How Encryption Keeps Your Data Safe

  Переглядів 107,343

SciShow

SciShow

День тому

Start protecting yourself on the web at NordVPN.com/SCISHOW or use code SCISHOW to save 75% off of a 3-year Virtual Private Network plan, plus 1 month free.
Keeping our data safe and secure is necessary in today's world, but a lot of the encryption we depend on has been in development for thousands of years!
Hosted by: Stefan Chin
Head to scishowfinds.com/ for hand selected artifacts of the universe!
----------
Support SciShow by becoming a patron on Patreon: / scishow
----------
Dooblydoo thanks go to the following Patreon supporters: Lazarus G, Sam Lutfi, D.A. Noe, الخليفي سلطان, Piya Shedden, KatieMarie Magnone, Scott Satovsky Jr, Charles Southerland, Patrick D. Ashmore, charles george, Kevin Bealer, Chris Peters
----------
Looking for SciShow elsewhere on the internet?
Facebook: / scishow
Twitter: / scishow
Tumblr: / scishow
Instagram: / thescishow
----------
Sources:
book.itep.ru/depository/crypto...
www.sans.org/reading-room/whi...
cryptogramma.com/cryptogramma/...
books.google.com/books?id=Zb2...
www.britannica.com/topic/tran...
books.google.com/books?id=o3Y...
penelope.uchicago.edu/Thayer/E...
www.coursera.org/lecture/symm...
www.moserware.com/2009/09/stic...
• DES Confusion And Diff...
dl.acm.org/citation.cfm?id=18...
www.networkdls.com/Articles/tr...
ftp://ftp.rsasecurity.com/pub/pdfs/tr701.pdf
link.springer.com/content/pdf...
cacr.uwaterloo.ca/hac/about/ch...
• Public key cryptograph...
• Public Key Cryptograph...
www.digicert.com/TimeTravel/m...

КОМЕНТАРІ: 226
@blueblazeing94
@blueblazeing94 5 років тому
Nice shirt, see someone is a fan of Engineering Explained.
@J4rj4r81nx
@J4rj4r81nx 5 років тому
I'll have to check those guys out. But Hank was also wearing a Kurzgesagt shirt recently. Maybe they're just doing some subtle shoutouts to related channels?
@just-a-silly-goofy-guy
@just-a-silly-goofy-guy 5 років тому
Of course it’s sponsored by a security company lol
@PikaQPika
@PikaQPika 5 років тому
Is a data security video meant to be sponsored by Walmart? Am i missing some sort of logic here? Lol
@BartJBols
@BartJBols 5 років тому
@@PikaQPika It means the video is biassed.
@blakestone75
@blakestone75 5 років тому
Lol biased. Hardly. All he did was explain a little bit about the history of cryptography. Nord VPN probably just sees value in educating the masses on this subject. It’s not like video went out of its way to say “and Nord VPN does crypto better than anyone else”... that would be bias.
@Grosvenor77
@Grosvenor77 5 років тому
@@BartJBols There was no bias at all in this video. how do you figure?
@BartJBols
@BartJBols 5 років тому
@@Grosvenor77 how could we ever know lol.
@baltakatei
@baltakatei 5 років тому
A minigame I like to play is to guess when the commercial starts. Sometimes they get sneaky and insert it in the middle. Sometimes at the start. Usually at the end.
@keriezy
@keriezy 5 років тому
I created a cypher in high school... I have it somewhere. I have to say it was good. It included many symbols for the same letter, but not the same amount of symbols for each letter. "E" for example had six options and "Z" had two options. Some symbols were letters, others were pictograms, and a few were just basic circles filled in in different ways.
@poppasmurf4115
@poppasmurf4115 5 років тому
i still believe that pig latin is the most secure cipher ever devised.
@jarencascino7604
@jarencascino7604 5 років тому
Why didn’t u write this in pig latin
@poppasmurf4115
@poppasmurf4115 5 років тому
@@jarencascino7604 i was afraid that younger viewers might not know what pig latin was (i'm 62). utbay uryay ightray, i ouldshay avehay.
