method that researchers have sometimes called a 'decoy twin' or 'evil twin' tactic, and is exactly why it is recommended to only download software from trusted publishers and to avoid installing APK files from third-party app stores. Still, some users will resort to searching on these marketplaces for supposedly free versions of popular apps either because they don't have access to Google services as their Android device isn't supported or because they don't want to pay for legitimate software. Here's everything you need to know about this new Android threat including some tips and tricks to help keep your phone safe from hackers and malware free. Hiding in plain sight Once Konfety has been installed on a victim's device it uses a malformed ZIP structure to avoid analysis and detection, and will begin its malicious behavior. It can redirect users to dangerous websites, install unwanted apps and provide fake browser notifications. Additionally, it can produce ads using a CaramelAds SKD and exfiltrate device data like installed apps, network configuration and system information. Thanks to the capabilities of this latest version, it can also hide its app icon and name, and then use geofencing to alter its behavior depending on the region the device is located in. It performs all its nefarious hidden features courtesy of an encrypted DEX file inside the APK which is loaded and decrypted during runtime, and contains hidden services declared in the AndroidManifest file which allows for the delivery of more dangerous modules. Konfety also manipulates the APK files to confuse and break static analysis and reverse engineering tools by signaling that the file is encrypted when it is not, which triggers a false password prompt when trying to inspect the file. This can block or delay access to the APKs contents. Next, critical files within the APK are declared using BZIP compression, which is not supported by analysis tools and this results in a parsing failure. Android ignores the declared method and returns to the default processing which allows Konfety to install and run on the device without issue. How to stay safe from Android malware First and foremost, to avoid falling victim to the Konfety malware and other Android malware strains, it's essential that you don't sideload apps on your devices. While it may seem convenient, doing so puts you at serious risk from malware, adware, spyware and other threats. The reason being is that sideloaded apps from third-party app stores or those downloaded as APK files don't go through the same rigorous security checks that they would on the Google Play Store or other first-party app stores like the Samsung Galaxy Store. From there, you want to make sure that Google Play Protect is enabled on your Android phone. This pre-installed security app scans all of your existing apps and any new ones you download for malware. For extra protection though, you may also want to install and run one of the best Android antivirus apps alongside it. Malicious apps are one of the easiest ways for hackers and other cybercriminals to establish a foothold on your devices, so they likely won't be going anywhere anytime soon. Instead, it's up to you to carefully vet each and every app you download and install. You also want to keep in mind that if an app sounds too good to be true, it probably is. By sticking to official, first-party app stores and by limiting the number of apps you have installed on your phone overall, you should be able to safely avoid this new version of Konfety and other Android malware strains entirely. Follow Tom's Guide on Google News to get our up-to-date news, how-tos, and reviews in your feeds. Make sure to click the Follow button. More from Tom's Guide 5.4 million hit in major healthcare data breach — names, emails, SSNs and more exposed Google Gemini flaw exploited to turn AI-powered email summaries into the perfect phishing tool — everything you need to know This new Android attack could trick you into compromising your own phone — everything you need to know

Your Ring cameras weren't hacked over the weekend — here's what actually happened
Your Ring cameras weren't hacked over the weekend — here's what actually happened

Yahoo

timean hour ago

  • Yahoo

Your Ring cameras weren't hacked over the weekend — here's what actually happened

When you buy through links on our articles, Future and its syndication partners may earn a commission. If you noticed a flurry of unauthorized devices logged into your Ring account recently, you're not alone and no, you weren't hacked. As reported by BleepingComputer, Ring, which makes some of the best video doorbells and home security cameras, has revealed that a bug in a backend update led to customers around the world believing their accounts might have been hacked. In a post on Facebook, the company explained that it was aware of 'a bug that incorrectly displays prior login dates as May 28, 2025.' Ring also updated its status page, explaining that the bug led to information being incorrectly displayed within the Control Center in its app. The company also went on to say that 'we have no reason to believe this is the result of unauthorized access to customer accounts.' In addition to fake login entries, some Ring customers reported that they saw unknown devices, strange IP addresses and even countries they've never been to in their Authorized Client Devices list. As BleepingComputer points out, this led many of them to believe that these entries couldn't just be previous logins. To make matters worse, it took Ring a lot longer than many customers believed it would to reverse the faulty backend update that led to all this confusion in the first. In fact, even after three days, some users are still seeing logins from unrecognized devices. Likewise, some users reported seeing live view activity when no one within their household had accessed the app. At the same time, other customers reported that they didn't receive security alerts or multi-factor authentication prompts when new devices were added to their Ring app. How to keep your Ring account safe from hackers Seeing unauthorized devices access your video doorbell and home security cameras is certainly the kind of thing that can leave someone shaken up. It could also indicate that your account was hacked which is why this backend update bug led to an uproar online from Ring users. If you're worried about unauthorized devices accessing your Ring account, you can open the app, head to Control Center and then to Authorized Client Devices. There, you'll see a list of all devices and logins. If there are any there you don't recognize, then you should remove them immediately. Although Ring has done its best to assure users that this was not a data breach, it's still a good idea to change your password if you haven't done so recently. Just like with the rest of your online accounts, you want to ensure you're using a strong and complex password in the Ring app. If you have trouble coming up with passwords on your own or even just remembering them, then you might want to consider using one of the best password managers. Not only will they generate strong and unique passwords for all of your online accounts but a password manager also stores all of your credentials securely in one place so that they're easy to find. In addition to changing your Ring password, you should also set up two-factor authentication for your account if you haven't done so already. That way, anyone who tries to login to your account will also need a single-use code to gain access to it. I've reached out to Ring in regard to this recent backend update bug and will update this story accordingly if and when I learn more. In the meantime though, an incident like this one while scary could be the wake-up call you needed to start taking your online security more seriously. It's one thing to lose access to an account and it's another to potentially have strangers watching your every move online. When it comes to the best home security cameras, you always want to make sure that you keep their apps updated and that you're using a strong and complex password that you aren't using for any of your other online accounts. Follow Tom's Guide on Google News to get our up-to-date news, how-tos, and reviews in your feeds. Make sure to click the Follow button. More from Tom's Guide How to enable two-factor authentication (2FA) for Ring cameras Which Ring Video Doorbell should you buy? Ring backtracks, lets cops once again request video from your doorbell and security cameras

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store