How does data travel around the internet without becoming publicly visible? Encryption! But what is encryption?... Massdrop link: dro.ps/techquickie
КОМЕНТАРІ: 575
@MatheusLB20097 років тому
I type with gloves so they can't get my fingerprints
@Ajswindowshelper7 років тому
Mom what did I tell you about watching videos that'll just get you worried about being hacked!!?!?!!
@gysmothediamond20464 роки тому
this is very useful now bc contact is bad
@SimpleSetting3 роки тому
I use no keyboard or mouse, actually i dont gave a pc so they dont get my fingerprints
@tombrown52353 роки тому
@@gysmothediamond2046 yes with covid
@CTSSTC4 роки тому
Am I going crazy, or is his voice fluctuation in pitch/squeakiness?! :0
@rodrigocorreia80965 років тому
WHO DOESN'T LOVE THIS FAST AS POSSIBLE VIDEOS AS I DO!? Thank You Linus Sebastian! Keep the greatest content up! :D
@neeraj_hk9 років тому
LinusLaunderingTips
@HomeSkillenSLICE9 років тому
LinusStabbingTips
@TheRealSkeletor9 років тому
LinusFoldingKnifeTips
@Walterrinho9 років тому
Did anyone noticed Linus's tabs "contract killing", "laundering" and "hire hitman"?!!
@oniruddhoalam20393 роки тому
Taran's computer
@TheAIKnowledgeHub9 років тому
Techquickie Nice video, but you might want to add an important thing in when you talk about this again. All encryption can be broken, but it's about it being resource intensive. For example, AES 256 can be broken, but it will take a computer about 10,000 years to go through all the possible combinations that the password can be. However, a weaker encryption may take a few seconds or minutes. (It's like other locks. No one would use a bike lock to protect their bank because it's not resource intensive enough. However, no one would use a bank lock to protect a bike because that's too resource intensive for the end user. But in both cases, you can break any lock if you have the right resource (equipment and time).)
@ludan14989 років тому
Simple example of encryption: 1234 => Your password 5=> encryption key (1+5)(2+5)(3+5)(4+5) = 6789 => encrypted password. Encryption key received by recipient => -5 So 6-5; 7-5; 8-5; 9-5; and voila
@hihisham9 років тому
You sir deserved my like
@bollwerk7849 років тому
Ceasar cipher sucks, as it's a perfect bijection, where you can - given the ciphertext - calculate the plaintext without problems.
@sighisoaraa9 років тому
The recipient doesn't receive a key, but instead already has a private key of its own, just like the guy in the video said. That's the point.
@napillnik9 років тому
sighisoaraa that's just called a key. Private and public are used only when talking about key pairs, in algorithms that use them. Such algorithms are called Asymmetric. Now, what you're referring to is just a symmetric encryption. Asymmetric encryption is extremely slow, and quite vulnerable. Symmetric encryption is lightning fast (a modern day CPU can encrypt/decrypt gigabytes of data each second with symmetric keys, even 10 years ago CPUs could encrypt/decrypt up to 100Mb/s)
@napillnik9 років тому
That's a trivial encryption example, which can be decrypted by any 7th grader without having the key. There is a certain information about text, like the frequency of each letter. In longer messages, that can be converted into statistics, and very confident guesses about what the key is. Or without any statistics, a regular brute force attack is easy.
@EonityLuna9 років тому
1:45 > "The server room is on fire again"
@Xava20119 років тому
Linus, u (and your team) are awesome. Thanks for everything :)
@TehOnlyShoe9 років тому
Well, I learnt a new lesson today. Throwing knives in the air is okay because Linus does it. Thanks Linus! My mother will be proud of me :D
"Hi Linus, The server room is on fire again Just FYI" LOLD me more then the green linus.
@airplaneass9 років тому
Hey, could you explain what the differences are between all the phone processors? Ex. Intel Atom, Rockchip processors, Qualcomm Snapdragon etc etc. Thank you!
@limitlessgames29218 років тому
Always wondered what the little padlock was....You learn something new everyday. Usually encryption dosent make sense to me but this did! Thanks so much!