@jarencascino7604
@jarencascino7604 5 років тому
Makes sense but I’ll tell you this Im 17 and I know what pig Latin is. It is still a language in elementary school! I remember we used to argue whether it’s the first letter or the first sound. Like “the” would be hetay or ethay.
@Zeldaschampion
@Zeldaschampion 5 років тому
0:30 Lol. I actually just finished that quest in AC odyssey a couple of hours ago.
@necrisro
@necrisro 5 років тому
Same, and wondered what the heck was special about a stick, but didn't google it. Thanks SciShow !
@jaredpotter1
@jaredpotter1 5 років тому
This is a great video. I'm looking forward to the next one on secure key distribution!
@Babarudra
@Babarudra 5 років тому
This was very interesting, but my eyes started to glaze over.
@celtgunn9775
@celtgunn9775 5 років тому
Me too... just bleh.
@KwynM
@KwynM 5 років тому
Can't wait for the public and private key episode!
@undead890
@undead890 5 років тому
Right?
@Farreach
@Farreach 5 років тому
i love these computer science related video's ... currently going over hashing in my data structure class
@gregoryfenn1462
@gregoryfenn1462 5 років тому
hashing in data structures often means something very different to hashing in cryptography, The former is used in Java and other languages to create a quick dictionary-mapping from keys to values, and these hash tables are built to be user-friendly and programmer-friendly. Often a computer could take a pretty good guess as a key associated with some value. Cryptographic hash functions. on the other hand, are designed to be secure: so that the output of the hash (the 'value') is so different from the input ('key') that no known computer (or computer predicted to exist for at least a decade or two) could feasibly make an above 0.01%-likely guess as to the input associated with a given output, even if allowed to keep testing guesses and computing maths behind the scenes for a thousand years.
@JosephDavies
@JosephDavies 5 років тому
Great topic. You should try to do one building on this video, explaining why backdoors to encryption are being sought by law enforcement, and how it's not possible to do while still having reliable and secure encryption. People are woefully under-informed on this subject, and it's increasingly becoming a crucial issue (at least here in the USA) that voters need to be aware of.
@64standardtrickyness
@64standardtrickyness 5 років тому
Basically the key is it is possible to create easy/ fast encryption methods such that the decryption method is hard/slow to find (see diffie helman Euler totient theorem)
@RangerRuby
@RangerRuby 5 років тому
I love SciShow videos that explain big words I don't know!
@metanumia
@metanumia 5 років тому
The beauty of learning! And now you know what they mean! Glad you're enthusiastic about acquiring new knowledge! Every human on Earth should be! :)
@arturbaleja3907
@arturbaleja3907 5 років тому
Alan touring did not crack the enigma. Enigma was in fact decyphered in Poland before the war. They even build a decoding computer based on 3 examples of the civilian version of enigma (there was such thing. Germans just adopted and modified a device designed for bank security). Then after September of 1939, the team that did it, moved with the hardware to France and later England, where English simply decided thet, with the code cracked, they don't need them anymore. What Touring team was doing was mass scale decoding. They run the procedures discovered in Poland on thousends of radio messages every day and transfering the data to the inteligence. This team was cranking numbers, not cracking the code.
@alexandren.9346
@alexandren.9346 5 років тому
The best encryption method is still some kind of prime factorisation, since the primes involved are impossible to guess without the key. And: You don't even need to share the key! There are also ways to use a public encryption that is impossible to decrypt unless you have your own public key (prime numbers involved;) So the Cesar Cipher was just the beginning....
@meowzerus
@meowzerus 5 років тому
Fun facts: Encryption algorithms are treated as munitions, and you can't export software with them outside the US. If you want to exchange keys with someone, you should check out how Diffie-Hellman key exchange happens! There are plenty of explanations that don't involve any math.
@FusionDeveloper
@FusionDeveloper 5 років тому
I absolutely LOVE videos about Encryption. I hope to make my own online chat (some day) that uses a unique form of encryption that I come up with. Alternating Transposition and Substitution sounds just like what I would use. All the bit flipping stuff is out of my league.
