How Encryption Keeps Your Data Safe

Поделиться
HTML-код
  • Опубликовано: 10 сен 2024

Комментарии • 223

  • @blueblazeing94
    @blueblazeing94 5 лет назад +68

    Nice shirt, see someone is a fan of
    Engineering Explained.

    • @J4rj4r81nx
      @J4rj4r81nx 5 лет назад +1

      I'll have to check those guys out.
      But Hank was also wearing a Kurzgesagt shirt recently. Maybe they're just doing some subtle shoutouts to related channels?

  • @baltakatei
    @baltakatei 5 лет назад +6

    A minigame I like to play is to guess when the commercial starts. Sometimes they get sneaky and insert it in the middle. Sometimes at the start. Usually at the end.

  • @just-a-silly-goofy-guy
    @just-a-silly-goofy-guy 5 лет назад +229

    Of course it’s sponsored by a security company lol

    • @PikaQPika
      @PikaQPika 5 лет назад +9

      Is a data security video meant to be sponsored by Walmart? Am i missing some sort of logic here? Lol

    • @BartJBols
      @BartJBols 5 лет назад +2

      @@PikaQPika It means the video is biassed.

    • @blakestone75
      @blakestone75 5 лет назад +14

      Lol biased. Hardly. All he did was explain a little bit about the history of cryptography. Nord VPN probably just sees value in educating the masses on this subject. It’s not like video went out of its way to say “and Nord VPN does crypto better than anyone else”... that would be bias.

    • @Grosvenor77
      @Grosvenor77 5 лет назад

      @@BartJBols There was no bias at all in this video. how do you figure?

    • @BartJBols
      @BartJBols 5 лет назад

      @@Grosvenor77 how could we ever know lol.

  • @poppasmurf4115
    @poppasmurf4115 5 лет назад +41

    i still believe that pig latin is the most secure cipher ever devised.

    • @jarencascino7604
      @jarencascino7604 5 лет назад +1

      Why didn’t u write this in pig latin

    • @poppasmurf4115
      @poppasmurf4115 5 лет назад +9

      @@jarencascino7604 i was afraid that younger viewers might not know what pig latin was (i'm 62). utbay uryay ightray, i ouldshay avehay.

    • @jarencascino7604
      @jarencascino7604 5 лет назад

      Makes sense but I’ll tell you this Im 17 and I know what pig Latin is. It is still a language in elementary school!
      I remember we used to argue whether it’s the first letter or the first sound. Like “the” would be hetay or ethay.

  • @keriezy
    @keriezy 5 лет назад +1

    I created a cypher in high school... I have it somewhere. I have to say it was good. It included many symbols for the same letter, but not the same amount of symbols for each letter. "E" for example had six options and "Z" had two options. Some symbols were letters, others were pictograms, and a few were just basic circles filled in in different ways.

  • @Babarudra
    @Babarudra 5 лет назад +10

    This was very interesting, but my eyes started to glaze over.

  • @klumaverik
    @klumaverik 5 лет назад +3

    Lol stefan eats the edamame. Why did that make me heehee?

  • @e4r281
    @e4r281 5 лет назад +25

    Wait, where are Alice and Bob ?

    • @Neumah
      @Neumah 5 лет назад

      Asking the real questions. Did Mallory get them?

    • @moosemaimer
      @moosemaimer 5 лет назад +3

      @@Neumah Eve did

    • @ViralonEarth
      @ViralonEarth 5 лет назад

      Top 10 ringtone of 2018
      Link:- ruclips.net/video/WJCB84IBuYE/видео.html
      Watch it & please do Subscribe & share if you like it.
      Have a Great Day :-)

    • @alexandren.9346
      @alexandren.9346 5 лет назад

      You mean Dolfh and Ere, right? ;D

  • @Zeldaschampion
    @Zeldaschampion 5 лет назад +9

    0:30 Lol. I actually just finished that quest in AC odyssey a couple of hours ago.

    • @necrisro
      @necrisro 5 лет назад +3

      Same, and wondered what the heck was special about a stick, but didn't google it. Thanks SciShow !

  • @KwynM
    @KwynM 5 лет назад +5

    Can't wait for the public and private key episode!

