How Encryption Works - and How It Can Be Bypassed

Sdílet
Vložit
  • čas přidán 3. 03. 2016
  • The debate between privacy and national security has never been more heated, with Apple and other tech firms going up against the government. So how are text messages encrypted, and what are the controversial "backdoors" that could allow access to them?
    Subscribe to the WSJ channel here:
    bit.ly/14Q81Xy
    More from the Wall Street Journal:
    Visit WSJ.com: www.wsj.com
    Follow WSJ on Facebook: / wsjvideo
    Follow WSJ on Google+: plus.google.com/+wsj/posts
    Follow WSJ on Twitter: / wsjvideo
    Follow WSJ on Instagram: / wsj
    Follow WSJ on Pinterest: / wsj
    Don’t miss a WSJ video, subscribe here: bit.ly/14Q81Xy
    More from the Wall Street Journal:
    Visit WSJ.com: www.wsj.com
    Visit the WSJ Video Center: wsj.com/video
    On Facebook: / videos
    On Twitter: / wsj
    On Snapchat: on.wsj.com/2ratjSM

Komentáře • 162

  • @mateko2001
    @mateko2001 Před 2 lety +129

    I absolutely hate the idea of government justifying having control of everything and everyone by saying it's trying to protect you.

    • @sam_9228
      @sam_9228 Před rokem +1

      true

    • @juansarabia7530
      @juansarabia7530 Před rokem +1

      This not about control of 'everything' but about control of crime! Idiot.

    • @haimo14228
      @haimo14228 Před rokem +19

      "Allow us to break in to your home so we can protect you, otherwise, we're going to break in to your home and find out why you won't allow us to break in to your home".

    • @user-sf9gs2pg1b
      @user-sf9gs2pg1b Před 10 měsíci +4

      I feel like some criminals could be caught if everything were open, but there are more cons than pros. A couple criminals get caught, sure, but at the cost of virtually no privacy for law-abiding citizens.

    • @myxobe
      @myxobe Před 3 měsíci

      ​@@haimo14228it reminds me of that south park series when one of the characters forgot to put the lid of his toilet down and his mom died because of it. then the town implemented surveillance to prevent people from dying in the toilet

  • @LibertyAnd1776
    @LibertyAnd1776 Před 9 měsíci +15

    Whenever I hear the term “national security,” I know that it’s going to be followed up with stupid anti-privacy BS.

  • @Karmiangod
    @Karmiangod Před 8 lety +282

    Personal privacy is much more important than national security.

    • @thehonkening1
      @thehonkening1 Před 7 lety +33

      "rather have my country die for me"

    • @suleymenkand41
      @suleymenkand41 Před 7 lety +14

      You both have a valid point

    • @nicholasfulton9658
      @nicholasfulton9658 Před 6 lety +2

      I agree with you, but I have an Android phone. Don't worry, im saving for an iPhone

    • @thefunnybuddy4138
      @thefunnybuddy4138 Před 5 lety +7

      How 'bout we just write letters?

    • @Valdismith
      @Valdismith Před 5 lety +3

      Hahaa, I know, tell them about it, they won't believe me. F national security

  • @Godsserver22
    @Godsserver22 Před 2 lety +3

    That last statement, right on the head!

  • @VictoriaOtunsha
    @VictoriaOtunsha Před 2 lety +3

    Thank you for the easy breakdown

  • @loveredmoon2600
    @loveredmoon2600 Před rokem +1

    I dont understand the shared key, after creating the shared key, is the shared key the same for each end? how does the shared key be used?

  • @realdragon
    @realdragon Před 4 lety +11

    Privacy vs National security
    Because criminals doesn't communicate in code or use their own programs

  • @riviera443
    @riviera443 Před 5 lety +1

    Thanks a lot

  • @ssjlee93-uu1cv
    @ssjlee93-uu1cv Před 2 měsíci

    Perfect, flawless, and neutral video! Highly informative! My ideal form of what mews should be. Just amazing.