@wikilcontainments
@wikilcontainments 5 років тому
One time pads were used in WW2. And still are considered one of the best encryption methods. Unbreakable for short messages with no key.
@Furiends
@Furiends 5 років тому
NIST which is pronounced as one word also created Data Encryption Standard as effectively an early open standard where the public gave input on how the system worked. This is significant for two reasons. One is it was the government that was responsible for the modern concept of open standards and also because public research was responsible for the development of data encryption, the Internet and computers.
@klumaverik
@klumaverik 5 років тому
Lol stefan eats the edamame. Why did that make me heehee?
@bardes18
@bardes18 5 років тому
First time I see a video that actually explains modern cryptography in simple terms without just saying "it's magic".
@metanumia
@metanumia 5 років тому
Check out 3Blue1Brown here on UKposts! Excellent explanations of cryptography and other mathematical concepts!
@jasonspence
@jasonspence 5 років тому
@@metanumia Also Computerphile has some great videos on specific encryption methods
@jerry3790
@jerry3790 5 років тому
That new Tux is scary as hell. Would’ve made a good Halloween costume.
@e4r281
@e4r281 5 років тому
Wait, where are Alice and Bob ?
@Neumah
@Neumah 5 років тому
Asking the real questions. Did Mallory get them?
@moosemaimer
@moosemaimer 5 років тому
@@Neumah Eve did
@ViralonEarth
@ViralonEarth 5 років тому
Top 10 ringtone of 2018 Link:- ukposts.info/have/v-deo/j3p0dm5rgHimunk.html Watch it & please do Subscribe & share if you like it. Have a Great Day :-)
@alexandren.9346
@alexandren.9346 5 років тому
You mean Dolfh and Ere, right? ;D
@monkeyplayer1
@monkeyplayer1 5 років тому
Engineering Explained!
@asphaltpilgrim
@asphaltpilgrim 5 років тому
You guys are really reaching for a halloeen special this year ;)
@rogerhinman5427
@rogerhinman5427 5 років тому
Love the Engineering Explained shirt.
@ewoodley82
@ewoodley82 5 років тому
For those who are curious about those key exchanges, look into PKI, or Public Key Infrastructure
@JeremyWS
@JeremyWS 5 років тому
Decode this: [key, sentence is translated to French and then written backwards] laineg ertê'd zeibou'N unetnoc not emai'J. lainég tse lanac eC
@undead890
@undead890 5 років тому
This is what I got: This channel is great. I love your content Do not be awesome
@JeremyWS
@JeremyWS 5 років тому
It's suppose to be: This channel is great. I love your content. Don't forget to be awesome.
@undead890
@undead890 5 років тому
@@JeremyWSThat makes more sense :)
@Master_Therion
@Master_Therion 5 років тому
It's Halloween, so I have the movie Ghostbusters on my mind: "I am the Encryption Key Master." "I am the Security Gate Keeper."
@rake4290
@rake4290 5 років тому
I see your point, but you should never cross streams. Feel free to retort and take me down a peg. I don't want my ego to stay puffed.
@metanumia
@metanumia 5 років тому
@Master Therion Happy Halloween! I've missed your witty comments, so have Alice and Bob, but my friends Whitfield and Martin have yet to discover the keys to your humor! I will have to show them, but they only communicate with me after I cook them a nice breakfast of salted hash and coffee. ;)
@tuseroni6085
@tuseroni6085 5 років тому
the matter of sharing the key is part of why DRM will never work. the key to decrypt the content is given to the user, it has to be or they can't view the content, the whole thing is based on trying to keep this fact hidden from the user. the key is hidden somewhere so the program running it can use the key but that the user won't be able to just use the key themselves. it never works for very long (many companies feel so long as it can be hidden for a little while it's worth it, but still say they need copyright protection for up to 170 years or what's the point in making anything.)
@yurymol
@yurymol 5 років тому
It’d be great if you told how does SSL work. It’s really exciting what prime numbers can do.
@jangambler9998
@jangambler9998 5 років тому
I'm guessing the other stuff is about Quantum Cryptography? I am seriously amazed by how useful inherent randomness is.
