1
00:00:00,120 --> 00:00:06,160
when we visit a website that features that little padlock in the corner of our

2
00:00:03,959 --> 00:00:10,320
browser we're trusting it to keep our data safe and whether it's our credit

3
00:00:08,000 --> 00:00:15,080
card numbers sensitive work documents or those questionable photos that you told

4
00:00:12,480 --> 00:00:19,920
your friend not to take various types of encryption standards ensure that they

5
00:00:16,920 --> 00:00:23,439
are kept out of the prying hands of e

6
00:00:19,920 --> 00:00:25,599
Intruders Intruders whatever while they

7
00:00:23,439 --> 00:00:30,640
zip around on the internet but aside from the reassuring little icon on your

8
00:00:27,920 --> 00:00:35,719
computer screen what's actually going on what is encryption all right so while

9
00:00:33,120 --> 00:00:39,879
today's video focuses on encryption on the web specifically and the procedures

10
00:00:38,120 --> 00:00:45,000
used for encrypting data can be massively complex the fundamental idea

11
00:00:42,800 --> 00:00:49,719
behind all encryption is really quite simple whenever you transfer encrypted

12
00:00:47,800 --> 00:00:55,399
information your computer turns that data into an unintelligible mess or

13
00:00:52,800 --> 00:01:00,239
Cipher text that can only be put back into a readable form by unlocking it

14
00:00:57,719 --> 00:01:04,879
with a key of some sort that tells the receiving computer how to decode the

15
00:01:02,280 --> 00:01:08,680
incoming message this basic concept has actually been used to send secret

16
00:01:06,600 --> 00:01:13,320
messages since long before the invention of computers ciphers of various kinds

17
00:01:11,360 --> 00:01:17,479
have been used for thousands of years and machines that could encode and

18
00:01:15,560 --> 00:01:22,040
decode messages were in use before The Modern PC ever came along Thomas

19
00:01:19,240 --> 00:01:25,920
Jefferson invented a wheel Cipher that was nothing more than wooden discs

20
00:01:23,880 --> 00:01:30,439
around an axle and then the Germans famously used a typewriter like device

21
00:01:28,040 --> 00:01:34,840
called the Enigma machine to encrypt military messages during World War II

22
00:01:32,479 --> 00:01:40,119
although the Allies were able to crack that code now back to the web era modern

23
00:01:37,799 --> 00:01:43,759
Electronics often use a widespread encryption scheme called public key

24
00:01:41,920 --> 00:01:48,560
encryption suppose you want to send an email when you click Send the receiving

25
00:01:46,399 --> 00:01:52,479
computer will provide your computer with what's called a public key a public key

26
00:01:50,960 --> 00:01:55,719
is generated by the computer just randomly choosing a very large number

27
00:01:54,320 --> 00:02:00,479
and running it through some mathematical functions once your computer receives

28
00:01:58,119 --> 00:02:05,280
this public key it uses the the key to lock the email using a special algorithm

29
00:02:02,960 --> 00:02:10,360
then sends it on its way now since anyone can request a public key from a

30
00:02:07,479 --> 00:02:14,640
computer the public key can't be used to unlock a message otherwise anyone could

31
00:02:12,959 --> 00:02:18,920
intercept and read your encrypted emails that would defeat the purpose instead

32
00:02:16,920 --> 00:02:23,160
the recipient's computer unlocks the message with a private key that is

33
00:02:21,080 --> 00:02:27,280
stored on that system alone making it mercifully impossible for anyone else to

34
00:02:25,319 --> 00:02:31,640
do the terrible poetry you sent to your girlfriend that has her rethinking

35
00:02:29,120 --> 00:02:36,040
things public key encryption isn't just used for email it's actually the basis

36
00:02:33,519 --> 00:02:40,440
of tons of websites that require you to sign in securely if you've ever clicked

37
00:02:38,599 --> 00:02:44,720
on that little padlock and saw a mention of SSL or TLS these are two

