this post was submitted on 19 Feb 2026
87 points (96.8% liked)
Technology
81558 readers
4485 users here now
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related news or articles.
- Be excellent to each other!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
- Check for duplicates before posting, duplicates may be removed
- Accounts 7 days and younger will have their posts automatically removed.
Approved Bots
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Nope, the actual information must still be transported via a classical no quantum (and trusted) channel so that both ends can match their statistics and thus deduce the crytographic keys from the qunatum signals. And thats it what its all about: key exchange
thanks. I had forgotten about that I think mainly because I can't wrap my mind around how it works like if its intercepted and used then it will confirm that its void and produce a new one or such.