Hey linus...what abt a tech quickie on data encryption softwares for hard drive? And also about what is visual studio redistributables...?
@david.st12 роки тому
Thank you for explaining encryption so clearly. It couldnt be explained any better!
@shrimpy4204 роки тому
Came for the encryption explanation, stayed for the guy's funny voice
@simplyrubi19106 років тому
may I use the encryption part of this video for my final exam project in BCIS 1305 class?
@gladyszryan9 років тому
Everyone can see exactly the videos I like and how many of your videos are liked by me, clearly i spend a LOT of time listening to you talk Linus :D
@DannyCarter959 років тому
Linus, can you make an episode covering Audio Cables and such? RCA, TRS, XLR, Optical etc, their quality and general information? And some depth about Audio Quality between cables and also Bluetooth if possible :) I'm looking to get a pair of good speakers/studio monitors and I would like to know different input/outputs and such.
@MrJdavi39 років тому
I need a computer for college soon and am looking at the old MacBook Pro and I'm going to put ssd' s in them is this better than buying something else if so plz tell me
@Fluxtroid9 років тому
Soo, can you encrypt when using UDP then, because you don't have the handshake procedure in order to get the key? If someone knows regarding UDP and encryption, would be cool to learn!
@tmm-thirtyfive4 роки тому
Hey Linus, I am currently in CompTIA Security+ and have no IT background! Your videos are helping me understand very easily! Any way you could put out a video explaining asymmetric encryption vs symmetric as you only explain asymmetric in this video.
@tmm-thirtyfive2 роки тому
@John Howard was this supposed to be funny or something?
@yourstrulybae9 років тому
I swear he makes the best videos of describing something.
@Stike96official9 років тому
Was he actually throwing a real knife into the air and catching it :O. Also 89'th viewer here :D.
@Deathtopaper9 років тому
Yes
@thomaster88709 років тому
The only thing holding you back is your own fear. And as always don't forget that fear is the true enemy.
@Slayer1111111111able9 років тому
it looked like it. He probably dulled the hell out of it. Hopefully. I know I have a cheapo dull knife specifically for that purpose.
@theuseraccountname9 років тому
He was tossing a real knife, but when he was tossing it, it was closed. He then reopened it when he showed us the blade part and stopped tossing it.
@drewhuff4479 років тому
89th viewer?!?!?! holy shit that is sooooooooo fucking insaneeeeee broooooo
@JonnySelProductions9 років тому
Linus! A Topic for you! Can you PLEASE make a comparison once and for all about what the big differences are between DLP and LCD Projectors!? I am really stuck as to which type of projector has the least amount of input lag as possible (for gaming of course). Can you please settle this? Thank you so much for your consideration.
@kapildeshmukh78789 років тому
A projector has a very high latency rate that makes it unsuitable for gaming. It takes more time than any physical display to "project" the rendering. Therefore you are better off with a good old cheap monitor.
@JonnySelProductions9 років тому
kapil deshmukh I'm very well aware of that. However, there will always be a time when I may want to game on the biggest screen possible (especially if I am with friends where-ever I may be). And I can only do that with projectors. HUGE screen TVs cost a helluva lot more than an home theatre/entertainment projector that can project an even larger screen! :P
@bassl0va9 років тому
thecoolman3060 Productions Not really. Don't get data projectors mixed up with home theater projectors. Good projectors aren't cheap either. Not to mention getting a good screen too. Go have a look at Home Theather Shack or AVS Forum and they can probably help you choose something. People seem to look at 65"+ TVs costing many thousands and think "oh this $300 projector can do a way bigger picture!" Sure it can do a bigger picture, but it's cheap for a reason!
@JonnySelProductions9 років тому
bassl0va I see your point, but I still want to see Linus' thoughts on this issue. I want to see different views on this matter, so I want to also know what Linus thinks about it (the best projector tech that is suitable for gaming (obviously with the least amount of input lag possible for a tolerable gaming experience with a projector (especially for parties and such)).
