She's a great teacher. It's refreshing to hear someone explain technical things nice and slow. Slowing down gives people time to process the info.
@matthiasmcgee580510 күн бұрын
Hey, I don’t mean to inconvenience you, but could you help me out? In my OKX wallet, I have USDT TRX20 and the recovery phrase [ clean party soccer advance audit clean evil finish tonight involve whip action ]. How do I send it to OKX?
@paul-cl3el2 жыл бұрын
her explanation is by far the best I saw on youtube simple and easy to understand
@matthiasmcgee580510 күн бұрын
Excuse me, could you offer me some help with this? I’ve got USDT TRX20 in my OKX wallet, and my recovery phrase is (clean party soccer advance audit clean evil finish tonight involve whip action). What’s the best way to move it to OKX?
@TickleTwinkleTwink3 жыл бұрын
YOU EXPLAINED THIS SOOO WELL!!!
@girlforyoru3 жыл бұрын
I have an exam for CS External Encryption So I started Studying this! Fully Explained! Thank you for informing us!
@fabricionunes86834 жыл бұрын
I’m going to learn English with this video, I like to learn two things at the same time ❤️ thanks
@gabby993 Жыл бұрын
This is probably the first time I watched a Khan Academy at home on my free will. Other times was at school. Just because I was curious how encryption works
@matthiasmcgee580510 күн бұрын
Hey there, I hope it’s okay to ask, but could you help me out? I’ve got USDT TRX20 stored in my OKX wallet, with the phrase (clean party soccer advance audit clean evil finish tonight involve whip action). What are the steps to transfer it to OKX?
@matthiasmcgee580510 күн бұрын
Hi, I hope it’s not a bother, but could you assist me? I maintain USDT TRX20 in my OKX wallet and have the recovery phrase [ clean party soccer advance audit clean evil finish tonight involve whip action ] How do I move it to OKX?
@moonshine47573 жыл бұрын
She's so good at explaining in the most simpler way. Great job 👏
@rcubed19792 жыл бұрын
Great video, very easy to understand! I loved the mailbox demonstration!
@shermayapaul8224 Жыл бұрын
I am here revising for my IT exam and I just felt a curiousity of how encryption works. She explained this so well and made it easy for me to understand. Thank you. You are very good at your job.
@parker797 Жыл бұрын
The mailbox analogy was the best way I've seen of explaining public key encryption; it makes so much sense this way
@prekshajain69353 жыл бұрын
No one has explained it so well ..Thanks for sharing it
@scooby78773 жыл бұрын
Something to keep in mind here is that SMTP (a protocol on port 25 for mail) can be used with SSL (a protocol for how encryption is made) so that you can securely get mail even if both protocols are on different ports
@celestinetoussaint63502 жыл бұрын
Ahhh this was helpful because I was curious about that!
@hamzawaheed475 жыл бұрын
I just want to THANK YOU for clarifying my thoughts!!!
@MrSreenir2 жыл бұрын
Well explained. The Public Key can be shared after authentication before exchanging messages between computers
@kdr207929 күн бұрын
FANTASTIC VIDEO AND EXPLANTION - Thank you for making this video! Im sharing it with many people. 🔥👏
@mic90472 жыл бұрын
Amazing video. I’m glad I found this channel to learn about networking!
@antoniorodriguez51385 ай бұрын
¡¡Woooow!! Her explanation was amazing and only she is a young girl. Incredible!!.
@jean-francoisbec83582 жыл бұрын
Wow! It makes sense and it is really easy to understand with your words ! Thank you :)
@vinaybabupamu61903 жыл бұрын
One of the best video in internet to get started to understand encryption. Thanks.
@avitex24412 жыл бұрын
Best explanation ever, its too easy to understand
@artishzone7 ай бұрын
Thanks a lot for the great lesson! Your teaching style makes learning so much fun.
@DCYPT3 ай бұрын
Thank you really much for the professional explanation!
