Тёмный

How does encryption work? - Gary explains 

Android Authority
Подписаться 3,4 млн
Просмотров 110 тыс.
50% 1

Опубликовано:

 

29 сен 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 255   
@lenosashetnaya
@lenosashetnaya 8 лет назад
My whole semester at college was mentioned in only 20 min 😅. Go for part 2
@razalasreficul6902
@razalasreficul6902 5 лет назад
Wow, guys. Are both of you American?
@kimmulakucharski5970
@kimmulakucharski5970 5 лет назад
On a tombstone what could this mean CLL7VEVIL7LMEr
@blesroy1090
@blesroy1090 5 лет назад
Go F**K YOUR SELF.................
@henk_kruger
@henk_kruger 4 года назад
Even less if you play at it at 1.25 or 1.5 x speed
@TheBigjamie69
@TheBigjamie69 3 года назад
LOL SOOOOOOO TRUEEEEE HA HA DUDE YOU DA BEST !!!!! THANKS FOR YOUR TIME DOING THIS VIDEO REALLY APPREIATE IT
@dhatten87
@dhatten87 8 лет назад
Yes part 2! Always more "Gary Explains"! Love this series!
@MasinacCcC
@MasinacCcC 8 лет назад
Please make part 2, this is very interesting topic.
@swayzee6598
@swayzee6598 8 лет назад
definitely part 2. PLEASE.
@EvanRelfWasHere
@EvanRelfWasHere 8 лет назад
Please do a part 2!
@RPG_ash
@RPG_ash 8 лет назад
Thanks Gary, interesting stuff.
@markbartalos1443
@markbartalos1443 8 лет назад
Part 2 please!!!
@manupastor2003
@manupastor2003 8 лет назад
Part 2 please !
@attlantic114
@attlantic114 8 лет назад
Go for part two
@mdjrodjevicbgd
@mdjrodjevicbgd 8 лет назад
2nd video pls
@JAGAN010
@JAGAN010 8 лет назад
Informative! But difficult to understand
@deephazarika2259
@deephazarika2259 8 лет назад
yes
@samdeur
@samdeur 8 лет назад
Like the video interesting pls part two and 3 hahaha
@sydjaguar
@sydjaguar 8 лет назад
This is the kind of stuff which is what makes Android Authority a top channel. Brilliant work, Gary!
@LarryMooreW00t
@LarryMooreW00t 8 лет назад
+1 for 2nd video
@SageMinimalist
@SageMinimalist 8 лет назад
Full 20 min on encryption! Gary doesn't mess around! Thanks
@klyded8523
@klyded8523 8 лет назад
Gary is the boss.
@akilghosh
@akilghosh 8 лет назад
No he isn't. He is quite famous on RU-vid.
@randielrodriguez8297
@randielrodriguez8297 8 лет назад
2nd video pls very interesting
@aleksander791
@aleksander791 8 лет назад
need that pgp and nsa leaks on NIST standard
@nicolalombardi7352
@nicolalombardi7352 8 лет назад
That would be awesome
@sweetladyd515
@sweetladyd515 4 года назад
Interesting... wanna know more thx for this!!🙂
@arunt6659
@arunt6659 8 лет назад
fsociety.dat
@fuzz33594
@fuzz33594 8 лет назад
Prof. Sims: Remarkable as always. A second video would be great. How do, assuming that they do, MD5 and SHA fit into encryption? Is our use to ensure uncorrupted file transfers a spinoff of their use in encryption?
@hasanramsey4626
@hasanramsey4626 8 лет назад
They are hashes
@bocamax
@bocamax 8 лет назад
Gary, your videos are always informative and interesting. This is so much better than rumors about phones and app reviews. Your hard work is very much appreciated.
@djknight00
@djknight00 8 лет назад
Lol only a 20mins video but i still learned more than system security lectures in my college.
@danielblanchard1222
@danielblanchard1222 8 лет назад
So accurate and well explained in simple terms! Thank you for the excellent work:-)
@GeoCherian
@GeoCherian 8 лет назад
PLEASE DO PART2 (or even part 10 if possible!!)
@lukemilner9787
@lukemilner9787 8 лет назад
If anyone is interested in enigma I recommend they watch "the imitation game" film. It is very intresting..
@ao_qd
@ao_qd 8 лет назад
Do as many parts of this as necessary! I love this series!
@hugohell8290
@hugohell8290 8 лет назад
2nd video please, 4096bits + longest prime number as a key :)
@mikiduric
@mikiduric 8 лет назад
Part 2 would be nice Gary
@hasanramsey4626
@hasanramsey4626 8 лет назад
do a paart two on wpa psk wpa 2 and wireless handshake protocols
@Aeid55
@Aeid55 8 лет назад
gary , wow man . need part 2 surely
@rutgerssander
@rutgerssander 8 лет назад
Yes please on the second video!
@beyond.skylimits8116
@beyond.skylimits8116 8 лет назад
I'm just starting to learn cryptography and this video is just what I needed. Part two please.
@oldnavyvet1977
@oldnavyvet1977 8 лет назад
2nd video would be nice as I am taking a COMPTIA Security+ class at a local California community college and this was covered.
@anujgupta3397
@anujgupta3397 8 лет назад
