🌌
Privacy Village Academy
Join The Community!AcademyAbout HGPE
  • Hitchhiker's Guide to Privacy Engineering
    • ❓What is HGPE?
      • ⚖️Who is this for?
      • 🧙‍♂️Privacy Engineering
      • 🎨Creative Privacy
      • 🔮Generative AI
      • 🧑‍💻About the Author
  • 🧙‍♂️The Ethical AI Governance Playbook 2025 Edition
    • 🤖Chapter 1 : AI Literacy
    • 🌍Chapter 2 : AI Governance in the 21st Century
    • ⌛Chapter 3 - Getting Started with AI Act Compliance
    • 🚀Chapter 4 : Rise of AI Governance: Building Ethical & Compliant AI
    • Chapter 5 : Introduction to the Lifecycle of AI
  • 🎓Privacy Engineering Field Guide Season 1
    • ❓Decoding the Digital World: Exploring Everyday Technology
    • 👁️Introduction: Why Privacy Matters?
      • Age of Mass Surveillance
      • Privacy & Democracy
      • Privacy & Government Surveillance
    • ⚡Chapter 1 : How Computers Work?
      • Electricity
      • Bits
      • Logic Gates
      • Central Processing Unit (CPU)
      • Graphic Processing Unit (GPU)
      • Motherboard
      • Data Storage
      • Databases
      • Operating System (OS)
      • Computer Code
      • Programming Languages
      • The File System
      • Bugs and Errors
      • Computer Virus
      • Internet of Things (IoT)
      • Cloud Computing
    • 🛰️Chapter 2 : How the internet works?
      • Physical Infrastructure
      • Network and Protocols
      • Switch
      • Routers
      • IP Address
      • Domain Name System (DNS)
      • Mac Address
      • TCP / IP
      • OSI Model
      • Packets
      • The Client - Server Architecture
      • Secure Socket Shell (SSH)
      • Transport Layer Security (TLS)
      • Firewall
      • Tunnels and VPNs
      • Proxy Server
    • 🖥️Chapter 3 : How Websites Work?
      • HTML
      • CSS
      • Javascript
      • Web Server
      • Browser
      • HTTP
      • Databases
      • Front End (Client Side)
      • Back End (Server Side)
      • Cookies
      • Local Storage
      • Session Storage
      • IndexedDB
      • XHR Requests
      • Web APIs
      • Webhooks
      • Email Server
      • HTTPS
      • Web Application Firewall
      • Single Sign-on (SS0)
      • OAuth 2.0
      • Pixels
      • Canvas Fingerprinting
      • Email Tracking
      • Containers
      • CI/CD
      • Kubernetes
      • Serverless Architecture
    • ⚛️Chapter 4 : How Quantum Computers Work?
      • Quantum Properties
      • Quantum Bits (Qubits)
      • Decoherence
      • Quantum Circuits
      • Quantum Algorithms
      • Quantum Sensing
      • Post-Quantum Cryptography
    • 📳Chapter 5 : Mobile Apps and Privacy
      • Battery
      • Processor
      • Mobile Operating Systems
      • Mobile Data Storage
      • Cellular Data
      • Mobile Device Sensors
      • Wireless Connectivity
      • Camera & Microphone
      • Mobile Apps
      • Software Development Kits (SDKs)
      • Mobile Device Identifiers
      • Bring Your Own Device (BYOD)
  • 🕵️‍♂️Privacy Engineering Field Guide Season 2
    • ❓Introduction to Privacy Engineering for Non-Techs
      • 🎭Chapter 1 : Digital Identities
        • What is identity?
        • Authentication Flows
        • Authentication vs. Authorization
        • OAuth 2.0
        • OpenID Connect (OIDC)
        • Self Sovereign Identities
        • Decentralized Identifiers
        • eIDAS
      • 👁️‍🗨️Chapter 2 : De-Identification
        • Introduction to De-Identification?
        • Input / Output Privacy
        • De-identification Strategies
        • K-Anonymity
        • Differential Privacy
        • Privacy Threat Modeling
  • 📖HGPE Story and Lore
    • 🪦Chapter 1 : The Prologue
    • ☄️Chapter 2 : Battle for Earth
    • 🦠Chapter 3 : A Nightmare To Remember
    • 🧙‍♂️Chapter 4 : The Academy
    • 🌃Chapter 5: The Approaching Darkness
    • ⚔️Chapter 6 : The Invasion
    • 🏰Chapter 7 : The Fall of the Academy
    • 🛩️Chapter 8 : The Escape
    • 🪐Chapter 9 : The Moon Cave
    • 🦇Chapter 10: Queen of Darkness
  • 📺Videos, Audio Book and Soundtracks
    • 🎧Reading Episodes
    • 🎹Soundtracks
  • 👾HGPE Privacy Games and Challenges
    • 🎮Data Privacy Day'23 / Privacy Treasure Hunt Game
    • 🧩Privacy Quest
  • 📬Subscribe Now!
Powered by GitBook
On this page

