Brings up one of the weak points in all likelihood - in practice, it also changes from inherent and background environmental 'noise' the system would have to ignore at some RW point. The hacker would want to bury their attack in the 'noise'...
Of course there are easy counters to that - embedded patterns within the noise to catch the interloper's interference, and pre-arranged timing disparities (to catch the delays from a MiM attack when they are otherwise below processing thresholds)... which, of course, can be countered in turn...
The jury is still very much out on this, I think currently a majority doubts
that the observer would have to be sentient:
http://en.wikipedia.org/wiki/Observer_(quantum_physics)
The jury is still very much out on this, I think currently a majority doubts
that the observer would have to be sentient:
http://en.wikipedia.org/wiki/Observer_(quantum_physics)
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.