Тёмный

Why the NSA is breaking our encryption -- and why we should care | Matthew Green | TEDxMidAtlantic 

TEDx Talks
Подписаться 41 млн
Просмотров 179 тыс.
50% 1

This talk was given at a local TEDx event, produced independently of the TED Conferences. Encryption dates back to the Founding Fathers and the Bill of Rights. Now, the United States National Security Agency is breaking and undermining core encryption technologies that power the Internet, saying it's being done for our own protection from terrorists. But are we sacrificing our freedoms for fear?
Matthew Green is an Assistant Research Professor of Computer Science at the Johns Hopkins University. His research focuses on computer security and cryptography, and particularly the way that cryptography can be used to promote individual privacy. His work includes techniques to securely access medical databases, enhance the anonymity of Bitcoin, and to analyze deployed security systems. Prior to joining the Johns Hopkins faculty he served as a Senior Technical Staff Member at AT&T Laboratories.
About TEDx, x = independently organized event In the spirit of ideas worth spreading, TEDx is a program of local, self-organized events that bring people together to share a TED-like experience. At a TEDx event, TEDTalks video and live speakers combine to spark deep discussion and connection in a small group. These local, self-organized events are branded TEDx, where x = independently organized TED event. The TED Conference provides general guidance for the TEDx program, but individual TEDx events are self-organized.* (*Subject to certain rules and regulations)

Опубликовано:

 