  • @Farreach
    @Farreach 5 лет назад +3

    i love these computer science related video's ... currently going over hashing in my data structure class

    • @gregoryfenn1462
      @gregoryfenn1462 5 лет назад

      hashing in data structures often means something very different to hashing in cryptography, The former is used in Java and other languages to create a quick dictionary-mapping from keys to values, and these hash tables are built to be user-friendly and programmer-friendly. Often a computer could take a pretty good guess as a key associated with some value. Cryptographic hash functions. on the other hand, are designed to be secure: so that the output of the hash (the 'value') is so different from the input ('key') that no known computer (or computer predicted to exist for at least a decade or two) could feasibly make an above 0.01%-likely guess as to the input associated with a given output, even if allowed to keep testing guesses and computing maths behind the scenes for a thousand years.

  • @monkeyplayer1
    @monkeyplayer1 5 лет назад +14

    Engineering Explained!

  • @JeremyWS
    @JeremyWS 5 лет назад +4

    Decode this: [key, sentence is translated to French and then written backwards]
    laineg ertê'd zeibou'N unetnoc not emai'J. lainég tse lanac eC

    • @undead890
      @undead890 5 лет назад +2

      This is what I got:
      This channel is great. I love your content Do not be awesome

    • @JeremyWS
      @JeremyWS 5 лет назад +2

      It's suppose to be:
      This channel is great. I love your content. Don't forget to be awesome.

    • @undead890
      @undead890 5 лет назад +1

      @@JeremyWSThat makes more sense :)

  • @RangerRuby
    @RangerRuby 5 лет назад +3

    I love SciShow videos that explain big words I don't know!

    • @metanumia
      @metanumia 5 лет назад

      The beauty of learning! And now you know what they mean! Glad you're enthusiastic about acquiring new knowledge! Every human on Earth should be! :)

  • @alexandren.9346
    @alexandren.9346 5 лет назад

    The best encryption method is still some kind of prime factorisation, since the primes involved are impossible to guess without the key.
    And: You don't even need to share the key! There are also ways to use a public encryption that is impossible to decrypt unless you have your own public key (prime numbers involved;)
    So the Cesar Cipher was just the beginning....

  • @Furiends
    @Furiends 5 лет назад

    NIST which is pronounced as one word also created Data Encryption Standard as effectively an early open standard where the public gave input on how the system worked. This is significant for two reasons. One is it was the government that was responsible for the modern concept of open standards and also because public research was responsible for the development of data encryption, the Internet and computers.

  • @Master_Therion
    @Master_Therion 5 лет назад +19

    It's Halloween, so I have the movie Ghostbusters on my mind:
    "I am the Encryption Key Master." "I am the Security Gate Keeper."

    • @rake4290
      @rake4290 5 лет назад +5

      I see your point, but you should never cross streams.
      Feel free to retort and take me down a peg. I don't want my ego to stay puffed.

    • @metanumia
      @metanumia 5 лет назад +1

      @Master Therion Happy Halloween! I've missed your witty comments, so have Alice and Bob, but my friends Whitfield and Martin have yet to discover the keys to your humor! I will have to show them, but they only communicate with me after I cook them a nice breakfast of salted hash and coffee. ;)

  • @meowzerus
    @meowzerus 5 лет назад

    Fun facts:
    Encryption algorithms are treated as munitions, and you can't export software with them outside the US.
    If you want to exchange keys with someone, you should check out how Diffie-Hellman key exchange happens! There are plenty of explanations that don't involve any math.

  • @jerry3790
    @jerry3790 5 лет назад

    That new Tux is scary as hell. Would’ve made a good Halloween costume.

  • @yurymol
    @yurymol 5 лет назад +1

    It’d be great if you told how does SSL work. It’s really exciting what prime numbers can do.

  • @wikilcontainments
    @wikilcontainments 5 лет назад

    One time pads were used in WW2. And still are considered one of the best encryption methods. Unbreakable for short messages with no key.

  • @medokn99
    @medokn99 5 лет назад +11

    Engineering Explained! (the shirt)

  • @roguedogx
    @roguedogx 5 лет назад +4

    Nice shirt.

  • @64standardtrickyness
    @64standardtrickyness 5 лет назад +1

    Basically the key is it is possible to create easy/ fast encryption methods such that the decryption method is hard/slow to find (see diffie helman Euler totient theorem)

  • @JosephDavies
    @JosephDavies 5 лет назад

    Great topic. You should try to do one building on this video, explaining why backdoors to encryption are being sought by law enforcement, and how it's not possible to do while still having reliable and secure encryption. People are woefully under-informed on this subject, and it's increasingly becoming a crucial issue (at least here in the USA) that voters need to be aware of.

