Jump to content

Recommended Posts

Posted (edited)

Is it to act as an alarm trigger when data is breached? In this scenario no information is transmitted. The wavefunction acts as the trigger.

Edited by StringJunky
Posted

That is the more common proposed methods to apply quantum entanglement cryptology that I have encountered. At this point in time quantum cryptology is more of a speculative application. Thus far I haven't heard of any actual tests of its use.

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.