i was nt able to understand this video fully bt still itz awesome waiting for part 2
@randielrodriguez8297
@randielrodriguez8297 8 лет назад
Gary the most intelligent guy ever
@dinorl
@dinorl 8 лет назад
I would to see a part 2. Thanks.
@NumberOneInUrHeart
@NumberOneInUrHeart 8 лет назад
+1 part 2
@jakelo3034
@jakelo3034 8 лет назад
I'm very interested in a part 2 of this video. As encryption has always been a very interesting topic for computing students.
@TheCrashedMind
@TheCrashedMind 8 лет назад
Awesome video! Thank You!
@iambbr
@iambbr 8 лет назад
Im studying a course abt cryptography at my uni... I just finished my class and then came across this video.. Totally refreshed my memory .. What i have studied in three class u explained in 20 minutes .. Good work gary
@pavaloipetrica9617
@pavaloipetrica9617 8 лет назад
I'd love to see part 2! And wath inscription use ios?
@DmytroBogdan
@DmytroBogdan 8 лет назад
Well, you have my permission to do part 2 :) I don't think anyone around internet can explain more simple and understandable for end product consumer as you do.
@thomasphilipmeadows4569
@thomasphilipmeadows4569 8 лет назад
this guy literally does not mess around. good stuff
@Goku-on3ro
@Goku-on3ro 8 лет назад
For some reason. I learned something new today XD
@salvatorecelestino5270
@salvatorecelestino5270 8 лет назад
Beautiful video Gary, thx!
@Dr_Sudarshan_Gogoi
@Dr_Sudarshan_Gogoi 8 лет назад
Today my Supervisor's computer has been attacked by malware. It has encrypted all files in the computer destroying 10 years of research work. It has encrypted all files to convert .ZEPTO type. I tried a lot, but could not recover/decrypt them. Finally, I have reset the whole system. It is extremely unfortunate for me, because it has severely affected our research work.
@dani1235a
@dani1235a 8 лет назад
do a part 2!
@VampiresDarkCreed
@VampiresDarkCreed 8 лет назад
Please do a part 2. You explain very well. Thank you for your lessons.
@RobinCeltic
@RobinCeltic 6 лет назад
I needed to change my encryption code. I seemed to activated my sims lock with a new code. Did I re-encrypt my phone? Against the person(hacker) who has my original encrytion code? Am I safe now? Which is more powerful sims lock or the encryption code feature on android?
@YaketyYakDontTalkBack
@YaketyYakDontTalkBack 8 лет назад
Let's get that video on public keys. Also talk about privacy issues like Tor browsing and deleting messages on Android. this is awesome stuff
@ritulgogoi464
@ritulgogoi464 8 лет назад
hello sir i am from india and my gf is doing her higher studies in greece. We dont know much about hacking because its very rare here in india. but recently my gf laptop ws hacked with all the file renamed to ".cyber3" she had very important files on her lapto and also her back up hd files were encrypted as it ws connected at the time of hacking.. is there any way to get her files back?? She had her whole thesis it too ws encrypted. can you help sir?
@americanboy48
@americanboy48 8 лет назад
nice this is class time for me
@c6sm9sgg69
@c6sm9sgg69 8 лет назад
Waaaw was that 20 minutes that just passed by?! Time realy flies when you enjoy it!
@CoryRoy
@CoryRoy 8 лет назад
The background track is at such a level that I thought it was coming from a different video. Probably better off without it - good content and delivery though!
@mrmojorisen6336
@mrmojorisen6336 5 лет назад
has anyone started working on computer human DNA encryption, what are the odds of a hacker busting 2 DNA profiles?
@thomyhr
@thomyhr 8 лет назад
Knew the most of this from my university, but still very interresting video. Would very much like a part 2! :)
@shiamjad
@shiamjad 8 лет назад
thanks for yet another informative video.....please keep the GREAT work up!!!
@htarhini
@htarhini 8 лет назад
2nd video please. It's very interesting. Good job.
@Bhatakti_Hawas
@Bhatakti_Hawas 8 лет назад
Plz make a 2nd part...and much longer in duration. A documentary would have been the best.
@williamhart4896
@williamhart4896 8 лет назад
thanks Garry nice video as always and a go for it on part 2
@KartikGajaria
@KartikGajaria 8 лет назад
Thanks Gary the video was great! I am looking forward for the second part of this.
@johnnythe3rd182
@johnnythe3rd182 8 лет назад
I would love to learn more, and how Android is updating to keep my OS safe.
@shaileshaanand
