In 2018, Aayush Jain, a graduate pupil on the College of California, Los Angeles, traveled to Japan to offer a speak about a strong cryptographic instrument he and his colleagues had been creating. As he detailed the group’s method to indistinguishability obfuscation (iO for brief), one viewers member raised his hand in bewilderment.

“However I believed iO doesn’t exist?” he stated.

On the time, such skepticism was widespread. Indistinguishability obfuscation, if it could possibly be constructed, would be capable to disguise not simply collections of knowledge however the interior workings of a pc program itself, making a kind of cryptographic grasp instrument from which practically each different cryptographic protocol could possibly be constructed. It’s “one cryptographic primitive to rule all of them,” stated Boaz Barak of Harvard College. However to many laptop scientists, this very energy made iO appear too good to be true.

Pc scientists set forth candidate variations of iO beginning in 2013. However the intense pleasure these constructions generated regularly fizzled out, as different researchers found out how you can break their safety. Because the assaults piled up, “you could possibly see quite a lot of adverse vibes,” stated Yuval Ishai of the Technion in Haifa, Israel. Researchers questioned, he stated, “Who will win: the makers or the breakers?”

“There have been the individuals who had been the zealots, they usually believed in [iO] and saved engaged on it,” stated Shafi Goldwasser, director of the Simons Institute for the Idea of Computing on the College of California, Berkeley. However because the years glided by, she stated, “there was much less and fewer of these folks.”

Now, Jain — along with Huijia Lin of the College of Washington and Amit Sahai, Jain’s adviser at UCLA — has planted a flag for the makers. In a paper posted on-line on August 18, the three researchers present for the primary time how you can construct indistinguishability obfuscation utilizing solely “normal” safety assumptions.

All cryptographic protocols relaxation on assumptions — some, such because the well-known RSA algorithm, rely upon the extensively held perception that normal computer systems won’t ever be capable to rapidly issue the product of two massive prime numbers. A cryptographic protocol is just as safe as its assumptions, and former makes an attempt at iO had been constructed on untested and in the end shaky foundations. The brand new protocol, in contrast, is dependent upon safety assumptions which were extensively used and studied previously.

“Barring a extremely shocking improvement, these assumptions will stand,” Ishai stated.

Whereas the protocol is way from able to be deployed in real-world functions, from a theoretical standpoint it gives an immediate option to construct an array of cryptographic instruments that had been beforehand out of attain. As an example, it permits the creation of “deniable” encryption, in which you’ll plausibly persuade an attacker that you just despatched a wholly completely different message from the one you actually despatched, and “useful” encryption, in which you’ll give chosen customers completely different ranges of entry to carry out computations utilizing your information.

The brand new outcome ought to definitively silence the iO skeptics, Ishai stated. “Now there’ll now not be any doubts concerning the existence of indistinguishability obfuscation,” he stated. “It looks like a contented finish.”

The Crown Jewel

For many years, laptop scientists questioned if there may be any safe, all-encompassing option to obfuscate laptop applications, permitting folks to make use of them with out determining their inside secrets and techniques. Program obfuscation would allow a number of helpful functions: As an example, you could possibly use an obfuscated program to delegate explicit duties inside your financial institution or e-mail accounts to different people, with out worrying that somebody may use this system in a means it wasn’t meant for or learn off your account passwords (until this system was designed to output them).

However to date, all makes an attempt to construct sensible obfuscators have failed. “Those which have come out in actual life are ludicrously damaged, … sometimes inside hours of launch into the wild,” Sahai stated. At greatest, they provide attackers a velocity bump, he stated.

In 2001, dangerous information got here on the theoretical entrance too: The strongest type of obfuscation is inconceivable. Known as black field obfuscation, it calls for that attackers ought to be capable to be taught completely nothing about this system besides what they will observe through the use of this system and seeing what it outputs. Some applications, Barak, Sahai and 5 different researchers showed, reveal their secrets and techniques so determinedly that they’re inconceivable to obfuscate totally.

These applications, nonetheless, had been specifically concocted to defy obfuscation and bear little resemblance to real-world applications. So laptop scientists hoped there may be another type of obfuscation that was weak sufficient to be possible however sturdy sufficient to cover the sorts of secrets and techniques folks truly care about. The identical researchers who confirmed that black field obfuscation is inconceivable proposed one attainable different of their paper: indistinguishability obfuscation.

