Home
Search results “Shor algorithm cryptography jobs”
How to Break Cryptography | Infinite Series
 
15:37
Viewers like you help make PBS (Thank you 😃) . Support your local PBS Member Station here: https://to.pbs.org/donateinfi Only 4 steps stand between you and the secrets hidden behind RSA cryptography. Find out how to crack the world’s most commonly used form of encryption. Tweet at us! @pbsinfinite Facebook: facebook.com/pbsinfinite series Email us! pbsinfiniteseries [at] gmail [dot] com Previous Episode: Can We Combine pi & e into a Rational Number? https://www.youtube.com/watch?v=bG7cCXqcJag&t=25s Links to other resources: Shor's paper: https://arxiv.org/abs/quant-ph/9508027v2 Lecture on Shor's Algorithm: https://arxiv.org/pdf/quant-ph/0010034.pdf Blog on Shor's algorithm: http://www.scottaaronson.com/blog/?p=208 Video on RSA cryptography: https://www.youtube.com/watch?v=wXB-V_Keiu8 Another video on RSA cryptography: https://www.youtube.com/watch?v=4zahvcJ9glg Euler's Big Idea: https://en.wikipedia.org/wiki/Euler%27s_theorem (I can find a non-wiki article, but I don't actually use this in the video. It's just where to learn more about the relevant math Euler did.) Written and Hosted by Kelsey Houston-Edwards Produced by Rusty Ward Graphics by Ray Lux Made by Kornhaber Brown (www.kornhaberbrown.com) Challenge Winner - Reddles37 https://www.youtube.com/watch?v=bG7cCXqcJag&lc=z135cnmgxlbwch1ds233sbzgaojkivaz004 Comments answered by Kelsey: Joel David Hamkins https://www.youtube.com/watch?v=bG7cCXqcJag&lc=z13zdpcwyk2ofhugh04cdh4agsr2whmbsmk0k PCreeper394 https://www.youtube.com/watch?v=bG7cCXqcJag&lc=z135w324kw21j1qi104cdzvrpoixslmq1jw
Views: 186569 PBS Infinite Series
Shor's Algoirthm
 
09:48
Overview of Chapter 23, Shor's Algorithm, in "A Course in Quantum Computing" (by Michael Loceff)
Views: 8559 michael loceff
Encryption: Last Week Tonight with John Oliver (HBO)
 
18:01
Strong encryption poses problems for law enforcement, is weakening it worth the risks it presents? It’s…complicated. Connect with Last Week Tonight online... Subscribe to the Last Week Tonight YouTube channel for more almost news as it almost happens: www.youtube.com/user/LastWeekTonight Find Last Week Tonight on Facebook like your mom would: http://Facebook.com/LastWeekTonight Follow us on Twitter for news about jokes and jokes about news: http://Twitter.com/LastWeekTonight Visit our official site for all that other stuff at once: http://www.hbo.com/lastweektonight
Views: 10471648 LastWeekTonight
Will Quantum Computers break encryption?
 
15:45
How do you secure messages over the internet? How do quantum computers break it? How do you fix it? Why don't you watch the video to find out? Why does this description have so many questions? Why are you still reading? What is the meaning of life? Facebook: https://www.facebook.com/frameofessence Twitter: https://twitter.com/frameofessence YouTube: https://www.youtube.com/user/frameofessence CLARIFICATIONS: You don't actually need a quantum computer to do quantum-safe encryption. As briefly mentioned at 7:04 , there are encryption schemes that can be run on regular computers that can't be broken by quantum computers. CORRECTIONS: [2:18] Technically, you can use any key to encrypt or decrypt whatever you want. But there's a specific way to use them that's useful, which is what's shown in the video. [5:36] In RSA, depending on exactly what you mean by "private key", neither key is actually derivable from the other. When they are created, they are generated together from a common base (not just the public key from the private key). But typically, the file that stores the "private key" actually contains a bit more information than just the private key. For example, in PKCS #1 RSA private key format ( https://tools.ietf.org/html/rfc3447#appendix-A.1.2 ), the file technically contains the entire public key too. So in short, you technically can't get the public key from the private key or vice versa, but the file that contains the private key can hold more than just the private key alone, making it possible to retrieve the public key from it. Video links: Encryption and HUGE numbers - Numberphile https://youtu.be/M7kEpw1tn50 The No Cloning Theorem - minutephysics https://youtu.be/owPC60Ue0BE Quantum Entanglement & Spooky Action at a Distance - Veritasium https://youtu.be/ZuvK-od647c Sources: Quantum Computing for Computer Scientists http://books.google.ca/books/about/Quantum_Computing_for_Computer_Scientist.html?id=eTT0FsHA5DAC Random person talking about Quantum MITM attacks http://crypto.stackexchange.com/questions/2719/is-quantum-key-distribution-safe-against-mitm-attacks-too The Ekert Protocol (i.e. E91) http://www.ux1.eiu.edu/~nilic/Nina's-article.pdf Annealing vs. Universal Quantum Computers https://medium.com/quantum-bits/what-s-the-difference-between-quantum-annealing-and-universal-gate-quantum-computers-c5e5099175a1 Images, Documents, and Screenshots: Post-Quantum Cryptography initiatives http://csrc.nist.gov/groups/ST/post-quantum-crypto/cfp-announce-dec2016.html http://pqcrypto.eu.org/docs/initial-recommendations.pdf Internet map (Carna Botnet) http://census2012.sourceforge.net/ Quantum network maps https://www.slideshare.net/ADVAOpticalNetworking/how-to-quantumsecure-optical-networks http://www.secoqc.net/html/press/pressmedia.html IBM Quantum http://research.ibm.com/ibm-q/ Music: YouTube audio library: Blue Skies Incompetech: Jay Jay Pamgaea The House of Leaves Premium Beat: Cutting Edge Technology Second Time Around Swoosh 1 sound effect came from here: http://soundbible.com/682-Swoosh-1.html ...and is under this license: https://creativecommons.org/licenses/sampling+/1.0/
Views: 622437 Frame of Essence
What Is the Future of Cryptography?
 
