Research Team Demonstrates Perfect Secrecy Implementation

The technique is notable because it can be implemented using low-cost, standard hardware components.

from Dark Reading: https://ift.tt/2ScgF6f
via IFTTT