On the face of it, iO doesn’t appear to be an particularly helpful idea. As a substitute of requiring {that a} program’s secrets and techniques be hidden, it merely requires that this system be obfuscated sufficient that when you have two completely different applications that carry out the identical process, you possibly can’t distinguish which obfuscated model got here from which authentic model.

However iO is stronger than it sounds. For instance, suppose you will have a program that carries out some process associated to your checking account, however this system comprises your unencrypted password, making you susceptible to anybody who will get maintain of this system. Then — so long as there may be some program on the market that might carry out the identical process whereas retaining your password hidden — an indistinguishability obfuscator will likely be sturdy sufficient to efficiently masks the password. In spite of everything, if it didn’t, then should you put each applications by the obfuscator, you’d be capable to inform which obfuscated model got here out of your authentic program.

Over time, laptop scientists have proven that you need to use iO as the premise for nearly each cryptographic protocol you could possibly think about (apart from black field obfuscation). That features each traditional cryptographic duties like public key encryption (which is utilized in on-line transactions) and dazzling newcomers like totally homomorphic encryption, through which a cloud laptop can compute on encrypted information with out studying something about it. And it contains cryptographic protocols nobody knew how you can construct, like deniable or useful encryption.

“It truly is type of the crown jewel” of cryptographic protocols, stated Rafael Pass of Cornell College. “When you obtain this, we are able to get primarily the whole lot.”

In 2013, Sahai and 5 co-authors proposed an iO protocol that splits up a program into one thing like jigsaw puzzle items, then makes use of cryptographic objects known as multilinear maps to garble the person items. If the items are put collectively appropriately, the garbling cancels out and this system capabilities as meant, however every particular person piece seems to be meaningless. The outcome was hailed as a breakthrough and prompted dozens of follow-up papers. However inside a number of years, different researchers confirmed that the multilinear maps used within the garbling course of weren’t safe. Different iO candidates got here alongside and had been damaged of their flip.

“There was some fear that possibly that is only a mirage, possibly iO is solely inconceivable to get,” Barak stated. Individuals began to really feel, he stated, that “possibly this complete enterprise is doomed.”

Hiding Much less to Cover Extra

In 2016, Lin began exploring whether or not it may be attainable to get across the weaknesses of multilinear maps by merely demanding much less of them. Multilinear maps are primarily simply secretive methods of computing with polynomials — mathematical expressions made up of sums and merchandise of numbers and variables, like 3xy + 2yz2. These maps, Jain stated, entail one thing akin to a polynomial calculating machine related to a system of secret lockers containing the values of the variables. A person who drops in a polynomial that the machine accepts will get to look inside one closing locker to seek out out whether or not the hidden values make the polynomial consider to 0.

For the scheme to be safe, the person shouldn’t be capable to work out something concerning the contents of the opposite lockers or the numbers that had been generated alongside the way in which. “We wish that to be true,” Sahai stated. However in all of the candidate multilinear maps folks may give you, the method of opening the ultimate locker revealed details about the calculation that was supposed to remain hidden.

For the reason that proposed multilinear map machines all had safety weaknesses, Lin questioned if there was a option to construct iO utilizing machines that don’t should compute as many various sorts of polynomials (and subsequently may be simpler to construct securely). 4 years in the past, she figured out how you can construct iO utilizing solely multilinear maps that compute polynomials whose “diploma” is 30 or much less (which means that each time period is a product of at most 30 variables, counting repeats). Over the following couple of years, she, Sahai and different researchers regularly found out how you can convey the diploma down even decrease, till they had been capable of present how you can construct iO utilizing simply degree-3 multilinear maps.

On paper, it regarded like an enormous enchancment. There was only one downside: From a safety standpoint, “diploma 3 was truly as damaged” because the machines that may deal with polynomials of each diploma, Jain stated.

The one multilinear maps researchers knew how you can construct securely had been people who computed polynomials of diploma 2 or much less. Lin joined forces with Jain and Sahai to attempt to determine how you can assemble iO from degree-2 multilinear maps. However “we had been caught for a really, very very long time,” Lin stated.

“It was type of a depressing time,” Sahai recalled. “There’s a graveyard full of all of the concepts that didn’t work.”

Finally, although — along with Prabhanjan Ananth of the College of California, Santa Barbara and Christian Matt of the blockchain venture Concordium — they got here up with an concept for a kind of compromise: Since iO appeared to want degree-3 maps, however laptop scientists solely had safe constructions for degree-2 maps, what if there was one thing in between — a kind of degree-2.5 map?