@aidanwansbrough7495
@aidanwansbrough7495 5 років тому
Really interesting!
@allertonoff4
@allertonoff4 5 років тому
i might have to Re:listen to this MUSIC a couple of times.
@esecallum
@esecallum 5 років тому
frequency analysis is easily defeted by using multiple numbers to substitute for the same letter.
@calamusgladiofortior2814
@calamusgladiofortior2814 5 років тому
To crack the Spartan's code, just look for the frequently-occuring, 12-letter phrase.... ..."This is SPARTA!"
@scheimong
@scheimong 5 років тому
I'm interested in seeing how SciShow will manage to explain modular arithmetics and finding multiplicative inverses in a 10 minute video...
@Vladimir-et2kq
@Vladimir-et2kq 5 років тому
can you do fresh cut grass smell?? or why when cut the grass and keep it I'm a bag it smells so foul after a day or two
@Vladimir-et2kq
@Vladimir-et2kq 5 років тому
@cypress cat plants curl up when touched? I honestly didnt know that. amd thanks :)
@Hawkenshmire
@Hawkenshmire 5 років тому
That shirt looks cool
@Merennulli
@Merennulli Рік тому
Would be interesting to see how a WWII cryptographer would approach modern encrypted data. We are currently at a point where 20 characters decrypted by brute force with the best supercomputer will take longer than the Earth has left to live so they wouldn't be able to touch it computationally, but they might try some interesting approaches. I still struggle to understand how they prevent public key interception. A security expert tried to explain it to me once but eventually gave up.
@vistastructions
@vistastructions 5 років тому
Engineering Explained shirt!!! Jason you're famous!!!
@someoneelse8494
@someoneelse8494 5 років тому
Good episode, but I´ve missed the asymmetric encryption based on prime numbers!
@medokn99
@medokn99 5 років тому
Engineering Explained! (the shirt)
@roguedogx
@roguedogx 5 років тому
Nice shirt.
@gamereditor59ner22
@gamereditor59ner22 5 років тому
I may use this method if there's a software to create a encryption code.
@bgroks1
@bgroks1 5 років тому
information to learn Don’t recommend implementing your own custom code if you’re programming. Look into veracrypt.
@LordZozzy
@LordZozzy 5 років тому
7:38 I'd just like to interject for a moment. What you're referring to as Linux, is in fact, GNU/Linux, or as I've recently taken to calling it, GNU plus Linux. Linux is not an operating system unto itself, but rather another free component of a fully functioning GNU system made useful by the GNU corelibs, shell utilities and vital system components comprising a full OS as defined by POSIX. Many computer users run a modified version of the GNU system every day, without realizing it. Through a peculiar turn of events, the version of GNU which is widely used today is often called “Linux,” and many of its users are not aware that it is basically the GNU system, developed by the GNU Project. There really is a Linux, and these people are using it, but it is just a part of the system they use. Linux is the kernel: the program in the system that allocates the machine's resources to the other programs that you run. The kernel is an essential part of an operating system, but useless by itself; it can only function in the context of a complete operating system. Linux is normally used in combination with the GNU operating system: the whole system is basically GNU with Linux added, or GNU/Linux. All the so-called “Linux” distributions are really distributions of GNU/Linux.
@LordZozzy
@LordZozzy 5 років тому
That feeling when the sole reaction to a correction under a SCIENTIFIC video is "get a life"... F-ing priceless.
@LordZozzy
@LordZozzy 5 років тому
Wow, mimicking - what's next, name-calling? >Not important Are you this meticulous in your work, too? Also, correcting something = having no life. What an interesting notion. Tell me more.
@LordZozzy
@LordZozzy 5 років тому
You might want to learn english before you insult somebody, kid. :)
@eruyommo
@eruyommo 5 років тому
9:10 Magical hair cut
@pikminlord343
@pikminlord343 3 роки тому
This was an interesting video
@mauriciofuentes7638
@mauriciofuentes7638 5 років тому
Where is Muscle Hank?
@strangederekredux
@strangederekredux 5 років тому
Really surprised there was no mention of RSA.
