What is Encryption? (& How it Works to Protect Your Data)

Поделиться
HTML-код
  • Опубликовано: 18 ноя 2024

Комментарии • 41

  • @trustkibou
    @trustkibou Год назад +2

    You definitely hav3 a new subscriber. You are an excellent teacher.

  • @ayodhyayodha9445
    @ayodhyayodha9445 4 года назад +3

    Great information.....Bit Defender has always been my favorite...

  • @fajvac6436
    @fajvac6436 7 месяцев назад

    Thank you for your effort to share with us your knowledge. ❤

  • @RobertHorvat
    @RobertHorvat 4 года назад +2

    As far as I understand this encription, even owner encrypts something with public key. And this is impossible to unlock except that owners private key.
    If I want to send you something important, I have to get your public key and enctypt with that key.
    I can not encrypt with private key and decrypt with public key.
    This is my understanding of encryption. I may be wrong. Of course :)

  • @santoshwalavalkar2390
    @santoshwalavalkar2390 2 года назад

    What is difference between encrypted and masked data? How are they stored at back end and how they interpreted once queried or fetched by an application? When shuld encryption be used and when masking?

  • @anumolcherian7692
    @anumolcherian7692 4 года назад +4

    Nice explanation..
    Would you please explain, can we use LSB algorithm for encryption and decryption...?

  • @sapphire6442
    @sapphire6442 Год назад

    Such useful information. Thank you!

  • @jvtechtea
    @jvtechtea 4 года назад +1

    I tried to use my physical key to lock my phone. Didn't end well.
    Lol great video, brother. I use a manager too, but 2FA has also been a good layer. I'm adding it more and more to my accounts.

    • @TheUnlockr
      @TheUnlockr  4 года назад

      Ha. Hey bud, and yeah 2FA ALL THE THINGS. I turn it on on every service that offers it 👌

  • @Keephopealive-u6l
    @Keephopealive-u6l 3 месяца назад

    I am undergoing CompTIA and believe I may need ya expertise

  • @user-db5lq5bw3p
    @user-db5lq5bw3p 4 года назад

    if the data were encrypted by EFS, then install Biterdefender security, how would work to each other?

  • @vhol93
    @vhol93 4 года назад +3

    Great explanation!!

  • @stephenwilliams5201
    @stephenwilliams5201 4 года назад

    My frends and my selfe. Had a wheel for each person. And the wheels had numbers 0 to 30. One set per day was used. A letter was assigned to a space. Rotating the wheel to today's number. Gave the letter/ number combo for that day. then the next set was used the next day. Drove the study hall monitor and the principal. Nuts. Tks ps that was 60 some years ago at arcadia high school OHIO

  • @nitzkit
    @nitzkit 4 года назад +1

    After reading the title 5 times, I swore it was “Why is encryption 🔑 “

  • @theswordandtrowel
    @theswordandtrowel 3 года назад

    Thank you

  • @jhuny
    @jhuny 4 года назад

    unlockr does a video on locking and unlocking because of course, why wasn't this done soonr, and on his decodr channel too lol

  • @soroushsafarzadeh8321
    @soroushsafarzadeh8321 4 года назад +1

    I like you man. Stay safe 👍

  • @discam0
    @discam0 3 года назад

    If I'm getting this right, Asymmetric Encryption lets anyone with the public key read any of the data FROM the holder of the private key? Since anyone with a public key can unlock the encryption and see what was sent.
    So it sounds like all Sir Hacksalot has to do is get a public key, spoof his IP to intercept, and unencrypt anything sent from the holder of the private key.
    In other words...They could see everything sent to other public keys holders, but nothing sent back.
    Or am I missing something here?

    • @tomtravis858
      @tomtravis858 3 года назад

      Spoofing IPs isn't really a thing for web browsing.
      The public key encrypts things encrypted with the private key (which is rare, only used for signing, not actually encryption).
      So if I were to use your public key to encrypt my data, then send it to you, but it's intercepted:
      The hacker would have the encrypted data, but not your private key, so they wouldn't be able to decrypt.

  • @MR.RIZKIS97
    @MR.RIZKIS97 3 года назад

    I got the bitcoin in blockchain but i don't know how to take the money , they said u need to encrypted first

  • @monikasavner6641
    @monikasavner6641 4 года назад

    Good thanks

  • @Chemy.
    @Chemy. 4 года назад +1

    Great video man, very informative, in fact I'm watching it a second time because I missed a little bit (in sorting out things at home) the asymmetric encryption.
    Liked as all other your videos

    • @TheUnlockr
      @TheUnlockr  4 года назад

      Thank you so much Chemy 🙏

    • @DDeLoen
      @DDeLoen 4 года назад

      TheUnlockr m

    • @DDeLoen
      @DDeLoen 4 года назад

      TheUnlockr pmo

    • @DDeLoen
      @DDeLoen 4 года назад

      TheUnlockr m

  • @drueleopard7737
    @drueleopard7737 4 года назад +1

    Okay 1 more time...🔒🔓🔐🔑🗝

  • @nancyboris9085
    @nancyboris9085 4 года назад

    Ya this is scott , just don’t get a bit of it , but if you say it works all good then

  • @jerilbiju8200
    @jerilbiju8200 4 года назад

    Bro can we decrypt our data if our pc get attacked by ransomeware

  • @lyricsradio2149
    @lyricsradio2149 2 года назад +1

    New subscriber 👍🤝💪

  • @abidalam7390
    @abidalam7390 4 года назад

    My Nokia e63 sd card is crapted show .how I am uncrapted SD card ? ......

  • @abdalarashid5408
    @abdalarashid5408 4 года назад

    Nice keep going

  • @aqeelabader7951
    @aqeelabader7951 4 года назад

    this feels like the tutorial videos lecturers play at universities lol

  • @mahmoodshuvo2787
    @mahmoodshuvo2787 4 года назад +1

    ✌🏻☝🏻

  • @DDeLoen
    @DDeLoen 4 года назад

    Ml

  • @mohammedshamil65677
    @mohammedshamil65677 4 года назад

    1st

  • @kellypreston8933
    @kellypreston8933 Год назад

    @kellypreston8933
    1 second ago
    When using the term "key" the subject is confusing. The locked home is not encrypted and the key makes it accessible, yet that is not this concept. What is the real name for the "key"? The data is not locked, it is scrambled, still readable, but not understandable. Could this video be undated to college level? How can data become totally unreadable to anyone but the creator and reader? This would revolutionize data as we know it. Thank you.