The researchers envisioned a system through which a few of the lockers have clear home windows, so the person can see the values contained inside. This frees the machine from having to guard an excessive amount of hidden info. To strike a stability between the facility of higher-degree multilinear maps and the safety of degree-2 maps, the machine is allowed to compute with polynomials of diploma greater than 2, however there’s a restriction: The polynomial should be diploma 2 on the hidden variables. “We’re attempting to not disguise as a lot” as on the whole multilinear maps, Lin stated. The researchers had been capable of present that these hybrid locker techniques will be constructed securely.

nn","settings":{"socialLinks":[{"type":"facebook","label":"Facebook","url":"https://www.facebook.com/QuantaNews","__typename":"SocialMediaLink"},{"type":"twitter","label":"Twitter","url":"https://twitter.com/QuantaMagazine","__typename":"SocialMediaLink"},{"type":"youtube","label":"YouTube","url":"http://youtube.com/c/QuantamagazineOrgNews","__typename":"SocialMediaLink"},{"type":"rss","label":"RSS","url":"https://api.quantamagazine.org/feed/","__typename":"SocialMediaLink"},{"type":"instagram","label":"Instagram","url":"https://instagram.com/quantamag","__typename":"SocialMediaLink"}],"newsletterAction":"https://quantamagazine.us1.list-manage.com/subscribe/put up?u=0d6ddf7dc1a0b7297c8e06618&id=f0cb61321c","newsletterUrl":"http://us1.campaign-archive2.com/residence/?u=0d6ddf7dc1a0b7297c8e06618&id=f0cb61321c","commentsHeader":"