19 окт 2014

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 124   
@drsingingeagle
@drsingingeagle 2 года назад
“You’re not paranoid. Everybody out there is out to get you.” My day-to-day life would be the cure for insomnia.
@cza99
@cza99 7 лет назад
Tor network does not secure your communication, it only make you anonymous. Tor exit nodes (can be setup by anyone) can read your data if you are not accessing data via HTTPS.
@saltyasian4462
@saltyasian4462 7 лет назад
If you are only accessing hidden services it does secure it, but exit nodes as you described can sometimes be dodgy.
@crollinsphoto
@crollinsphoto 6 лет назад
Tor has already been broken.
@parveezalam3748
@parveezalam3748 4 года назад
@ollux paeternax which can be use to have our privacy?
@krzysztofjuszczak906
@krzysztofjuszczak906 3 года назад
@@crollinsphoto how so
@itsamemario1772
@itsamemario1772 7 лет назад
This needs more views
@ghffrsfygdhfjkjiysdz
@ghffrsfygdhfjkjiysdz 7 лет назад
Actually, he is studying maps. After all a crypto-system is just a map from plain text to cipher text and visa-versa.
@jadesluv
@jadesluv 9 лет назад
Movie > Enemy of the State, Gene Hackman
@jetsetjourneysofficial
@jetsetjourneysofficial 6 лет назад
It will only encourage people to develop better encryption.
@AndreAmorim-AA
@AndreAmorim-AA 9 лет назад
Congrats Professor
@maomxesoax2471
@maomxesoax2471 5 лет назад
A makes a scrambled char set, then creates a one time pad from that set. A sends that pad (not the scrambled char set just the otp), to the recipient. The recipient (B) creates their scrambled char set and sends back their created one time pad created from that set (not B's scrambled char set) to A. Now A has B's otp and B has A's otp. They each use their otp's they got from each other to send msgs. A will be able to decrypt B's msgs (sent using A's otp) because A has the original A char set. B will be able to decrypt A's msgs because A is using B's otp and B has original B char set and can decrypt A's msgs. E in the middle will not have access to A scrambled or B scrambled, only the A otp and B otp. What do you think?
@Decebal825
@Decebal825 7 лет назад
democracy is so screwed
@tryptex
@tryptex 5 лет назад
But the real question should be: What can we do about it?
@yourmomsasshole7301
@yourmomsasshole7301 5 лет назад
Pierce Sonnenberg vote better
@nobody46820
@nobody46820 4 года назад
Answer: Nothing.
@iahelcathartesaura3887
@iahelcathartesaura3887 7 лет назад
The way he pronounces "cryptography" totally sounds like "cartography", which sounds confusing lol. Both are fascinating, esp cryptography.
@lapointe64
@lapointe64 5 лет назад
There's always cryptocartography where you make secret maps. Not to be confused with cartocryptography which is making maps to all your secret codes...
@MichaelButlerC
@MichaelButlerC 9 лет назад
I'd like to hear more how the NSA is (supposedly) weakening encryption. Did they solve the prime factorization problem which is what powers RSA encryption?
@theroundduckman
@theroundduckman 9 лет назад
they can use quantum computers, for example
@MichaelButlerC
@MichaelButlerC 9 лет назад
RoundDuckMan ok but what makes the NSA more capable of doing this than anyone else? once the technology exists, it's up to the highest bidder. So we had better discover a new, stronger encryption scheme.
@theroundduckman
@theroundduckman 9 лет назад
Michael Butler True, heck Codecrypt (I think that's their name) is making quantum-resistant encryption. So the battle goes on. :P
@jtdemille
@jtdemille 8 лет назад
+Michael Butler They made the maintainer of RSA (and many other encryption algorithms) to pretty much have a certain set of "default" prime numbers. So now the NSA is pretty much running around with an infinite keyring, and they're like "Let's try this key. Nope. Now the next one!" until they get someone's private key.
@nosuchthing8
@nosuchthing8 8 лет назад
Check out numberphile, they have an episode about that. The published encryption code looks good, but its cooked and only mathematicans can pick up on it.
@superreverbfreak
@superreverbfreak 7 лет назад
Ok I gotta more than likely a dumb ass question but I'm going to ask it anyways cuz ftw what rhymes with swipe?
@Arrix949
@Arrix949 7 лет назад
superreverbfreak Skype
@4cps777
@4cps777 2 года назад
5:00 Funnily enough, asymmetric encryption originated at the GCHQ.
@curtn7076
@curtn7076 7 лет назад
I think my Florida Congressman is in it. it's like Orson Welles book 1984
@sundhaug92
@sundhaug92 4 года назад
1984 is George Orwell (from which we get Orwellian), not Orson Welles
@EXHellfire
@EXHellfire 7 лет назад
I was seriously freaking out over how good the autogenerated cc is in this video but then "insight furred" replaced "enciphered" and I now breathe again...
@ProfessorScottRyan
@ProfessorScottRyan 2 года назад
Regular text and cell calls are not encrypted actually... but the connection to the cell tower can be... except that the towers can be spoofed. So much of the phone and now wireless infrastructure is terribly designed from a security perspective. Publicly available phones never have been encrypted have they? You can encrypt modern cell phone voice and text end to end using apps though. Some of those apps can also be used to attack you (Whatsapp being one example that has happened).
@nafeesarazzaq8586
@nafeesarazzaq8586 5 лет назад
Any one tell me that how can i make a new Security algorithm (Symmetric or asymmetric ).Tell me about working of algorithm.Its mine Assignment And present in class.Not already Algorithms present in class sir said present your own idea so Help me Please.
@mdd1963
@mdd1963 4 года назад
you should use the impenetrable substitution cipher, where A=1, B=2, etc., Z=26.....; no one will ever catch on, and the code is unbreakabe!
@otisobl
@otisobl 3 года назад
Funny he would advertise for Truecrypt: one year later, it was found out to be compromised.
@lapointe64
@lapointe64 5 лет назад
The speaker never really addressed the question in the title: Why the NSA is breaking our encryption. He gave good reasons for why they shouldn't, but that's a different question.
@josephstarling7359
@josephstarling7359 3 года назад