  • @arturbaleja3907
    @arturbaleja3907 5 лет назад

    Alan touring did not crack the enigma. Enigma was in fact decyphered in Poland before the war.
    They even build a decoding computer based on 3 examples of the civilian version of enigma (there was such thing. Germans just adopted and modified a device designed for bank security). Then after September of 1939, the team that did it, moved with the hardware to France and later England, where English simply decided thet, with the code cracked, they don't need them anymore.
    What Touring team was doing was mass scale decoding. They run the procedures discovered in Poland on thousends of radio messages every day and transfering the data to the inteligence. This team was cranking numbers, not cracking the code.

  • @ewoodley82
    @ewoodley82 5 лет назад

    For those who are curious about those key exchanges, look into PKI, or Public Key Infrastructure

  • @Hawkenshmire
    @Hawkenshmire 5 лет назад +3

    That shirt looks cool

  • @FusionDeveloper
    @FusionDeveloper 5 лет назад

    I absolutely LOVE videos about Encryption. I hope to make my own online chat (some day) that uses a unique form of encryption that I come up with. Alternating Transposition and Substitution sounds just like what I would use. All the bit flipping stuff is out of my league.

  • @calamusgladiofortior2814
    @calamusgladiofortior2814 5 лет назад

    To crack the Spartan's code, just look for the frequently-occuring, 12-letter phrase....
    ..."This is SPARTA!"

  • @jangambler9998
    @jangambler9998 5 лет назад

    I'm guessing the other stuff is about Quantum Cryptography? I am seriously amazed by how useful inherent randomness is.

  • @esecallum
    @esecallum 5 лет назад +1

    frequency analysis is easily defeted by using multiple numbers to substitute for the same letter.

  • @vistastructions
    @vistastructions 5 лет назад

    Engineering Explained shirt!!! Jason you're famous!!!

  • @inademv
    @inademv 5 лет назад +3

    i feel like this whole video was a long commercial for NordVPN...

  • @mauriciofuentes7638
    @mauriciofuentes7638 5 лет назад +2

    Where is Muscle Hank?

  • @tuseroni6085
    @tuseroni6085 5 лет назад

    the matter of sharing the key is part of why DRM will never work. the key to decrypt the content is given to the user, it has to be or they can't view the content, the whole thing is based on trying to keep this fact hidden from the user. the key is hidden somewhere so the program running it can use the key but that the user won't be able to just use the key themselves. it never works for very long (many companies feel so long as it can be hidden for a little while it's worth it, but still say they need copyright protection for up to 170 years or what's the point in making anything.)

  • @jaredpotter1
    @jaredpotter1 5 лет назад

    This is a great video. I'm looking forward to the next one on secure key distribution!

  • @eruyommo
    @eruyommo 5 лет назад

    9:10 Magical hair cut

  • @scottc.4234
    @scottc.4234 5 лет назад

    I like the engineering explained shirt.

  • @rogerhinman5427
    @rogerhinman5427 5 лет назад

    Love the Engineering Explained shirt.

  • @gamereditor59ner22
    @gamereditor59ner22 5 лет назад +3

    I may use this method if there's a software to create a encryption code.

    • @bgroks1
      @bgroks1 5 лет назад +3

      information to learn Don’t recommend implementing your own custom code if you’re programming. Look into veracrypt.

  • @Merennulli
    @Merennulli Год назад

    Would be interesting to see how a WWII cryptographer would approach modern encrypted data. We are currently at a point where 20 characters decrypted by brute force with the best supercomputer will take longer than the Earth has left to live so they wouldn't be able to touch it computationally, but they might try some interesting approaches.
    I still struggle to understand how they prevent public key interception. A security expert tried to explain it to me once but eventually gave up.

  • @strangederekredux
    @strangederekredux 5 лет назад +7

    Really surprised there was no mention of RSA.

    • @Markovisch
      @Markovisch 5 лет назад +4

      How come? This was all about Symmetric Key Cryptography, while RSA falls under Public Key Cryptography.

    • @ChenfengBao
      @ChenfengBao 5 лет назад +2

      He said they'll make another video on how to securely exchanging secrets, where RSA is primarily used.

  • @thesteadfastduelist6258
    @thesteadfastduelist6258 5 лет назад +6

    *What about Bill Cipher?*

    • @metanumia
      @metanumia 5 лет назад

      LOL at this great reference! I was so impressed by the complexity of that subplot! :)

  • @saumyashah7978
    @saumyashah7978 5 лет назад +1

    Then how does the NSA spy on us? Isn't that a violation of our privacy?