@shaileshaanand 8 лет назад
please do the part 2 of this video
@Cash2024
@Cash2024 8 лет назад
hi gary please can we have 2nd video explaining SSL basics
@dr4gon743
@dr4gon743 8 лет назад
This is my favorite video among all the videos you guys uploaded. Please make a part 2.
@Andrew-mz4lg
@Andrew-mz4lg 8 лет назад
2nd video por favor
@UsSpiritual
@UsSpiritual 8 лет назад
Yes part 2 will be interesting to see and do include about 256 bit encryption and latest tech in this space.
@acalkan
@acalkan 8 лет назад
Great job Gary. Second video on Public Key Encryption please.
@travisblack4902
@travisblack4902 8 лет назад
I loved this video Gary...really looking forward to your next video
@toaster7239
@toaster7239 3 года назад
I never noticed the letters on the enigma machine were different than a regular qwerty keyboard.
@trevorshepherd749
@trevorshepherd749 8 лет назад
i would love to see a part 2!!! i am a future network engineer so encryption is fascinating to me.
@slead1
@slead1 8 лет назад
Always appreciate your videos Gary, please make a second part to this. Cheers mate
@andaloons
@andaloons 8 лет назад
Please more encryption! Also maybe touch on bitcoin/blockchain.
@m4m205
@m4m205 8 лет назад
make past 2 please
@ManaaHraib
@ManaaHraib 8 лет назад
another rich material, thank you 👍
@kaustubh3d
@kaustubh3d 8 лет назад
Can you elaborate more on AES standard ? Definitely yes for a 2nd video
@Rafaelhernandez-fc3lq
@Rafaelhernandez-fc3lq 8 лет назад
Part 2 please
@mohankmc6
@mohankmc6 8 лет назад
thanks Gary for this video. Please do make a follow up video.
@kimmulakucharski5970
@kimmulakucharski5970 5 лет назад
This is on a tombstone what does it mean CLL7VEVIL7LMEr
@anthonycummings5566
@anthonycummings5566 8 лет назад
please do a second video i loved this one. very informative thank you!
@angelreyes6332
@angelreyes6332 8 лет назад
I love your videos Gary. Exquisitely presented.
@1MarkKeller
@1MarkKeller 6 лет назад
*GARY!!!* *Morning Professor!!!*
@thevenicein
@thevenicein 8 лет назад
Gary dude you're better then many professors of my college !!
@deld210
@deld210 8 лет назад
Thanks for the video. Part 2 please :)
@miamiole
@miamiole 8 лет назад
My mind is now encrypted.
@akvlogs_1-i7k
@akvlogs_1-i7k 8 лет назад
Part 2 !
@robhubert8350
@robhubert8350 3 года назад
Your videos on encryption and key exchanges are phenomenal
@TLD.CREATES
@TLD.CREATES 8 лет назад
part 2!!
@javiertejeda7975
@javiertejeda7975 8 лет назад
part 2!
@khansoh7564
@khansoh7564 8 лет назад
Part 2!
@xkluzivtv
@xkluzivtv 8 лет назад
part 2
@joyston5921
@joyston5921 8 лет назад
Part 2
@chrisn7346
@chrisn7346 8 лет назад
part 2
@atull3778
@atull3778 8 лет назад
Very much interested in a video on public and private keys
@zihsuan2
@zihsuan2 8 лет назад
Excellent video Gary. +1 for sequel
@CognosSquare
@CognosSquare 8 лет назад
Public key cryptography pls. Dont leave us hanging. How can the phone decrypt the drive if not the key is stored right there on the drive also?
@GarySims
@GarySims 8 лет назад
And therein lies the secret!
@veer4sam
@veer4sam 8 лет назад
really great information....please make the 2nd part...
@leaveanonnalone
@leaveanonnalone 8 лет назад
when did Android Authority become Vsauce?
@alexanderbarr
@alexanderbarr 8 лет назад
yes, a further video on this would be interesting.
@salvatorecelestino5270
@salvatorecelestino5270 8 лет назад
Beautiful video Gary, thx!
@adityachauhan3673
@adityachauhan3673 8 лет назад
i m interested to know more about inscription go for part 2😅
Далее
How does public key cryptography work - Gary explains
15:46
What is a GPU and how does it work? - Gary explains
11:32
50m Small Bike vs Car FastChallenge
00:22
Просмотров 3 млн
100 Identical Twins Fight For $250,000
35:40
Просмотров 49 млн
What is a kernel - Gary explains
9:50
Просмотров 958 тыс.
Why VPNs are a WASTE of Your Money (usually…)
14:40
AES: How to Design Secure Encryption
15:37
Просмотров 163 тыс.
How AI 'Understands' Images (CLIP) - Computerphile
18:05
What is cache memory - Gary explains
9:09
Просмотров 163 тыс.
TLS Handshake Explained - Computerphile
16:59
Просмотров 559 тыс.
Hacking a weird TV censoring device
20:59
Просмотров 3,1 млн
7 Cryptography Concepts EVERY Developer Should Know
11:55
What is in your smartphone? - Gary explains
12:06
Просмотров 177 тыс.
50m Small Bike vs Car FastChallenge
00:22
Просмотров 3 млн