  • @neverendingjourneystilllea5271

    Thanks

  • @danielleonard2891
    @danielleonard2891 Před 3 lety +11

    Finally a video on encryption that made sense.

  • @Alex-dn7jq
    @Alex-dn7jq Před 6 lety +15

    That's not how national security should work in the first place.

  • @erltyriss6820
    @erltyriss6820 Před 8 lety +29

    I was going to comment that privacy was far more important than security, but the other commenters have already said it for me.

  • @muntee33
    @muntee33 Před 4 lety +7

    What if private key and encryption/decryption is only done on dedicated device that does not utilise major processor chipsets? Such as a scientific calculator type device?

    • @earring2301
      @earring2301 Před 3 lety

      Then everything you send can easily be compromised by both the government and hackers, did you not watch the video?

    • @monkemode8128
      @monkemode8128 Před 2 lety

      @@earring2301 why would that be?

    • @macdoctor145
      @macdoctor145 Před 6 měsíci

      I did not know that dedicated scientific calculator devices connected to the web. If they did not connect to the web wouldn't this be an irrelevant question?

  • @gustavomartinez6892
    @gustavomartinez6892 Před 4 lety +6

    Love this kind of journalism, great

  • @Roy4USA
    @Roy4USA Před 8 lety +5

    So the key of the story is the private key? All someone has to do is either get or replace your private key...

    • @kylergray
      @kylergray Před 7 lety +7

      yeah but thats near impossible

  • @ResidentialGondola
    @ResidentialGondola Před 3 lety +3

    Download Signal

    • @dirksesterhenn2432
      @dirksesterhenn2432 Před 3 lety +2

      Or use the Matrix protocol, has the additional benefit of decentralization.

  • @stanleyfrancois8924
    @stanleyfrancois8924 Před 2 lety

    Verry Good

  • @simplyrubi1910
    @simplyrubi1910 Před 6 lety +2

    may I use this video in my powerpoint presentation for my BCIS class?

  • @adielsigron230
    @adielsigron230 Před 9 měsíci

    Why is bob private key + alice public key = bob' pulic key + alice private key?

  • @pracheerdeka6737
    @pracheerdeka6737 Před 4 lety

    But where is the public and private key situated ?

    • @blaze738
      @blaze738 Před 3 lety

      maybe this video would help - czcams.com/video/DXv1boalsDI/video.html

  • @dilpreetramgharia854
    @dilpreetramgharia854 Před 2 lety

    Nice

  • @Bill0102
    @Bill0102 Před 3 měsíci

    I'm lost in this content. I read a book with similar content, and I was completely lost in its world. "The Art of Meaningful Relationships in the 21st Century" by Leo Flint

  • @jameswharton5259
    @jameswharton5259 Před 15 dny

    Build your own encryption protocols problem solved.

  • @dillasafitri2194
    @dillasafitri2194 Před 2 lety

    Good

  • @yomi2624
    @yomi2624 Před 3 lety

    my digital footprint is actually bent

  • @Digital_Rust
    @Digital_Rust Před 9 dny

    The assymetric encryption in this video was explained poorly

  • @guenyhd6265
    @guenyhd6265 Před 3 lety

    How can I decrypt my data.

  • @janang21kurniawan
    @janang21kurniawan Před 2 lety

    Thanks for the info

  • @johnwayneasgenghiskhan4699
    @johnwayneasgenghiskhan4699 Před 10 měsíci

    "National Security?" That's cute comrade... Have you seen the southern border lately?

  • @Normie_dog
    @Normie_dog Před 8 lety +19

    4th amendment trumps national security....

  • @piemain
    @piemain Před rokem

    "potential" violation of privacy

  • @m.l.7292
    @m.l.7292 Před 6 lety +3

    Информативно и доступно для понимания.

