What is Encryption? (& How it Works to Protect Your Data)

preview_player
Показать описание
There is a lot of data in today's world constantly being sent to and from or even sitting on our hard drives but what stops someone from intercepting or stealing that data? Well in this Decodr episode, let's talk about what encryption is, how it works, and the ways it protects your data.

CLICK BELOW FOR A FREE 4 MONTH TRIAL OF BITDEFENDER'S LATEST PRODUCT THAT CAN HELP YOU FURTHER ENCRYPT YOUR DATA (thanks again to them for sponsoring this video!):

SIGN UP FOR MY WEEKLY, NOT-AT-ALL-ANNOYING NEWSLETTER FOR THE LATEST TIPS, TRICKS, AND TECH!

REPAIR YOUR IPHONE YOURSELF WITH PARTS FROM MY SHOP AND SAVE MONEY:

UNLOCK YOUR PHONE:

LETS CHAT:
Рекомендации по теме
Комментарии
Автор

Thank you for your effort to share with us your knowledge. ❤

fajvac
Автор

Great Defender has always been my favorite...

ayodhyayodha
Автор

Nice explanation..
Would you please explain, can we use LSB algorithm for encryption and decryption...?

anumolcherian
Автор

I tried to use my physical key to lock my phone. Didn't end well.

Lol great video, brother. I use a manager too, but 2FA has also been a good layer. I'm adding it more and more to my accounts.

jvtechtea
Автор

I am undergoing CompTIA and believe I may need ya expertise

Keephopealive-ul
Автор

You definitely hav3 a new subscriber. You are an excellent teacher.

trustkibou
Автор

What is difference between encrypted and masked data? How are they stored at back end and how they interpreted once queried or fetched by an application? When shuld encryption be used and when masking?

santoshwalavalkar
Автор

if the data were encrypted by EFS, then install Biterdefender security, how would work to each other?

dblqbwp
Автор

After reading the title 5 times, I swore it was “Why is encryption 🔑 “

nitzkit
Автор

As far as I understand this encription, even owner encrypts something with public key. And this is impossible to unlock except that owners private key.
If I want to send you something important, I have to get your public key and enctypt with that key.
I can not encrypt with private key and decrypt with public key.
This is my understanding of encryption. I may be wrong. Of course :)

RobertHorvat
Автор

I got the bitcoin in blockchain but i don't know how to take the money, they said u need to encrypted first

MR.RIZKIS
Автор

My Nokia e63 sd card is crapted show .how I am uncrapted SD card ?

abidalam
Автор

Great video man, very informative, in fact I'm watching it a second time because I missed a little bit (in sorting out things at home) the asymmetric encryption.
Liked as all other your videos

Chemy.
Автор

unlockr does a video on locking and unlocking because of course, why wasn't this done soonr, and on his decodr channel too lol

jhuny
Автор

Bro can we decrypt our data if our pc get attacked by ransomeware

jerilbiju
Автор

My frends and my selfe. Had a wheel for each person. And the wheels had numbers 0 to 30. One set per day was used. A letter was assigned to a space. Rotating the wheel to today's number. Gave the letter/ number combo for that day. then the next set was used the next day. Drove the study hall monitor and the principal. Nuts. Tks ps that was 60 some years ago at arcadia high school OHIO

stephenwilliams
Автор

If I'm getting this right, Asymmetric Encryption lets anyone with the public key read any of the data FROM the holder of the private key? Since anyone with a public key can unlock the encryption and see what was sent.

So it sounds like all Sir Hacksalot has to do is get a public key, spoof his IP to intercept, and unencrypt anything sent from the holder of the private key.

In other words...They could see everything sent to other public keys holders, but nothing sent back.

Or am I missing something here?

discam
Автор

Ya this is scott, just don’t get a bit of it, but if you say it works all good then

nancyboris
Автор

this feels like the tutorial videos lecturers play at universities lol

aqeelabader
Автор

@kellypreston8933
1 second ago
When using the term "key" the subject is confusing. The locked home is not encrypted and the key makes it accessible, yet that is not this concept. What is the real name for the "key"? The data is not locked, it is scrambled, still readable, but not understandable. Could this video be undated to college level? How can data become totally unreadable to anyone but the creator and reader? This would revolutionize data as we know it. Thank you.

kellypreston