@Markovisch
@Markovisch 5 років тому
How come? This was all about Symmetric Key Cryptography, while RSA falls under Public Key Cryptography.
@ChenfengBao
@ChenfengBao 5 років тому
He said they'll make another video on how to securely exchanging secrets, where RSA is primarily used.
@inademv
@inademv 5 років тому
i feel like this whole video was a long commercial for NordVPN...
@mikopiko
@mikopiko 5 років тому
10:03 minutes exactly, keep that in mind folks!
@scottc.4234
@scottc.4234 5 років тому
I like the engineering explained shirt.
@SaucerJess
@SaucerJess 5 років тому
💙
@grrttr
@grrttr 5 років тому
why is muscleHank never shown=?
@bikespj22
@bikespj22 5 років тому
What cypher is this?
@cryptosporidium1375
@cryptosporidium1375 5 років тому
Make a crash course IT series please.
@malasoat1
@malasoat1 5 років тому
Cryptosporidium 137 there's crash course computer science which goes pretty in depth
@k0vert
@k0vert 5 років тому
Scytale dytale damn good stuff
@famistu
@famistu 5 років тому
Not a big misinformation. But Enigma wasn't crack by Gentelman on photo slide... 😂 Thank You for information. That wasn't sarcastic. ☺️
@bgroks1
@bgroks1 5 років тому
Dawid Kryspin Ehhh. I mean they weren’t the first to crack the device called “Enigma”, but after the Enigma was made more secure by adding wheels or the plug box, they had to crack it on their own.
@windhelmguard5295
@windhelmguard5295 5 років тому
the enigma was never actually cracked, the allies only managed to decrypt the enigma by geting their hands on a working machine, from that point on they just examined the enigma, learned that a letter would never become itself, they then designed a machine that could, within 20 minutes, brute force all possible plug and rotor settings, this would, given that you managed to guess a certain word or phrase in a massage such as the words "Führer" or "Wetterbericht" give you the correct plug and rotor settings, from which point on all they had to do was to set their enigma to the correct settings and then just decrypt messeges until they where changed at midnight. however the reason why i'm saying that the enigma was never truelly cracked is that they couldn't crack signals sent by the kriegsmarine, because those sent the settings for the plugs and rotors at the start of every messege using a different code and since that code did not contain any repeating patterns such as words that the germans would often use, this method didn't work. either way if you know how the enigma works you know that it can not be "cracked" you always need your own working machine as well as a good hunch on the information your enemy is trying to send, as a matter of fact the british actually improoved on the design to make it impossible to decrypt by allowing for letters to become themselfs.
@eChuckNorris
@eChuckNorris 5 років тому
Explain block-chain and RSA :)
@kinomora-gaming
@kinomora-gaming 5 років тому
I think we can all thank the ancient Greeks for allow us to safely order our favorite snacks online. [cc]
@telotawa
@telotawa 5 років тому
1:22 keeps prying eyes out of your whatsapp messages... except from whatsapp itself when they wanna harvest data
@thesteadfastduelist6258
@thesteadfastduelist6258 5 років тому
*What about Bill Cipher?*
@metanumia
@metanumia 5 років тому
LOL at this great reference! I was so impressed by the complexity of that subplot! :)
@shis10
@shis10 5 років тому
AES ?
@unleashingpotential-psycho9433
@unleashingpotential-psycho9433 5 років тому
Encryption is what prevents a whole bunch of identity theft from occurring.
@safir2241
@safir2241 5 років тому
UNLEASHING POTENTIAL - PSYCHOLOGY VIDEOS Like your own comment, I see? Dw I do it too & all my comments get hundreds of likes
@just-a-silly-goofy-guy
@just-a-silly-goofy-guy 5 років тому
Safir ok
@safir2241
@safir2241 5 років тому
G G Leave a comment or a reply talking about this. I’m fully interested & prepared for walls of text.