01:52
Historically, as advances were made in the fields of engineering, mathematics, and physics, so the field of cryptography has advanced with them—usually by leaps and bounds. Where is it headed next? Science journalist Simon Singh concedes that the science of secrecy tends to be secret, so we may not know about it until it has already been broken. Watch the Full Program Here: https://youtu.be/nVVF8dgKC38 Original Program Date: June 4, 2011 The World Science Festival gathers great minds in science and the arts to produce live and digital content that allows a broad general audience to engage with scientific discoveries. Our mission is to cultivate a general public informed by science, inspired by its wonder, convinced of its value, and prepared to engage with its implications for the future. Subscribe to our YouTube Channel for all the latest from WSF. Visit our Website: http://www.worldsciencefestival.com/ Like us on Facebook: https://www.facebook.com/worldsciencefestival Follow us on twitter: https://twitter.com/WorldSciFest
Asymmetric Cryptography
 
07:55
Google IT Support Professional Certificate Course 6 - IT Security: Defense against the digital dark arts, Module 2 - Cryptology To get certificate subscribe at: https://www.coursera.org/specializations/google-it-support ================= The whole course playlist: Google IT Support Professional Certificate https://www.youtube.com/playlist?list=PL2jykFOD1AWZlfwMPcVKwaFrRXbqObI3U ================= IT Security https://www.youtube.com/playlist?list=PL2jykFOD1AWaEXEpyRf-Im3U8WQ962Y4B ================= https://www.facebook.com/cyberassociation/ https://scsa.ge/en/online-courses/ This six-course certificate, developed exclusively by Google, includes innovative curriculum designed to prepare you for an entry-level role in IT support. A job in IT can mean in-person or remote help desk work, either in a small business or at a global company, like Google. Whether you’ve been tinkering with IT or are completely new to the field, you’ve come to the right place. If you’re looking for a job, upon completion of the certificate, you can share your information with top employers, like Bank of America, Walmart, Sprint, GE Digital, PNC Bank, Infosys, TEKsystems, UPMC, and, of course, Google. Course 6 - IT Security: Defense against the digital dark arts About the Course This course covers a wide variety of IT security concepts, tools, and best practices. It introduces threats and attacks and the many ways they can show up. We’ll give you some background of encryption algorithms and how they’re used to safeguard data. Then, we’ll dive into the three As of information security: Authentication, authorization, and accounting. We’ll also cover network security solutions, ranging from firewalls to Wifi encryption options. The course is rounded out by putting all these elements together into a multi-layered, in-depth security architecture, followed by recommendations on how to integrate a culture of security into your organization or team. At the end of this course, you’ll understand: - how various encryption algorithms and techniques work and their benefits and limitations. - various authentication systems and types. - the difference between authentication and authorization. At the end of this course, you’ll be able to: - evaluate potential risks and recommend ways to reduce risk. - make recommendations on how best to secure a network. - help others to understand security concepts and protect themselves Who is this class for: This program is intended for beginners who are interested in developing the skills necessary to perform entry-level IT support. No pre-requisite knowledge is required. However, if you do have some familiarity with IT, you can skip through any content that you might already know and speed ahead to the graded assessments. Module 2 - Cryptology In the second module of this course, we'll learn about cryptology. We'll explore different types of encryption practices and how they work. We'll show you the most common algorithms used in cryptography and how they've evolved over time. By the end of this module, you'll understand how symmetric encryption, asymmetric encryption, and hashing work; you'll also know how to choose the most appropriate cryptographic method for a scenario you may see in the workplace. Learning Objectives • Understand the how symmetric encryption, asymmetric encryption, and hashing work. • Describe the most common algorithms of cryptography. • Choose the most appropriate cryptographic method given a scenario.
Views: 142 intrigano
How Machines Learn
 
08:55
How do all the algorithms around us learn to do their jobs? **OMG PLUSHIE BOTS!!**: https://standard.tv/collections/cgp-grey/products/cgp-grey-sorterbot-5000-plush Bot Wallpapers on Patreon: https://www.patreon.com/posts/15959388 Footnote: https://www.youtube.com/watch?v=wvWpdrfoEv0 Podcasts: https://www.youtube.com/user/HelloInternetPodcast https://www.youtube.com/channel/UCqoy014xOu7ICwgLWHd9BzQ Thank you to my supporters on Patreon: James Bissonette, James Gill, Cas Eliëns, Jeremy Banks, Thomas J Miller Jr MD, Jaclyn Cauley, David F Watson, Jay Edwards, Tianyu Ge, Michael Cao, Caron Hideg, Andrea Di Biagio, Andrey Chursin, Christopher Anthony, Richard Comish, Stephen W. Carson, JoJo Chehebar, Mark Govea, John Buchan, Donal Botkin, Bob Kunz https://www.patreon.com/cgpgrey How neural networks really work with the real linear algebra: https://www.youtube.com/watch?v=aircAruvnKk Music by: http://www.davidreesmusic.com
Views: 3402723 CGP Grey
Watch this hacker break into a company
 
02:56
Social engineers, or people hackers, specialize in getting you to share information you shouldn't -- like personal details that could lead to a password being stolen. Laurie Segall reports.
Views: 2720156 CNN Business
This Video was Not Encrypted with RSA | Infinite Series
 
09:48
Viewers like you help make PBS (Thank you 😃) . Support your local PBS Member Station here: https://to.pbs.org/donateinfi Learn through active problem-solving at Brilliant: https://brilliant.org/InfiniteSeries/ Last episode we discussed Symmetric cryptography https://www.youtube.com/watch?v=NOs34_-eREk Here we break down Asymmetric crypto and more. Tweet at us! @pbsinfinite Facebook: facebook.com/pbsinfinite series Email us! pbsinfiniteseries [at] gmail [dot] com Previous Episode (Almost) Unbreakable Crypto | Infinite Series https://www.youtube.com/watch?v=NOs34_-eREk How To Break Cryptography https://www.youtube.com/watch?v=12Q3Mrh03Gk&list=PLa6IE8XPP_gnot4uwqn7BeRJoZcaEsG1D&index=2 Last time, we discussed symmetric encryption protocols, which rely on a user-supplied number called "the key" to drive an algorithm that scrambles messages. Since anything encrypted with a given key can only be decrypted with the same key, Alice and Bob can exchange secure messages once they agree on a key. But what if Alice and Bob are strangers who can only communicate over a channel monitored by eavesdroppers like Eve? How do they agree on a secret key in the first place? Written and Hosted by Gabe Perez-Giz Produced by Rusty Ward Graphics by Ray Lux Assistant Editing and Sound Design by Mike Petrow and Meah Denee Barrington Made by Kornhaber Brown (www.kornhaberbrown.com) Thanks to Matthew O'Connor and Yana Chernobilsky who are supporting us on Patreon at the Identity level! And thanks to Nicholas Rose and Mauricio Pacheco who are supporting us at the Lemma level!
Views: 56656 PBS Infinite Series
The Mathematics of Diffie-Hellman Key Exchange | Infinite Series
 