  • @scheimong
    @scheimong 5 лет назад +4

    I'm interested in seeing how SciShow will manage to explain modular arithmetics and finding multiplicative inverses in a 10 minute video...

  • @cryptosporidium1375
    @cryptosporidium1375 5 лет назад +1

    Make a crash course IT series please.

    • @malasoat1
      @malasoat1 5 лет назад +1

      Cryptosporidium 137 there's crash course computer science which goes pretty in depth

  • @grrttr
    @grrttr 5 лет назад

    why is muscleHank never shown=?

  • @someoneelse8494
    @someoneelse8494 5 лет назад

    Good episode, but I´ve missed the asymmetric encryption based on prime numbers!

  • @asphaltpilgrim
    @asphaltpilgrim 5 лет назад

    You guys are really reaching for a halloeen special this year ;)

  • @allertonoff4
    @allertonoff4 5 лет назад

    i might have to Re:listen to this MUSIC a couple of times.

  • @Unplanted
    @Unplanted 5 лет назад

    Hey cool, I already use NordVPN. Makes me feel better about it :)

  • @aidanwansbrough7495
    @aidanwansbrough7495 5 лет назад

    Really interesting!

  • @Vladimir-et2kq
    @Vladimir-et2kq 5 лет назад

    can you do fresh cut grass smell?? or why when cut the grass and keep it I'm a bag it smells so foul after a day or two

    • @Vladimir-et2kq
      @Vladimir-et2kq 5 лет назад

      @cypress cat
      plants curl up when touched? I honestly didnt know that. amd thanks :)

  • @thstroyur
    @thstroyur 5 лет назад +1

    9:10 Isn't it cool just how jumpcuts can now also make haircuts? I mean, why waste your money with barbers when you can use your editing skillz for zildo?

  • @hunteur
    @hunteur 4 года назад

    stefan is adorable!

  • @LordZozzy
    @LordZozzy 5 лет назад

    7:38 I'd just like to interject for a moment. What you're referring to as Linux, is in fact, GNU/Linux, or as I've recently taken to calling it, GNU plus Linux. Linux is not an operating system unto itself, but rather another free component of a fully functioning GNU system made useful by the GNU corelibs, shell utilities and vital system components comprising a full OS as defined by POSIX. Many computer users run a modified version of the GNU system every day, without realizing it. Through a peculiar turn of events, the version of GNU which is widely used today is often called “Linux,” and many of its users are not aware that it is basically the GNU system, developed by the GNU Project. There really is a Linux, and these people are using it, but it is just a part of the system they use.
    Linux is the kernel: the program in the system that allocates the machine's resources to the other programs that you run. The kernel is an essential part of an operating system, but useless by itself; it can only function in the context of a complete operating system. Linux is normally used in combination with the GNU operating system: the whole system is basically GNU with Linux added, or GNU/Linux. All the so-called “Linux” distributions are really distributions of GNU/Linux.

    • @LordZozzy
      @LordZozzy 5 лет назад

      That feeling when the sole reaction to a correction under a SCIENTIFIC video is "get a life"...
      F-ing priceless.

    • @LordZozzy
      @LordZozzy 5 лет назад

      Wow, mimicking - what's next, name-calling?
      >Not important
      Are you this meticulous in your work, too?
      Also, correcting something = having no life.
      What an interesting notion. Tell me more.

    • @LordZozzy
      @LordZozzy 5 лет назад

      You might want to learn english before you insult somebody, kid. :)

  • @meghanparris8203
    @meghanparris8203 5 лет назад +2

    That haircut at the end.... lol

  • @famistu
    @famistu 5 лет назад +1

    Not a big misinformation. But Enigma wasn't crack by Gentelman on photo slide... 😂
    Thank You for information.
    That wasn't sarcastic. ☺️

    • @bgroks1
      @bgroks1 5 лет назад +1

      Dawid Kryspin Ehhh. I mean they weren’t the first to crack the device called “Enigma”, but after the Enigma was made more secure by adding wheels or the plug box, they had to crack it on their own.

