{"id":5188,"date":"2023-09-07T19:52:53","date_gmt":"2023-09-07T19:52:53","guid":{"rendered":"https:\/\/smartmag.theme-sphere.com\/tech-blog\/latest-windows-11-preview-build-finally-lets-you-search-for-copied-text\/"},"modified":"2024-04-20T03:15:31","modified_gmt":"2024-04-20T03:15:31","slug":"latest-windows-11-preview-build-finally-lets-you-search-for-copied-text","status":"publish","type":"post","link":"https:\/\/projects.multibizdev.com\/ciss_blogs\/latest-windows-11-preview-build-finally-lets-you-search-for-copied-text\/","title":{"rendered":"The Quantum Threat: Disruption of Nuclear Warhead Cryptography and Its Impact on Nuclear Deterrence"},"content":{"rendered":"\n<p>Nuclear safety and security have always been of paramount importance. In the early 1960s, during the administration of John F. Kennedy, the decision was made to utilize the cryptographic technique of Permissive Action Links (PALs) to enhance the security of nuclear weapons. The&nbsp;<a href=\"https:\/\/web.stanford.edu\/class\/ee380\/Abstracts\/060315-slides-bellovin.pdf\">primary objective<\/a>&nbsp;was to prevent the unauthorized launch of US nuclear weapons by its European allies \u2013 including France, Germany, Turkey, and Greece \u2013 who were granted access to the US nuclear armaments through NATO agreements. Additionally, the adoption of PALs was prompted by apprehensions about a&nbsp;<a href=\"https:\/\/web.stanford.edu\/class\/ee380\/Abstracts\/060315-slides-bellovin.pdf\">potential Soviet invasion<\/a>&nbsp;of Western Europe. This could precipitate a nuclear conflict if US allies opted to deploy nuclear weapons without Washington\u2019s authorization. This measure was conceived as a means to elevate the command and control protocols of nuclear weaponry, thereby diminishing the prospect of inadvertent or unauthorized launch.<\/p>\n\n\n\n<p>The development of PALs was the joint responsibility of the US Department of Defense (DOD) and the Atomic Energy Commission (AEC), facilitated by the Sandia and Los Alamos National Laboratories working on US national security program. In&nbsp;<a href=\"https:\/\/web.stanford.edu\/class\/ee380\/Abstracts\/060315-slides-bellovin.pdf\">1962<\/a>, the initial PALs were integrated with certain nuclear weapons stationed in Europe. This pivotal security measure gained global traction, with nuclear-armed nations worldwide adopting PALs to safeguard their weaponry. These PALs require a secret code or physical key to be entered before a nuclear weapon can be armed or launched. This code or key is encrypted and verified by a device on the weapon, preventing unauthorized access. This apparatus also establishes communication with other components within the weapon system, enabling their activation or deactivation. PALs have evolved from mechanical locks to complex electronic circuits, incorporating diverse cryptographic methods, including self-destruct protocols, tamper detection systems, and public-key encryption.<\/p>\n\n\n\n<p>While PALs seemed highly secure in the past, nothing remains impervious. The advent of quantum computing has unveiled vulnerabilities in the military cryptography utilized to safeguard nuclear weapons. It is because the integrity of cryptography faces a challenge from quantum computing, as these advanced computers have the potential to break commonly used encryption techniques like RSA and elliptic curve cryptography. These techniques rely on complex mathematical puzzles that are difficult to solve by classical computers. Quantum computers, however, can employ algorithms such as Shor\u2019s or Grover\u2019s to efficiently crack these puzzles, leading to the&nbsp;<a href=\"http:\/\/gilyen.hu\/\">decryption<\/a>&nbsp;of encrypted data. This implies that if harnessed effectively, quantum computing could decrypt PALs, enabling access to nuclear weapons, including their launch codes.