Peter: "If anyone in the field wishes to run a computer model they're welcome to your £500. I'm sure it wouldn't be difficult as I can do it with cosine tables.
Did you understand what the blue pivoting quadrant did? I think it's cleverer than you noticed. A number of others have so I'm sure you're able. I've improved at A4 'Kit' with more cosines added in the right places to show how they should be read off."
No I didn't understand. I also made a typing error. The offer is 5000 not 500. But Euros not pounds or dollars.
So, great that so many people understand it. Now they can program it, show how it can run on a network of computers connected to as to respect locality and causality, and not only win 5000 Euro from me but also the Nobel prize.
No one has yet performed a successful loophole free Bell-CHSH test experiment. They might succeed in about five years from now, some people think. So not only would the lucky winner be the first to perform a successful loophole free Bell-CHSH test experiment, they would also actually do it using only classical physical systems (I mean of course: using only physical systems for which classical physics gives a perfectly adequate, "local realistic", description).
Now don't tell me that a computer uses quantum physics because it has transistors in it or whatever they use nowadays. You can replace the machine on your desk with a scribe and an abacus and a papyrus roll, if you like. It's just another Turing machine, for present purposes.
Now don't tell me that quantum physics makes our brains work like they do and create the illusion of consciousness because of QM, either.
The point is that a classical physical description would adequately represent the phenomenon being studied here. Alice and Bob tossing coins to choose settings on a machine by pressing buttons marked "H" and "T". Alice and Bob's machines receive some kind of message or transmission from another machine. After this has happened Alice and Bob's machine starts flashing a green or red lights. The machines are black boxes. There could be a PC in the box, or a scribe; the transmissions could be by email, or by pigeon post.
Write three computer programs (one for a PC inside Alice's box, one for a PC inside Bob's box, and one for a PC standing for the source). You know which communications are allowed, when, and in which sequence. All others are forbidden.
Simulate a violation of the CHSH inequality and become world famous.