{"video_id":"dut9EnbFym0","title":"Encryption as Fast As Possible","channel":"Techquickie","show":"Techquickie","published_at":"2015-05-07T14:58:16Z","duration_s":324,"segments":[{"start_s":0.12,"end_s":6.16,"text":"when we visit a website that features that little padlock in the corner of our","speaker":null,"is_sponsor":0},{"start_s":3.959,"end_s":10.32,"text":"browser we're trusting it to keep our data safe and whether it's our credit","speaker":null,"is_sponsor":0},{"start_s":8.0,"end_s":15.08,"text":"card numbers sensitive work documents or those questionable photos that you told","speaker":null,"is_sponsor":0},{"start_s":12.48,"end_s":19.92,"text":"your friend not to take various types of encryption standards ensure that they","speaker":null,"is_sponsor":0},{"start_s":16.92,"end_s":23.439,"text":"are kept out of the prying hands of e","speaker":null,"is_sponsor":0},{"start_s":19.92,"end_s":25.599,"text":"Intruders Intruders whatever while they","speaker":null,"is_sponsor":0},{"start_s":23.439,"end_s":30.64,"text":"zip around on the internet but aside from the reassuring little icon on your","speaker":null,"is_sponsor":0},{"start_s":27.92,"end_s":35.719,"text":"computer screen what's actually going on what is encryption all right so while","speaker":null,"is_sponsor":0},{"start_s":33.12,"end_s":39.879,"text":"today's video focuses on encryption on the web specifically and the procedures","speaker":null,"is_sponsor":0},{"start_s":38.12,"end_s":45.0,"text":"used for encrypting data can be massively complex the fundamental idea","speaker":null,"is_sponsor":0},{"start_s":42.8,"end_s":49.719,"text":"behind all encryption is really quite simple whenever you transfer encrypted","speaker":null,"is_sponsor":0},{"start_s":47.8,"end_s":55.399,"text":"information your computer turns that data into an unintelligible mess or","speaker":null,"is_sponsor":0},{"start_s":52.8,"end_s":60.239,"text":"Cipher text that can only be put back into a readable form by unlocking it","speaker":null,"is_sponsor":0},{"start_s":57.719,"end_s":64.879,"text":"with a key of some sort that tells the receiving computer how to decode the","speaker":null,"is_sponsor":0},{"start_s":62.28,"end_s":68.68,"text":"incoming message this basic concept has actually been used to send secret","speaker":null,"is_sponsor":0},{"start_s":66.6,"end_s":73.32,"text":"messages since long before the invention of computers ciphers of various kinds","speaker":null,"is_sponsor":0},{"start_s":71.36,"end_s":77.479,"text":"have been used for thousands of years and machines that could encode and","speaker":null,"is_sponsor":0},{"start_s":75.56,"end_s":82.04,"text":"decode messages were in use before The Modern PC ever came along Thomas","speaker":null,"is_sponsor":0},{"start_s":79.24,"end_s":85.92,"text":"Jefferson invented a wheel Cipher that was nothing more than wooden discs","speaker":null,"is_sponsor":0},{"start_s":83.88,"end_s":90.439,"text":"around an axle and then the Germans famously used a typewriter like device","speaker":null,"is_sponsor":0},{"start_s":88.04,"end_s":94.84,"text":"called the Enigma machine to encrypt military messages during World War II","speaker":null,"is_sponsor":0},{"start_s":92.479,"end_s":100.119,"text":"although the Allies were able to crack that code now back to the web era modern","speaker":null,"is_sponsor":0},{"start_s":97.799,"end_s":103.759,"text":"Electronics often use a widespread encryption scheme called public key","speaker":null,"is_sponsor":0},{"start_s":101.92,"end_s":108.56,"text":"encryption suppose you want to send an email when you click Send the receiving","speaker":null,"is_sponsor":0},{"start_s":106.399,"end_s":112.479,"text":"computer will provide your computer with what's called a public key a public key","speaker":null,"is_sponsor":0},{"start_s":110.96,"end_s":115.719,"text":"is generated by the computer just randomly choosing a very large number","speaker":null,"is_sponsor":0},{"start_s":114.32,"end_s":120.479,"text":"and running it through some mathematical functions once your computer receives","speaker":null,"is_sponsor":0},{"start_s":118.119,"end_s":125.28,"text":"this public key it uses the the key to lock the email using a special algorithm","speaker":null,"is_sponsor":0},{"start_s":122.96,"end_s":130.36,"text":"then sends it on its way now since anyone can request a public key from a","speaker":null,"is_sponsor":0},{"start_s":127.479,"end_s":134.64,"text":"computer the public key can't be used to unlock a message otherwise anyone could","speaker":null,"is_sponsor":0},{"start_s":132.959,"end_s":138.92,"text":"intercept and read your encrypted emails that would defeat the purpose instead","speaker":null,"is_sponsor":0},{"start_s":136.92,"end_s":143.16,"text":"the recipient's computer unlocks the message with a private key that is","speaker":null,"is_sponsor":0},{"start_s":141.08,"end_s":147.28,"text":"stored on that system alone making it mercifully impossible for anyone else to","speaker":null,"is_sponsor":0},{"start_s":145.319,"end_s":151.64,"text":"do the terrible poetry you sent to your girlfriend that has her rethinking","speaker":null,"is_sponsor":0},{"start_s":149.12,"end_s":156.04,"text":"things public key encryption isn't just used for email it's actually the basis","speaker":null,"is_sponsor":0},{"start_s":153.519,"end_s":160.44,"text":"of tons of websites that require you to sign in securely if you've ever clicked","speaker":null,"is_sponsor":0},{"start_s":158.599,"end_s":164.72,"text":"on that little padlock and saw a mention of SSL or TLS these are two","speaker":null,"is_sponsor":0},{"start_s":162.8,"end_s":169.239,"text":"implementations of public key encryption that are widely used by Google Facebook","speaker":null,"is_sponsor":0},{"start_s":167.239,"end_s":172.879,"text":"Microsoft and many more to make sure that only you can access your data or","speaker":null,"is_sponsor":0},{"start_s":171.0,"end_s":176.08,"text":"change your settings now once the sensitive data actually arrives at its","speaker":null,"is_sponsor":0},{"start_s":174.8,"end_s":182.879,"text":"destination there are a number of other encryption methods used to make sure it can sit on the computer or server safely","speaker":null,"is_sponsor":0},{"start_s":180.48,"end_s":186.959,"text":"for example you probably have a password and credit card number stored with","speaker":null,"is_sponsor":0},{"start_s":184.84,"end_s":191.76,"text":"Amazon for example how do they keep those things safe often web servers will","speaker":null,"is_sponsor":0},{"start_s":189.72,"end_s":196.519,"text":"hash your passwords meaning that they're converted into encrypted strings of text","speaker":null,"is_sponsor":0},{"start_s":194.159,"end_s":200.519,"text":"through a process that is extremely difficult to reverse and can't be","speaker":null,"is_sponsor":0},{"start_s":198.159,"end_s":205.92,"text":"unlocked with a key now with all that said it is important to remember that no","speaker":null,"is_sponsor":0},{"start_s":203.159,"end_s":209.92,"text":"system of encryption is perfect and experts in the field are constantly","speaker":null,"is_sponsor":0},{"start_s":207.68,"end_s":214.76,"text":"searching for weaknesses in encryption algorithms and devising new ones to","speaker":null,"is_sponsor":0},{"start_s":212.0,"end_s":218.76,"text":"outsmart hackers so next time you're G chatting a friend about how awesome the","speaker":null,"is_sponsor":0},{"start_s":216.72,"end_s":222.879,"text":"latest episode of tech quick you was remember that it was really an epic","speaker":null,"is_sponsor":0},{"start_s":220.879,"end_s":227.2,"text":"digital arms race that allowed you to do that without everyone knowing exactly","speaker":null,"is_sponsor":0},{"start_s":225.439,"end_s":231.84,"text":"how much of your free time you spend listening to me talk speaking of","speaker":null,"is_sponsor":0},{"start_s":229.08,"end_s":237.2,"text":"whatever I was talking about mop.com they have all kinds of cool stuff on","speaker":null,"is_sponsor":0},{"start_s":234.519,"end_s":243.84,"text":"that their site they got like knives they got like keyboards and key apps","speaker":null,"is_sponsor":0},{"start_s":240.439,"end_s":246.159,"text":"they got like headphones basically if","speaker":null,"is_sponsor":0},{"start_s":243.84,"end_s":250.64,"text":"it's a consumer electronic item that's like hip and cool and people want to buy","speaker":null,"is_sponsor":0},{"start_s":248.599,"end_s":255.36,"text":"it m drop works with the manufacturers and Distributors to get the lowest","speaker":null,"is_sponsor":0},{"start_s":252.68,"end_s":260.079,"text":"possible prices depending on how many people want to buy it so the way it","speaker":null,"is_sponsor":0},{"start_s":257.72,"end_s":265.199,"text":"works is the more people commit to buy the more people get an even lower price","speaker":null,"is_sponsor":0},{"start_s":262.639,"end_s":268.8,"text":"on one of the community curated deals that's available on the site so all you","speaker":null,"is_sponsor":0},{"start_s":266.8,"end_s":273.4,"text":"got to do is sign up you can start browsing around and finding cool stuff","speaker":null,"is_sponsor":0},{"start_s":271.32,"end_s":278.479,"text":"uh really audio products are a really big one but they have all kinds of","speaker":null,"is_sponsor":0},{"start_s":276.44,"end_s":283.8,"text":"different stuff and often only available for limited time although sometimes","speaker":null,"is_sponsor":0},{"start_s":281.16,"end_s":287.759,"text":"particularly popular deals come back like for example they have the ant lion","speaker":null,"is_sponsor":0},{"start_s":286.0,"end_s":291.6,"text":"mod mic back right now we've actually done a review of that over on my other","speaker":null,"is_sponsor":0},{"start_s":289.28,"end_s":295.84,"text":"channel Linus Tech tips and I think the longer I keep doing this the more likely","speaker":null,"is_sponsor":0},{"start_s":293.52,"end_s":299.84,"text":"it is that let's go for a double oh the more likely it is that I'm going to cut","speaker":null,"is_sponsor":0},{"start_s":297.479,"end_s":306.56,"text":"myself with this so M drop does not any way condone the unsafe use of knives but","speaker":null,"is_sponsor":0},{"start_s":302.32,"end_s":308.759,"text":"they definitely do sell them to even me","speaker":null,"is_sponsor":0},{"start_s":306.56,"end_s":311.639,"text":"so uh is that unsafe I don't know you can find out by clicking on the link in","speaker":null,"is_sponsor":0},{"start_s":310.32,"end_s":315.479,"text":"the video description thanks for watching guys like this video if you liked it dislike it if you thought it","speaker":null,"is_sponsor":0},{"start_s":314.12,"end_s":319.0,"text":"sucked leave a comment if your feelings are more complicated than either of those things and if you have suggestions","speaker":null,"is_sponsor":0},{"start_s":317.56,"end_s":322.24,"text":"for future fast as popal episodes just like this one and as always don't forget","speaker":null,"is_sponsor":0},{"start_s":320.72,"end_s":325.759,"text":"to subscribe to Techquickie for more videos just like this","speaker":null,"is_sponsor":0}],"full_text":"when we