 We have our noisemakers, those on the corner are not our fault. So it doesn't mean you're going to go time-on-time or anything. All right, next up, we have kind of children, Marius, who will go to G-Line and speak as fast as you can. Seek as long as the talk of people is dispensable by thought. So I want to start with the story, as you might have heard. It involves the FBI and an hour. So the FBI is the FBI, whatever it is, and the Apple produces smartphones. At some point, if I go to the Apple, and there's the battery on your phone, so that it's on the ground, it says no, no way. I don't understand. This creates a big dispute. The Apple ends up explaining, because if I link the backdoor to you, then anyone who gets it will be able to unlock all my phones. And that's a disaster. I cannot take the risk. And the question is, can this be avoided? So if you watch James Bond movies, you might think, yeah, of course, this guy knows how to do it, right? That's how. Very simple. Write your backdoor in one of those self-destruct machines. Only James Bond can hear it. The problem is that not only James Bond can hear it. Everyone and his cat can hear this tape before it's distracted. And then it's the same disaster. He has the backdoor. And I should say already that this image of a cat, I used the learning app with Mark Karsten from before. It works. That's evidence. Right? So the Apple has a solution, because next to the pit, it has actually an Intel SGX processor. Right? What can it do? It can store pairs, key, and phone ID. And then upon receiving a message, here is my phone ID. It can spit out the key and stop responding. Fantastic solution. Right next to the pit. So if the Apple does that and produces such a smartphone, then locking is very simple. Just use that key to encrypt your state and throw the key away. Every phone does that. Only one phone can be unlocked. And what this gives us is effectively encryption, where we have a single backdoor, many keys. We can actually learn only one key and decrypt whatever is encrypted with it. And nothing else. The security of any other encryption is preserved. And in some sense it's like a scratch-off card backdoor, dispensable backdoor. All right. What's the problem with that? The problem is that this guy might get his hands on this Intel SGX. A knife next to the pit is not that hard. And then he can start doing all sorts of things, like freeze it, microwave it, disconnect the electricity, you know, roast it, put it in a washing machine, have Daniel listen to it until he figures out something. He can do many things. This means that he might be able to reset it. He might be able to get another key out of it. So we'd prefer to be able to do it from state to state. So now the Apple has a problem, right? The Apple needs a way to create some information that cannot be copied or duplicated, because otherwise I can just use it twice, can encode a bunch of keys and can only be used once for one key and then it self-destructs. Which clearly is more than z-diagmatic. Or is it? There is actually something that has exactly these properties and it's called a qubit. And if you want to find out how this qubit is used for dispensable backdoors, there are papers on the aprons, and it will make this guy obsolete. Again, this picture is from Carsten's Learning algorithm. Thank you.