{"id":152,"date":"2018-06-28T12:51:06","date_gmt":"2018-06-28T12:51:06","guid":{"rendered":"http:\/\/www.q-crypt.com\/?p=152"},"modified":"2018-11-23T23:08:11","modified_gmt":"2018-11-23T23:08:11","slug":"most-frequent-counter-arguments","status":"publish","type":"post","link":"https:\/\/www.q-crypt.com\/index.php\/2018\/06\/28\/most-frequent-counter-arguments\/","title":{"rendered":"Most frequent counter-arguments"},"content":{"rendered":"<p>After 5 years of exposing the weaknesses of the Bell theorem and showing semi-quantum cryptography solutions, I have noticed these statements among the most frequent:<\/p>\n<ul>\n<li><strong>The simulation is false<\/strong><br \/>\n<em>Check the code and see that it does not perform any non-local calculations in the polarizer response, the random variables are credible and the statistics fair. Or<a href=\"\/index.php\/2017\/09\/08\/six\/\"> try with 6 operators<\/a> , a protocol where you keep the control on all the exchanged data using files.<\/em><\/li>\n<li><strong>The simulation is not physical<\/strong><br \/>\n<em>That is possible. Whatever the counter exemple is physical or not, it brings a doubt on the possibility to observe non intuitive but physical quantum-like correlations. Then, the conclusion that the shape in cos\u00b2 is a quantum signature becomes difficult.<\/em><\/li>\n<li><strong>Yes, it is normal that one can simulate up to 75% but then, QM finishes the job , making the remaining 25%<\/strong><br \/>\n<em>This is an explanation difficult to understand. How one pair out of four finds itself quantum and the other three classics with hidden variables? What path leads exactly to this particular interpretation?<\/em><\/li>\n<li><strong>The experiments showed a detection rate of 92% ; the simulation is below, around a small 75%<\/strong><em><br \/>\nNo, it is wrong. To remain very kind, no one experiment has been able to achieve a pairs detection rate higher than 50% with a double detector. <a href=\"\/index.php\/2017\/10\/12\/labs-performance\/\">See Laboratory Performance<\/a><\/em>.<\/li>\n<li><strong>You know, the theories that say that everyone is wrong, even very great physics teachers, I do not spend my time with &#8230;<\/strong><br \/>\n<em>You&#8217;re right, me too ! But here, if the subject is not so interesting for ambitious physicists, the experiences are at least questionable. There is not a real negative impact on other researches, then all is possible.<\/em><\/li>\n<\/ul>\n<hr \/>\n<p>Sean Caroll recently quoted a survey giving the deBroglie-Bohm interpretation at 0% and that of Bohr at 42%.<\/p>\n<p>The good question to ask is: would you have believed in Bohr&#8217;s Copenhagen interpretation and would you have endorsed its consequences if you had known that there are local algorithms, computer programs, to reproduce the best labs outcomes as described here?<\/p>\n<p>Parsimony and Occam are my friends.<\/p>\n","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\"><p>After 5 years of exposing the weaknesses of the Bell theorem and showing semi-quantum cryptography solutions, I have noticed these statements among the most frequent: <a class=\"mh-excerpt-more\" href=\"https:\/\/www.q-crypt.com\/index.php\/2018\/06\/28\/most-frequent-counter-arguments\/\" title=\"Most frequent counter-arguments\">[&#8230;]<\/a><\/p>\n<\/div>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[],"class_list":["post-152","post","type-post","status-publish","format-standard","hentry","category-epr-bell"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Most frequent counter-arguments - q-Crypt<\/title>\n<meta name=\"description\" content=\"The 5 most frequent counter-arguments opposed to a classical interpretation not needing special and weird assumptions on locality and causality\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.q-crypt.com\/index.php\/2018\/06\/28\/most-frequent-counter-arguments\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Most frequent counter-arguments - q-Crypt\" \/>\n<meta property=\"og:description\" content=\"The 5 most frequent counter-arguments opposed to a classical interpretation