<\/p>\n\n\n\n<p>The potential decryption of PALs guarding nuclear weapons presents a grave challenge to nuclear deterrence. If a state manages to develop and deploy a formidable quantum computer, it could potentially breach the encryption of PALs and other communication systems responsible for transmitting and verifying nuclear launch codes or directives. This scenario could grant the state unauthorized access, the ability to incapacitate, or even launch the nuclear weapons belonging to its adversaries clandestinely. This could provide the state with a substantial upper hand during a conflict, leveraging nuclear weapons for coercion, blackmail, or negotiation. The prevailing concept of nuclear deterrence hinges on the assurance that rational actors would refrain from initiating a nuclear conflict due to the promise of mutual devastation. Nevertheless, if quantum computing compromises nuclear weapons security, rational deterrence paradigm is challenged, thus escalating the risk of a catastrophic nuclear war.<\/p>\n\n\n\n<p>What further exacerbates the situation is the fact that the strategic benefits arising from efficient quantum computing mechanisms have propelled states into a fierce arms race within this domain. Quantum computing could potentially revolutionize various domains vital for national security and military operations, such as intelligence, communication, cryptography, and simulation.<\/p>\n\n\n\n<p>States have expressed concerns over the quantum development of other states, fearing that they could lose their competitive edge or technological sovereignty. Moreover, powerful states such as the&nbsp;<a href=\"https:\/\/www.weforum.org\/agenda\/2021\/09\/everything-you-need-to-know-about-quantum-computing\/\">US<\/a>,&nbsp;<a href=\"https:\/\/www.bing.com\/ck\/a?!&amp;&amp;p=a97313622a558201JmltdHM9MTY5MTc5ODQwMCZpZ3VpZD0yZGIyMDBjYS1mZjdjLTYwMzQtMjI4NC0wZjVlZmU2ODYxODImaW5zaWQ9NTQ0NQ&amp;ptn=3&amp;hsh=3&amp;fclid=2db200ca-ff7c-6034-2284-0f5efe686182&amp;psq=russia+leading+in+quantum+computing+&amp;u=a1aHR0cHM6Ly93d3cubGlua2VkaW4uY29tL3B1bHNlL3J1c3NpYXMtZmlyc3QtcXVhbnR1bS1jb21wdXRlci0xNi1xdWJpdC1icmVha3Rocm91Z2gtc3dhcm5vZGlwLW5hZyM6fjp0ZXh0PVJlY2VudGx5JTJDJTIwYSUyMHRlYW0lMjBvZiUyMFJ1c3NpYW4lMjBwaHlzaWNpc3RzJTIwcHJlc2VudGVkJTIwYSxjb21iaW5lJTIwdHdvJTIwYWR2YW5jZWQlMjBhcHByb2FjaGVzJTNBJTIwdHJhcHBlZCUyMGlvbiUyMGFuZCUyMHBob3Rvbmljcy4&amp;ntb=1\">Russia<\/a>, and&nbsp;<a href=\"https:\/\/www.forbes.com\/sites\/gilpress\/2022\/04\/14\/the-state-of-quantum-computing-future-present-past\/\">China<\/a>, have launched aggressive quantum programs, investing heavily in quantum research and development and seeking to achieve quantum supremacy or dominance. These superpowers also compete for quantum talent, resources, and infrastructure and are developing quantum policies and strategies. Other states are also following them, trying to catch up or keep pace with the quantum race, or to establish their niche or role in the quantum landscape.<\/p>\n\n\n\n<p>To counter the looming threat of nuclear deterrence vulnerability posed by quantum computing, states should proactively engage in research and policy formulation aimed at fortifying the security of their nuclear weapons. One avenue is the exploration of physical cryptographic methods, grounded in the intrinsic characteristics of radiation, as an alternative to digital encryption. These methods hold the potential to authenticate and verify nuclear warheads without divulging their sensitive design details while also being resistant to quantum attacks due to their departure from complex mathematical challenges.<\/p>\n\n\n\n<p>It may be mentioned that physical cryptographic techniques are currently in the developmental phase and confront various technical and political obstacles before practical implementation. Consequently, it becomes imperative for states to channel investments into advancing these methods, fostering a collaborative environment with other nations to build trust, transparency, and mutual assurance in nuclear security.<\/p>\n\n\n\n<div class=\"wp-block-media-text is-stacked-on-mobile\" style=\"grid-template-columns:33% auto\"><figure class=\"wp-block-media-text__media\"><img decoding=\"async\" src=\"https:\/\/blog.ciss.org.pk\/wp-content\/uploads\/2020\/03\/Picture-Fatima-Zainab-web-300x300-1.jpeg\" alt=\"\" class=\"wp-image-8094 size-full\"\/><\/figure><div class=\"wp-block-media-text__content\">\n<h2 class=\"wp-block-heading\">About the Author<\/h2>\n\n\n\n<p>Ms Fatima Zainab is a student of Strategic and Security Studies at the National Defence University (NDU) Islamabad.