logoalt Hacker News

buildbotyesterday at 11:39 PM0 repliesview on HN

I think that post quantum encryption methods might be in this category but I am not knowledgeable enough to say either way.

One issue though with making a one time pad trivial to copy - how do you authenticate that you are allowed to read? How do you know the client isn’t copying?