{"video_id":"T5HCy3udooo","title":"Wi-Fi Security as Fast As Possible","channel":"Techquickie","show":"Techquickie","published_at":"2016-05-06T14:58:16Z","duration_s":313,"segments":[{"start_s":0.16,"end_s":6.6,"text":"it seems like not too long ago that stealing things from the airwaves just","speaker":null,"is_sponsor":0},{"start_s":4.24,"end_s":11.92,"text":"meant recording radio broadcasts of songs about Barbie girls and wanting it","speaker":null,"is_sponsor":0},{"start_s":9.4,"end_s":17.4,"text":"that way onto bootleg cassette tapes but now with details of our personal lives","speaker":null,"is_sponsor":0},{"start_s":14.599,"end_s":22.72,"text":"and billions of dollars worth of transactions constantly being beamed","speaker":null,"is_sponsor":0},{"start_s":19.72,"end_s":25.279,"text":"around over Wi-Fi securing all of this","speaker":null,"is_sponsor":0},{"start_s":22.72,"end_s":31.84,"text":"stuff has become a huge priority for more than just Nick Carter well yeah","speaker":null,"is_sponsor":0},{"start_s":28.32,"end_s":34.6,"text":"lius uh that's what those passwords that","speaker":null,"is_sponsor":0},{"start_s":31.84,"end_s":38.079,"text":"uh clever people put in place over their wireless networks to keep unwanted","speaker":null,"is_sponsor":0},{"start_s":36.52,"end_s":43.16,"text":"Intruders from accessing computers and files on the networker for if you got","speaker":null,"is_sponsor":0},{"start_s":40.12,"end_s":45.399,"text":"one of those you're safe smart guy","speaker":null,"is_sponsor":0},{"start_s":43.16,"end_s":51.12,"text":"actually you're partly right password protection on your Wi-Fi hotspot is a","speaker":null,"is_sponsor":0},{"start_s":48.16,"end_s":55.879,"text":"must these days with some places even holding the internet connection owner","speaker":null,"is_sponsor":0},{"start_s":53.559,"end_s":61.0,"text":"liable for cyber crimes committed through their unsecured access point but","speaker":null,"is_sponsor":0},{"start_s":58.32,"end_s":67.2,"text":"that's also a gross over simp ification not all passwords are created equal back","speaker":null,"is_sponsor":0},{"start_s":64.479,"end_s":73.6,"text":"in the early 2000s nearly all routers shipped with a default security scheme","speaker":null,"is_sponsor":0},{"start_s":69.4,"end_s":75.2,"text":"called we or wired equivalency privacy","speaker":null,"is_sponsor":0},{"start_s":73.6,"end_s":81.32,"text":"and although it was incredibly widespread thanks to us laws restricting","speaker":null,"is_sponsor":0},{"start_s":78.439,"end_s":85.0,"text":"the export of cryptographic technology and some short-sighted exploits that","speaker":null,"is_sponsor":0},{"start_s":83.0,"end_s":90.36,"text":"allowed Brute Force attacks to defeat it quite easily as computing power","speaker":null,"is_sponsor":0},{"start_s":87.0,"end_s":92.439,"text":"increased it was also incredibly weak if","speaker":null,"is_sponsor":0},{"start_s":90.36,"end_s":97.88,"text":"you're still using web it's better than nothing but know that it can be broken","speaker":null,"is_sponsor":0},{"start_s":94.759,"end_s":100.399,"text":"in minutes using free software so this","speaker":null,"is_sponsor":0},{"start_s":97.88,"end_s":105.88,"text":"led to the development of WPA which introduced much longer encryption keys","speaker":null,"is_sponsor":0},{"start_s":102.88,"end_s":108.399,"text":"and tkip or temporal key Integrity","speaker":null,"is_sponsor":0},{"start_s":105.88,"end_s":113.479,"text":"protocol which protected against altered or forged packets and used constantly","speaker":null,"is_sponsor":0},{"start_s":111.36,"end_s":118.799,"text":"changing keys to dramatically improve the security of the web standard but it","speaker":null,"is_sponsor":0},{"start_s":116.399,"end_s":123.6,"text":"was merely a temporary solution since the convenience and cost Savings of","speaker":null,"is_sponsor":0},{"start_s":121.84,"end_s":129.759,"text":"being able to implement it with a firmware update on existing Hardware","speaker":null,"is_sponsor":0},{"start_s":126.2,"end_s":131.64,"text":"came at a cost it reused some parts of","speaker":null,"is_sponsor":0},{"start_s":129.759,"end_s":136.92,"text":"web making it highly vulnerable to breach by today's standards and not only","speaker":null,"is_sponsor":0},{"start_s":134.48,"end_s":141.76,"text":"that but device intercompatibility sucks the big one which leads us to Modern","speaker":null,"is_sponsor":0},{"start_s":139.56,"end_s":146.48,"text":"wireless encryption the one you should be using unless you have some older","speaker":null,"is_sponsor":0},{"start_s":143.56,"end_s":150.12,"text":"devices that only support WPA although given that WPA 2 support has been","speaker":null,"is_sponsor":0},{"start_s":148.12,"end_s":153.72,"text":"mandatory on any device with a Wi-Fi since 2006 there's really not much","speaker":null,"is_sponsor":0},{"start_s":151.64,"end_s":159.159,"text":"excuse for not swapping out that pocket PC for an iPad or something at this","speaker":null,"is_sponsor":0},{"start_s":156.08,"end_s":162.519,"text":"point but what does WPA 2 bring to