Тёмный

How Encryption Works - and How It Can Be Bypassed 

The Wall Street Journal
Подписаться 5 млн
Просмотров 206 тыс.
50% 1

The debate between privacy and national security has never been more heated, with Apple and other tech firms going up against the government. So how are text messages encrypted, and what are the controversial "backdoors" that could allow access to them?
Subscribe to the WSJ channel here:
bit.ly/14Q81Xy
More from the Wall Street Journal:
Visit WSJ.com: www.wsj.com
Follow WSJ on Facebook: / wsjvideo
Follow WSJ on Google+: plus.google.com/+wsj/posts
Follow WSJ on Twitter: / wsjvideo
Follow WSJ on Instagram: / wsj
Follow WSJ on Pinterest: / wsj
Don’t miss a WSJ video, subscribe here: bit.ly/14Q81Xy
More from the Wall Street Journal:
Visit WSJ.com: www.wsj.com
Visit the WSJ Video Center: wsj.com/video
On Facebook: / videos
On Twitter: / wsj
On Snapchat: on.wsj.com/2ratjSM

Опубликовано:

 

3 мар 2016

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 168   
@mateko2001
@mateko2001 2 года назад
I absolutely hate the idea of government justifying having control of everything and everyone by saying it's trying to protect you.
@sam_9228
@sam_9228 Год назад
true
@juansarabia7530
@juansarabia7530 Год назад
This not about control of 'everything' but about control of crime! Idiot.
@haimo14228
@haimo14228 Год назад
"Allow us to break in to your home so we can protect you, otherwise, we're going to break in to your home and find out why you won't allow us to break in to your home".
@user-sf9gs2pg1b
@user-sf9gs2pg1b Год назад
I feel like some criminals could be caught if everything were open, but there are more cons than pros. A couple criminals get caught, sure, but at the cost of virtually no privacy for law-abiding citizens.
@nxb00
@nxb00 5 месяцев назад
​@@haimo14228it reminds me of that south park series when one of the characters forgot to put the lid of his toilet down and his mom died because of it. then the town implemented surveillance to prevent people from dying in the toilet
@LibertyAnd1776
@LibertyAnd1776 11 месяцев назад
Whenever I hear the term “national security,” I know that it’s going to be followed up with stupid anti-privacy BS.
@Karmiangod
@Karmiangod 8 лет назад
Personal privacy is much more important than national security.
@thehonkening1
@thehonkening1 8 лет назад
"rather have my country die for me"
@suleymenkand41
@suleymenkand41 7 лет назад
You both have a valid point
@nicholasfulton9658
@nicholasfulton9658 6 лет назад
I agree with you, but I have an Android phone. Don't worry, im saving for an iPhone
@thefunnybuddy4138
@thefunnybuddy4138 6 лет назад
How 'bout we just write letters?
@Valdismith
@Valdismith 5 лет назад
Hahaa, I know, tell them about it, they won't believe me. F national security
@realdragon
@realdragon 4 года назад
Privacy vs National security Because criminals doesn't communicate in code or use their own programs
@VictoriaOtunsha
@VictoriaOtunsha 2 года назад
Thank you for the easy breakdown
@Godsserver22
@Godsserver22 2 года назад
That last statement, right on the head!
@minajohanne3690
@minajohanne3690 Месяц назад
this is so useful thank you so much!
@muntee33
@muntee33 4 года назад
What if private key and encryption/decryption is only done on dedicated device that does not utilise major processor chipsets? Such as a scientific calculator type device?
@earring2301
@earring2301 4 года назад
Then everything you send can easily be compromised by both the government and hackers, did you not watch the video?
@monkemode8128
@monkemode8128 3 года назад
@@earring2301 why would that be?
@macdoctor145
@macdoctor145 8 месяцев назад
I did not know that dedicated scientific calculator devices connected to the web. If they did not connect to the web wouldn't this be an irrelevant question?