<\/p>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Nuclear safety and security have always been of paramount importance. In the early 1960s, during the administration of John F. Kennedy, the decision was made to utilize the cryptographic technique of Permissive Action Links (PALs) to enhance the security of nuclear weapons. The&nbsp;primary objective&nbsp;was to prevent the unauthorized launch of US nuclear weapons by its<\/p>\n","protected":false},"author":36,"featured_media":8095,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[171],"tags":[247],"class_list":{"0":"post-5188","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-blog","8":"tag-fatima-zainab"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The Quantum Threat: Disruption of Nuclear Warhead Cryptography and Its Impact on Nuclear Deterrence - CISS Blog - Center For International Strategic Studies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/projects.multibizdev.com\/ciss_blogs\/latest-windows-11-preview-build-finally-lets-you-search-for-copied-text\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Quantum Threat: Disruption of Nuclear Warhead Cryptography and Its Impact on Nuclear Deterrence - CISS Blog - Center For International Strategic Studies\" \/>\n<meta property=\"og:description\" content=\"Nuclear safety and security have always been of paramount importance. In the early 1960s, during the administration of John F. Kennedy, the decision was made to utilize the cryptographic technique of Permissive Action Links (PALs) to enhance the security of nuclear weapons. The&nbsp;primary objective&nbsp;was to prevent the unauthorized launch of US nuclear weapons by its\" \/>\n<meta property=\"og:url\" content=\"https:\/\/projects.multibizdev.com\/ciss_blogs\/latest-windows-11-preview-build-finally-lets-you-search-for-copied-text\/\" \/>\n<meta property=\"og:site_name\" content=\"CISS Blog - Center For International Strategic Studies\" \/>\n<meta property=\"article:published_time\" content=\"2023-09-07T19:52:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-20T03:15:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/projects.multibizdev.com\/ciss_blogs\/wp-content\/uploads\/2020\/03\/Picture-Fatima-Zainab-web-300x300-2.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"fatimazainab\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"fatimazainab\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/projects.multibizdev.com\/ciss_blogs\/latest-windows-11-preview-build-finally-lets-you-search-for-copied-text\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/projects.multibizdev.com\/ciss_blogs\/latest-windows-11-preview-build-finally-lets-you-search-for-copied-text\/\"},\"author\":{\"name\":\"fatimazainab\",\"@id\":\"https:\/\/projects.multibizdev.com\/ciss_blogs\/#\/schema\/person\/ce627d98643fb0807edbc426419f8c79\"},\"headline\":\"The Quantum Threat: Disruption of Nuclear Warhead Cryptography and Its Impact on Nuclear Deterrence\",\"datePublished\":\"2023-09-07T19:52:53+00:00\",\"dateModified\":\"2024-04-20T03:15:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/projects.multibizdev.com\/ciss_blogs\/latest-windows-11-preview-build-finally-lets-you-search-for-copied-text\/\"},\"wordCount\":875,\"commentCount\":35,\"publisher\":{\"@id\":\"https:\/\/projects.multibizdev.com\/ciss_blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/projects.multibizdev.com\/ciss_blogs\/latest-windows-11-preview-build-finally-lets-you-search-for-copied-text\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/projects.multibizdev.com\/ciss_blogs\/wp-content\/uploads\/2020\/03\/Picture-Fatima-Zainab-web-300x300-2.jpeg\",\"keywords\":[\"Fatima Zainab\"],\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/projects.multibizdev.com\/ciss_blogs\/latest-windows-11-preview-build-finally-lets-you-search-for-copied-text\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/projects.multibizdev.com\/ciss_blogs\/latest-windows-11-preview-build-finally-lets-you-search-for-copied-text\/\",\"url\":\"https:\/\/projects.multibizdev.com\/ciss_blogs\/latest-windows-11-preview-build-finally-lets-you-search-for-copied-text\/\",\"name\":\"The