the","speaker":null,"is_sponsor":0},{"start_s":159.159,"end_s":165.08,"text":"table most importantly the mandatory use","speaker":null,"is_sponsor":0},{"start_s":162.519,"end_s":168.72,"text":"of the AES or Advanced encryption standard an encryption algorithm so","speaker":null,"is_sponsor":0},{"start_s":167.519,"end_s":173.56,"text":"strong that it would take a modern computer hundreds or even thousands of","speaker":null,"is_sponsor":0},{"start_s":171.28,"end_s":178.519,"text":"years to break a 12 character password by brute forcing it which doesn't mean","speaker":null,"is_sponsor":0},{"start_s":176.44,"end_s":182.92,"text":"it's bulletproof though you know that one button WI","speaker":null,"is_sponsor":0},{"start_s":180.36,"end_s":187.799,"text":"setup thing WPS it's convenient for home use but turn that crank off for your","speaker":null,"is_sponsor":0},{"start_s":185.159,"end_s":190.84,"text":"business Network because someone who has previously had access to the network","speaker":null,"is_sponsor":0},{"start_s":189.56,"end_s":196.76,"text":"let's say for example a disgruntled employee Could Break Your WPA 2 Security","speaker":null,"is_sponsor":0},{"start_s":193.72,"end_s":198.64,"text":"in a couple of hours and on top of that","speaker":null,"is_sponsor":0},{"start_s":196.76,"end_s":203.799,"text":"if you're concerned about your personal data being stolen security comes with","speaker":null,"is_sponsor":0},{"start_s":201.799,"end_s":207.959,"text":"you not just when you're setting up your access point because even the strongest","speaker":null,"is_sponsor":0},{"start_s":206.08,"end_s":212.439,"text":"encryption in the world between you and an access point can't protect prot you","speaker":null,"is_sponsor":0},{"start_s":210.599,"end_s":217.04,"text":"if that access point is being operated by someone who wants to get into your","speaker":null,"is_sponsor":0},{"start_s":214.439,"end_s":221.84,"text":"base and kill your dudes or at least steal your banking information beware of","speaker":null,"is_sponsor":0},{"start_s":219.4,"end_s":226.56,"text":"public Wi-Fi networks and ensure that whatever you're connecting to belongs to","speaker":null,"is_sponsor":0},{"start_s":223.68,"end_s":232.319,"text":"an individual or a business that you trust speaking of trust and being","speaker":null,"is_sponsor":0},{"start_s":229.28,"end_s":234.4,"text":"connected on the go fresh books it's","speaker":null,"is_sponsor":0},{"start_s":232.319,"end_s":238.439,"text":"designed for freelance workers or small businesses it's an online tool that's","speaker":null,"is_sponsor":0},{"start_s":236.4,"end_s":243.519,"text":"why I said connected and on the go and it makes invoicing getting paid and","speaker":null,"is_sponsor":0},{"start_s":240.56,"end_s":248.159,"text":"tracking expenses easier so you just go into it on your mobile device and you're","speaker":null,"is_sponsor":0},{"start_s":245.519,"end_s":253.68,"text":"like yeah I worked these hours I expens the things blippity bloppy send an email","speaker":null,"is_sponsor":0},{"start_s":251.12,"end_s":257.519,"text":"with an invoice to your customer and get this you can tell when they've read it","speaker":null,"is_sponsor":0},{"start_s":255.799,"end_s":262.759,"text":"and then they can pay you by credit card so that you are spending your time doing","speaker":null,"is_sponsor":0},{"start_s":260.0,"end_s":267.28,"text":"your business instead of playing around with numbers which let's face it are you","speaker":null,"is_sponsor":0},{"start_s":264.919,"end_s":270.919,"text":"that great with numbers anyway I didn't think so I'm sure not so if you're your","speaker":null,"is_sponsor":0},{"start_s":269.32,"end_s":276.24,"text":"own boss you should be using stuff that makes you feel like a boss and freshbooks is the easy way to do all","speaker":null,"is_sponsor":0},{"start_s":274.16,"end_s":279.8,"text":"your online billing so you have more time to do the work you actually want to","speaker":null,"is_sponsor":0},{"start_s":277.88,"end_s":285.68,"text":"be doing head over to freshbooks.com tequi and enter Techquickie and how did","speaker":null,"is_sponsor":0},{"start_s":282.08,"end_s":287.44,"text":"you hear about us to get a free trial","speaker":null,"is_sponsor":0},{"start_s":285.68,"end_s":291.16,"text":"thanks for watching guys like this video if you liked it dislike it if you thought it sucked leave a comment if you","speaker":null,"is_sponsor":0},{"start_s":290.039,"end_s":295.72,"text":"have suggestions for future fastest Possible episodes just like this one and as always don't forget to subscribe and","speaker":null,"is_sponsor":0},{"start_s":294.36,"end_s":301.919,"text":"if you're looking for something else to watch check out our recent video on","speaker":null,"is_sponsor":0},{"start_s":298.12,"end_s":304.6,"text":"channel super Le fun where we actually","speaker":null,"is_sponsor":0},{"start_s":301.919,"end_s":308.52,"text":"shock each other for no reason actually there's a reason it's for being too slow","speaker":null,"is_sponsor":0},{"start_s":306.759,"end_s":312.8,"text":"I mean what