@Unplanted
@Unplanted 5 років тому
Hey cool, I already use NordVPN. Makes me feel better about it :)
@Tholomaios
@Tholomaios 5 років тому
*ehem* It was not the English to crack Enigma: 'On 26 and 27 July 1939,[4] in Pyry near Warsaw, the Poles initiated French and British military intelligence representatives into their Enigma-decryption techniques and equipment, including Zygalski sheets and the cryptologic bomb, and promised each delegation a Polish-reconstructed Enigma. The demonstration represented a vital basis for the later British continuation and effort.' Gordon Welchman, The Hut Six Story, 1982, p. 289.
@ruileite4579
@ruileite4579 5 років тому
With quantum encrypting hackers will cry
@glowingone1774
@glowingone1774 5 років тому
Not really
@ChenfengBao
@ChenfengBao 5 років тому
Even today hackers can't do anything against properly encrypted data. Problem is that it's hard to do encryption properly.
@hunteur
@hunteur 3 роки тому
stefan is adorable!
@pdaphuulz8219
@pdaphuulz8219 5 років тому
Thanks, Cryptographers.
@SkiddosSiren
@SkiddosSiren 5 років тому
COMPLEX Indeed
@THETRIVIALTHINGS
@THETRIVIALTHINGS 5 років тому
The best kind of secret is the one you don't know.
@chaosopher23
@chaosopher23 5 років тому
But you didn't mention SHA...
@meghanparris8203
@meghanparris8203 5 років тому
That haircut at the end.... lol
@Guru_1092
@Guru_1092 5 років тому
Quantum Cryptograhy. Have fun.
@heliosprime6426
@heliosprime6426 5 років тому
I can't see how entrustng my data to the Egyptians would keep it safer!!
@moosemaimer
@moosemaimer 5 років тому
That's easy: 🐍🐢🐈🌿🌘🐞🐂🏺👁⚖️
@patriciaa4451
@patriciaa4451 5 років тому
4:53 I got completely lost
@jeremiasrobinson
@jeremiasrobinson 5 років тому
Send me the information!!
@danukil7703
@danukil7703 5 років тому
0:21 Heh, what Spartan navy? XD Just a joke
@MikeTrieu
@MikeTrieu 5 років тому
Scytale: Taste the Rainbow Table
@Singular121
@Singular121 5 років тому
I would never be good in coding after watching this.
@FlyLikeADragon
@FlyLikeADragon 5 років тому
the cipher..... Bill Cipher!
@NotAJosh
@NotAJosh 5 років тому
Hmm the vid is still private
@EHLOVader
@EHLOVader 5 років тому
Nooooo! Never encrypt passwords. Any bank that does is doing passwords wrong. If they limit the length of your password it's a good indicator that it's encrypted instead of hashed, or perhaps worse stored in plain text
@whoofianbrony8804
@whoofianbrony8804 5 років тому
Very very bad. Follow proper zero-forward trust security controls!
@BattousaiHBr
@BattousaiHBr 5 років тому
password length limit is not necessarily correlated with encryption/hashing at all. a lot of websites will limit password length even if it's hashed, simply because bigger passwords require more computational power to hash.
@whoofianbrony8804
@whoofianbrony8804 5 років тому
@@BattousaiHBr in general that is not that much of a problem with current computing power. SHA-512 with a random salt is not very computationally expensive to do once. Multiple times? Oh hell yes. That's why it's one-way. :)
@EHLOVader
@EHLOVader 5 років тому
@@BattousaiHBr do you imagine a 13 character password is much harder to effectively hash than a 50 char? Hashes are designed to be quick, one way, and unique. I've had banks limit length to 7 or 13 or in that vicinity. It suggests that they are storing it in fixed length storage like a string in a database. Whether it is encrypted or not. Hashes take the same amount of space. Be they 7 or 500.
@EHLOVader
@EHLOVader 5 років тому
@Kernels exactly, so why did he say the banks secure passwords with encryption?
@robramsey5120
@robramsey5120 5 років тому
9 minute segway for the sponsor, everyone seems to be doing this lately.
@smurfyday
@smurfyday 5 років тому
Rob Ramsey segue, genius.
@robramsey5120
@robramsey5120 5 років тому
@@smurfyday Thank you so much for the correction, every little bit of kindness helps, I'm clearly no genius though, I'm often making silly little mistakes these days especially with my mental health getting worse and worse by the day, it really does make clear thought difficult.