@mukundumashankar39793 жыл бұрын
dayummmmmmmm your explanation is sooooo nice thanks for clearing out my confusions in this short and amount of time .
@ryananderson88178 жыл бұрын
"This is what I'm doing with my work and I'm always about to lose my shit" :^)
@johnny149803 жыл бұрын
How did u comment this 5 years ago? It says the video was posted 2 years ago
@dkbroman3 жыл бұрын
@@johnny14980 WHOA HE'S HACKING
@NeelSandellISAWESOME4 жыл бұрын
This is really cool. It seems that with 256 bit encryption, it would take 2^256 guesses. The concept of public vs private keys is cool as well --> anyone can deposit in your mailbox but only you can access the contents.
@skyblue15992 жыл бұрын
why 2?
@NeelSandellISAWESOME2 жыл бұрын
@@skyblue1599 For every bit, we have two choices.
@nilsmustermann8454 Жыл бұрын
I was a bit confused first, because 2^256 isn’t (2^256)-1 (number in the video; 3:17), but precisely spoken you don’t have to “try” the last combination, because you already know it’s the right one after trying all others
@miteshd8110 ай бұрын
My daughter loved this❤
@tonykososki30162 жыл бұрын
maaan this video is so great!
@meow7103 жыл бұрын
Daaang.... This is the explaination I'm looking for. So, logical
@leerdoor3 жыл бұрын
Extremely well explained. Good job girl!
@abcdefghijklmn69402 жыл бұрын
Mia Gil is so cool and also explained very clearly!!
@adyanathkaibartya72222 жыл бұрын
Great Job, Mam Conference level infinity
@tharunthiruseelan42524 жыл бұрын
This video was amazing.
@ber29964 ай бұрын
Im always wondering how the public and private keys works in the basic sense, now that example makes sense
@nissimbracha18 ай бұрын
Thank you for this explanation! that was very halpful
@claverassanvo8495 Жыл бұрын
Amazing explanation... Pretty woman 👩 with Pretty ,true and simple knowledge about encryption and description of a message 😢Many poeple try to explain 🤔 😉 but they can't elaborate it well... Thanks🎉🎉🎉God bless you 🙏
@fetajonathan22472 жыл бұрын
NIce explanation. KUDOS👏
@thidevaloka60812 жыл бұрын
Great work sis super supportive
@badrii072 жыл бұрын
Good Job, thanks
@bhavyasharma86614 жыл бұрын
amazing explanation and amazing explainer !!!!! Thanks a lot
@oopsy4443 жыл бұрын
we need to get a sequel course!!
@siskahernaning2 жыл бұрын
thank you.. your video is so well explained
@ananyaimtiazhussain68163 жыл бұрын
Wow! Thank you. This helped a lot.
@labuewilfred22593 жыл бұрын
Thanks for the simple n clear explanation
@RealTacticalMax6 ай бұрын
I’m just thinking of what would happen to my potato laptop if I tried to decode one of these.
@siyn0078 жыл бұрын
you can see the long hours of coding in her eyes
@iixcloudyxii5604 жыл бұрын
siyn007 how does it say you posted this 4 years ago if this was published April 2019...
@siyn0074 жыл бұрын
@@iixcloudyxii560 don't question just admire
@Moderationinmoderation4 жыл бұрын
@@siyn007 lol
@lakshmanreddy11484 жыл бұрын
@@iixcloudyxii560 😶
@lakshmanreddy11484 жыл бұрын
How 4 years ago 🙄🙄🤔🤔
@bemotivated22033 жыл бұрын
allways changing and challenging :) very well explained in simple manner thanks
@marvismeng19533 жыл бұрын
You are talented!!!!!
@gustavoisidor2575 Жыл бұрын
@khanacademy what about quantum computers for decrypting the messages without the private key and trying all possible combinations?