kind of chump is too slow to press the button they should get zapped","speaker":null,"is_sponsor":0}],"full_text":"it seems like not too long ago that stealing things from the airwaves just meant recording radio broadcasts of songs about Barbie girls and wanting it that way onto bootleg cassette tapes but now with details of our personal lives and billions of dollars worth of transactions constantly being beamed around over Wi-Fi securing all of this stuff has become a huge priority for more than just Nick Carter well yeah lius uh that's what those passwords that uh clever people put in place over their wireless networks to keep unwanted Intruders from accessing computers and files on the networker for if you got one of those you're safe smart guy actually you're partly right password protection on your Wi-Fi hotspot is a must these days with some places even holding the internet connection owner liable for cyber crimes committed through their unsecured access point but that's also a gross over simp ification not all passwords are created equal back in the early 2000s nearly all routers shipped with a default security scheme called we or wired equivalency privacy and although it was incredibly widespread thanks to us laws restricting the export of cryptographic technology and some short-sighted exploits that allowed Brute Force attacks to defeat it quite easily as computing power increased it was also incredibly weak if you're still using web it's better than nothing but know that it can be broken in minutes using free software so this led to the development of WPA which introduced much longer encryption keys and tkip or temporal key Integrity protocol which protected against altered or forged packets and used constantly changing keys to dramatically improve the security of the web standard but it was merely a temporary solution since the convenience and cost Savings of being able to implement it with a firmware update on existing Hardware came at a cost it reused some parts of web making it highly vulnerable to breach by today's standards and not only that but device intercompatibility sucks the big one which leads us to Modern wireless encryption the one you should be using unless you have some older devices that only support WPA although given that WPA 2 support has been mandatory on any device with a Wi-Fi since 2006 there's really not much excuse for not swapping out that pocket PC for an iPad or something at this point but what does WPA 2 bring to the table most importantly the mandatory use of the AES or Advanced encryption standard an encryption algorithm so strong that it would take a modern computer hundreds or even thousands of years to break a 12 character password by brute forcing it which doesn't mean it's bulletproof though you know that one button WI setup thing WPS it's convenient for home use but turn that crank off for your business Network because someone who has previously had access to the network let's say for example a disgruntled employee Could Break Your WPA 2 Security in a couple of hours and on top of that if you're concerned about your personal data being stolen security comes with you not just when you're setting up your access point because even the strongest encryption in the world between you and an access point can't protect prot you if that access point is being operated by someone who wants to get into your base and kill your dudes or at least steal your banking information beware of public Wi-Fi networks and ensure that whatever you're connecting to belongs to an individual or a business that you trust speaking of trust and being connected on the go fresh books it's designed for freelance workers or small businesses it's an online tool that's why I said connected and on the go and it makes invoicing getting paid and tracking expenses easier so you just go into it on your mobile device and you're like yeah I worked these hours I expens the things blippity bloppy send an email with an invoice to your customer and get this you can tell when they've read it and then they can pay you by credit card so that you are spending your time doing your business instead of playing around with numbers which let's face it are you that great with numbers anyway I didn't think so I'm sure not so if you're your own boss you should be using stuff that makes you feel like a boss and freshbooks is the easy way to do all your online billing so you have more time to do the work you actually want to be doing head over to freshbooks.com tequi and enter Techquickie and how did you hear about us to get a free trial thanks for watching guys like this video if you liked it dislike it if you thought it sucked leave a comment if you have suggestions for future fastest Possible episodes just like this one and as always don't forget to subscribe and if you're looking for something else to watch check out our recent video on channel super Le fun where we actually shock each other for no reason actually there's a reason it's for being too slow I mean what kind of chump is too slow to press the button they should get zapped"}