How Encryption Works - and How It Can Be Bypassed
Vložit
- čas přidán 3. 03. 2016
- The debate between privacy and national security has never been more heated, with Apple and other tech firms going up against the government. So how are text messages encrypted, and what are the controversial "backdoors" that could allow access to them?
Subscribe to the WSJ channel here:
bit.ly/14Q81Xy
More from the Wall Street Journal:
Visit WSJ.com: www.wsj.com
Follow WSJ on Facebook: / wsjvideo
Follow WSJ on Google+: plus.google.com/+wsj/posts
Follow WSJ on Twitter: / wsjvideo
Follow WSJ on Instagram: / wsj
Follow WSJ on Pinterest: / wsj
Don’t miss a WSJ video, subscribe here: bit.ly/14Q81Xy
More from the Wall Street Journal:
Visit WSJ.com: www.wsj.com
Visit the WSJ Video Center: wsj.com/video
On Facebook: / videos
On Twitter: / wsj
On Snapchat: on.wsj.com/2ratjSM
I absolutely hate the idea of government justifying having control of everything and everyone by saying it's trying to protect you.
true
This not about control of 'everything' but about control of crime! Idiot.
"Allow us to break in to your home so we can protect you, otherwise, we're going to break in to your home and find out why you won't allow us to break in to your home".
I feel like some criminals could be caught if everything were open, but there are more cons than pros. A couple criminals get caught, sure, but at the cost of virtually no privacy for law-abiding citizens.
@@haimo14228it reminds me of that south park series when one of the characters forgot to put the lid of his toilet down and his mom died because of it. then the town implemented surveillance to prevent people from dying in the toilet
Whenever I hear the term “national security,” I know that it’s going to be followed up with stupid anti-privacy BS.
Personal privacy is much more important than national security.
"rather have my country die for me"
You both have a valid point
I agree with you, but I have an Android phone. Don't worry, im saving for an iPhone
How 'bout we just write letters?
Hahaa, I know, tell them about it, they won't believe me. F national security
That last statement, right on the head!
Thank you for the easy breakdown
I dont understand the shared key, after creating the shared key, is the shared key the same for each end? how does the shared key be used?
Privacy vs National security
Because criminals doesn't communicate in code or use their own programs
Thanks a lot
Perfect, flawless, and neutral video! Highly informative! My ideal form of what mews should be. Just amazing.
Thanks
Finally a video on encryption that made sense.
That's not how national security should work in the first place.
I was going to comment that privacy was far more important than security, but the other commenters have already said it for me.
1
2
What if private key and encryption/decryption is only done on dedicated device that does not utilise major processor chipsets? Such as a scientific calculator type device?
Then everything you send can easily be compromised by both the government and hackers, did you not watch the video?
@@earring2301 why would that be?
I did not know that dedicated scientific calculator devices connected to the web. If they did not connect to the web wouldn't this be an irrelevant question?
Love this kind of journalism, great
So the key of the story is the private key? All someone has to do is either get or replace your private key...
yeah but thats near impossible
Download Signal
Or use the Matrix protocol, has the additional benefit of decentralization.
Verry Good
may I use this video in my powerpoint presentation for my BCIS class?
How did your presentation go
Tell us, how did it go ?
Did you get an A+?
Lol whos going to find out if you use it for your presentation without asking?
@@nczioox1116 it is called moral and respect to people's intellectual work.
Why is bob private key + alice public key = bob' pulic key + alice private key?
But where is the public and private key situated ?
maybe this video would help - czcams.com/video/DXv1boalsDI/video.html
Nice
I'm lost in this content. I read a book with similar content, and I was completely lost in its world. "The Art of Meaningful Relationships in the 21st Century" by Leo Flint
Build your own encryption protocols problem solved.
Good
my digital footprint is actually bent
The assymetric encryption in this video was explained poorly
How can I decrypt my data.
Thanks for the info
"National Security?" That's cute comrade... Have you seen the southern border lately?
4th amendment trumps national security....
"potential" violation of privacy
Информативно и доступно для понимания.
nice
I cracked the 4 chyper at cia headcorders
I really don’t understand it
1:43
Hi
That’s great
Just invent that "Minority Report" technology and read peoples' minds.
Apple be like, I am sell out and sell you private.
Que negocio se tienen con WhatsApp.
😀😀nice
gagagagag
surprisingly accurate. 5/7
But who decrypt the data when i use fb on google crome
..
How encryption works - and How you can Stalk your ex-girlfriend's activity in whatsapp
Decrepted
Obol y6oo byygoy
Why don't they use a third shared key?
Whazzak has super quick loading time when it comes to hacking Whatsapp accounts! I tested them a few times and it never failed to fetch Whatsapp account details.
This is false and misleading. First Imagine that every cell phone has a duplicate cell phone. A twin. Then realize that with the right software and access every cell phone could have an infinite number of fully functioning replicas. Ever loose your phone? How did it make you feel? What if someone found it and started using it. Imagine 1,000s of exact copies of your phone lost. Fully functional copies. No encryption necessary. Encryption doesn't stop this. It's very simple. There is no bug in your phone or anti virus app that can prevent this. Also, you can remove the lenses from your phone and still be seen. Seen even better with sonar. Site by sound. Providing you have the right software of course. EMF and EMP sitting in a tree! As far as privacy and national security is concerned...under no circumstances do you ever invade some ones privacy ever! With or without a warrant to do so! Ever!
And furthermore, if your worried about other countries retaliating from military attacks....STOP ATTACKING OTHER COUNTRIES!
Very interesting info here? Where did you find this, I would like to know more!!
Wow how it works without how it works. Wheres the math,programming explanation? Waste of a video
IT'S 👏 JUST 👏 AN 👏 INTRODUCTION 👏 VIDEO !
OMG😱😱😱😱😱😱😱😱😨😨😰😰😰😰😰😰😰😰😰😰😰😰😰😰😰😰😰😰😰😰😰😰😰 SO CREEPY
Thanks
Personal privacy is much more important than national security
Nice
Nice