n","itunesSubscribe":"https://itunes.apple.com/us/podcast/quanta-science-podcast/id1021340531?mt=2&ls=1","androidSubscribe":"https://subscribeonandroid.com/www.quantamagazine.org/feed/podcast/","itunesJoyOfX":"https://podcasts.apple.com/us/podcast/the-joy-of-x/id1495067186","androidJoyOfX":"https://subscribeonandroid.com/api.quantamagazine.org/feed/the-joy-of-x/","trackingScripts":"rnrnrnrnrnrnrn","popularSearches":[{"term":"math","label":"Mathematics","__typename":"PopularSearch"},{"term":"physics","label":"Physics","__typename":"PopularSearch"},{"term":"black holes","label":"Black Holes","__typename":"PopularSearch"},{"term":"evolution","label":"Evolution","__typename":"PopularSearch"}],"searchTopics":[{"type":"Tag","label":"Podcasts","tag":{"name":"podcast","slug":"podcast","term_id":"552","__typename":"Term"},"category":{"name":null,"slug":null,"term_id":null,"__typename":"Term"},"__typename":"SearchTopic"},{"type":"Tag","label":"Columns","tag":{"name":"Quantized Columns","slug":"quantized","term_id":"551","__typename":"Term"},"category":{"name":null,"slug":null,"term_id":null,"__typename":"Term"},"__typename":"SearchTopic"},{"type":"Series","label":"Series","tag":{"name":null,"slug":null,"term_id":null,"__typename":"Term"},"category":{"name":null,"slug":null,"term_id":null,"__typename":"Term"},"__typename":"SearchTopic"},{"type":"Category","label":"Interviews","tag":{"name":"Q&A","slug":"qa","term_id":"567","__typename":"Term"},"category":{"name":"Q&A","slug":"qa","term_id":"176","__typename":"Term"},"__typename":"SearchTopic"},{"type":"Category","label":"Multimedia","tag":{"name":null,"slug":null,"term_id":null,"__typename":"Term"},"category":{"name":"Multimedia","slug":"multimedia","term_id":"43","__typename":"Term"},"__typename":"SearchTopic"},{"type":"Category","label":"Puzzles","tag":{"name":"puzzles","slug":"puzzles","term_id":"542","__typename":"Term"},"category":{"name":"Puzzles","slug":"puzzles","term_id":"546","__typename":"Term"},"__typename":"SearchTopic"},{"type":"Category","label":"Blog Posts","tag":{"name":null,"slug":null,"term_id":null,"__typename":"Term"},"category":{"name":"Abstractions blog","slug":"abstractions","term_id":"619","__typename":"Term"},"__typename":"SearchTopic"},{"type":"news","label":"News Articles","tag":{"name":null,"slug":null,"term_id":null,"__typename":"Term"},"category":{"name":null,"slug":null,"term_id":null,"__typename":"Term"},"__typename":"SearchTopic"},{"type":"videos","label":"Videos","tag":{"name":null,"slug":null,"term_id":null,"__typename":"Term"},"category":{"name":null,"slug":null,"term_id":null,"__typename":"Term"},"__typename":"SearchTopic"}],"searchSections":[{"name":"Mathematics","slug":"mathematics","term_id":"188","__typename":"Term"},{"name":"Physics","slug":"physics","term_id":"189","__typename":"Term"},{"name":"Biology","slug":"biology","term_id":"191","__typename":"Term"},{"name":"Computer Science","slug":"computer-science","term_id":"190","__typename":"Term"}],"searchAuthors":[{"id":"28087","name":"Adam Mann","__typename":"AuthorList"},{"id":"56","name":"Alla Katsnelson","__typename":"AuthorList"},{"id":"73","name":"Amanda Gefter","__typename":"AuthorList"},{"id":"59","name":"Andreas von Bubnoff","__typename":"AuthorList"},{"id":"8728","name":"Anil Ananthaswamy","__typename":"AuthorList"},{"id":"11648","name":"Ann Finkbeiner","__typename":"AuthorList"},{"id":"95","name":"Ariel Bleicher","__typename":"AuthorList"},{"id":"15493","name":"Ashley Smart","__typename":"AuthorList"},{"id":"450","name":"Ashley Yeager","__typename":"AuthorList"},{"id":"16315","name":"Bill Andrews","__typename":"AuthorList"},{"id":"2752","name":"Bob Henderson","__typename":"AuthorList"},{"id":"15492","name":"Brendan Z. Foster","__typename":"AuthorList"},{"id":"68","name":"Brooke Borel","__typename":"AuthorList"},{"id":"62","name":"Carl Zimmer","__typename":"AuthorList"},{"id":"13691","name":"Caroline Lee","__typename":"AuthorList"},{"id":"50","name":"Carrie Arnold","__typename":"AuthorList"},{"id":"15142","name":"Chanda Prescod-Weinstein","__typename":"AuthorList"},{"id":"8084","name":"Charlie Wood","__typename":"AuthorList"},{"id":"742","name":"Christie Wilcox","__typename":"AuthorList"},{"id":"11543","name":"Claudia Dreifus","__typename":"AuthorList"},{"id":"57","name":"Courtney