How Encryption Works - and How It Can Be Bypassed

preview_player
Показать описание
The debate between privacy and national security has never been more heated, with Apple and other tech firms going up against the government. So how are text messages encrypted, and what are the controversial "backdoors" that could allow access to them?

Subscribe to the WSJ channel here:

More from the Wall Street Journal:

More from the Wall Street Journal:

Рекомендации по теме
Комментарии
Автор

I absolutely hate the idea of government justifying having control of everything and everyone by saying it's trying to protect you.

mateko
Автор

Whenever I hear the term “national security, ” I know that it’s going to be followed up with stupid anti-privacy BS.

LibertyAnd
Автор

Privacy vs National security

Because criminals doesn't communicate in code or use their own programs

realdragon
Автор

Personal privacy is much more important than national security.

Karmiangod
Автор

That last statement, right on the head!

Godsserver
Автор

Finally a video on encryption that made sense.

danielleonard
Автор

Perfect, flawless, and neutral video! Highly informative! My ideal form of what mews should be. Just amazing.

ssjlee-uucv
Автор

So the key of the story is the private key? All someone has to do is either get or replace your private key...

RoyUSA
Автор

That's not how national security should work in the first place.

Alex-dnjq
Автор

I was going to comment that privacy was far more important than security, but the other commenters have already said it for me.

erltyriss
Автор

What if private key and encryption/decryption is only done on dedicated device that does not utilise major processor chipsets? Such as a scientific calculator type device?

muntee
Автор

I dont understand the shared key, after creating the shared key, is the shared key the same for each end? how does the shared key be used?

loveredmoon
Автор

I'm lost in this content. I read a book with similar content, and I was completely lost in its world. "The Art of Meaningful Relationships in the 21st Century" by Leo Flint

Bill
Автор

But where is the public and private key situated ?

pracheerdeka
Автор

4th amendment trumps national security....

Normie_dog
Автор

Wow my data is so encrypted.

Also I am thinking about that what if my hacker is a member of FBI

imranhasandot
Автор

Why is bob private key + alice public key = bob' pulic key + alice private key?

adielsigron
Автор

Build your own encryption protocols problem solved.

jameswharton
Автор

The assymetric encryption in this video was explained poorly

Digital_Rust
Автор

"National Security?" That's cute comrade... Have you seen the southern border lately?

johnwayneasgenghiskhan