Skip to main content

Research tangled quantum memory for 50 kilometers. And that makes it possible to create safe WiFi between systems.

 Research tangled quantum memory for 50 kilometers. And that makes it possible to create safe WiFi between systems. 



This thing is a breakthrough for making new quantum networks that are extremely safe. Extremely safe quantum networks allow the creation of the WLAN that benefits the abilities of the quantum computer. That thing allows sending data through the air by using qubits. 

And that allows connecting quantum computers without binary layers. The thing is that the connected quantum computers are the single quantum system. And the bottleneck is how to introduce processed data.

But the quantum entanglement can also transmit data in binary mode. There might be two lines of quantum entanglement. When Line 1 is in use the value in the system is 0. And line 2 means the value of the bit in the system is 1. That means the quantum entanglement can offer secured data transmission in the binary network. 

The thing that makes quantum entanglement safe against eavesdropping is that the superpositioned and entangled particles are hard to see from the sides. That means the eavesdropper must cut the quantum entanglement. And that causes a cut in the data line. If eavesdropping has been detected the access codes to the system can be changed. 

This kind of thing can make by using regular electric wires or laser rays. But the detection of hacking is based the error detection. If those lines are cut there is an error in the data flow. Also if somebody conducts the electricity away from the wire or laser ray, that causes that the signal will turn weaker than it should be. 

The system requires four connections for error handling. Detection of errors can be made by using two data handling lines. If the data that travels through those lines is similar. That means there are no errors. If there is a difference something affects the network. 

When people are talking about secured data transmission. They always forget to mention that two things can danger data. The destruction of data can happen on purpose. Or the destruction of the data can happen by accident. It's the same for the system what is the reason why the data is lost. The lost data means that everything must be driven to the system again. Of course, there is some kind of security dimensions. 

But the fact is always the same. Every lost data must drive back to the system without depending on the reason why the data is lost. A broken hard disk or computer virus is both making the system useless. There is of course possible to eavesdrop on the quantum-based binary WiFi. 

But those kinds of actions can be seen when the quantum entanglement, is cut. And there are differences between data masses that are sent by using that kind of system. The data must use two lines and four connections. If the data is similar in both lines. That means there is nobody who has tried to see data. 


https://www.scientiststudy.com/2020/02/new-record-researchers-have-tangled.html?m=1


Image:https://www.scientiststudy.com/2020/02/new-record-researchers-have-tangled.html?m=1


https://thoughtsaboutsuperpositions.blogspot.com/

Comments

Popular posts from this blog

Could this be the thing, that some people don't want you to know about zombies?

Could this be the thing, that some people don't want you to know about zombies? The simplest way to control zombies, which are made by using tetrodotoxin, which is called "zombie poison" is to use the automatic dispenser, which is normally used in diabetes treatment. In this case, the dispenser would be loaded by using tetrodotoxin. If the level of this poison is right, the person would be totally under the control of other people. And if the system cannot detect this poison there is a possibility to make the laboratory experiment when the staff will follow the decrease of the tetrodotoxin, and then the system can use a simple clock, which will inject poison to the body of a victim after a certain time. This would be an effective tool in the hands of military and counter-terror operators. Those zombies can be captured enemy operators, who will send back, and then they just kill their ex-partners. By using genetically engineered bacteria could be possible to create t...

Terrifying visions of genetic engineering.

 Terrifying visions of genetic engineering.  The modern Hounds of Baskerville ABW:s (Advanced biological weapons are the modern Hounds of Baskerville. The term ABV means the animal which is genetically engineered. And which is controlled by using some interactive electronic systems. There is a possibility to connect the action camera to dogs collars. And transmit commands to that animal by using electronic systems. Spoken words can use to the commands.  Or they can be a series of sounds that are stored in the sound files. When the operator activates a certain file that sound means a certain command to the animals. There is the possibility to automatize some commands by connecting the system to the image recognition tool. When the action camera sees something that is stored in the memory of the computer. That system sends the coded order to the animal.  Nanotechnology and genetic engineering are the most lethal combination in the world. The ABW:s (Advanced Biological ...

The story of (Northrop?) TR3A "Black Manta"

    Image I The story of (Northrop?) TR3A "Black Manta" Sometimes there have been discussions that the mysterious TR3A "Black Manta" was a study project for the B-2 bomber.  That means that TR3A was used as the flying mockup for testing the aerodynamic and control solutions for the B-2 "Spirit" bomber. The thing that supports this thing is that the manufacturer of both planes is Northrop corporation.  Along with "Aurora" was flying one other mysterious aircraft, TR3A "Black Manta". The system is described as the "Stealth VTOL" (Vertical Take-Off and Landing) aircraft. Unless the mysterious TR3B, the Northrop TR3A is the conventional VTOL-aircraft, what is using regular jet engines, but what has the stealth-body.  Image II The thing is that the stealth-reconnaissance aircraft, which uses a similar technology with the Northrop B-2 bomber would be an interesting part of the weapon arsenal. There is a possibility that the TR3A was...