13:33
Viewers like you help make PBS (Thank you 😃) . Support your local PBS Member Station here: https://to.pbs.org/donateinfi Symmetric keys are essential to encrypting messages. How can two people share the same key without someone else getting a hold of it? Upfront asymmetric encryption is one way, but another is Diffie-Hellman key exchange. This is part 3 in our Cryptography 101 series. Check out the playlist here for parts 1 & 2: https://www.youtube.com/watch?v=NOs34_-eREk&list=PLa6IE8XPP_gmVt-Q4ldHi56mYsBuOg2Qw Tweet at us! @pbsinfinite Facebook: facebook.com/pbsinfinite series Email us! pbsinfiniteseries [at] gmail [dot] com Previous Episode Topology vs. “a” Topology https://www.youtube.com/watch?v=tdOaMOcxY7U&t=13s Symmetric single-key encryption schemes have become the workhorses of secure communication for a good reason. They’re fast and practically bulletproof… once two parties like Alice and Bob have a single shared key in hand. And that’s the challenge -- they can’t use symmetric key encryption to share the original symmetric key, so how do they get started? Written and Hosted by Gabe Perez-Giz Produced by Rusty Ward Graphics by Ray Lux Assistant Editing and Sound Design by Mike Petrow and Meah Denee Barrington Made by Kornhaber Brown (www.kornhaberbrown.com) Thanks to Matthew O'Connor, Yana Chernobilsky, and John Hoffman who are supporting us on Patreon at the Identity level! And thanks to Nicholas Rose, Jason Hise, Thomas Scheer, Marting Sergio H. Faester, CSS, and Mauricio Pacheco who are supporting us at the Lemma level!
Views: 50395 PBS Infinite Series
(Almost) Unbreakable Crypto | Infinite Series
 
09:29
Viewers like you help make PBS (Thank you 😃) . Support your local PBS Member Station here: https://to.pbs.org/donateinfi Despite what many believe, the essence of encryption isn’t really about factoring or prime numbers. So what is it about? Thanks to Vanessa Hill for playing the part of our evil hacker! Be sure to check out Braincraft https://www.youtube.com/channel/UCt_t6FwNsqr3WWoL6dFqG9w Tweet at us! @pbsinfinite Facebook: facebook.com/pbsinfinite series Email us! pbsinfiniteseries [at] gmail [dot] com Previous Episode Associahedra: The Shapes of Multiplication | Infinite Series https://www.youtube.com/watch?v=N7wNWQ4aTLQ In previous episodes, Kelsey explained how you could crack RSA encryption with an algorithm capable of quickly factoring ginormous numbers into primes. That might give you the impression that fast factoring algorithms would compromise all digital encryption. But not so -- for instance, YouTube's encryption of this video would be unaffected. And that's because the essence of encryption isn’t really about factoring or prime numbers per se. So what is it about? Written and Hosted by Gabe Perez-Giz Produced by Rusty Ward Graphics by Ray Lux Assistant Editing and Sound Design by Mike Petrow and Meah Denee Barrington Made by Kornhaber Brown (www.kornhaberbrown.com) Thanks to Matthew O'Connor and Yana Chernobilsky who are supporting us on Patreon at the Identity level! And thanks to Nicholas Rose and Mauricio Pacheco who are supporting us at the Lemma level!
Views: 74778 PBS Infinite Series
2.4.1 RSA Public Key Encryption: Video
 
21:45
MIT 6.042J Mathematics for Computer Science, Spring 2015 View the complete course: http://ocw.mit.edu/6-042JS15 Instructor: Albert R. Meyer License: Creative Commons BY-NC-SA More information at http://ocw.mit.edu/terms More courses at http://ocw.mit.edu
Views: 18028 MIT OpenCourseWare
Quantum Computing for Computer Scientists
 
01:28:23
This talk discards hand-wavy pop-science metaphors and answers a simple question: from a computer science perspective, how can a quantum computer outperform a classical computer? Attendees will learn the following: - Representing computation with basic linear algebra (matrices and vectors) - The computational workings of qbits, superposition, and quantum logic gates - Solving the Deutsch oracle problem: the simplest problem where a quantum computer outperforms classical methods - Bonus topics: quantum entanglement and teleportation The talk concludes with a live demonstration of quantum entanglement on a real-world quantum computer, and a demo of the Deutsch oracle problem implemented in Q# with the Microsoft Quantum Development Kit. This talk assumes no prerequisite knowledge, although comfort with basic linear algebra (matrices, vectors, matrix multiplication) will ease understanding. See more at https://www.microsoft.com/en-us/research/video/quantum-computing-computer-scientists/
Views: 156433 Microsoft Research
A Tor Guide to Encryption ♦ The IDCast Vol 1 ♦ Tourguide to the Internet Ep10
 
31:15
Hey everybody. We are the IDCast, a Duo that can't decide on what the I stands for. This week we discuss the wide problems of encryption and cyber security. Stay tuned every saturday for new podcasts! Check out our Twitter @TheIDCast Era-tic guide to history: Alfred Hitchcock died 1980 Mir Space walk was 1997 Royal Wedding was 2011 Wedding of Hitler and Eva Braun Further reading: Natwest encryption:https://www.youtube.com/watch?v=M7kEpw1tn50 Natwest: https://en.wikipedia.org/wiki/NatWest Caesar Cipher: https://en.wikipedia.org/wiki/Caesar_cipher Man-In-The-Middle: https://www.youtube.com/watch?v=-enHfpHMBo4 Quantum Computers: https://www.youtube.com/watch?v=JhHMJCUmq28 Qu-bits: https://www.youtube.com/watch?v=g_IaVepNDT4 Quantum Cryptography: https://www.youtube.com/watch?v=UiJiXNEm-Go Shor's algorithm: https://www.youtube.com/watch?v=wUwZZaI5u0c Slow Loris: https://youtu.be/XiFkyR35v2Y Example of how a 'Bug bounty' white hat hack works: https://youtu.be/XiFkyR35v2Y Merry Christma : https://www.youtube.com/watch?v=kNm-b1UXGTY Steam buffer bug : https://youtu.be/dkSslseq9Y8 ILOVEYOU Virus: https://youtu.be/DF8Ka8Jh0BQ Stuxnet: https://en.wikipedia.org/wiki/Stuxnet Tsar Bomba: https://www.youtube.com/watch?v=fs1CIrwg5zU Fission and Fusion: https://youtu.be/FU6y1XIADdg The Italian Job: http://www.imdb.com/title/tt0064505/ Vernam cipher: https://youtu.be/FlIG3TvQCBQ Polarised light: https://youtu.be/-ob7foUzXaY?t=5m55s
Views: 45 The ID Cast
What is Bitcoin Mining?
 