not needing special and weird assumptions on locality and causality\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.q-crypt.com\/index.php\/2018\/06\/28\/most-frequent-counter-arguments\/\" \/>\n<meta property=\"og:site_name\" content=\"q-Crypt\" \/>\n<meta property=\"article:published_time\" content=\"2018-06-28T12:51:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-11-23T23:08:11+00:00\" \/>\n<meta name=\"author\" content=\"qcry\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@igael123\" \/>\n<meta name=\"twitter:site\" content=\"@igael123\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"qcry\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.q-crypt.com\\\/index.php\\\/2018\\\/06\\\/28\\\/most-frequent-counter-arguments\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.q-crypt.com\\\/index.php\\\/2018\\\/06\\\/28\\\/most-frequent-counter-arguments\\\/\"},\"author\":{\"name\":\"qcry\",\"@id\":\"https:\\\/\\\/www.q-crypt.com\\\/#\\\/schema\\\/person\\\/a29b2a4f7e3e0d1d49d71411a49618c9\"},\"headline\":\"Most frequent counter-arguments\",\"datePublished\":\"2018-06-28T12:51:06+00:00\",\"dateModified\":\"2018-11-23T23:08:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.q-crypt.com\\\/index.php\\\/2018\\\/06\\\/28\\\/most-frequent-counter-arguments\\\/\"},\"wordCount\":337,\"commentCount\":0,\"articleSection\":[\"EPR-Bell articles\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.q-crypt.com\\\/index.php\\\/2018\\\/06\\\/28\\\/most-frequent-counter-arguments\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.q-crypt.com\\\/index.php\\\/2018\\\/06\\\/28\\\/most-frequent-counter-arguments\\\/\",\"url\":\"https:\\\/\\\/www.q-crypt.com\\\/index.php\\\/2018\\\/06\\\/28\\\/most-frequent-counter-arguments\\\/\",\"name\":\"Most frequent counter-arguments - q-Crypt\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.q-crypt.com\\\/#website\"},\"datePublished\":\"2018-06-28T12:51:06+00:00\",\"dateModified\":\"2018-11-23T23:08:11+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.q-crypt.com\\\/#\\\/schema\\\/person\\\/a29b2a4f7e3e0d1d49d71411a49618c9\"},\"description\":\"The 5 most frequent counter-arguments opposed to a classical interpretation not needing special and weird assumptions on locality and causality\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.q-crypt.com\\\/index.php\\\/2018\\\/06\\\/28\\\/most-frequent-counter-arguments\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.q-crypt.com\\\/index.php\\\/2018\\\/06\\\/28\\\/most-frequent-counter-arguments\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.q-crypt.com\\\/index.php\\\/2018\\\/06\\\/28\\\/most-frequent-counter-arguments\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.q-crypt.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Most frequent counter-arguments\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.q-crypt.com\\\/#website\",\"url\":\"https:\\\/\\\/www.q-crypt.com\\\/\",\"name\":\"q-Crypt project\",\"description\":\"checking quantum computing investments\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.q-crypt.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.q-crypt.com\\\/#\\\/schema\\\/person\\\/a29b2a4f7e3e0d1d49d71411a49618c9\",\"name\":\"qcry\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6f79d06ab0eec81a917741adc81b134e3309f55c9fb11bce3d165e08c9114300?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6f79d06ab0eec81a917741adc81b134e3309f55c9fb11bce3d165e08c9114300?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6f79d06ab0eec81a917741adc81b134e3309f55c9fb11bce3d165e08c9114300?s=96&d=mm&r=g\",\"caption\":\"qcry\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Most frequent counter-arguments - q-Crypt","description":"The 5 most frequent counter-arguments opposed to a classical interpretation not needing special and weird assumptions on locality and causality","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.q-crypt.com\/index.php\/2018\/06\/28\/most-frequent-counter-arguments\/","og_locale":"en_US","og_type":"article","og_title":"Most frequent counter-arguments - q-Crypt","og_description":"The 