Cybersecurity and Quantum Key Distribution
The concept of Alice and Bob communicating is back in the spotlight with quantum key distribution added to it. This team from the University of York developed a process which involves displacing the data detectors – the point where information must be read – to a location separate from the sender and receiver. Doing so reduces probability of a hacker attacking the device. See the layperson’s article at ScienceDaily and the original study at the Cornell University Library site.