@bassl0va9 років тому
thecoolman3060 Productions You'll probably have the most luck from responses on home theater sites since there are guys there with lots of experience in that sort of thing. A video by Linus on the matter - while interesting - wouldn't be as comprehensive as from someone who has owned multiple projectors/worked with them for many years. You do notice people pulling Linus up on mistakes/generalizations in AFAPs where he's researched the topic just for video as he doesn't have the long term experience in those matters, whereas his content based on topics that have been his hobby/work for many years are much better.
@coffindancerno.1735 років тому
We watched this at school today and I subbed from my teachers email to tech quickie as we were going to the cafeteria
@Entrepid839 років тому
Is HDCP any different than what was discussed in this video?
@EBackwards8 років тому
You know what Linus, when I watch your video at 2x times the speed... your voice changes very little 0.o Side Note: I've been sending my clients here as of late so they can learn more about anything computer related so keep it up!
@Muriqa7 років тому
Hi Linus, The server room is on fire again. Just for your information. Sarcastic. :)
@Bubbirock9 років тому
I know this is possible the wrong video to post this comment but I think some people here have knowlegde for this question: I've got a Pc with 8GB-Ram, Nvidia GTX650Ti, I5-3450 4x 3.10 Ghz, 64-Bit. Is it possible to change the GTX650Ti to a GTX970 and the I5-3450 to a I7-4790K (4x4.0Ghz) without problems? That I only have to remove the processor and the graphic card and put in the newer ones and then my Pc is working? Sry for my English. :)
@eliemervelez35839 років тому
Make sure your power supply has enough juice. Also, that the I5-3450 and the I7-4790k have the same socket in the motherboard. thats about it
@walterhigo76588 років тому
Excellent video. Very creative and explicative at the same time. This helped me a lot, thanx!
@coenraadkoster20945 років тому
I like how he ended the video with a satisfied smile after he one-breathed did his outro...😂
@faridtitan72569 років тому
I know many informations about the GPU like the name, due size, number of transistors, Technologie..... but when it comes to ROPs/TMUs !!! I have no idea what's that! and I know if there is more shaders unit its better, but what are those shaders unit ???
@TheMrMKultra9 років тому
i wonder if he also wears socks in sandals while shooting techquickie
@amon78168 років тому
When I play League of legends my toaster seems to run really slow. I have a hamster running on a wheel and I whip it, how do I make it run faster to make my otter better?
@JoshuaPlays999 років тому
Dang Linus you scared the crap out of me when you started flipping that knife haha.
@woopygoman9 років тому
You are really bad ass in this video man... 0_0
@Fantasma259 років тому
Actually most public key encryption algorithms (like RSA) have a really high computational complexity, so they are used only to share the keys used by other symmetric algorithms (like AES128/192/256). Those algorithms are the ones used to encrypt the actual data. You can see that in the padlock of the web browser.
@DerHirni9 років тому
Did you even read more than one article on this topic? Asymetric encryption like you explained it is usually not used to encrypt data. It's used to encrypt the session key of a symetric encryption algorithm to transfer it securely over the internet. That symetric algorithm is then used to encrypt the data.
@kelvinnguyen51306 років тому
“I type with a stick so that my hands don’t get ‘dirty’.”
@ModrunOfficial9 років тому
ok so how can i encrypt my everythingdata? i alredy use a vpn sometimes but i rather not have my interwebs speed slowed so is there another way that wont slow my internets?
@cncrim19 років тому
I love this channel.
@thematthewyoung9 років тому
wait so if the recipient sends you a public key which is some random number say 5325 and uses it as an encryption tool, how does the private key know you're public key was 5325? like how does it know that the key its using to decrypt the message is the same key that was used to encrypt it?
@arthurbirck42933 роки тому
I spend lots of time listening to your voice Linus i have now seen all of your newer vids so now i at watching the old ones
@dahorn1000119 років тому
I remember something ironic about Lizard Squad, they were all on about privacy, but the list of people who had bought their 'lizard hack' tool the database was stored in plain text so the police were able to track emails and passwords of anyone who bought the tool
@Brandon-ob9rg8 років тому
Shit I learn so much from these videos it's crazy!