Was this helpful?

  1. Privacy Engineering Field Guide Season 1
  2. Chapter 4 : How Quantum Computers Work?

Quantum Properties

A quantum state is a mathematical representation of a physical system, such as an atom, and provides the basis for processing quantum information.

PreviousChapter 4 : How Quantum Computers Work?NextQuantum Bits (Qubits)

Last updated 2 years ago

Was this helpful?

Galactic citizens marveled at the strange and wondrous world of quantum mechanics. The weird and wonderful properties of subatomic particles - how they could exist in two places at once, how they could become entangled and affect each other instantaneously, how they could tunnel through seemingly impenetrable barriers.

Then the age of quantum computers began.

Humanity watched in awe as particles blurred and shifted, appearing and disappearing in the blink of an eye. They knew that these quantum properties held the key to unlocking the mysteries of the universe, and they couldn't wait to explore them further.

What are Quantum Properties?

Uncertainty

The uncertainty principle is a fundamental concept in quantum mechanics that states that it is impossible to know both the position and momentum of a particle with absolute certainty.

This principle has profound implications for our understanding of the behavior of subatomic particles, as it suggests that the universe is inherently unpredictable at a quantum level.

It also plays a crucial role in many practical applications, such as quantum computing and cryptography.

Entanglement

This is the quantum property that makes one believe we are really living in a simulation.

Entanglement is another fundamental concept in quantum mechanics, which describes a strange and seemingly instantaneous connection that can exist between two or more particles.

Entanglement happens when qubits have a relationship with each other that prevents them from acting independently. Entangled particles are somehow linked on the quantum level, even though they are separated in physical space and have no known way of communicating with each other.

When two particles are entangled, the measurement of one particle somehow affects another distant one as they mysteriously sense the quantum state of their twin.

Superposition

The principle of superposition is the idea that a qubit can be in multiple states at once. With traditional bits, you only have two options: 1 or 0.

Superposition is a concept in quantum mechanics that describes the ability of particles to exist in multiple states at once.

Superposition means we can kind of compute both zero and one at the same time which causes the quantum speedup power. How things works are that when we measure this qubit collapse to either one or zero with some probability.

Superposition allows quantum computers to compute directly with quantum probabilities.

Schrödinger's cat thought experiment, imagines placing a cat in a sealed box along with a poisonous substance that has an equal chance of killing the cat—or not—within an hour.

Schrödinger proposed that, at the end of the hour, the cat could be said to be both alive and dead, in a superposition of states until the box is opened, and that the act of observation randomly determines whether the cat is alive or dead.

This concept has important implications for the development of quantum technologies such as quantum computing, where multiple states can be used to perform complex calculations more efficiently than classical computers.

🎓
⚛️
Red and Kyle made their way to the atmosphere of the planet Koraya. It was home to a great human and machine city once. Before Lilith laid siege and captured humans and corrupted most of the machines. Lilith had created a moon lab during the siege to experiment on the captured humans on Shadow Matter mutations.
Page cover image