Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Theoretically you could use quantum key distribution, but in practice this usually requires a fiber-optic connection.

https://en.wikipedia.org/wiki/Quantum_key_distribution

Edit: Nope, I am wrong, as the comments below point out.



Even with QKD, an attacker that just passes data along without trying to read or change it is nearly undetectable.


I don't see how that helps. QKD stops eavesdroppers, not amplifiers.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: