Im studying a course abt cryptography at my uni... I just finished my class and then came across this video.. Totally refreshed my memory .. What i have studied in three class u explained in 20 minutes .. Good work gary
Gary, your videos are always informative and interesting. This is so much better than rumors about phones and app reviews. Your hard work is very much appreciated.
Well, you have my permission to do part 2 :) I don't think anyone around internet can explain more simple and understandable for end product consumer as you do.
Prof. Sims: Remarkable as always. A second video would be great. How do, assuming that they do, MD5 and SHA fit into encryption? Is our use to ensure uncorrupted file transfers a spinoff of their use in encryption?
The background track is at such a level that I thought it was coming from a different video. Probably better off without it - good content and delivery though!
Thank you for the video sir :) My friend's computer was affected with a ransom-ware and had to format his PC. I think that is the only negative use of encryption...
Try this one: ruclips.net/video/mAJeK283j0I/видео.html plus also check out the Android Development section on the Android Authority site, we have lots of app development tutorials.
I needed to change my encryption code. I seemed to activated my sims lock with a new code. Did I re-encrypt my phone? Against the person(hacker) who has my original encrytion code? Am I safe now? Which is more powerful sims lock or the encryption code feature on android?
This is the kind of stuff which is what makes Android Authority a top channel. Brilliant work, Gary!
Full 20 min on encryption!
Gary doesn't mess around!
Thanks
Gary is the boss.
No he isn't. He is quite famous on RUclips.
Im studying a course abt cryptography at my uni... I just finished my class and then came across this video.. Totally refreshed my memory .. What i have studied in three class u explained in 20 minutes .. Good work gary
My whole semester at college was mentioned in only 20 min 😅. Go for part 2
Wow, guys. Are both of you American?
On a tombstone what could this mean CLL7VEVIL7LMEr
Go F**K YOUR SELF.................
Even less if you play at it at 1.25 or 1.5 x speed
LOL SOOOOOOO TRUEEEEE HA HA DUDE YOU DA BEST !!!!! THANKS FOR YOUR TIME DOING THIS VIDEO REALLY APPREIATE IT
Gary, your videos are always informative and interesting. This is so much better than rumors about phones and app reviews. Your hard work is very much appreciated.
Do as many parts of this as necessary! I love this series!
this guy literally does not mess around. good stuff
Please do a part 2. You explain very well. Thank you for your lessons.
Waaaw was that 20 minutes that just passed by?! Time realy flies when you enjoy it!
Your videos on encryption and key exchanges are phenomenal
I'm very interested in a part 2 of this video. As encryption has always been a very interesting topic for computing students.
As someone who works with PKI I'd like to hear your explanation. You're great as always Gary!
I'm just starting to learn cryptography and this video is just what I needed. Part two please.
So accurate and well explained in simple terms! Thank you for the excellent work:-)
Gary dude you're better then many professors of my college !!
Well, you have my permission to do part 2 :)
I don't think anyone around internet can explain more simple and understandable for end product consumer as you do.
Lol only a 20mins video but i still learned more than system security lectures in my college.
This is my favorite video among all the videos you guys uploaded. Please make a part 2.
Part 2 would be nice Gary
gary , wow man . need part 2 surely
Yes part 2! Always more "Gary Explains"! Love this series!
woooooooooo! Another Gary explains video!! Filling the heart and head with joy and information. More please Gary :)
A second video would be much appreciated, this was great.
Prof. Sims: Remarkable as always. A second video would be great. How do, assuming that they do, MD5 and SHA fit into encryption? Is our use to ensure uncorrupted file transfers a spinoff of their use in encryption?
They are hashes
Plz make a 2nd part...and much longer in duration. A documentary would have been the best.
i was nt able to understand this video fully bt still itz awesome
waiting for part 2
This was fascinating! It was a history lesson as well as a lesson on encryption. Thank you. More, please.
Utterly Brilliant. Part Two Please.
