It is very difficult to build a quantum encrypting system with photons. As the article on EPR correlations shows, it is a technical feat to bring out the quantum difference and to guarantee a transmission without parasites. This is essential to fulfill the promise of real-time listening detection.
We know how to generate artifical data with potential barriers. We studied them to determine their characteristics and established an efficient protocol to use them. Any attempt to misuse the protocol makes any interpretation impossible on solid mathematical foundations.
We will share later a part of our results.
Meanwhile, here you will find EPR experimental simulations descriptions rendering quite astonishing results and their script sources for Linux and Windows. You may also try the online light and compact simulation computed in your browser with random initial values. This light and sufficient demonstration of the invalidity of the protocol used in all EPR experiments is within the reach of all.
The theoretical invalidation is difficult because it involves placing the old equations of theoretical quantum mechanics in the rubric “history” and incorporating a causal limitation to several developments of CFT / QFT. Sometimes, theorists had already done so by resorting to strict relativistic formalisms. But it is very difficult in other sectors with results validated by experiments whose raw data are not available.
Many mathematician physicists from the last 30 years have published articles on similar issues.
Then, one can believe the “spooky at a distance” theories or, at least, the technical abandonment of causality, it is a matter of faith. Q-crypt does not fight against beliefs, moreover, it approves them all without distinction.
Q-crypt approach is in computer technology applied to the industry. Scientific developments belong to their authors, whether or not they are members of our project team.