When this system is applied to encrypted data signals, the data changes its encryption code the instant it senses any unauthorized attempt to read the signal. [...]
Source
When this system is applied to encrypted data signals, the data changes its encryption code the instant it senses any unauthorized attempt to read the signal. [...]