01:56
For more information: https://www.bitcoinmining.com and https://www.weusecoins.com What is Bitcoin Mining? Have you ever wondered how Bitcoin is generated? This short video is an animated introduction to Bitcoin Mining. Credits: Voice - Chris Rice (www.ricevoice.com) Motion Graphics - Fabian Rühle (www.fabianruehle.de) Music/Sound Design - Christian Barth (www.akkord-arbeiter.de) Andrew Mottl (www.andrewmottl.com)
Views: 6742951 BitcoinMiningCom
R6. Greedy Algorithms
 
22:24
MIT 6.046J Design and Analysis of Algorithms, Spring 2015 View the complete course: http://ocw.mit.edu/6-046JS15 Instructor: Amartya Shankha Biswas In this recitation, problems related to greedy algorithms are discussed. License: Creative Commons BY-NC-SA More information at http://ocw.mit.edu/terms More courses at http://ocw.mit.edu
Views: 26629 MIT OpenCourseWare
158,962,555,217,826,360,000 (Enigma Machine) - Numberphile
 
11:52
The Nazi's Enigma Machine - and the mathematics behind it - was a crucial part of World War II. Flaw video at: http://www.youtube.com/watch?v=V4V2bpZlqx8 More links & stuff in full description below ↓↓↓ Brown papers on ebay: bit.ly/brownpapers Dr James Grime demonstrates the machine and discusses its many configurations. James' "day job" is touring with the Enigma machine - he could even visit you - see more at http://enigma.maths.org/content/project-officer NUMBERPHILE Website: http://www.numberphile.com/ Numberphile on Facebook: http://www.facebook.com/numberphile Numberphile tweets: https://twitter.com/numberphile Subscribe: http://bit.ly/Numberphile_Sub Videos by Brady Haran Patreon: http://www.patreon.com/numberphile Brady's videos subreddit: http://www.reddit.com/r/BradyHaran/ Brady's latest videos across all channels: http://www.bradyharanblog.com/ Sign up for (occasional) emails: http://eepurl.com/YdjL9 Numberphile T-Shirts: https://teespring.com/stores/numberphile Other merchandise: https://store.dftba.com/collections/numberphile
Views: 3725250 Numberphile
Part 1 - Information Security - How Cryptography Works Choosing the Right Crypto for the Job
 
15:54
For more information visit http://ow.ly/aDxuq Part 1 - Security Expert and Interface Technical Training Director Mike Danseglio presented at the Security BSides event in Tempe, AZ on February 18th, 2012. Mr. Danseglio's topic was How Cryptography Works (Choosing the Right Crypto for the Right Job).
Views: 686 InterfaceTT
Humans Need Not Apply
 
15:01
Support Grey making videos: https://www.patreon.com/cgpgrey ## Robots, Etc: Terex Port automation: http://www.terex.com/port-solutions/en/products/new-equipment/automated-guided-vehicles/lift-agv/index.htm Command | Cat MieStar System.: http://www.catminestarsystem.com/capability_sets/command Bosch Automotive Technology: http://www.bosch-automotivetechnology.com/en/de/specials/specials_for_more_driving_safety/automated_driving/automated_driving.html Atlas Update: https://www.youtube.com/watch?v=SD6Okylclb8&list=UU7vVhkEfw4nOGp8TyDk7RcQ Kiva Systems: http://www.kivasystems.com PhantomX running Phoenix code: https://www.youtube.com/watch?v=rAeQn5QnyXo iRobot, Do You: https://www.youtube.com/watch?v=da-5Uw8GBks&list=UUB6E-44uKOyRW9hX378XEyg New pharmacy robot at QEHB: https://www.youtube.com/watch?v=_Ql1ZHSkUPk Briggo Coffee Experience: http://vimeo.com/77993254 John Deere Autosteer ITEC Pro 2010. In use while cultivating: https://www.youtube.com/watch?v=VAPfImWdkDw&t=19s The Duel: Timo Boll vs. KUKA Robot: https://www.youtube.com/watch?v=tIIJME8-au8 Baxter with the Power of Intera 3: https://www.youtube.com/watch?v=DKR_pje7X2A&list=UUpSQ-euTEYaq5VtmEWukyiQ Baxter Research Robot SDK 1.0: https://www.youtube.com/watch?v=wgQLzin4I9M&list=UUpSQ-euTEYaq5VtmEWukyiQ&index=11 Baxter the Bartender: https://www.youtube.com/watch?v=AeTs9tLsUmc&list=UUpSQ-euTEYaq5VtmEWukyiQ Online Cash Registers Touch-Screen EPOS System Demonstration: https://www.youtube.com/watch?v=3yA22B0rC4o Self-Service Check in: https://www.youtube.com/watch?v=OafuIBDzxxU Robot to play Flappy Bird: https://www.youtube.com/watch?v=kHkMaWZFePI e-david from University of Konstanz, Germany: https://vimeo.com/68859229 Sedasys: http://www.sedasys.com/ Empty Car Convoy: http://www.youtube.com/watch?v=EPTIXldrq3Q Clever robots for crops: http://www.crops-robots.eu/index.php?option=com_content&view=article&id=62&Itemid=61 Autonomously folding a pile of 5 previously-unseen towels: https://www.youtube.com/watch?v=gy5g33S0Gzo#t=94 LS3 Follow Tight: https://www.youtube.com/watch?v=hNUeSUXOc-w Robotic Handling material: https://www.youtube.com/watch?v=pT3XoqJ7lIY Caterpillar automation project: http://www.catminestarsystem.com/articles/autonomous-haulage-improves-mine-site-safety Universal Robots has reinvented industrial robotics: https://www.youtube.com/watch?v=UQj-1yZFEZI Introducing WildCat: https://www.youtube.com/watch?v=wE3fmFTtP9g The Human Brain Project - Video Overview: https://www.youtube.com/watch?v=JqMpGrM5ECo This Robot Is Changing How We Cure Diseases: https://www.youtube.com/watch?v=ra0e97Wiqds Jeopardy! - Watson Game 2: https://www.youtube.com/watch?v=kDA-7O1q4oo What Will You Do With Watson?: https://www.youtube.com/watch?v=Y_cqBP08yuA ## Other Credits Mandelbrot set: https://www.youtube.com/watch?v=NGMRB4O922I&list=UUoxcjq-8xIDTYp3uz647V5A Moore's law graph: http://en.wikipedia.org/wiki/File:PPTMooresLawai.jpg Apple II 1977: https://www.youtube.com/watch?v=CxJwy8NsXFs Beer Robot Fail m2803: https://www.youtube.com/watch?v=N4Lb_3_NMjE All Wales Ambulance Promotional Video: https://www.youtube.com/watch?v=658aiRoVp6s Clyde Robinson: https://www.flickr.com/photos/crobj/4312159033/in/photostream/ Time lapse Painting - Monster Spa: https://www.youtube.com/watch?v=ED14i8qLxr4
Views: 11035965 CGP Grey
How Does a Quantum Computer Work?
 
