"but isn't this still susceptible to man in the middle attacks?"
"but isn't this still susceptible to man in the middle attacks?"
No they shouldn't be, as per wikipedia (https://en.wikipedia.org/wiki/Quantum_network#Trusted_repeaters)
If you have a Trusted Repeater that repeater will decode your message, if you have a Quantum Repeater then it can't, even though it will be doing error correction to clean and further propagate the signal. I'm a bit vague about whether you would be able to distinguish (from a fundamental point of view) between a remote end point and a TR masquerading as it.
I can understand how the Quantum Repeater works, broadly speaking, based on my degree but I'm not clear about distinguishing an endpoint from a TR. I get the bit where they start talking about Bell States but nobody seems to address the question of identity, but the easy way of telling would be to communicate with yourself via your ISP i.e. have a transmitter and receiver at your end, establish entanglement between them and then examine their state to make sure they are directly entangled.
As per wikipedia...
"A true quantum repeater allows the end to end generation of quantum entanglement, and thus - by using quantum teleportation - the end to end transmission of qubits. In quantum key distribution protocols one can test for such entanglement. This means that when making encryption keys, the sender and receiver are secure even if they do not trust the quantum repeater. Any other application of a quantum internet also requires the end to end transmission of qubits, and thus a quantum repeater."