5 most frequent counter-arguments opposed to a classical interpretation not needing special and weird assumptions on locality and causality","og_url":"https:\/\/www.q-crypt.com\/index.php\/2018\/06\/28\/most-frequent-counter-arguments\/","og_site_name":"q-Crypt","article_published_time":"2018-06-28T12:51:06+00:00","article_modified_time":"2018-11-23T23:08:11+00:00","author":"qcry","twitter_card":"summary_large_image","twitter_creator":"@igael123","twitter_site":"@igael123","twitter_misc":{"Written by":"qcry","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.q-crypt.com\/index.php\/2018\/06\/28\/most-frequent-counter-arguments\/#article","isPartOf":{"@id":"https:\/\/www.q-crypt.com\/index.php\/2018\/06\/28\/most-frequent-counter-arguments\/"},"author":{"name":"qcry","@id":"https:\/\/www.q-crypt.com\/#\/schema\/person\/a29b2a4f7e3e0d1d49d71411a49618c9"},"headline":"Most frequent counter-arguments","datePublished":"2018-06-28T12:51:06+00:00","dateModified":"2018-11-23T23:08:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.q-crypt.com\/index.php\/2018\/06\/28\/most-frequent-counter-arguments\/"},"wordCount":337,"commentCount":0,"articleSection":["EPR-Bell articles"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.q-crypt.com\/index.php\/2018\/06\/28\/most-frequent-counter-arguments\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.q-crypt.com\/index.php\/2018\/06\/28\/most-frequent-counter-arguments\/","url":"https:\/\/www.q-crypt.com\/index.php\/2018\/06\/28\/most-frequent-counter-arguments\/","name":"Most frequent counter-arguments - q-Crypt","isPartOf":{"@id":"https:\/\/www.q-crypt.com\/#website"},"datePublished":"2018-06-28T12:51:06+00:00","dateModified":"2018-11-23T23:08:11+00:00","author":{"@id":"https:\/\/www.q-crypt.com\/#\/schema\/person\/a29b2a4f7e3e0d1d49d71411a49618c9"},"description":"The 5 most frequent counter-arguments opposed to a classical interpretation not needing special and weird assumptions on locality and causality","breadcrumb":{"@id":"https:\/\/www.q-crypt.com\/index.php\/2018\/06\/28\/most-frequent-counter-arguments\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.q-crypt.com\/index.php\/2018\/06\/28\/most-frequent-counter-arguments\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.q-crypt.com\/index.php\/2018\/06\/28\/most-frequent-counter-arguments\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.q-crypt.com\/"},{"@type":"ListItem","position":2,"name":"Most frequent counter-arguments"}]},{"@type":"WebSite","@id":"https:\/\/www.q-crypt.com\/#website","url":"https:\/\/www.q-crypt.com\/","name":"q-Crypt project","description":"checking quantum computing investments","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.q-crypt.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.q-crypt.com\/#\/schema\/person\/a29b2a4f7e3e0d1d49d71411a49618c9","name":"qcry","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/6f79d06ab0eec81a917741adc81b134e3309f55c9fb11bce3d165e08c9114300?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/6f79d06ab0eec81a917741adc81b134e3309f55c9fb11bce3d165e08c9114300?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6f79d06ab0eec81a917741adc81b134e3309f55c9fb11bce3d165e08c9114300?s=96&d=mm&r=g","caption":"qcry"}}]}},"_links":{"self":[{"href":"https:\/\/www.q-crypt.com\/index.php\/wp-json\/wp\/v2\/posts\/152","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.q-crypt.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.q-crypt.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.q-crypt.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.q-crypt.com\/index.php\/wp-json\/wp\/v2\/comments?post=152"}],"version-history":[{"count":0,"href":"https:\/\/www.q-crypt.com\/index.php\/wp-json\/wp\/v2\/posts\/152\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.q-crypt.com\/index.php\/wp-json\/wp\/v2\/media?parent=152"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.q-crypt.com\/index.php\/wp-json\/wp\/v2\/categories?post=152"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.q-crypt.com\/index.php\/wp-json\/wp\/v2\/tags?post=152"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}