06:47
For more on spin, check out: http://youtu.be/v1_-LsQLwkA This video was supported by TechNYou: http://bit.ly/19bBX5G A quantum computer works in a totally different way from a classical computer. Quantum bits or 'qubits' can exist in a superposition state of both zero and one simultaneously. This means that a set of two qubits can be in a superposition of four states, which therefore require four numbers to uniquely identify the state. So the amount of information stored in N qubits is two to the power of N classical bits. Thank you to Andrea Morello and UNSW. For more info, check out: http://bit.ly/17wZ7lt
Views: 3004409 Veritasium
Trade: Last Week Tonight with John Oliver (HBO)
 
21:14
Donald Trump is waging a trade war that hurts a lot of American workers. Maybe he would understand that if our heavy-handed documentaries about the global trading system were more informative. Connect with Last Week Tonight online... Subscribe to the Last Week Tonight YouTube channel for more almost news as it almost happens: www.youtube.com/user/LastWeekTonight Find Last Week Tonight on Facebook like your mom would: http://Facebook.com/LastWeekTonight Follow us on Twitter for news about jokes and jokes about news: http://Twitter.com/LastWeekTonight Visit our official site for all that other stuff at once: http://www.hbo.com/lastweektonight
Views: 7643648 LastWeekTonight
How a VPN Works and What It Does for You
 
02:16
What is VPN VPN is short for Virtual Private Network. Think of your home network, or your office network, as private networks. Through a VPN connection, your computer, tablet or smartphone is able to securely connect with others on the Internet as if they were part of the same private network. In the olden days, VPN was used by corporate employees to access their offices while remote - when they needed to access sensitive information in a secure way. In time, VPN technology became available for regular internet users. It helps people from all over the world connect in a secure way. VPN allows you to have your connection encrypted and secure, to become anonymous online and to keep your traffic data private and safe from hackers, government censorship and other dangers of the Internet. VPN also helps you get access to blocked content. Because of geolocation, some online content, such as videos, music files, news, search engines and so on, may be unavailable from certain countries and locations. Using a VPN service allows you to login to a server located in a place from where the content is available - and voila - you have access to previously blocked content. This is especially significant for those who live in countries where the government is restrictive and censors online content and information from the outside world. VPN technology helps people in these countries get vital information and talk to the world, thus making their problems visible to the international community. They live in an information-blocking cage. And with our VPN service we give them one of the keys to more freedom. So, to recap: VPN technology gives you Privacy, Freedom and Security, and this is incredibly useful when you do your online banking, use WiFi hotspots, shop online, access media or secure your communication. And here, at CyberGhost VPN, we believe you deserve all these benefits. CyberGhost is a fast, simple and efficient way to protect your online privacy, surf anonymously and access blocked or censored content. It offers top-notch security and anonymity without being complicated to use or slowing down your internet connection. http://www.cyberghostvpn.com/en
Views: 722419 CyberGhost VPN
John Oliver Worked the Phones at a Place that Sold Stolen Goods
 
05:56
John Oliver chats with Jimmy about his toddler son throwing up all over his homeland of England and what it was like answering phones for a guy who sold stolen kitchen equipment. Subscribe NOW to The Tonight Show Starring Jimmy Fallon: http://bit.ly/1nwT1aN Watch The Tonight Show Starring Jimmy Fallon Weeknights 11:35/10:35c Get more Jimmy Fallon: Follow Jimmy: http://Twitter.com/JimmyFallon Like Jimmy: https://Facebook.com/JimmyFallon Get more The Tonight Show Starring Jimmy Fallon: Follow The Tonight Show: http://Twitter.com/FallonTonight Like The Tonight Show: https://Facebook.com/FallonTonight The Tonight Show Tumblr: http://fallontonight.tumblr.com/ Get more NBC: NBC YouTube: http://bit.ly/1dM1qBH Like NBC: http://Facebook.com/NBC Follow NBC: http://Twitter.com/NBC NBC Tumblr: http://nbctv.tumblr.com/ NBC Google+: https://plus.google.com/+NBC/posts The Tonight Show Starring Jimmy Fallon features hilarious highlights from the show including: comedy sketches, music parodies, celebrity interviews, ridiculous games, and, of course, Jimmy's Thank You Notes and hashtags! You'll also find behind the scenes videos and other great web exclusives. John Oliver Worked the Phones at a Place that Sold Stolen Goods http://www.youtube.com/fallontonight
Measuring Success: Price or Principle
 
36:30
In this talk, Andreas questions whether our ways of measuring success in Bitcoin and open blockchains (such as price, market capitalisation, or being able to buy coffee at Starbucks) make sense, what these metrics reveal about our individual goals, and why we should instead focus on fostering communities founded on principles we want to see flourish in the world. This talk took place on May 23rd 2018 as part of 'The Internet of Money Tour' at University College Dublin in Dublin, Ireland: https://antonopoulos.com/event/dublin-bitcoin-meet-up/ If you want early-access to talks and a chance to participate in the monthly live Q&As with Andreas, become a patron: https://www.patreon.com/aantonop RELATED: Why Open Blockchains Matter - https://youtu.be/uZPIz3ArQww Decentralised Globalisation - https://youtu.be/QoiR4aNbTOw Investing in Education instead of Speculation - https://youtu.be/6uXAbJQoZlE Beyond Price: Bitcoin's Impact on the Future - https://youtu.be/rvwVbRQ5Ysc Wallet design and mass adoption - https://youtu.be/WbZX6BDZJHc Mass adoption and peer-to-peer commerce - https://youtu.be/n9qIAEFS-Qs Price volatility and store of value - https://youtu.be/wzzZT95ijTo Why I earn bitcoin instead of buying - https://youtu.be/Ci7TyD8jETY Job opportunities with cryptocurrencies - https://youtu.be/89_p4pDlQtI Inspiring cryptocurrency projects - https://youtu.be/WW8norCKUbE From barter to abstract money - https://youtu.be/KYsppZoHguQ Crossing the chasm of theoretical vs. real need - https://youtu.be/yIR0OBEAaUE Remittances and smuggling in Venezuela - https://youtu.be/RRXecXfWARw How long until mainstream adption? - https://youtu.be/y3cKBDBabtA What is the biggest adoption hurdle? - https://youtu.be/jHgyHF3F2TI Bitcoin as everyday currency - https://youtu.be/xYvvSV4mjH0 Hyperbitcoinization - https://youtu.be/AB5MU5fXKfo Andreas M. Antonopoulos is a technologist and serial entrepreneur who has become one of the most well-known and respected figures in bitcoin. Follow on Twitter: @aantonop https://twitter.com/aantonop Website: https://antonopoulos.com/ He is the author of two books: “Mastering Bitcoin,” published by O’Reilly Media and considered the best technical guide to bitcoin; “The Internet of Money,” a book about why bitcoin matters. THE INTERNET OF MONEY, v1: https://www.amazon.co.uk/Internet-Money-collection-Andreas-Antonopoulos/dp/1537000454/ref=asap_bc?ie=UTF8 [NEW] THE INTERNET OF MONEY, v2: https://www.amazon.com/Internet-Money-Andreas-M-Antonopoulos/dp/194791006X/ref=asap_bc?ie=UTF8 MASTERING BITCOIN: https://www.amazon.co.uk/Mastering-Bitcoin-Unlocking-Digital-Cryptocurrencies/dp/1449374042 [NEW] MASTERING BITCOIN, 2nd Edition: https://www.amazon.com/Mastering-Bitcoin-Programming-Open-Blockchain/dp/1491954388 Translations of MASTERING BITCOIN: https://bitcoinbook.info/translations-of-mastering-bitcoin/ Subscribe to the channel to learn more about Bitcoin & open blockchains! Music: "Unbounded" by Orfan (https://www.facebook.com/Orfan/) Outro Graphics: Phneep (http://www.phneep.com/) Outro Art: Rock Barcellos (http://www.rockincomics.com.br/)
Views: 29613 aantonop
Artificial Intelligence - Merits and Demerits of Thinking Machines , Robots Robotics AI IOT Sophia
 