@mikeltxo11
@mikeltxo11 5 років тому
Did you just get a haircut in the middle of the episode? xD Between 9:00 and 9:15
@MichaelBattaglia
@MichaelBattaglia 5 років тому
What will happen to modern cryptography once quantum computers become common place?
@valtur25
@valtur25 5 років тому
Turing and his collegues didn't crack the Enigma. Check your information before such bold statements! German military texts enciphered on the Enigma machine were first broken by the Polish Cipher Bureau, beginning in December 1932. This success was a result of efforts by three Polish cryptologists, Marian Rejewski, Jerzy Różycki and Henryk Zygalski, working for Polish military intelligence.
@thstroyur
@thstroyur 5 років тому
9:10 Isn't it cool just how jumpcuts can now also make haircuts? I mean, why waste your money with barbers when you can use your editing skillz for zildo?
@ISTAYUPLATE
@ISTAYUPLATE 5 років тому
But how do you crack Bill Cipher?
@fevre_dream8542
@fevre_dream8542 4 роки тому
Rib spreader.
@bneisasmiler4942
@bneisasmiler4942 5 років тому
Just Google translate and then do it back a ton of times :P
@ireallyhatemakingupnamesfo1758
@ireallyhatemakingupnamesfo1758 5 років тому
This video should be Demonetized for that pun in the thumbnail
@DonaldSleightholme
@DonaldSleightholme 5 років тому
just send yourself a message that says hello world and read it while it’s encrypted... it still says hello world 😝
@bigguix
@bigguix 5 років тому
dat engineering explained tshit tho !@
@ElynevanOpzeeland
@ElynevanOpzeeland 5 років тому
why didn't i hear anything about lava lamps?
@Niinkai
@Niinkai 5 років тому
WRONG! Media has taught me that anything can easily hacked if you just type real fast! The counter-hackers always lose if you wear a beanie, have at least two keyboards, speak with a Russian accent and have headphones resting on your neck. This Is The Truth!
@MrWombatty
@MrWombatty 5 років тому
Congratulations if you deciphered this video to be really just an ad!
@Co-km6cl
@Co-km6cl 5 років тому
12th
@saumyashah7978
@saumyashah7978 5 років тому
Then how does the NSA spy on us? Isn't that a violation of our privacy?
@HappyHusbandnWife
@HappyHusbandnWife 5 років тому
Thanks to Felix who hacked the youtube code, now the standard length for a vid is 10mins
How does encryption work? - Gary explains
20:30
Android Authority
Переглядів 108 тис.
Data Mining: How You're Revealing More Than You Think
11:13
SciShow
Переглядів 247 тис.
Level 1 to 100 Mystery Buttons
00:46
A4
Переглядів 8 млн
ФОКУС С ЧИПСАМИ (секрет)
00:44
Masomka
Переглядів 4,1 млн
Что будет с кроссовком?
00:35
Аришнев
Переглядів 2,3 млн
This Problem Could Break Cryptography
8:08
SciShow
Переглядів 294 тис.
The Mystery of the Copiale Cipher
10:23
hochelaga
Переглядів 608 тис.
The Secret World of Ones and Zeroes: Moore's Law Explained
9:19
NIST Announces First Four Quantum-Resistant Cryptographic Algorithms
17:16
TWiT Tech Podcast Network
Переглядів 10 тис.
Should You Really 'Feed a Cold, Starve a Fever'?
4:48
SciShow
Переглядів 175 тис.
The Methodical Plan to Erase Chicago
14:47
Stewart Hicks
Переглядів 76 тис.
Why you should NEVER* encrypt your backups
7:57
Vector
Переглядів 43 тис.
Why flat earthers scare me
8:05
Sabine Hossenfelder
Переглядів 194 тис.
HTTPS, SSL, TLS & Certificate Authority Explained
43:29
Laith Academy
Переглядів 41 тис.
Symmetrical vs asymmetrical Encryption Pros and Cons by Example
22:07
Hussein Nasser
Переглядів 41 тис.