    • @windhelmguard5295
      @windhelmguard5295 5 лет назад +1

      the enigma was never actually cracked, the allies only managed to decrypt the enigma by geting their hands on a working machine, from that point on they just examined the enigma, learned that a letter would never become itself, they then designed a machine that could, within 20 minutes, brute force all possible plug and rotor settings, this would, given that you managed to guess a certain word or phrase in a massage such as the words "Führer" or "Wetterbericht" give you the correct plug and rotor settings, from which point on all they had to do was to set their enigma to the correct settings and then just decrypt messeges until they where changed at midnight.
      however the reason why i'm saying that the enigma was never truelly cracked is that they couldn't crack signals sent by the kriegsmarine, because those sent the settings for the plugs and rotors at the start of every messege using a different code and since that code did not contain any repeating patterns such as words that the germans would often use, this method didn't work.
      either way if you know how the enigma works you know that it can not be "cracked" you always need your own working machine as well as a good hunch on the information your enemy is trying to send, as a matter of fact the british actually improoved on the design to make it impossible to decrypt by allowing for letters to become themselfs.

  • @shis10
    @shis10 5 лет назад +1

    AES ?

  • @pikminlord343
    @pikminlord343 3 года назад

    This was an interesting video

  • @kinomora-gaming
    @kinomora-gaming 5 лет назад

    I think we can all thank the ancient Greeks for allow us to safely order our favorite snacks online. [cc]

  • @chaosopher23
    @chaosopher23 5 лет назад

    But you didn't mention SHA...

  • @telotawa
    @telotawa 5 лет назад

    1:22 keeps prying eyes out of your whatsapp messages... except from whatsapp itself when they wanna harvest data

  • @Tholomaios
    @Tholomaios 5 лет назад

    *ehem*
    It was not the English to crack Enigma:
    'On 26 and 27 July 1939,[4] in Pyry near Warsaw, the Poles initiated French and British military intelligence representatives into their Enigma-decryption techniques and equipment, including Zygalski sheets and the cryptologic bomb, and promised each delegation a Polish-reconstructed Enigma. The demonstration represented a vital basis for the later British continuation and effort.' Gordon Welchman, The Hut Six Story, 1982, p. 289.

  • @valtur25
    @valtur25 5 лет назад

    Turing and his collegues didn't crack the Enigma. Check your information before such bold statements!
    German military texts enciphered on the Enigma machine were first broken by the Polish Cipher Bureau, beginning in December 1932. This success was a result of efforts by three Polish cryptologists, Marian Rejewski, Jerzy Różycki and Henryk Zygalski, working for Polish military intelligence.

  • @heliosprime6426
    @heliosprime6426 5 лет назад +2

    I can't see how entrustng my data to the Egyptians would keep it safer!!

    • @moosemaimer
      @moosemaimer 5 лет назад +1

      That's easy:
      🐍🐢🐈🌿🌘🐞🐂🏺👁⚖️

  • @k0vert
    @k0vert 5 лет назад

    Scytale dytale damn good stuff

  • @mikopiko
    @mikopiko 5 лет назад

    10:03 minutes exactly, keep that in mind folks!

  • @FlyLikeADragon
    @FlyLikeADragon 5 лет назад

    the cipher..... Bill Cipher!

  • @MikeTrieu
    @MikeTrieu 5 лет назад

    Scytale: Taste the Rainbow Table

  • @danukil7703
    @danukil7703 5 лет назад

    0:21 Heh, what Spartan navy? XD
    Just a joke

  • @pdaphuulz8219
    @pdaphuulz8219 5 лет назад

    Thanks, Cryptographers.

  • @bikespj22
    @bikespj22 5 лет назад

    What cypher is this?

  • @Singular121
    @Singular121 5 лет назад

    I would never be good in coding after watching this.

  • @SaucerJess
    @SaucerJess 5 лет назад

    💙

  • @eChuckNorris
    @eChuckNorris 5 лет назад

    Explain block-chain and RSA :)

  • @MichaelBattaglia
    @MichaelBattaglia 5 лет назад

    What will happen to modern cryptography once quantum computers become common place?

  • @robramsey5120
    @robramsey5120 5 лет назад +2

    9 minute segway for the sponsor, everyone seems to be doing this lately.

    • @smurfyday
      @smurfyday 5 лет назад +1

      Rob Ramsey segue, genius.

    • @robramsey5120
      @robramsey5120 5 лет назад +3

      @@smurfyday Thank you so much for the correction, every little bit of kindness helps, I'm clearly no genius though, I'm often making silly little mistakes these days especially with my mental health getting worse and worse by the day, it really does make clear thought difficult.

  • @patriciaa4451
    @patriciaa4451 5 лет назад

    4:53 I got completely lost

  • @EHLOVader
    @EHLOVader 5 лет назад +21

    Nooooo! Never encrypt passwords. Any bank that does is doing passwords wrong. If they limit the length of your password it's a good indicator that it's encrypted instead of hashed, or perhaps worse stored in plain text

    • @whoofianbrony8804
      @whoofianbrony8804 5 лет назад +4

      Very very bad. Follow proper zero-forward trust security controls!