It's all helping to set up the framework needed to fulfill the Biblical prophesies about the end times. It's so overwhelming clear now that there is really no excuse for ignoring the one and only most important event in all of history. An event that depending on how you respond to it will affect your eternal destiny. That event, of course, is death and resurrection of Jesus Christ. What you do about Jesus is all that really matters in life (and death).
@dennisgilesjnr3538
@dennisgilesjnr3538 9 лет назад
Heard of "Windtalkers" ????
@stratosjoebar
@stratosjoebar 4 года назад
As always.a meaning discovered by Greece.
@foggyblues13
@foggyblues13 9 лет назад
uripre, that's what they want you to believe, but it's all b.s.
@MarkScott1
@MarkScott1 9 лет назад
foggyblues13 It is all BS. If you were Al-Qaeda, ISIS or whatever, you'd just get on the dark web and talk fairly freely. Why our surface internet needs to be monitored and the reasons that they are giving for this is pure bullshit. Why they are so concerned about monitoring us normal folk though I don't fully understand. Anyone?
@zissou6928
@zissou6928 9 лет назад
mispellt 'led' gives me a tummy ache
@su8z3r03
@su8z3r03 3 года назад
Cell phone data going over the air is not enecrypted SS7 exploit proves this.
@agentstepheng289
@agentstepheng289 8 лет назад
I am curious where those documents are from that is showed. Where they part of the Snowden files?
@chrisrussell9118
@chrisrussell9118 8 лет назад
+Agent StephenG yes they are
@chrisrussell9118
@chrisrussell9118 8 лет назад
+Agent StephenG archive.org/details/NSA-PRISM-Slides
@samislam2746
@samislam2746 3 года назад
people are like: Zzzz
@juliannevillecorrea
@juliannevillecorrea 9 лет назад
Where the #mind is without #fear and the head is held high; Where knowledge is #free; Where the world has not been broken up into fragments By narrow domestic walls Where words come out from the depth of #truth; Where tireless striving stretches its arms towards perfection; Where the clear stream of #reason has not lost its way Into the dreary desert sand of dead habit; Where the mind is led forward by thee Into ever-widening #thought and action; Into that heaven of #freedom, My Father, let my #country awake. ............................... #notimeforcaution #badwolf #redpill #datadarwinism Sefra Correa Marielyn Correa Wilson Correa watch
@ackinito
@ackinito 3 года назад
Superficial talk, but he is probably about that NSA agent sitting among the crowd.
@benniedewaal685
@benniedewaal685 6 лет назад
balls can be eyes.
@noezzi
@noezzi 9 лет назад
They want to be like God. The all seeing eye on your dollar bills is a prime example. The devil is a jealous entity
@iwill1171
@iwill1171 7 месяцев назад
😢
@reginald8623
@reginald8623 3 года назад
if someone routinely visits Israel. maaaybe they have other interests than the US but thats just a hunch
@jony7779
@jony7779 9 лет назад
If we prevent the NSA from discovering how to break common encryption techniques, then we may be leaving those discoveries to a more malicious group of people. Sure, surveillance is bad, but avoiding surveillance is a great motivation to develop better encryption techniques. If someone is breaking our encryption techniques, I would prefer it be the NSA over a group with malevolent intent.
@nosuchthing8
@nosuchthing8 8 лет назад
the reality is that the nsa forces most software to have backdoors built in, at one level or a other. Which then is expolited when said agents move on to other jobs. Forcing software to be crippled is like forcing all cars to drive at 5mph tops to save lives.
@grrr1351
@grrr1351 6 лет назад
Like the NSA doesn't have a malevolent intent.
@non-human3072
@non-human3072 4 года назад
Nothing is safer than pen and paper... good luck G-ogle
@mastaskep
@mastaskep 9 лет назад
This video really makes me question his expertise in his profession. Does he not know that cryptography algorithms are made public for the purpose of getting others to test its ability to withstand attempts to decrpyt. This video is pretty misleading he must never heard of kerckhoffs principle. But I do agree that NSA has crossed boundaries by recording and storing information once they crack an algorithm but what have they done with the information that was so wrong? Have they blackmailed anyone no..
@wiscanson9498
@wiscanson9498 8 лет назад
+mastaskep So it's better to wait until after the fact? By then it is too late. There is no reason why large letter organizations have authority and control over anyone's info. Paste your SSN and admit you won't worry. That can't be true.
@mastaskep
@mastaskep 8 лет назад
+Wis Canson Dude I did say they crossed boundaries by recording and storing information. I am quite sure NSA has my SSN and yours anyway......
@wiscanson9498
@wiscanson9498 8 лет назад
*****​ Ok, so now one must act. You mentioned they have not blackmailed anyone. Would you please elaborate?
@mastaskep
@mastaskep 8 лет назад
There has not been, to me recollection, any nefarious activities by the government agencies where they use non-criminal information about you. For instance, if you were some high level official that cheats on his wife and they got into your phone records and blackmailed you into doing something against your will.
@wiscanson9498
@wiscanson9498 8 лет назад
+mastaskep No one can against anyone's will. Unless, of course, if they threaten your life. As I have stated no one, not limited to but including government, should have even the slightest of access to anyone's info.
@uripre
@uripre 9 лет назад
Those civilian encryptions, even if created by Americans, are not only used by Americans, but also by Al-Qaeda, Iran or any other nutter. *Your safety depends on the ability of the NSA to decrypt those encryptions.*
@culturedesi
@culturedesi 8 лет назад
+uripre hahahaha ur a funny one
@luddity
@luddity 7 лет назад
and then the NSA decryption will, in turn, end up being used by the other nutter down the road against any target they choose
Далее
ПОМОГЛА НАЗЫВАЕТСЯ😂
00:20
Просмотров 804 тыс.
The Internet is on fire | Mikko Hypponen | TEDxBrussels
19:17
Cyber Self-Defense | Paul Carugati | TEDxSpokane
14:48
Hacking 101: Frank Heidt at TEDxMidwest
15:37
Просмотров 1 млн