38
00:02:42,800 --> 00:02:49,239
implementations of public key encryption that are widely used by Google Facebook

39
00:02:47,239 --> 00:02:52,879
Microsoft and many more to make sure that only you can access your data or

40
00:02:51,000 --> 00:02:56,080
change your settings now once the sensitive data actually arrives at its

41
00:02:54,800 --> 00:03:02,879
destination there are a number of other encryption methods used to make sure it can sit on the computer or server safely

42
00:03:00,480 --> 00:03:06,959
for example you probably have a password and credit card number stored with

43
00:03:04,840 --> 00:03:11,760
Amazon for example how do they keep those things safe often web servers will

44
00:03:09,720 --> 00:03:16,519
hash your passwords meaning that they're converted into encrypted strings of text

45
00:03:14,159 --> 00:03:20,519
through a process that is extremely difficult to reverse and can't be

46
00:03:18,159 --> 00:03:25,920
unlocked with a key now with all that said it is important to remember that no

47
00:03:23,159 --> 00:03:29,920
system of encryption is perfect and experts in the field are constantly

48
00:03:27,680 --> 00:03:34,760
searching for weaknesses in encryption algorithms and devising new ones to

49
00:03:32,000 --> 00:03:38,760
outsmart hackers so next time you're G chatting a friend about how awesome the

50
00:03:36,720 --> 00:03:42,879
latest episode of tech quick you was remember that it was really an epic

51
00:03:40,879 --> 00:03:47,200
digital arms race that allowed you to do that without everyone knowing exactly

52
00:03:45,439 --> 00:03:51,840
how much of your free time you spend listening to me talk speaking of

53
00:03:49,080 --> 00:03:57,200
whatever I was talking about mop.com they have all kinds of cool stuff on

54
00:03:54,519 --> 00:04:03,840
that their site they got like knives they got like keyboards and key apps

55
00:04:00,439 --> 00:04:06,159
they got like headphones basically if

56
00:04:03,840 --> 00:04:10,640
it's a consumer electronic item that's like hip and cool and people want to buy

57
00:04:08,599 --> 00:04:15,360
it m drop works with the manufacturers and Distributors to get the lowest

58
00:04:12,680 --> 00:04:20,079
possible prices depending on how many people want to buy it so the way it

59
00:04:17,720 --> 00:04:25,199
works is the more people commit to buy the more people get an even lower price

60
00:04:22,639 --> 00:04:28,800
on one of the community curated deals that's available on the site so all you

61
00:04:26,800 --> 00:04:33,400
got to do is sign up you can start browsing around and finding cool stuff

62
00:04:31,320 --> 00:04:38,479
uh really audio products are a really big one but they have all kinds of

63
00:04:36,440 --> 00:04:43,800
different stuff and often only available for limited time although sometimes

64
00:04:41,160 --> 00:04:47,759
particularly popular deals come back like for example they have the ant lion

65
00:04:46,000 --> 00:04:51,600
mod mic back right now we've actually done a review of that over on my other

66
00:04:49,280 --> 00:04:55,840
channel Linus Tech tips and I think the longer I keep doing this the more likely

67
00:04:53,520 --> 00:04:59,840
it is that let's go for a double oh the more likely it is that I'm going to cut

68
00:04:57,479 --> 00:05:06,560
myself with this so M drop does not any way condone the unsafe use of knives but

69
00:05:02,320 --> 00:05:08,759
they definitely do sell them to even me

70
00:05:06,560 --> 00:05:11,639
so uh is that unsafe I don't know you can find out by clicking on the link in

71
00:05:10,320 --> 00:05:15,479
the video description thanks for watching guys like this video if you liked it dislike it if you thought it

72
00:05:14,120 --> 00:05:19,000
sucked leave a comment if your feelings are more complicated than either of those things and if you have suggestions

73
00:05:17,560 --> 00:05:22,240
for future fast as popal episodes just like this one and as always don't forget

74
00:05:20,720 --> 00:05:25,759
to subscribe to Techquickie for more videos just like this