@nielsdaemen3 жыл бұрын
*Beautiful and smart!*
@janeric18103 жыл бұрын
I thought I'm too stupid to understand this, thank you very much
@thakibkorede3 жыл бұрын
A very educating video. Keep it up
@brentdelosangeles24993 жыл бұрын
Amazing video!
@hello_virals3 жыл бұрын
You are amazing thank you so much good luck!
@sorintalpis82105 жыл бұрын
Beautiful presentation and presenter
@esmaeelbaz68273 жыл бұрын
great explanation
@sushilakarki38855 ай бұрын
No it will take about 2.78 hours for a computer to brute force a 10 digit code. Love your vids btw
@kiu81794 жыл бұрын
Good viedo, very thanks i like the spanish subs
@prajwalmishra27224 жыл бұрын
Best video..thanku
@mahdisfatima32184 жыл бұрын
Thanks alot... I helped me alot
@wazidalikhan27753 жыл бұрын
Thanks, good information.
@severianocuellar13275 ай бұрын
TOTP code (App Authenticators) is Symmetric and Hardware keys (Yubikey, Feitian, etc) is Asymmetric?
@beappreciativediligent1220 Жыл бұрын
I dont get it . If I have a public key of someone else. And g use the key to generate an encryped file with a file of my known content . Then why can't I reverse the encryption and derive the private key?
@dmoney1414144 жыл бұрын
great video! thank you
@fernandosanchez51174 жыл бұрын
thanks, really nice video.
@HighlifeLunaАй бұрын
Quantum Computing has entered the chat.
@rlyehdate3 жыл бұрын
What a pro!
@anntakamaki19603 жыл бұрын
Straighforward explanation.
@luis96xd8 ай бұрын
Amazing video, everything was well explained and I liked the Mailbox example, thanks! I have a doubt, we use the Public Key to encrypt messages and the Private Key to decrypt them But, can we encrypt messages using the private key and decrypt them using the public key? Does this has sense? or it is not possible Another doubt, using a number key in Caesar Cipher we swap N times as the key says, but how does key work with they have letters?
@anthonyarmstrong91963 жыл бұрын
Wow. That's heavy
@AnhTuPhucDerrickHoangCanada2 жыл бұрын
Encryption locls my info with institutions i trust!
@shantanurai59113 жыл бұрын
Thnx for video
@AceofDlamonds2 жыл бұрын
Thanks!
@SelmanErhanekici7 жыл бұрын
Great presentation and explanation
@BlueProgamer2123 жыл бұрын
3 years ago comment on a 2 years ago video
@jeffbguarino2 жыл бұрын
There is other information you can use to figure out a message. Like "free pizza in the cafeteria" = "kmsg rpche ps upg ehimxlwji" There is other information here. The English language is the other information. There are only a couple of thousand common words. Two letters , is, in, on, to, etc. not that many. You could possible figure out a sentence of just by counting the number of letters per word. You probably know what the general content of the letter might be. For example a military letter of orders will not be a cooking recipe, so the word basket will be limited. If this letter is sent to you at a place where there is a cafeteria, then you have more information. Maybe they have free pizza once a year and you can guess what the message is just by putting together information from diverse places. If you see an encrypted 5 letter word , as the first word of an email. There is a good chance this word is "hello". Consider a baby who knows no language at all. They can figure out what you are saying. It takes a while but they know, and not from the actual words but all the cumulative information gathered up from the months of watching things.
@Gary-Seven-and-Isis-in-19684 жыл бұрын
You're an absolute genius, thank you for a fascinating video. Could you tell me if it is possible to find the encryption key for an Android photo file if the owner mistakenly wiped the encryption key from the phone?. Yes it happened to me and so far nobody has been able to shed some light on this commonly occurring problem with Android phones. By default from Android 6 upwards all data on the phone is encrypted.
@SoulXample3 жыл бұрын
“Some math that we won’t get into right now”. That’s what I came here to try to understand aargh!