    • @BattousaiHBr
      @BattousaiHBr 5 лет назад +8

      password length limit is not necessarily correlated with encryption/hashing at all.
      a lot of websites will limit password length even if it's hashed, simply because bigger passwords require more computational power to hash.

    • @whoofianbrony8804
      @whoofianbrony8804 5 лет назад +1

      @@BattousaiHBr in general that is not that much of a problem with current computing power. SHA-512 with a random salt is not very computationally expensive to do once. Multiple times? Oh hell yes. That's why it's one-way. :)

    • @EHLOVader
      @EHLOVader 5 лет назад +3

      @@BattousaiHBr do you imagine a 13 character password is much harder to effectively hash than a 50 char? Hashes are designed to be quick, one way, and unique. I've had banks limit length to 7 or 13 or in that vicinity. It suggests that they are storing it in fixed length storage like a string in a database. Whether it is encrypted or not. Hashes take the same amount of space. Be they 7 or 500.

    • @EHLOVader
      @EHLOVader 5 лет назад

      @Kernels exactly, so why did he say the banks secure passwords with encryption?

  • @NotAJosh
    @NotAJosh 5 лет назад

    Hmm the vid is still private

  • @manvendrasingh4409
    @manvendrasingh4409 5 лет назад

    It is really difficult to understand.

  • @THETRIVIALTHINGS
    @THETRIVIALTHINGS 5 лет назад

    The best kind of secret is the one you don't know.

  • @ruileite4579
    @ruileite4579 5 лет назад +1

    With quantum encrypting hackers will cry

    • @glowingone1774
      @glowingone1774 5 лет назад +1

      Not really

    • @ChenfengBao
      @ChenfengBao 5 лет назад +1

      Even today hackers can't do anything against properly encrypted data. Problem is that it's hard to do encryption properly.

  • @SkiddosSiren
    @SkiddosSiren 5 лет назад

    COMPLEX Indeed

  • @mikeltxo11
    @mikeltxo11 5 лет назад

    Did you just get a haircut in the middle of the episode? xD
    Between 9:00 and 9:15

  • @ISTAYUPLATE
    @ISTAYUPLATE 5 лет назад +2

    But how do you crack Bill Cipher?

  • @HappyHusbandnWife
    @HappyHusbandnWife 5 лет назад

    Thanks to Felix who hacked the youtube code, now the standard length for a vid is 10mins

  • @hannasobieska3782
    @hannasobieska3782 5 лет назад

    The Enigma was actually first hacked by POLISH mathematicians

  • @Niinkai
    @Niinkai 5 лет назад

    WRONG! Media has taught me that anything can easily hacked if you just type real fast! The counter-hackers always lose if you wear a beanie, have at least two keyboards, speak with a Russian accent and have headphones resting on your neck. This Is The Truth!

  • @ElynevanOpzeeland
    @ElynevanOpzeeland 5 лет назад

    why didn't i hear anything about lava lamps?

  • @DonaldSleightholme
    @DonaldSleightholme 5 лет назад

    just send yourself a message that says hello world and read it while it’s encrypted... it still says hello world 😝

  • @bneisasmiler4942
    @bneisasmiler4942 5 лет назад

    Just Google translate and then do it back a ton of times :P

  • @bigguix
    @bigguix 5 лет назад

    dat engineering explained tshit tho !@

  • @Guru_1092
    @Guru_1092 5 лет назад

    Quantum Cryptograhy.
    Have fun.

  • @Silver-Arrow
    @Silver-Arrow 5 лет назад +2

    the raw Zimmerman telegram was deciphered by my 7th grade class... History is fun

  • @Bynming
    @Bynming 5 лет назад

    Nord's service might be good but their marketing is annoyingly dishonest. They had an ad on youtube that said using a VPN would improve your latency giving you a competitive edge, which it can in some fringe cases but it's unlikely. But also if you click that link, it says you have 9 hours and 38 minutes to purchase it at the advertised price, but that's BS. It doesn't expire, and if you open the same link with a new browser it'll go back to 9h38. I personally find that type of advertising to be unethical and even though their service seems decent, I don't support that type of corporate behavior.

  • @jeremiasrobinson
    @jeremiasrobinson 5 лет назад

    Send me the information!!

  • @ISoloYouRelax
    @ISoloYouRelax 5 лет назад

    Something that can't be cracked? Doesn't exist.