Humphries","__typename":"AuthorList"},{"id":"7262","name":"Dalmeet Singh Chawla","__typename":"AuthorList"},{"id":"70","name":"Dan Falk","__typename":"AuthorList"},{"id":"19918","name":"Dana Najjar","__typename":"AuthorList"},{"id":"13724","name":"David H. Freedman","__typename":"AuthorList"},{"id":"26310","name":"David S. Richeson","__typename":"AuthorList"},{"id":"19266","name":"Devin Powell","__typename":"AuthorList"},{"id":"13251","name":"Diana Kwon","__typename":"AuthorList"},{"id":"17000","name":"Elena Renken","__typename":"AuthorList"},{"id":"17149","name":"Elizabeth Landau","__typename":"AuthorList"},{"id":"5279","name":"Elizabeth Preston","__typename":"AuthorList"},{"id":"58","name":"Elizabeth Svoboda","__typename":"AuthorList"},{"id":"25173","name":"Emily Levesque","__typename":"AuthorList"},{"id":"64","name":"Emily Singer","__typename":"AuthorList"},{"id":"47","name":"Erica Klarreich","__typename":"AuthorList"},{"id":"14784","name":"Erika K. Carlson","__typename":"AuthorList"},{"id":"98","name":"Esther Landhuis","__typename":"AuthorList"},{"id":"5830","name":"Eva Silverstein","__typename":"AuthorList"},{"id":"6793","name":"Evelyn Lamb","__typename":"AuthorList"},{"id":"75","name":"Ferris Jabr","__typename":"AuthorList"},{"id":"52","name":"Frank Wilczek","__typename":"AuthorList"},{"id":"69","name":"Gabriel Popkin","__typename":"AuthorList"},{"id":"77","name":"George Musser","__typename":"AuthorList"},{"id":"19092","name":"Grant Sanderson","__typename":"AuthorList"},{"id":"20557","name":"Howard Lee","__typename":"AuthorList"},{"id":"66","name":"Ingrid Daubechies","__typename":"AuthorList"},{"id":"85","name":"Ivan Amato","__typename":"AuthorList"},{"id":"12170","name":"Janna Levin","__typename":"AuthorList"},{"id":"32","name":"Jeanette Kazmierczak","__typename":"AuthorList"},{"id":"51","name":"Jennifer Ouellette","__typename":"AuthorList"},{"id":"72","name":"John Pavlus","__typename":"AuthorList"},{"id":"16475","name":"John Preskill","__typename":"AuthorList"},{"id":"91","name":"John Rennie","__typename":"AuthorList"},{"id":"10351","name":"Jonathan Lambert","__typename":"AuthorList"},{"id":"1241","name":"Jordana Cepelewicz","__typename":"AuthorList"},{"id":"8463","name":"Joshua Roebke","__typename":"AuthorList"},{"id":"49","name":"Joshua Sokol","__typename":"AuthorList"},{"id":"16815","name":"jye","__typename":"AuthorList"},{"id":"67","name":"K.C. Cole","__typename":"AuthorList"},{"id":"87","name":"Kat McGowan","__typename":"AuthorList"},{"id":"20556","name":"Katherine Harmon Courage","__typename":"AuthorList"},{"id":"90","name":"Katia Moskvitch","__typename":"AuthorList"},{"id":"27374","name":"Kelsey Houston-Edwards","__typename":"AuthorList"},{"id":"40","name":"Kevin Hartnett","__typename":"AuthorList"},{"id":"12570","name":"Laura Poppick","__typename":"AuthorList"},{"id":"23451","name":"Liam Drew","__typename":"AuthorList"},{"id":"79","name":"Liz Kruesi","__typename":"AuthorList"},{"id":"60","name":"Maggie McKee","__typename":"AuthorList"},{"id":"2333","name":"Mallory Locklear","__typename":"AuthorList"},{"id":"3569","name":"Marcus Woo","__typename":"AuthorList"},{"id":"414","name":"Mark H. Kim","__typename":"AuthorList"},{"id":"17147","name":"Matthew Hutson","__typename":"AuthorList"},{"id":"7186","name":"Melinda Wenner Moyer","__typename":"AuthorList"},{"id":"14093","name":"Michael Harris","__typename":"AuthorList"},{"id":"23","name":"Michael Moyer","__typename":"AuthorList"},{"id":"74","name":"Michael Nielsen","__typename":"AuthorList"},{"id":"19093","name":"Michele Bannister","__typename":"AuthorList"},{"id":"1472","name":"Moira Chas","__typename":"AuthorList"},{"id":"6476","name":"Monique Brouillette","__typename":"AuthorList"},{"id":"10","name":"Natalie Wolchover","__typename":"AuthorList"},{"id":"19962","name":"Nola Taylor Redd","__typename":"AuthorList"},{"id":"24","name":"Olena Shmahalo","__typename":"AuthorList"},{"id":"1816","name":"Patrick Honner","__typename":"AuthorList"},{"id":"84","name":"Peter Byrne","__typename":"AuthorList"},{"id":"55","name":"Philip Ball","__typename":"AuthorList"},{"id":"31","name":"Pradeep Mutalik","__typename":"AuthorList"},{"id":"24011","name":"Puja Changoiwala","__typename":"AuthorList"},{"id":"100","name":"Quanta Magazine","__typename":"AuthorList"},{"id":"2784","name":"R. Douglas Fields","__typename":"AuthorList"},{"id":"26114","name":"Rachel