@riviera443
@riviera443 5 лет назад
Thanks a lot
@neverendingjourneystilllea5271
@neverendingjourneystilllea5271 3 года назад
Thanks
@loveredmoon2600
@loveredmoon2600 Год назад
I dont understand the shared key, after creating the shared key, is the shared key the same for each end? how does the shared key be used?
@ssjlee93-uu1cv
@ssjlee93-uu1cv 4 месяца назад
Perfect, flawless, and neutral video! Highly informative! My ideal form of what mews should be. Just amazing.
@stanleyfrancois8924
@stanleyfrancois8924 3 года назад
Verry Good
@Alex-dn7jq
@Alex-dn7jq 6 лет назад
That's not how national security should work in the first place.
@liwakalamate3846
@liwakalamate3846 2 месяца назад
The last statement is wild😂😅😂
@guenyhd6265
@guenyhd6265 4 года назад
How can I decrypt my data.
@pracheerdeka6737
@pracheerdeka6737 4 года назад
But where is the public and private key situated ?
@blaze738
@blaze738 3 года назад
maybe this video would help - ru-vid.com/video/%D0%B2%D0%B8%D0%B4%D0%B5%D0%BE-DXv1boalsDI.html
@Roy4USA
@Roy4USA 8 лет назад
So the key of the story is the private key? All someone has to do is either get or replace your private key...
@kylergray
@kylergray 7 лет назад
yeah but thats near impossible
@danielleonard2891
@danielleonard2891 3 года назад
Finally a video on encryption that made sense.
@ResidentialGondola
@ResidentialGondola 3 года назад
Download Signal
@dirksesterhenn2432
@dirksesterhenn2432 3 года назад
Or use the Matrix protocol, has the additional benefit of decentralization.
@adielsigron230
@adielsigron230 11 месяцев назад
Why is bob private key + alice public key = bob' pulic key + alice private key?
@gustavomartinez6892
@gustavomartinez6892 4 года назад
Love this kind of journalism, great
@simplyrubi1910
@simplyrubi1910 6 лет назад
may I use this video in my powerpoint presentation for my BCIS class?
@schwaggimusprime9962
@schwaggimusprime9962 4 года назад
How did your presentation go
@IbrahimAli-vv3df
@IbrahimAli-vv3df 3 года назад
Tell us, how did it go ?
@rtsoccerplayer
@rtsoccerplayer 3 года назад
Did you get an A+?
@nczioox1116
@nczioox1116 2 года назад
Lol whos going to find out if you use it for your presentation without asking?
@Wanderers-Bulgaria
@Wanderers-Bulgaria 2 года назад
@@nczioox1116 it is called moral and respect to people's intellectual work.
@Normie_dog
@Normie_dog 8 лет назад
4th amendment trumps national security....
@erltyriss6820
@erltyriss6820 8 лет назад
I was going to comment that privacy was far more important than security, but the other commenters have already said it for me.
@elyyzorro
@elyyzorro 3 года назад
1
@nemod3338
@nemod3338 2 года назад
2
@Digital_Rust
@Digital_Rust 2 месяца назад
The assymetric encryption in this video was explained poorly
@yomi2624
@yomi2624 4 года назад
my digital footprint is actually bent
@21bang6
@21bang6 3 года назад
I really don’t understand it
@janang21kurniawan
@janang21kurniawan 3 года назад
Thanks for the info
@dilpreetramgharia854
@dilpreetramgharia854 3 года назад
Nice
@dillasafitri2194
@dillasafitri2194 2 года назад
Good
@Bill0102
@Bill0102 5 месяцев назад
I'm lost in this content. I read a book with similar content, and I was completely lost in its world. "The Art of Meaningful Relationships in the 21st Century" by Leo Flint
@imranhasan3dot
@imranhasan3dot 24 дня назад
Wow my data is so encrypted. Also I am thinking about that what if my hacker is a member of FBI
@johnwayneasgenghiskhan4699
@johnwayneasgenghiskhan4699 Год назад
"National Security?" That's cute comrade... Have you seen the southern border lately?
@piemain
@piemain Год назад
"potential" violation of privacy
@jameswharton5259
@jameswharton5259 2 месяца назад
Build your own encryption protocols problem solved.
@rhd882632490
@rhd882632490 2 года назад
nice
@gailbullett5807