Make that second part man... Loved it
Always appreciate your videos Gary, please make a second part to this. Cheers mate
2nd video pls very interesting
need that pgp and nsa leaks on NIST standard
That would be awesome
Interesting... wanna know more thx for this!!🙂
I love your videos Gary. Exquisitely presented.
2nd video would be nice as I am taking a COMPTIA Security+ class at a local California community college and this was covered.
2nd video please. It's very interesting. Good job.
PLEASE DO PART2 (or even part 10 if possible!!)
2nd video would be really nice Gary! Thanks for this one, really interesting and it brings some valuable information about my job actually.
Very informative. Definitely down for a round 2.
thanks for yet another informative video.....please keep the GREAT work up!!!
Very Helpful and really good explained - Part 2 please!
Very interesting and well presented. Would love to see a follow up
I would to see a part 2. Thanks.
Excellent video Gary. +1 for sequel
please do a second video i loved this one.
very informative thank you!
I loved this video Gary...really looking forward to your next video
Beautiful video Gary, thx!
Would love to see a part 2. And love your videos, my favorite to watch
Great job Gary. Second video on Public Key Encryption please.
Knew the most of this from my university, but still very interresting video. Would very much like a part 2! :)
yes, a further video on this would be interesting.
A second part would be great!
definitely part 2. PLEASE.
Informative video, we need more of such content. Part 2 please
You are brilliant at explanations.
For some reason. I learned something new today XD
Please make part 2, this is very interesting topic.
Great thanks to Mr Gary for this useful information.
Keep up the awesome work Gary!
Awesome video! Thank You!
A second video would be amazing. This one was.
superb video! great work Gary
Yes, part 2 please :)
Yes part 2 will be interesting to see and do include about 256 bit encryption and latest tech in this space.
Thanks Gary another great video ....
+1 for 2nd video
really great information....please make the 2nd part...
Thanks Gary the video was great! I am looking forward for the second part of this.
Can you elaborate more on AES standard ? Definitely yes for a 2nd video
Thanks for the video. Part 2 please :)
Let's get that video on public keys. Also talk about privacy issues like Tor browsing and deleting messages on Android. this is awesome stuff
Definitely need a part 2
Gary the most intelligent guy ever
Thanks for the great video :). A second video will be great.
*GARY!!!*
*Morning Professor!!!*
Only reason im subscribed to this channel.
Yes please on the second video!
i would love to see a part 2!!! i am a future network engineer so encryption is fascinating to me.
Very interesting video. Thanx Gary!!
thanks Garry nice video as always and a go for it on part 2
If anyone is interested in enigma I recommend they watch "the imitation game" film. It is very intresting..
The background track is at such a level that I thought it was coming from a different video. Probably better off without it - good content and delivery though!
I could do well with a copy of your brain. Great information. Thank you so much for those enlightenment.
Thanks and I`m looking forward for the part 2
I'd love to see part 2! And wath inscription use ios?
thanks Gary for this video. Please do make a follow up video.
I love these videos so much
A big yes to part 2
awesoooome short explanation sir !! 😘😘
going to part 2
please do the part 2 of this video
2nd video please, 4096bits + longest prime number as a key :)
good explanation, please do 2nd video also
Thank you for the video sir :)
My friend's computer was affected with a ransom-ware and had to format his PC. I think that is the only negative use of encryption...
yes, please do a second part. thanks
would really like a second video and can you tell us how to make apps?
Try this one: ruclips.net/video/mAJeK283j0I/видео.html plus also check out the Android Development section on the Android Authority site, we have lots of app development tutorials.
very well explained like a story
Yea we need part 2 :)
Thanks Gary, interesting stuff.
Part 2 please!!!
Let's have the part 2 Gary
I needed to change my encryption code. I seemed to activated my sims lock with a new code. Did I re-encrypt my phone? Against the person(hacker) who has my original encrytion code? Am I safe now? Which is more powerful sims lock or the encryption code feature on android?
Yes, actually public key cryptography is used in modern day payment systems and https also uses it. Therefore, I give my vote for a part 2.
do a part 2!