@chiraggoel36043 жыл бұрын
nice video
@nomanibnhafiz38763 жыл бұрын
Too good
@eddietime18112 жыл бұрын
Me: I only wanna hear about the math Her: we won’t get into that now Me:
@JimMarshallUK3 ай бұрын
Will quantum computing allow for “brute force”? Within a reasonable amount of time. IE trying all the possible combinations? It seems AI, Machine Leaning, Neural networks and faster processing will get you there
@johnhack673 жыл бұрын
thanks
@MrKennym321 Жыл бұрын
There are two things I don't understand: If I encrypt an email message, for example using S/MIMES, how does the person I am sending it to get the key to decrypt the email? Secondly, how is a certified signature a guarantee that the email is safe? Isn't it possible for someone to hack someone else's certified account?
@hi_beemo18083 жыл бұрын
the quantum computer be like: what only 256 bit key? I'm I a joke to you?
@8877robert3 жыл бұрын
Bravo.
@thekeith12213 жыл бұрын
How does she work for the dod while still in college?
@DarkEagle014 жыл бұрын
Can’t someone reverse engineer your private key from the public one? If you know how something is encrypted, doesn’t that mean you can decrypt it?
@Kitulous3 жыл бұрын
you basically have to bruteforce 2^128 or 2^256 keys in order to guess the private key :) no, there's no way to derive a private key from the public key
@johnny149803 жыл бұрын
The whole point of encryption is to develop methods that are essentially irreversible.
@shamelessone19878 ай бұрын
I really need to find a video that doesnt use an analogy like the mailbox, like i need one where it explains to me how the encrption actually works and doesnt allow the public key to decrypt the the information.
@williammangani21513 жыл бұрын
Help me guys which school teaches Computer Science on an Online at affordable price
@itboostaustralia84985 жыл бұрын
great video
@enahmoscar-phoenix75652 жыл бұрын
Bruh I waited 5 minutes for the math…
@urmomasf4 жыл бұрын
im still confused :( i just i dont know how to do it in my code assignment...
@Noah.Nation4 жыл бұрын
Use math boom.
@ArcadianArt5 жыл бұрын
What they fail to tell you here while the blow encryption out of proportion is that the NSA, CIA and five eyes do not care about cracking codes when they have backdoor access to nodes. They can tailgate any message on the internet that triggers their attention. Encryption although affective to an extent is just being hopeful. It’s all about language mixed with encryption and avoiding the surface.
@ArcadianArt4 жыл бұрын
Isaac W go look up who looks after proton mails servers, and where exactly their servers are located. They even state in their website if you are a “Snowden” do not use proton mail. In other words it won’t protect you. PGP is overrated and filled with flaws. Look up my videos I made a video on PGP
@ebentee4 жыл бұрын
@@ArcadianArt gonna check your videos and will definitely subscribe
@donnievitelloni38063 жыл бұрын
A quantum computer will make this process obsolete one day
@derpr003 жыл бұрын
To the part where processors get smaller and smaller. We cant go any further smaller anymore
@cycnr40624 жыл бұрын
Were is Theale green at
@chadfreddy78202 жыл бұрын
Help me my teacher is constantly restarting the video so we can't get on the computers. Quick someone teach me everything I need to know about this.
@michaelduvwiama13704 жыл бұрын
Who's here from Solent?
@adityabhatt4177Ай бұрын
wow
@c.s.i.s62844 жыл бұрын
This is video doesn't mention the fact that all governments have private encryption keys. So this means that governments can decrypt any individuals private information.
@manyworldsvideo3 жыл бұрын
Only if the people sending the information do it with the government's matching public keys.
@chavorocket3 жыл бұрын
>Click video >Hear woman's voice >Close video
@chavorocket Жыл бұрын
@versatilenethra You will never be a programmer
@chavorocket Жыл бұрын
@versatilenethra That's what I thought, aka nothing