This revolutionary tech takes “root source” quantum keys that are stored in data centres and uses them as an ingredient in a novel process whereby two or more end point devices create symmetric encryption keys locally. This process is both zero trust and computationally secure.
Today, the root source keys are created with quantum random number generators and sent to data centres globally using terrestrial digital methods. This is secure enough to allow the end point software to do its job in a very secure way.
4
13 reads
CURATED FROM
IDEAS CURATED BY
The idea is part of this collection:
Learn more about scienceandnature with this collection
How to practice effectively
The importance of consistency
How to immerse yourself in the language
Related collections
Read & Learn
20x Faster
without
deepstash
with
deepstash
with
deepstash
Personalized microlearning
—
100+ Learning Journeys
—
Access to 200,000+ ideas
—
Access to the mobile app
—
Unlimited idea saving
—
—
Unlimited history
—
—
Unlimited listening to ideas
—
—
Downloading & offline access
—
—
Supercharge your mind with one idea per day
Enter your email and spend 1 minute every day to learn something new.
I agree to receive email updates