  • @rhd882632490
    @rhd882632490 Před 2 lety

    nice

  • @MrFamilyMoments
    @MrFamilyMoments Před 11 měsíci

    I cracked the 4 chyper at cia headcorders

  • @21bang6
    @21bang6 Před 3 lety

    I really don’t understand it

  • @gailbullett5807
    @gailbullett5807 Před měsícem

    1:43

  • @mohanaduio7087
    @mohanaduio7087 Před 2 lety

    Hi

  • @frantzsaintilus2738
    @frantzsaintilus2738 Před 2 lety +1

    That’s great

  • @TaylorMade511
    @TaylorMade511 Před 8 lety +1

    Just invent that "Minority Report" technology and read peoples' minds.

  • @samefisher6835
    @samefisher6835 Před 3 lety +6

    Apple be like, I am sell out and sell you private.

  • @gatosilvestre2953
    @gatosilvestre2953 Před 3 lety

    Que negocio se tienen con WhatsApp.

  • @pawanub7357
    @pawanub7357 Před 2 lety

    😀😀nice

  • @adirejabehram831
    @adirejabehram831 Před 2 lety

    gagagagag

  • @LakkThereof
    @LakkThereof Před 8 lety

    surprisingly accurate. 5/7

  • @pracheerdeka6737
    @pracheerdeka6737 Před 4 lety

    But who decrypt the data when i use fb on google crome

  • @peggyjennifer3096
    @peggyjennifer3096 Před 3 lety +2

    ..

  • @CarlosGarcia-jw2xd
    @CarlosGarcia-jw2xd Před 3 lety +3

    How encryption works - and How you can Stalk your ex-girlfriend's activity in whatsapp

  • @danaparks3603
    @danaparks3603 Před 3 lety

    Decrepted

  • @solucoesdasgalinhas221

    Obol y6oo byygoy

  • @larssnoeijink181
    @larssnoeijink181 Před 3 lety

    Why don't they use a third shared key?

  • @Noor-jo2pp
    @Noor-jo2pp Před 2 lety +1

    Whazzak has super quick loading time when it comes to hacking Whatsapp accounts! I tested them a few times and it never failed to fetch Whatsapp account details.

  • @mailmail5644
    @mailmail5644 Před 6 lety +3

    This is false and misleading. First Imagine that every cell phone has a duplicate cell phone. A twin. Then realize that with the right software and access every cell phone could have an infinite number of fully functioning replicas. Ever loose your phone? How did it make you feel? What if someone found it and started using it. Imagine 1,000s of exact copies of your phone lost. Fully functional copies. No encryption necessary. Encryption doesn't stop this. It's very simple. There is no bug in your phone or anti virus app that can prevent this. Also, you can remove the lenses from your phone and still be seen. Seen even better with sonar. Site by sound. Providing you have the right software of course. EMF and EMP sitting in a tree! As far as privacy and national security is concerned...under no circumstances do you ever invade some ones privacy ever! With or without a warrant to do so! Ever!
    And furthermore, if your worried about other countries retaliating from military attacks....STOP ATTACKING OTHER COUNTRIES!

    • @dannygboyo
      @dannygboyo Před 3 lety +1

      Very interesting info here? Where did you find this, I would like to know more!!

  • @justinhart4010
    @justinhart4010 Před 9 měsíci

    Wow how it works without how it works. Wheres the math,programming explanation? Waste of a video

    • @SleepTime-Dark
      @SleepTime-Dark Před 2 měsíci

      IT'S 👏 JUST 👏 AN 👏 INTRODUCTION 👏 VIDEO !

  • @user-qz1ok4hb3h
    @user-qz1ok4hb3h Před 2 měsíci

    OMG😱😱😱😱😱😱😱😱😨😨😰😰😰😰😰😰😰😰😰😰😰😰😰😰😰😰😰😰😰😰😰😰😰 SO CREEPY

  • @neverendingjourneystilllea5271

    Thanks

  • @baleshpedia5049
    @baleshpedia5049 Před 2 lety +6

    Personal privacy is much more important than national security

  • @shradhanjalijena6270
    @shradhanjalijena6270 Před 2 lety

    Nice

  • @reetajayakumari549
    @reetajayakumari549 Před 3 lety

    Nice