Quantum Threat: Disruption of Nuclear Warhead Cryptography and Its Impact on Nuclear Deterrence - CISS Blog - Center For International Strategic Studies\",\"isPartOf\":{\"@id\":\"https:\/\/projects.multibizdev.com\/ciss_blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/projects.multibizdev.com\/ciss_blogs\/latest-windows-11-preview-build-finally-lets-you-search-for-copied-text\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/projects.multibizdev.com\/ciss_blogs\/latest-windows-11-preview-build-finally-lets-you-search-for-copied-text\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/projects.multibizdev.com\/ciss_blogs\/wp-content\/uploads\/2020\/03\/Picture-Fatima-Zainab-web-300x300-2.jpeg\",\"datePublished\":\"2023-09-07T19:52:53+00:00\",\"dateModified\":\"2024-04-20T03:15:31+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/projects.multibizdev.com\/ciss_blogs\/latest-windows-11-preview-build-finally-lets-you-search-for-copied-text\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/projects.multibizdev.com\/ciss_blogs\/latest-windows-11-preview-build-finally-lets-you-search-for-copied-text\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/projects.multibizdev.com\/ciss_blogs\/latest-windows-11-preview-build-finally-lets-you-search-for-copied-text\/#primaryimage\",\"url\":\"https:\/\/projects.multibizdev.com\/ciss_blogs\/wp-content\/uploads\/2020\/03\/Picture-Fatima-Zainab-web-300x300-2.jpeg\",\"contentUrl\":\"https:\/\/projects.multibizdev.com\/ciss_blogs\/wp-content\/uploads\/2020\/03\/Picture-Fatima-Zainab-web-300x300-2.jpeg\",\"width\":300,\"height\":300},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/projects.multibizdev.com\/ciss_blogs\/latest-windows-11-preview-build-finally-lets-you-search-for-copied-text\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/projects.multibizdev.com\/ciss_blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Quantum Threat: Disruption of Nuclear Warhead Cryptography and Its Impact on Nuclear Deterrence\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/projects.multibizdev.com\/ciss_blogs\/#website\",\"url\":\"https:\/\/projects.multibizdev.com\/ciss_blogs\/\",\"name\":\"CISS Blog - Center For International Strategic Studies\",\"description\":\"Center For International Strategic Studies\",\"publisher\":{\"@id\":\"https:\/\/projects.multibizdev.com\/ciss_blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/projects.multibizdev.com\/ciss_blogs\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/projects.multibizdev.com\/ciss_blogs\/#organization\",\"name\":\"CISS Blog - Center For International Strategic Studies\",\"url\":\"https:\/\/projects.multibizdev.com\/ciss_blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/projects.multibizdev.com\/ciss_blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/projects.multibizdev.com\/ciss_blogs\/wp-content\/uploads\/2024\/03\/CISS-Website-Logo-2.png\",\"contentUrl\":\"https:\/\/projects.multibizdev.com\/ciss_blogs\/wp-content\/uploads\/2024\/03\/CISS-Website-Logo-2.png\",\"width\":240,\"height\":80,\"caption\":\"CISS Blog - Center For International Strategic Studies\"},\"image\":{\"@id\":\"https:\/\/projects.multibizdev.com\/ciss_blogs\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/projects.multibizdev.com\/ciss_blogs\/#\/schema\/person\/ce627d98643fb0807edbc426419f8c79\",\"name\":\"fatimazainab\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/projects.multibizdev.com\/ciss_blogs\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d61d152c0bb3e82c2cf104e3a007aec17e4ba3db599c6212abf12a14aa26aaa5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d61d152c0bb3e82c2cf104e3a007aec17e4ba3db599c6212abf12a14aa26aaa5?s=96&d=mm&r=g\",\"caption\":\"fatimazainab\"},\"url\":\"https:\/\/projects.multibizdev.com\/ciss_blogs\/author\/fatimazainab\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Quantum Threat: Disruption of Nuclear Warhead Cryptography and Its Impact on Nuclear Deterrence - CISS Blog - Center For International Strategic Studies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/projects.multibizdev.com\/ciss_blogs\/latest-windows-11-preview-build-finally-lets-you-search-for-copied-text\/","og_locale":"en_US","og_type":"article","og_title":"The Quantum Threat: Disruption of Nuclear Warhead Cryptography and Its Impact on Nuclear Deterrence - CISS Blog - Center For International Strategic Studies","og_description":"Nuclear safety and security have always been of paramount importance. In the early 1960s, during the administration of John F. Kennedy, the decision was made to utilize the cryptographic technique of Permissive Action Links (PALs) to enhance the security of nuclear weapons. The&nbsp;primary objective&nbsp;was to prevent the unauthorized launch of US nuclear weapons by its","og_url":"https:\/\/projects.multibizdev.com\/ciss_blogs\/latest-windows-11-preview-build-finally-lets-you-search-for-copied-text\/","og_site_name":"CISS Blog - Center For International Strategic Studies","article_published_time":"2023-09-07T19:52:53+00:00","article_modified_time":"2024-04-20T03:15:31+00:00","og_image":[{"width":300,"height":300,"url":"https:\/\/projects.multibizdev.com\/ciss_blogs\/wp-content\/uploads\/2020\/03\/Picture-Fatima-Zainab-web-300x300-2.jpeg","type":"image\/jpeg"}],"author":"fatimazainab","twitter_card":"summary_large_image","twitter_misc":{"Written by":"fatimazainab","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/projects.multibizdev.com\/ciss_blogs\/latest-windows-11-preview-build-finally-lets-you-search-for-copied-text\/#article","isPartOf":{"@id":"https:\/\/projects.multibizdev.com\/ciss_blogs\/latest-windows-11-preview-build-finally-lets-you-search-for-copied-text\/"},"author":{"name":"fatimazainab","@id":"https:\/\/projects.multibizdev.com\/ciss_blogs\/#\/schema\/person\/ce627d98643fb0807edbc426419f8c79"},"headline":"The Quantum Threat: Disruption of Nuclear Warhead Cryptography and Its Impact on Nuclear Deterrence","datePublished":"2023-09-07T19:52:53+00:00","dateModified":"2024-04-20T03:15:31+00:00","mainEntityOfPage":{"@id":"https:\/\/projects.multibizdev.com\/ciss_blogs\/latest-windows-11-preview-build-finally-lets-you-search-for-copied-text\/"},"wordCount":875,"commentCount":35,"publisher":{"@id":"https:\/\/projects.multibizdev.com\/ciss_blogs\/#organization"},"image":{"@id":"https:\/\/projects.multibizdev.com\/ciss_blogs\/latest-windows-11-preview-build-finally-lets-you-search-for-copied-text\/#primaryimage"},"thumbnailUrl":"https:\/\/projects.multibizdev.com\/ciss_blogs\/wp-content\/uploads\/2020\/03\/Picture-Fatima-Zainab-web-300x300-2.jpeg","keywords":["Fatima Zainab"],"articleSection":["Blog"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/projects.multibizdev.com\/ciss_blogs\/latest-windows-11-preview-build-finally-lets-you-search-for-copied-text\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/projects.multibizdev.com\/ciss_blogs\/latest-windows-11-preview-build-finally-lets-you-search-for-copied-text\/","url":"https:\/\/projects.multibizdev.com\/ciss_blogs\/latest-windows-11-preview-build-finally-lets-you-search-for-copied-text\/","name":"The Quantum Threat: Disruption of Nuclear Warhead Cryptography and Its Impact on Nuclear Deterrence - CISS Blog - Center For International Strategic Studies","isPartOf":{"@id":"https:\/\/projects.multibizdev.com\/ciss_blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/projects.multibizdev.com\/ciss_blogs\/latest-windows-11-preview-build-finally-lets-you-search-for-copied-text\/#primaryimage"},"image":{"@id":"https:\/\/projects.multibizdev.com\/ciss_blogs\/latest-windows-11-preview-build-finally-lets-you-search-for-copied-text\/#primaryimage"},"thumbnailUrl":"https:\/\/projects.multibizdev.com\/ciss_blogs\/wp-content\/uploads\/2020\/03\/Picture-Fatima-Zainab-web-300x300-2.jpeg","datePublished":"2023-09-07T19:52:53+00:00","dateModified":"2024-04-20T03:15:31+00:00","breadcrumb":{"@id":"https:\/\/projects.multibizdev.com\/ciss_blogs\/latest-windows-11-preview-build-finally-lets-you-search