Why the NSA is breaking our encryption -- and why we should care | Matthew Green | TEDxMidAtlantic

preview_player
Показать описание
This talk was given at a local TEDx event, produced independently of the TED Conferences. Encryption dates back to the Founding Fathers and the Bill of Rights. Now, the United States National Security Agency is breaking and undermining core encryption technologies that power the Internet, saying it's being done for our own protection from terrorists. But are we sacrificing our freedoms for fear?

Matthew Green is an Assistant Research Professor of Computer Science at the Johns Hopkins University. His research focuses on computer security and cryptography, and particularly the way that cryptography can be used to promote individual privacy. His work includes techniques to securely access medical databases, enhance the anonymity of Bitcoin, and to analyze deployed security systems. Prior to joining the Johns Hopkins faculty he served as a Senior Technical Staff Member at AT&T Laboratories.

About TEDx, x = independently organized event In the spirit of ideas worth spreading, TEDx is a program of local, self-organized events that bring people together to share a TED-like experience. At a TEDx event, TEDTalks video and live speakers combine to spark deep discussion and connection in a small group. These local, self-organized events are branded TEDx, where x = independently organized TED event. The TED Conference provides general guidance for the TEDx program, but individual TEDx events are self-organized.* (*Subject to certain rules and regulations)
Рекомендации по теме
Комментарии
Автор

Tor network does not secure your communication, it only make you anonymous. Tor exit nodes (can be setup by anyone) can read your data if you are not accessing data via HTTPS.

cza
Автор

“You’re not paranoid. Everybody out there is out to get you.” My day-to-day life would be the cure for insomnia.

drsingingeagle
Автор

I'd like to hear more how the NSA is (supposedly) weakening encryption. Did they solve the prime factorization problem which is what powers RSA encryption?

MichaelButlerC
Автор

A makes a scrambled char set, then creates a one time pad from that set. A sends that pad (not the scrambled char set just the otp), to the recipient. The recipient (B) creates their scrambled char set and sends back their created one time pad created from that set (not B's scrambled char set) to A. Now A has B's otp and B has A's otp. They each use their otp's they got from each other to send msgs. A will be able to decrypt B's msgs (sent using A's otp) because A has the original A char set. B will be able to decrypt A's msgs because A is using B's otp and B has original B char set and can decrypt A's msgs. E in the middle will not have access to A scrambled or B scrambled, only the A otp and B otp. What do you think?

maomxesoax
Автор

It will only encourage people to develop better encryption.

jetsetjourneysofficial
Автор

Movie > Enemy of the State, Gene Hackman

jadesluv
Автор

Actually, he is studying maps. After all a crypto-system is just a map from plain text to cipher text and visa-versa.

ghffrsfygdhfjkjiysdz
Автор

5:00
Funnily enough, asymmetric encryption originated at the GCHQ.

cps
Автор

Ok I gotta more than likely a dumb ass question but I'm going to ask it anyways cuz ftw what rhymes with swipe?

superreverbfreak
Автор

Regular text and cell calls are not encrypted actually... but the connection to the cell tower can be... except that the towers can be spoofed. So much of the phone and now wireless infrastructure is terribly designed from a security perspective.
Publicly available phones never have been encrypted have they? You can encrypt modern cell phone voice and text end to end using apps though. Some of those apps can also be used to attack you (Whatsapp being one example that has happened).

ProfessorScottRyan
Автор

But the real question should be: What can we do about it?

tryptex
Автор

Any one tell me that how can i make a new Security algorithm (Symmetric or asymmetric ).Tell me about working of algorithm.Its mine Assignment And present in class.Not already Algorithms present in class sir said present your own idea so Help me Please.

nafeesarazzaq
Автор

The way he pronounces "cryptography" totally sounds like "cartography", which sounds confusing lol. Both are fascinating, esp cryptography.

iahelcathartesaura
Автор

I am curious where those documents are from that is showed.  Where they part of the Snowden files?

agentstepheng
Автор

I was seriously freaking out over how good the autogenerated cc is in this video but then "insight furred" replaced "enciphered" and I now breathe again...

EXHellfire
Автор

I think my Florida Congressman is in it. it's like Orson Welles book 1984

curtn
Автор

It's all helping to set up the framework needed to fulfill the Biblical prophesies about the end times. It's so overwhelming clear now that there is really no excuse for ignoring the one and only most important event in all of history. An event that depending on how you respond to it will affect your eternal destiny. That event, of course, is death and resurrection of Jesus Christ. What you do about Jesus is all that really matters in life (and death).

josephstarling
Автор

Where the #mind is without #fear and the head is held high;
Where knowledge is #free;
Where the world has not been broken up into fragments
By narrow domestic walls
Where words come out from the depth of #truth;
Where tireless striving stretches its arms towards perfection;
Where the clear stream of #reason has not lost its way
Into the dreary desert sand of dead habit;
Where the mind is led forward by thee
Into ever-widening #thought and action;
Into that heaven of #freedom, My Father, let my #country awake. 

#notimeforcaution   #badwolf   #redpill   #datadarwinism  
Sefra Correa Marielyn Correa Wilson Correa watch

juliannevillecorrea
Автор

The speaker never really addressed the question in the title: Why the NSA is breaking our encryption. He gave good reasons for why they shouldn't, but that's a different question.

lapointe
Автор

Funny he would advertise for Truecrypt: one year later, it was found out to be compromised.

otisobl