@gailbullett5807 3 месяца назад
1:43
@pracheerdeka6737
@pracheerdeka6737 4 года назад
But who decrypt the data when i use fb on google crome
@MrFamilyMoments
@MrFamilyMoments Год назад
I cracked the 4 chyper at cia headcorders
@mohanaduio7087
@mohanaduio7087 3 года назад
Hi
@gatosilvestre2953
@gatosilvestre2953 3 года назад
Que negocio se tienen con WhatsApp.
@frantzsaintilus2738
@frantzsaintilus2738 2 года назад
That’s great
@m.l.7292
@m.l.7292 6 лет назад
Информативно и доступно для понимания.
@TaylorMade511
@TaylorMade511 8 лет назад
Just invent that "Minority Report" technology and read peoples' minds.
@samefisher6835
@samefisher6835 3 года назад
Apple be like, I am sell out and sell you private.
@peggyjennifer3096
@peggyjennifer3096 3 года назад
..
@pawanub7357
@pawanub7357 2 года назад
😀😀nice
@Carlos-jw2xd
@Carlos-jw2xd 3 года назад
How encryption works - and How you can Stalk your ex-girlfriend's activity in whatsapp
@danaparks3603
@danaparks3603 3 года назад
Decrepted
@adirejabehram831
@adirejabehram831 2 года назад
gagagagag
@mailmail5644
@mailmail5644 6 лет назад
This is false and misleading. First Imagine that every cell phone has a duplicate cell phone. A twin. Then realize that with the right software and access every cell phone could have an infinite number of fully functioning replicas. Ever loose your phone? How did it make you feel? What if someone found it and started using it. Imagine 1,000s of exact copies of your phone lost. Fully functional copies. No encryption necessary. Encryption doesn't stop this. It's very simple. There is no bug in your phone or anti virus app that can prevent this. Also, you can remove the lenses from your phone and still be seen. Seen even better with sonar. Site by sound. Providing you have the right software of course. EMF and EMP sitting in a tree! As far as privacy and national security is concerned...under no circumstances do you ever invade some ones privacy ever! With or without a warrant to do so! Ever! And furthermore, if your worried about other countries retaliating from military attacks....STOP ATTACKING OTHER COUNTRIES!
@dannygboyo
@dannygboyo 3 года назад
Very interesting info here? Where did you find this, I would like to know more!!
@larssnoeijink181
@larssnoeijink181 3 года назад
Why don't they use a third shared key?
@solucoesdasgalinhas221
@solucoesdasgalinhas221 3 года назад
Obol y6oo byygoy
@LakkThereof
@LakkThereof 8 лет назад
surprisingly accurate. 5/7
@justinhart4010
@justinhart4010 Год назад
Wow how it works without how it works. Wheres the math,programming explanation? Waste of a video
@SleepTime-Dark
@SleepTime-Dark 4 месяца назад
IT'S 👏 JUST 👏 AN 👏 INTRODUCTION 👏 VIDEO !
@Noor-jo2pp
@Noor-jo2pp 3 года назад
Whazzak has super quick loading time when it comes to hacking Whatsapp accounts! I tested them a few times and it never failed to fetch Whatsapp account details.
@user-qz1ok4hb3h
@user-qz1ok4hb3h 4 месяца назад
OMG😱😱😱😱😱😱😱😱😨😨😰😰😰😰😰😰😰😰😰😰😰😰😰😰😰😰😰😰😰😰😰😰😰 SO CREEPY
@neverendingjourneystilllea5271
@neverendingjourneystilllea5271 3 года назад
Thanks
@shradhanjalijena6270
@shradhanjalijena6270 2 года назад
Nice
@baleshpedia5049
@baleshpedia5049 3 года назад
Personal privacy is much more important than national security
@reetajayakumari549
@reetajayakumari549 3 года назад
Nice
Далее
How does encryption work? - Gary explains
20:30
Просмотров 109 тыс.
6 Must-Have Security Gadgets That Fit in Your Pocket
9:03
КРЫЛЬЯ - ЗЕНИТ: все голы
01:00
Просмотров 85 тыс.
End to End Encryption (E2EE) - Computerphile
8:12
Просмотров 744 тыс.
Why The Government Shouldn't Break WhatsApp
11:11
Просмотров 3,6 млн
7 Cryptography Concepts EVERY Developer Should Know
11:55
Why VPNs are a WASTE of Your Money (usually…)
14:40
The Unhackable Email Service | Freethink Coded
5:50
Просмотров 1,3 млн