34:07
Videos PDFs - https://goo.gl/X8UMwF || Join StudyIQ on Telegram - https://goo.gl/xBR3g8 UPSCIQ - A Monthly Magazine for UPSC IAS http://bit.ly/2DH1ZWq We're HIRING, Apply Now - http://bit.ly/2PY1sVK UPSC/CSE 2019 - https://goo.gl/UrCD46 SSC & Bank - https://goo.gl/9LQ4Ai UPSC Optionals - https://goo.gl/rtmXRU State PSCs - https://goo.gl/FDB32q Defence Exams - https://goo.gl/UEmtRz SSC JE Exams - https://goo.gl/2WyU1Z RBI Grade B - https://goo.gl/PY32m6 NABARD Grade A - https://goo.gl/C6CzAL DMRC Exams - https://goo.gl/yDnvyf Insurance Exams - https://goo.gl/iLEFxf CLAT 2019 - https://goo.gl/Burjtj Railway Jobs - https://goo.gl/5KaL7h Teaching Jobs - https://goo.gl/q117TX UPSC Prelim 2019Test Series -https://goo.gl/zkCG51 #StudyIQ #Pendrive_Courses https://goo.gl/aTFK6Q or #Call_9580048004 or Live Chat Support - https://goo.gl/s68PZ1 Free PDFs - https://goo.gl/cJufZc || Free Quiz - https://goo.gl/wCxZsy || Free Video Courses - https://goo.gl/jtMKP9" Follow us on Facebook - https://goo.gl/iAhPDJ Telegram - https://t.me/Studyiqeducation The Hindu Editorial Analysis - https://goo.gl/vmvHjG Current Affairs by Dr Gaurav Garg - https://goo.gl/bqfkXe UPSC/IAS Burning Issues analysis- https://goo.gl/2NG7vP World History for UPSC - https://goo.gl/J7DLXv Indian History - https://goo.gl/kVwB79 Follow us on Facebook - https://goo.gl/iAhPDJ Follow Dr Gaurav Garg on Facebook - https://goo.gl/xqLaQm UPSC/IAS past papers questions - https://goo.gl/F5gyWH SSC CGL + IBPS Quantitative tricks - https://goo.gl/C6d9n8 English Vocabulary - https://goo.gl/G9e04H Reasoning tricks for Bank PO + SSC CGL- https://goo.gl/a68WRN Error spotting / Sentence correction https://goo.gl/6RbdjC Static GK complete- https://goo.gl/kB0uAo Complete GK + Current Affairs for all exams- https://goo.gl/MKEoLy World History - UPSC / IAS - https://goo.gl/kwU9jC Learn English for SSC CGL, Bank PO https://goo.gl/MoL2it Science and Technology for UPSC/IAS - https://goo.gl/Jm4h8j Philosophy for UPSC/IAS - https://goo.gl/FH9p3n Yojana Magazine analysis -https://goo.gl/8oK1gy History for SSC CGL + Railways NTPC - https://goo.gl/7939e
Views: 73594 Study IQ education
Aberdeen Group, Selecting Encryption for “Data at Rest” in Back-End Systems
 
03:26
Derek Brink, VP, Research Fellow, IT Security at Aberdeen Group discusses his research on the most common security risks for data at rest in back end storage systems and the different encryption methods for defending that data. He compares full disk encryption (FDE) vs File Level Encryption.
Views: 446 Vormetric
The Devil's Staircase | Infinite Series
 
13:34
Viewers like you help make PBS (Thank you 😃) . Support your local PBS Member Station here: https://to.pbs.org/donateinfi Find out why Cantor’s Function is nicknamed the Devil’s Staircase. Try Skillshare at http://skl.sh/Infinite2 And check out the brand new PBS Digital Series Above the Noise https://www.youtube.com/channel/UC4K10PNjqgGLKA3lo5V8KdQ Tweet at us! @pbsinfinite Facebook: facebook.com/pbsinfinite series Email us! pbsinfiniteseries [at] gmail [dot] com Previous Episode Topology Riddles https://www.youtube.com/watch?v=H8qwqGjOlSE Written and Hosted by Kelsey Houston-Edwards Produced by Rusty Ward Graphics by Ray Lux Made by Kornhaber Brown (www.kornhaberbrown.com) Cantor’s Function, also known as the Devil’s Staircase, is exceptionally strange. After mapping out Cantor’s Function, named after Georg Cantor, we find that its derivative disappears almost everywhere. Challenge Winner: Justin Wieland Honorable Mentions: Felix Beichler Andrew Weller Comments answered by Kelsey: Thomas Perry https://www.youtube.com/watch?v=H8qwqGjOlSE&lc=z13ncngjhwy5iv5tp23lungjrsbxyup0.1494583661471832 Ralph Dratman https://www.youtube.com/watch?v=H8qwqGjOlSE&lc=z13isv1g0krfg52ds235h1rbvqqtxndq204.1494681742451739
Views: 202089 PBS Infinite Series
Quantum Computing - The Qubit Technology Revolution
 
01:03:48
One of the strangest features of quantum mechanics is also potentially its most useful: entanglement. By harnessing the ability for two particles to be intimately intertwined across great distances, researchers are working to create technologies that even Einstein could not imagine, from quantum computers that can run millions of calculations in parallel, to new forms of cryptography that may be impossible to crack. Join us as we explore the coming age of quantum technology, which promises to bring with it a far deeper understanding of fundamental physics. PARTICIPANTS: Jerry Chow, Julia Kempe, Seth Lloyd, Kathy-Anne Soderberg MODERATOR: George Musser Original program date: JUNE 3, 2017 FIND OUT MORE ABOUT THE PROGRAM AND PARTICIPANTS: https://www.worldsciencefestival.com/programs/the-qubit-revolution/ This program is part of the Big Ideas Series, made possible with support from the John Templeton Foundation. SUBSCRIBE to our YouTube Channel for all the latest from WSF VISIT our Website: http://www.worldsciencefestival.com/ LIKE us on Facebook: https://www.facebook.com/worldscience... FOLLOW us on Twitter: https://twitter.com/WorldSciFest Introduction of Participants 00:25 Program Begins: Quantum mechanics, weird or unfamiliar? 01:38 How much power is 20 Qubit's? 10:28 What are the pros and cons of Superconducting quantum computing? 25:55 The factorization problem 40:01 Is there a relationship between quantum computing and machine learning? 48:31 Q & A 54:17 This program was filmed live at the 2017 World Science Festival and edited for YouTube.
Views: 40567 World Science Festival
How does a blockchain work - Simply Explained
 
