Information transfer will be safe even if all hardware components are compromised by an eavesdropper. This is a unique feature which eliminates the vulnerabilities present in some other commercially available QKD systems.

Additionally, if some hardware components are known to be trusted, our protocol can run in an alternative mode with higher communication rates, comparable to the best solutions available on the market. This adaptability allows the user to tailor the protocol to their individual needs