visit a website that features that little padlock in the corner of our browser we're trusting it to keep our data safe and whether it's our credit card numbers sensitive work documents or those questionable photos that you told your friend not to take various types of encryption standards ensure that they are kept out of the prying hands of e Intruders Intruders whatever while they zip around on the internet but aside from the reassuring little icon on your computer screen what's actually going on what is encryption all right so while today's video focuses on encryption on the web specifically and the procedures used for encrypting data can be massively complex the fundamental idea behind all encryption is really quite simple whenever you transfer encrypted information your computer turns that data into an unintelligible mess or Cipher text that can only be put back into a readable form by unlocking it with a key of some sort that tells the receiving computer how to decode the incoming message this basic concept has actually been used to send secret messages since long before the invention of computers ciphers of various kinds have been used for thousands of years and machines that could encode and decode messages were in use before The Modern PC ever came along Thomas Jefferson invented a wheel Cipher that was nothing more than wooden discs around an axle and then the Germans famously used a typewriter like device called the Enigma machine to encrypt military messages during World War II although the Allies were able to crack that code now back to the web era modern Electronics often use a widespread encryption scheme called public key encryption suppose you want to send an email when you click Send the receiving computer will provide your computer with what's called a public key a public key is generated by the computer just randomly choosing a very large number and running it through some mathematical functions once your computer receives this public key it uses the the key to lock the email using a special algorithm then sends it on its way now since anyone can request a public key from a computer the public key can't be used to unlock a message otherwise anyone could intercept and read your encrypted emails that would defeat the purpose instead the recipient's computer unlocks the message with a private key that is stored on that system alone making it mercifully impossible for anyone else to do the terrible poetry you sent to your girlfriend that has her rethinking things public key encryption isn't just used for email it's actually the basis of tons of websites that require you to sign in securely if you've ever clicked on that little padlock and saw a mention of SSL or TLS these are two implementations of public key encryption that are widely used by Google Facebook Microsoft and many more to make sure that only you can access your data or change your settings now once the sensitive data actually arrives at its destination there are a number of other encryption methods used to make sure it can sit on the computer or server safely for example you probably have a password and credit card number stored with Amazon for example how do they keep those things safe often web servers will hash your passwords meaning that they're converted into encrypted strings of text through a process that is extremely difficult to reverse and can't be unlocked with a key now with all that said it is important to remember that no system of encryption is perfect and experts in the field are constantly searching for weaknesses in encryption algorithms and devising new ones to outsmart hackers so next time you're G chatting a friend about how awesome the latest episode of tech quick you was remember that it was really an epic digital arms race that allowed you to do that without everyone knowing exactly how much of your free time you spend listening to me talk speaking of whatever I was talking about mop.com they have all kinds of cool stuff on that their site they got like knives they got like keyboards and key apps they got like headphones basically if it's a consumer electronic item that's like hip and cool and people want to buy it m drop works with the manufacturers and Distributors to get the lowest possible prices depending on how many people want to buy it so the way it works is the more people commit to buy the more people get an even lower price on one of the community curated deals that's available on the site so all you got to do is sign up you can start browsing around and finding cool stuff uh really audio products are a really big one but they have all kinds of different stuff and often only available for limited time although sometimes particularly popular deals come back like for example they have the ant lion mod mic back right now we've actually done a review of that over on my other channel Linus Tech tips and I think the longer I keep doing this the more likely it is that let's go for a double oh the more likely it is that I'm going to cut myself with this so M drop does not any way condone the unsafe use of knives but they definitely do sell them to even me so uh is that unsafe I don't know you can find out by clicking on the link in the video description thanks for watching guys like this video if you liked it dislike it if you thought it sucked leave a comment if your feelings are more complicated than either of those things and if you have suggestions for future fast as popal episodes just like this one and as always don't forget to subscribe to Techquickie for more videos just like this"}