@sectorcodec9 років тому
Linus' photos in the beginning made my day.
@Hevletica7 років тому
Hi Linus, how can you redirect HTTPS to http? Thanks!
@miketeo46277 років тому
If you're visiting a website, you don't. The website should automatically redirect you to HTTPS if they have it.
@xorinzor7 років тому
wrong. For chrome there is an extension called HTTPS Everywhere which will automatically redirect you to HTTPS if the website has it enabled. I'm sure other browsers have such extensions as well.
@courtneyjones90316 років тому
xorinzor its impossible to go to http if the site has https if its set up correctly
@cjz57576 років тому
"I TYPE WITH GLOVES SO THEY CAN'T GET MY FINGERPRINTS" LOOOOOL
@kairuihuang9 років тому
2:31 Good one Linus XD
@gaminworld10189 років тому
Would this pc play minecraft and bo2 good GT 720 2GB Intel i7 3.6GHz 12GBbof ram
@larswgjethammer68318 років тому
Can someone tell me which gtx 980 ti is the quietest one? I am building a VERY quiet pc.
@UndeadCreeper22In1080pHD9 років тому
3:05 "As seen on breaking bad" lol i remember that
@reidjohnson8082 роки тому
Ok but how does the other computer in the email example get the key
@DBTDerpbox6 років тому
Hi Linus, The server room is on fire again Just FYI I just wonder after 2 years how many joke emails he got from that.
@darshankavar53846 років тому
I have a base64 script. I want to decode it into the image. How can I do it???
@marsniper279 років тому
So what knife you flipping there? Dont get a good enough few to tell. Atleast not while watching the video on my phone..
@jayhawks3009 років тому
Love the Christmas Story reference
@glenndbritto6749 років тому
Please make a video about ambient occlusion....
@luketimothy8 років тому
I enjoyed the video but I feel like you oversimplified the process a little. Public key crypto (like RSA) is usually not used in message transmission because the mathematics involved (using enormous 4096-bit numbers) is so CPU intensive, so it would really slow things down... So public key crypto is instead used to securely exchange/agree upon a secret key which can be used in a private key crypto scheme, where both parties share a single private key. Since private key crypto (such as AES) is much faster than public key crypto... SSL/TLS is not a public key crypto implementation, but rather a protocol which uses both public and private key cryptography (as well as other crypto techniques such as digital signing) to both verify the identity of each party and then securely exchange data between them.
@VisualBasic69 років тому
clicked on the link in the video description, does not tell me if its dangerous to sell knives to Linus
@ArkadyVolovik9 років тому
But how can the Private Key can unlock the message if it's different from the Public key used to lock the message?
@itsokswallow2 роки тому
Thank you I finally understand encryption very informative and I will be using mass draw thanks for the tip
@mahoihei9 років тому
Correct me if I am wrong, I think nowadays email is not encrypted unless you apply PGP yourself
@minjung48269 років тому
The unlocking of enigma was told by the movie the Imitation Game It was a good one
@Luka-he5mr3 роки тому
Is this video double sponsored? pulseway... But where is the link in the description?
@zefrinarosli14986 років тому
i enjoy listening to this guy...
@RAZRC09 років тому
CYM or fnsr yvahf also, I'm pretty sure caesar made a cipher, which was in the early A.D.s.
@WyzzyMoon9 років тому
"speaking of whatever I was talking about"
@brendanleach89719 років тому
So what is "FAP topic ideas" doc in your google drive? Explain that in your next video pls.
@brendanleach89719 років тому
***** nice profile pic :)
@BLOOWOLF4562x9 років тому
It's an acronym for Fast as Possible
@brendanleach89719 років тому
BLOOWOLF4562 sure it is. We all know the real truth though
@DiegoBQZ9 років тому
Holy fuck the PC screen capture footage finally runs at 30 fps! What was all that stuttering you had in the past when capturing it? That Mouse acceleration had the same problem and the mouse capture was...very laggy.