06:00
What is a blockchain and how do they work? I'll explain why blockchains are so special in simple and plain English! 💰 Want to buy Bitcoin or Ethereum? Buy for $100 and get $10 free (through my affiliate link): https://www.coinbase.com/join/59284524822a3d0b19e11134 📚 Sources can be found on my website: https://www.savjee.be/videos/simply-explained/how-does-a-blockchain-work/ 🐦 Follow me on Twitter: https://twitter.com/savjee ✏️ Check out my blog: https://www.savjee.be ✉️ Subscribe to newsletter: https://goo.gl/nueDfz 👍🏻 Like my Facebook page: https://www.facebook.com/savjee
Views: 2650037 Simply Explained - Savjee
Crypto Defenses for Real-World System Threats - Kenn White - Ann Arbor
 
01:36:58
Modern encryption techniques provide several important security properties, well known to most practitioners. Or are they? What are in fact the guarantees of, say, HTTPS TLS cipher suites using authenticated encryption, IPSec vs. SSL VPNs, Property Preserving Encryption, or token vaults? We live in an era of embedded Hardware Security Modules that cost less than $1 in volume, and countless options now exist for encrypting streaming network data, files, volumes, and even entire databases. Let's take a deep dive into the edge of developed practice to discuss real-world threat scenarios to public cloud and IoT data, and look closely at how we can address specific technical risks with our current encryption toolkits. Advanced math not required. Bio: Kenneth White is a security researcher whose work focuses on networks and global systems. He is co-director of the Open Crypto Audit Project (OCAP), currently managing a large-scale audit of OpenSSL on behalf of the Linux Foundation's Core Infrastructure Initiative. Previously, White was Principal Scientist at Washington DC-based Social & Scientific Systems where he led the engineering team that designed and ran global operations and security for the largest clinical trial network in the world, with research centers in over 100 countries. White co-founded CBX Group which provides security services to major organizations including World Health, UNICEF, Doctors without Borders, the US State Department, and BAO Systems. Together with Matthew Green, White co-founded the TrueCrypt audit project, a community-driven initiative to conduct the first comprehensive cryptanalysis and public security audit of the widely used TrueCrypt encryption software. White holds a Masters from Harvard and is a PhD candidate in neuroscience and cognitive science, with applied research in real-time classification and machine learning. His work on network security and forensics and been cited by media including the Wall Street Journal, Forbes, Reuters, Wired and Nature. White is a technical reviewer for the Software Engineering Institute, and publishes and speaks frequently on computational modeling, security engineering, and trust. He tweets @kennwhite.
Views: 865 Duo Security
How Many Cops to Catch a Robber? | Infinite Series
 
09:46
Viewers like you help make PBS (Thank you 😃) . Support your local PBS Member Station here: https://to.pbs.org/donateinfi Last episode, we used graph theory to figure out how a cop could catch a robber. But what happens when we introduce multiple cops? What happens if you have "lazy" cops or "drunk" robbers? Tweet at us! @pbsinfinite Facebook: facebook.com/pbsinfinite series Email us! pbsinfiniteseries [at] gmail [dot] com Previous Episode The Cops and Robbers Theorem | Infinite Series https://www.youtube.com/watch?v=9mJEu-j1KT0 Cops and Robbers is played on a finite and connected graph - meaning that any two vertices are joined by a path of edges. The game begins by placing a cop and a robber each on a single vertex; we say it “occupies” that vertex. They alternate moving along the edges, from a vertex to neighboring vertex. Or, on any given turn, the player can choose to not move -- to stay where they are. We’ll assume that the cop always goes first. If, eventually, the cop lands on the robber’s vertex, the game is over -- we say that the game is a “win” for the cop. But, if the robber can avoid the cop indefinitely, we say that the game is a win for the robber. Written and Hosted by Kelsey Houston-Edwards Produced by Rusty Ward Graphics by Ray Lux Assistant Editing and Sound Design by Mike Petrow Made by Kornhaber Brown (www.kornhaberbrown.com) Resources: M. Aigner and M. Fromme -- A Game of Cops and Robbers: https://www.math.ucdavis.edu/~erikslivken/classes/2016_spring_180/aigner%20fromme.pdf What is Cop Number? -Anthony Bonato http://www.math.ryerson.ca/~abonato/papers/whatis_copnumber_new.pdf The Game of Cops and Robbers on Graph - Anthony Bonato and Richard Nowakowski Anthony Bonato -- "What is... Cops and Robbers" http://www.ams.org/notices/201208/rtx120801100p.pdf Special Thanks to Anthony Bonato and Brendan Sullivan Big thanks to Matthew O'Connor and Yana Chernobilsky who are supporting us on Patreon at the Identity level! And thanks to Nicholas Rose and Mauricio Pacheco who are supporting us at the Lemma level!
Views: 63276 PBS Infinite Series
[DEFCON 21] Protecting Data with Short-Lived Encryption Keys and Hardware Root of Trust
 
22:00
Protecting Data with Short-Lived Encryption Keys and Hardware Root of Trust Speaker: Dan Griffin - President, JW Secure, Inc. The US National Security Agency has been public about the inevitability of mobile computing and the need to support cloud-based service use for secret projects. General Alexander, head of the NSA, recently spoke of using smartphones as ID cards on classified networks. And yet, mobile devices have a poor security track record, both as data repositories and as sources of trustworthy identity information. Cloud services are no better: current security features are oriented toward compliance and not toward real protection. What if we could provide a strong link between mobile device identity, integrity, and the lifecycle of data retrieved from the cloud using only the hardware shipped with modern smartphones and tablets? The good news is that we can do that with the trusted execution environment (TEE) features of the common system on a chip (SOC) mobile processor architectures using 'measurement-bound' encryption. This talk will describe how data can be encrypted to a specific device, how decryption is no longer possible when the device is compromised, and where the weaknesses are. I will demonstrate measurement-bound encryption in action. I will also announce the release of an open-source tool that implements it as well as a paper that describes the techniques for time-bound keys. This is likely the very same way that NSA will be protecting the smartphones that will be used for classified information retrieval. Come learn how your government plans to keep its own secrets and how you can protect yours. Dan Griffin (@JWSdan) is the founder of JW Secure and is a Microsoft Enterprise Security MVP. Dan is the author of the books Cloud Security and Control, published in 2012, and The Four Pillars of Endpoint Security, to be published in 2013, and is a frequent conference speaker. Dan holds a Master's degree in Computer Science from the University of Washington and a Bachelor's degree in Computer Science from Indiana University.
Views: 261 TalksDump
Certified Network Defender (CND)
 
