>
Ivermectin & Cancer: 3 Tumor-Killing Mechanisms No Oncologist Is Talking About
Two Weeks to Flatten the Fuel Curve: Digital IDs, Rationing, Energy Austerity
9 Proven Ways to Boost Your Soil Health
This Forgotten NASA Insulation Trick Cuts AC Costs 70%. They Stopped Teaching It in 1991.
We Build and Test Microwave Blocking Panels - Invisible to Radar
Man Successfully Designs mRNA Vaccine To Treat His Dog's Cancer
Watch: Humanoid robot gets surprisingly good at tennis
Low-cost hypersonic rocket engine takes flight for US Air Force
Your WiFi Can See You. Here's How.
Decentralizing Defense: A $96 Guided Rocket Just Put Precision Warfare into the Hands of the People
Israel's Iron Beam and the laser future of missile defense
Scientists at the Harbin University of Science and Technology have pioneered a sophisticated...
Researchers have developed a breakthrough "molecular jackhammer" technique...
Human trials are underway for a drug that regrows human teeth in just 4 days.

Many of the encryption methods that keep our online data safe rely on a digital key which is very hard for computers to crack – for instance, requiring the identification of two very large prime numbers, which standard computers are very poor at. But if a powerful quantum computer were to be built, it could crack these types of code with ease and jeopardize the safety of our digital communications.
The only encryption method that has been proven to be completely secure if applied correctly – quantum computers or not – is the so-called "one-time pad." Here's how it works: first, a secret digital key is created consisting of a completely random sequence of bits. The key is then securely sent to the receiver, and kept private. Now, the sender can encrypt his message by adding the message's bits to the random bits of the key. Under these conditions, the code is deemed truly uncrackable.
Keeping the key secret can be a challenge, but quantum physics can come to the rescue. That's because the weird and wonderful properties of quantum mechanics make it so that if someone were to try and intercept it, the key itself would change and both the sender and the receiver would immediately notice.