-for-copied-text\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/projects.multibizdev.com\/ciss_blogs\/latest-windows-11-preview-build-finally-lets-you-search-for-copied-text\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/projects.multibizdev.com\/ciss_blogs\/latest-windows-11-preview-build-finally-lets-you-search-for-copied-text\/#primaryimage","url":"https:\/\/projects.multibizdev.com\/ciss_blogs\/wp-content\/uploads\/2020\/03\/Picture-Fatima-Zainab-web-300x300-2.jpeg","contentUrl":"https:\/\/projects.multibizdev.com\/ciss_blogs\/wp-content\/uploads\/2020\/03\/Picture-Fatima-Zainab-web-300x300-2.jpeg","width":300,"height":300},{"@type":"BreadcrumbList","@id":"https:\/\/projects.multibizdev.com\/ciss_blogs\/latest-windows-11-preview-build-finally-lets-you-search-for-copied-text\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/projects.multibizdev.com\/ciss_blogs\/"},{"@type":"ListItem","position":2,"name":"The Quantum Threat: Disruption of Nuclear Warhead Cryptography and Its Impact on Nuclear Deterrence"}]},{"@type":"WebSite","@id":"https:\/\/projects.multibizdev.com\/ciss_blogs\/#website","url":"https:\/\/projects.multibizdev.com\/ciss_blogs\/","name":"CISS Blog - Center For International Strategic Studies","description":"Center For International Strategic Studies","publisher":{"@id":"https:\/\/projects.multibizdev.com\/ciss_blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/projects.multibizdev.com\/ciss_blogs\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/projects.multibizdev.com\/ciss_blogs\/#organization","name":"CISS Blog - Center For International Strategic Studies","url":"https:\/\/projects.multibizdev.com\/ciss_blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/projects.multibizdev.com\/ciss_blogs\/#\/schema\/logo\/image\/","url":"https:\/\/projects.multibizdev.com\/ciss_blogs\/wp-content\/uploads\/2024\/03\/CISS-Website-Logo-2.png","contentUrl":"https:\/\/projects.multibizdev.com\/ciss_blogs\/wp-content\/uploads\/2024\/03\/CISS-Website-Logo-2.png","width":240,"height":80,"caption":"CISS Blog - Center For International Strategic Studies"},"image":{"@id":"https:\/\/projects.multibizdev.com\/ciss_blogs\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/projects.multibizdev.com\/ciss_blogs\/#\/schema\/person\/ce627d98643fb0807edbc426419f8c79","name":"fatimazainab","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/projects.multibizdev.com\/ciss_blogs\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d61d152c0bb3e82c2cf104e3a007aec17e4ba3db599c6212abf12a14aa26aaa5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d61d152c0bb3e82c2cf104e3a007aec17e4ba3db599c6212abf12a14aa26aaa5?s=96&d=mm&r=g","caption":"fatimazainab"},"url":"https:\/\/projects.multibizdev.com\/ciss_blogs\/author\/fatimazainab\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/projects.multibizdev.com\/ciss_blogs\/wp-json\/wp\/v2\/posts\/5188","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/projects.multibizdev.com\/ciss_blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/projects.multibizdev.com\/ciss_blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/projects.multibizdev.com\/ciss_blogs\/wp-json\/wp\/v2\/users\/36"}],"replies":[{"embeddable":true,"href":"https:\/\/projects.multibizdev.com\/ciss_blogs\/wp-json\/wp\/v2\/comments?post=5188"}],"version-history":[{"count":3,"href":"https:\/\/projects.multibizdev.com\/ciss_blogs\/wp-json\/wp\/v2\/posts\/5188\/revisions"}],"predecessor-version":[{"id":10061,"href":"https:\/\/projects.multibizdev.com\/ciss_blogs\/wp-json\/wp\/v2\/posts\/5188\/revisions\/10061"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/projects.multibizdev.com\/ciss_blogs\/wp-json\/wp\/v2\/media\/8095"}],"wp:attachment":[{"href":"https:\/\/projects.multibizdev.com\/ciss_blogs\/wp-json\/wp\/v2\/media?parent=5188"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/projects.multibizdev.com\/ciss_blogs\/wp-json\/wp\/v2\/categories?post=5188"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/projects.multibizdev.com\/ciss_blogs\/wp-json\/wp\/v2\/tags?post=5188"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}