WEBVTT

00:00:00.120 --> 00:00:06.160
when we visit a website that features that little padlock in the corner of our

00:00:03.959 --> 00:00:10.320
browser we're trusting it to keep our data safe and whether it's our credit

00:00:08.000 --> 00:00:15.080
card numbers sensitive work documents or those questionable photos that you told

00:00:12.480 --> 00:00:19.920
your friend not to take various types of encryption standards ensure that they

00:00:16.920 --> 00:00:23.439
are kept out of the prying hands of e

00:00:19.920 --> 00:00:25.599
Intruders Intruders whatever while they

00:00:23.439 --> 00:00:30.640
zip around on the internet but aside from the reassuring little icon on your

00:00:27.920 --> 00:00:35.719
computer screen what's actually going on what is encryption all right so while

00:00:33.120 --> 00:00:39.879
today's video focuses on encryption on the web specifically and the procedures

00:00:38.120 --> 00:00:45.000
used for encrypting data can be massively complex the fundamental idea

00:00:42.800 --> 00:00:49.719
behind all encryption is really quite simple whenever you transfer encrypted

00:00:47.800 --> 00:00:55.399
information your computer turns that data into an unintelligible mess or

00:00:52.800 --> 00:01:00.239
Cipher text that can only be put back into a readable form by unlocking it

00:00:57.719 --> 00:01:04.879
with a key of some sort that tells the receiving computer how to decode the

00:01:02.280 --> 00:01:08.680
incoming message this basic concept has actually been used to send secret

00:01:06.600 --> 00:01:13.320
messages since long before the invention of computers ciphers of various kinds

00:01:11.360 --> 00:01:17.479
have been used for thousands of years and machines that could encode and

00:01:15.560 --> 00:01:22.040
decode messages were in use before The Modern PC ever came along Thomas

00:01:19.240 --> 00:01:25.920
Jefferson invented a wheel Cipher that was nothing more than wooden discs

00:01:23.880 --> 00:01:30.439
around an axle and then the Germans famously used a typewriter like device

00:01:28.040 --> 00:01:34.840
called the Enigma machine to encrypt military messages during World War II

00:01:32.479 --> 00:01:40.119
although the Allies were able to crack that code now back to the web era modern

00:01:37.799 --> 00:01:43.759
Electronics often use a widespread encryption scheme called public key

00:01:41.920 --> 00:01:48.560
encryption suppose you want to send an email when you click Send the receiving

00:01:46.399 --> 00:01:52.479
computer will provide your computer with what's called a public key a public key

00:01:50.960 --> 00:01:55.719
is generated by the computer just randomly choosing a very large number

00:01:54.320 --> 00:02:00.479
and running it through some mathematical functions once your computer receives

00:01:58.119 --> 00:02:05.280
this public key it uses the the key to lock the email using a special algorithm

00:02:02.960 --> 00:02:10.360
then sends it on its way now since anyone can request a public key from a

00:02:07.479 --> 00:02:14.640
computer the public key can't be used to unlock a message otherwise anyone could

00:02:12.959 --> 00:02:18.920
intercept and read your encrypted emails that would defeat the purpose instead

00:02:16.920 --> 00:02:23.160
the recipient's computer unlocks the message with a private key that is

00:02:21.080 --> 00:02:27.280
stored on that system alone making it mercifully impossible for anyone else to

00:02:25.319 --> 00:02:31.640
do the terrible poetry you sent to your girlfriend that has her rethinking

00:02:29.120 --> 00:02:36.040
things public key encryption isn't just used for email it's actually the basis

00:02:33.519 --> 00:02:40.440
of tons of websites that require you to sign in securely if you've ever clicked

00:02:38.599 --> 00:02:44.720
on that little padlock and saw a mention of SSL or TLS these are two

00:02:42.800 --> 00:02:49.239
implementations of public key encryption that are widely used by Google Facebook

00:02:47.239 --> 00:02:52.879
Microsoft and many more to make sure that only you can access your data or

00:02:51.000 --> 00:02:56.080
change your settings now once the sensitive data actually arrives at its

00:02:54.800 --> 00:03:02.879
destination there are a number of other encryption methods used to make sure it can sit on the computer or server safely

00:03:00.480 --> 00:03:06.959
for example you probably have a password and credit card number stored with

00:03:04.840 --> 00:03:11.760
Amazon for example how do they keep those things safe often web servers will

00:03:09.720 --> 00:03:16.519
hash your passwords meaning that they're converted into encrypted strings of text

00:03:14.159 --> 00:03:20.519
through a process that is extremely difficult to reverse and can't be

00:03:18.159 --> 00:03:25.920
unlocked with a key now with all that said it is important to remember that no

00:03:23.159 --> 00:03:29.920
system of encryption is perfect and experts in the field are constantly

00:03:27.680 --> 00:03:34.760
searching for weaknesses in encryption algorithms and devising new ones to

00:03:32.000 --> 00:03:38.760
outsmart hackers so next time you're G chatting a friend about how awesome the

00:03:36.720 --> 00:03:42.879
latest episode of tech quick you was remember that it was really an epic

00:03:40.879 --> 00:03:47.200
digital arms race that allowed you to do that without everyone knowing exactly

00:03:45.439 --> 00:03:51.840
how much of your free time you spend listening to me talk speaking of

00:03:49.080 --> 00:03:57.200
whatever I was talking about mop.com they have all kinds of cool stuff on

00:03:54.519 --> 00:04:03.840
that their site they got like knives they got like keyboards and key apps

00:04:00.439 --> 00:04:06.159
they got like headphones basically if

00:04:03.840 --> 00:04:10.640
it's a consumer electronic item that's like hip and cool and people want to buy

00:04:08.599 --> 00:04:15.360
it m drop works with the manufacturers and Distributors to get the lowest

00:04:12.680 --> 00:04:20.079
possible prices depending on how many people want to buy it so the way it

00:04:17.720 --> 00:04:25.199
works is the more people commit to buy the more people get an even lower price

00:04:22.639 --> 00:04:28.800
on one of the community curated deals that's available on the site so all you

00:04:26.800 --> 00:04:33.400
got to do is sign up you can start browsing around and finding cool stuff

00:04:31.320 --> 00:04:38.479
uh really audio products are a really big one but they have all kinds of

00:04:36.440 --> 00:04:43.800
different stuff and often only available for limited time although sometimes

00:04:41.160 --> 00:04:47.759
particularly popular deals come back like for example they have the ant lion

00:04:46.000 --> 00:04:51.600
mod mic back right now we've actually done a review of that over on my other

00:04:49.280 --> 00:04:55.840
channel Linus Tech tips and I think the longer I keep doing this the more likely

00:04:53.520 --> 00:04:59.840
it is that let's go for a double oh the more likely it is that I'm going to cut

00:04:57.479 --> 00:05:06.560
myself with this so M drop does not any way condone the unsafe use of knives but

00:05:02.320 --> 00:05:08.759
they definitely do sell them to even me

00:05:06.560 --> 00:05:11.639
so uh is that unsafe I don't know you can find out by clicking on the link in

00:05:10.320 --> 00:05:15.479
the video description thanks for watching guys like this video if you liked it dislike it if you thought it

00:05:14.120 --> 00:05:19.000
sucked leave a comment if your feelings are more complicated than either of those things and if you have suggestions

00:05:17.560 --> 00:05:22.240
for future fast as popal episodes just like this one and as always don't forget

00:05:20.720 --> 00:05:25.759
to subscribe to Techquickie for more videos just like this