Crowell","__typename":"AuthorList"},{"id":"9412","name":"Raleigh McElvery","__typename":"AuthorList"},{"id":"820","name":"Ramin Skibba","__typename":"AuthorList"},{"id":"1666","name":"Rebecca Boyle","__typename":"AuthorList"},{"id":"20950","name":"Richard Masland","__typename":"AuthorList"},{"id":"48","name":"Robbert Dijkgraaf","__typename":"AuthorList"},{"id":"80","name":"Roberta Kwok","__typename":"AuthorList"},{"id":"15681","name":"Robin George Andrews","__typename":"AuthorList"},{"id":"24577","name":"Rodrigo Pérez Ortega","__typename":"AuthorList"},{"id":"78","name":"Sabine Hossenfelder","__typename":"AuthorList"},{"id":"83","name":"Sarah Lewin","__typename":"AuthorList"},{"id":"76","name":"Sean B. Carroll","__typename":"AuthorList"},{"id":"15680","name":"Sean Carroll","__typename":"AuthorList"},{"id":"7239","name":"Shannon Hall","__typename":"AuthorList"},{"id":"65","name":"Siobhan Roberts","__typename":"AuthorList"},{"id":"5944","name":"Sophia Chen","__typename":"AuthorList"},{"id":"61","name":"Steph Yin","__typename":"AuthorList"},{"id":"63","name":"Stephanie Bucklin","__typename":"AuthorList"},{"id":"26311","name":"Stephanie DeMarco","__typename":"AuthorList"},{"id":"71","name":"Stephen Ornes","__typename":"AuthorList"},{"id":"17148","name":"Steve Nadis","__typename":"AuthorList"},{"id":"13356","name":"Steven Strogatz","__typename":"AuthorList"},{"id":"17150","name":"Susan D'Agostino","__typename":"AuthorList"},{"id":"2960","name":"Tara C. Smith","__typename":"AuthorList"},{"id":"14785","name":"Thomas Lewton","__typename":"AuthorList"},{"id":"3","name":"Thomas Lin","__typename":"AuthorList"},{"id":"54","name":"Tim Vernimmen","__typename":"AuthorList"},{"id":"88","name":"Tom Siegfried","__typename":"AuthorList"},{"id":"12964","name":"Vanessa Schipani","__typename":"AuthorList"},{"id":"53","name":"Veronique Greenwood","__typename":"AuthorList"},{"id":"86","name":"Virginia Hughes","__typename":"AuthorList"},{"id":"3244","name":"Viviane Callier","__typename":"AuthorList"},{"id":"89","name":"Wynne Parry","__typename":"AuthorList"},{"id":"15913","name":"XiaoZhi Lim","__typename":"AuthorList"}],"adBehavior":"in all places","adUrl":"https://www.amazon.com/dp/0262536358/","adAlt":"The Prime Quantity Conspiracy - The Largest Concepts in Math from Quanta – AVAILABLE NOW!","adImageHome":"https://d2r55xnwy6nx47.cloudfront.web/uploads/2018/12/Dec-Ad_Default_1218_260x342_Math.jpg","adImageArticle":"https://d2r55xnwy6nx47.cloudfront.web/uploads/2018/12/Dec-Ad_Article_1218_320x600_Math.jpg","adImageTablet":"https://d2r55xnwy6nx47.cloudfront.web/uploads/2018/12/Dec-Ad_Tablet_1218_890x250_Math.jpg","adImageMobile":"https://d2r55xnwy6nx47.cloudfront.web/uploads/2018/12/Dec-Ad_Mobile_1218_500x400_Math.jpg"},"theme":{"web page":{"accent":"#ff8600","textual content":"#1a1a1a","background":"white"},"header":{"sort":"default","gradient":{"colour":"white"},"stable":{"major":"#1a1a1a","secondary":"#999999","hover":"#ff8600"},"clear":{"major":"white","secondary":"white","hover":"#ff8600"}}},"redirect":null,"fallbackImage":{"alt":"","caption":"","url":"https://d2r55xnwy6nx47.cloudfront.web/uploads/2017/04/default.gif","width":1200,"peak":600,"sizes":{"thumbnail":"https://d2r55xnwy6nx47.cloudfront.web/uploads/2017/04/default-520x260.gif","square_small":"https://d2r55xnwy6nx47.cloudfront.web/uploads/2017/04/default-160x160.gif","square_large":"https://d2r55xnwy6nx47.cloudfront.web/uploads/2017/04/default-520x520.gif","medium":"https://d2r55xnwy6nx47.cloudfront.web/uploads/2017/04/default.gif","medium_large":"https://d2r55xnwy6nx47.cloudfront.web/uploads/2017/04/default-768x384.gif","massive":"https://d2r55xnwy6nx47.cloudfront.web/uploads/2017/04/default.gif","__typename":"ImageSizes"},"__typename":"Picture"}},"modals":{"loginModal":false,"signUpModal":false,"forgotPasswordModal":false,"resetPasswordModal":false,"lightboxModal":false,"callback":null,"props":null},"podcast":{"id":null,"taking part in":false,"period":0,"currentTime":0},"person":{"loggedIn":false,"savedArticleIDs":[],"userEmail":"","editor":false},"feedback":{"open":false}},
env: {
APP_URL: 'https://www.quantamagazine.org',
NODE_ENV: 'manufacturing',
WP_URL: 'https://api.quantamagazine.org',
HAS_GOOGLE_ID: true,
HAS_FACEBOOK_ID: true,
},
}



Source link

Author

Write A Comment