This is a low bandwidth technique where a dedicated quantum link is provided between two points, and quantum mechanical effects are used to ensure that information transfer is secure and private.
Where does data harvesting occur?
Encrypted data can be intercepted and harvested at various points, including the user's server, through BGP hijacking, tapping undersea cables, and satellite data interception, posing risks of future decryption and exploitation of the data by adversaries using quantum computing capabilities.
This is the peer-reviewed and patented technology that is the basis of Qrypt’s key generation and secure transfer products. It enables the generation of identical symmetric keys at multiple endpoints, without ever needing to distribute that key over the wire. This means that it cannot be intercepted.