@GavinHohenheim9 років тому
Follow-up request: Lenovo and Superfish
@UnknownXV9 років тому
How does the recipient computer get the private key though? If the key is transmitted along with the data, couldn't the key be intercepted too? If it's not transmitted, how does the recipient computer have it?
@chris1958689 років тому
The recipient only sent the public key, the one that could only encrypt, but not decrypt. The recipient also generated it's own private key to decrypt, that was never sent out. The private key is a key that can decrypt whatever the public key has encrypted. It's kinda like a some bike locks, anyone can lock it, but you need your key to unlock it.
@UnknownXV9 років тому
Christoffer Nørskov Yeah I understand that, I don't understand how the recipient computer generates the private key though?
@chris1958689 років тому
UnknownXV very advanced math, no, but honestly i wouldnt know
@HeyJD1239 років тому
UnknownXV There's two locks. One lock only the server can unlock, and one lock only the client computer can unlock.
@UnknownXV9 років тому
HeyJD But the key has to be transmitted to the recipient computer, or else how can the client computer lock be opened? How does the recipient computer know how to unlock it?
@featherspy2 роки тому
You: as fast as possible Me: sets video to 2x anyways
@chaosjacky9 років тому
How does the recipients private key unlock the what was locked with a public key? How does the encryption know that was the correct target and that private key is the good one?
@bman12three439 років тому
nice christmas story reference
@javathehut35934 роки тому
does one private key decrypt only one message or does one private key decrypt multiple messages
@namangupta93195 років тому
Hey techquikie this is the half story of web encryption, after a successful public key private key connection their is a AES key exchanges in between 2 PCs and then the whole traffic is encrypts with AES encryption
@charleslane27356 років тому
so what your saying is that it makes harder for people what you look up on the internet?
@nexorabolis9 років тому
Good video :) I always wondered about this
@TheBassteban9 років тому
I know this channel has a worldwide audience but do Canadians really buy from Massdrops? I find the shipping fee really kill any deals the site could have...
@Victor_Marius2 роки тому
The encryption is done with the public key and decryption with the private key. Isn't possible to decrypt using the public key?
@xnamkcor9 років тому
"Metallic tears of Sunder". True Fact.
@Elitea204 роки тому
Man sounds like Alvin the chipmunk
@joshuamacauley12549 років тому
He is such a good speaker
@What_was_wrong_w_jst_our_names9 років тому
Wait so how does the private key unlock the encrypted data. How does it know how to unencrypt it
@supaicyboi9 років тому
The knife flipping made me so paranoid. I drop my darts on accident and I flip out that I'm gonna stab a hole through my foot. That takes serious balls.
@AJMansfield18 років тому
Except that unless you are using something special, current email DOES NOT use end-to-end public key encryption the way you suggest.
@robertkim70264 роки тому
Wow what an amazing job you do advertising starting from 3:49 lol didn't even notice that commin
@GavinRemme9 років тому
Linus, you're right, I spend way to much time watching you. Wait...my math...It's due in 12 hours!
@SgtJStupid9 років тому
solid video.
@UntouchedWagons9 років тому
An addition, what Linus described is called Asymmetric Encryption. There is also Symmetric Encryption which uses the same key to "lock" and "unlock" the data. TheMoreYouKnow.mp4
@adipramono1666Рік тому
hey linus, this video is 7 years old. i have a question tho. Why encryption and decryption is faster on intel platform rather than AMD?
@Taylor-Hanson3 роки тому
Hey Linus thanks for doing this video. I had no idea that you would be helping teach me to get my bachelor's degree from Western Governors University. I've been a long time fan of LTT and now I'm a fan here too. :-)
@stephensnell5707Рік тому
I like it when Linus goes crazy
@sungminz7 років тому
That voice though
@ohlife32887 років тому
that voice though
@ohlife32887 років тому
he has the voice of an angel that inhaled some helium
@wsqsite9 років тому
hashing != encryption Hashing was never meant to be reversed, it was just used in storing for authentication or verification.