01:35
https://www.eccouncil.org/programs/certified-network-defender-cnd/ About the Program Certified Network Defender (CND) is a vendor-neutral, hands-on, instructor-led comprehensive network security certification training program. It is a skills-based, lab intensive program based on a job-task analysis and cybersecurity education framework presented by the National Initiative of Cybersecurity Education (NICE). The course has also been mapped to global job roles and responsibilities and the Department of Defense (DoD) job roles for system/network administrators. The course is designed and developed after extensive market research and surveys. The program prepares network administrators on network security technologies and operations to attain Defense-in-Depth network security preparedness. It covers the protect, detect and respond approach to network security. The course contains hands-on labs, based on major network security tools and techniques which will provide network administrators real world expertise on current network security technologies and operations. The study-kit provides you with over 10 GB of network security best practices, assessments and protection tools. The kit also contains templates for various network policies and a large number of white papers for additional learning. https://www.eccouncil.org/programs/certified-network-defender-cnd/
Views: 33497 EC Council
Quantum Computers Explained – Limits of Human Technology
 
07:17
Where are the limits of human technology? And can we somehow avoid them? This is where quantum computers become very interesting. Check out THE NOVA PROJECT to learn more about dark energy: www.nova.org.au Support us on Patreon so we can make more stuff: https://www.patreon.com/Kurzgesagt?ty=h Get the music of the video here: https://soundcloud.com/epicmountain/quantum-computers https://epicmountainmusic.bandcamp.com/track/quantum-computers http://epic-mountain.com Wakelet: https://wakelet.com/wake/42ji9UMJzN?v=st Or follow us on social media or reddit: http://kurzgesagt.org https://www.reddit.com/r/kurzgesagt https://www.facebook.com/Kurzgesagt https://twitter.com/Kurz_Gesagt THANKS A LOT TO OUR LOVELY PATRONS FOR SUPPORTING US: Tamago231, H.H. Lewis, Kirin Tantinon, David, Max Lesterhuis, Marek Belski, Gisle, Colin Millions, Gregory Wolfe II, Lenoir Preminger, Abel X, Matt Knights, Amjad Al Taleb, Ian Bruce, Kris Wolfgramm, 麒麟 于, Christopher Shaw, 靖羊, Tomas Grolmus, Essena O’Neill, Kyle Messner, Pedro Devoto, Mark Radford, Ann-Marie Denham, Davide Pluda, Rik Vermeer, Justin Ritchie, Nicole White, Whireds, Claus Vallø, Jason Talley, Andrew Wu, Christian Dechery, Michael Howell, Michal Hanus, Cavit, Amary Wenger, JDKBot, Jason Eads, FreedomEagleAmerica, Roberto Maddaloni, TiagoF11, Harsha CS, Abhimanyu Yadav, Tracy Tobkin, Mike Fuchs, Elizabeth Mart, Jacob Wenger, Jeff Udall, Ricardo Affonso, Mauro Boffardi, Audrin Navarro, Troy Ross, Keith Tims, Santiago Perez, James, Jack Devlin, Chris Peters, Kenny Martin, Frederick Pickering, Lena Savelyeva, Ian Seale, Charles Ju, Brett Haugen, David Ramsey, Benjamin Dittes, Michelle Schoen, Albert Harguindey Sanchez, Michael King, Alex Kyriacou Alla Khvatova Thomas Rowan, Siim Sillamaa, David Bennell, Janzen,Bryn Farnsworth, Adam Recvlohe, Manuel Arredondo, Fred McIntyre, Maldock Manrique, Дмитрий, Ishita Bisht, Jake Ludwig, Zach Seggie, Casey Sloan, Myndert Papenhuyzen, rheingold3, AncientCulture, Orion Mondragon, Jan, Michael Kuperman, Alexander Argyropoulos Quantum Computers Explained – Limits of Human Technology Help us caption & translate this video! http://www.youtube.com/timedtext_cs_panel?c=UCsXVk37bltHxD1rDPwtNM8Q&tab=2
Stanford Engineering Hero Martin Hellman on inventing cryptography
 
02:21
In the 1970s, Stanford engineer Martin Hellman and two colleagues risked their careers to introduce to the world public-key cryptography that today secures literally trillions of dollars in transactions every day. Watch the full 90-minute lecture: http://youtu.be/XDgLDsUU7og.
U.S. Park Service Director: A Dream Job
 
03:32
Originally published at - http://learningenglish.voanews.com/a/3430801.html
Views: 2135 VOA Learning English
Scanner Audio | San Diego Police Involved Shooting | 2.14.19
 
06:49
A standoff suspect in Paradise Hills surrendered to SDPD after he was shot by a SWAT officer. The San Diego Police Department responded to the 1800 block of Altamont Court, east of Reo Drive, at around 2:15 p.m. Thursday to investigate reports of a man with a rifle. SDPD said a neighbor saw the man with the weapon in his backyard and called police. Officers arrived at the scene and attempted to make contact with the suspect and he fired two shots from his gun. The gunfire prompted a lockdown at nearby Paradise Hills Elementary School. Police evacuated some nearby residents and told others to shelter in place. SDPD said the man went out on his front porch and aimed his rifle at police. That's when a SWAT officer fired at him and struck him, according to SDPD. The suspect retreated into his home bt came back out moments later. he was loaded onto a gurney and taken away in an ambulance. SDPD tweeted the suspect was in custody just after 4 p.m. The extent of his injuries is unknown. source: https://www.nbcsandiego.com/news/local/Police-Activity-Paradise-Hills-San-Diego-Altamont-Court-Plaza-Boulevard-505856541.html Please consider showing support by making a donation Patreon: https://www.patreon.com/IrateProductions Paypal: paypal.me/Uaptsd Venmo: https://venmo.com/IrateProductions New T-Shirts Available Now shop.spreadshirt.com/irate-productions Equipment- Camera: Canon HF G40 https://amzn.to/2ANtbQi Microphone/Handle: Sevenoak MicRig https://amzn.to/2Md349B Light: LitraTorch https://amzn.to/2SWBD6H Scanner: Uniden BCD436HP https://amzn.to/2SXQWfv OnReal Body Camera 1080p https://amzn.to/2Meknr3 Phone {Live}: Samsung Galaxy S9 *Subscribe to My Backup Channel: Copwatch San Diego https://www.youtube.com/channel/UC6JEzB0dRiMjnHnCtsByEfQ Copwatch Playlist: https://tinyurl.com/UAPTSDCOPWATCH ★★★★★★★★★★★★★★★★★★★★★★ ©IRATE Productions Facebook: https://www.facebook.com/irateprod/ Twitter: https://twitter.com/Irate420 United Against Police Terror - San Diego Facebook: https://www.facebook.com/uaptsd/ Twitter: https://twitter.com/UAPTSD Website: https://uaptsd.org/ ★★★★★★★★★★★★★★★★★★★★★★ *Copyright Notice: All rights reserved. No content of this channel may be reproduced, distributed, or transmitted in any form or by any means, including duplicating, editing, and/or mirroring,. without the prior written permission of the publisher, except in the case of brief quotations embodied in critical reviews and certain other noncommercial uses permitted by copyright law. For permission requests, contact IRATE Productions at [email protected] #Copwatch #SanDiego #FilmThePolice
Views: 1077 IRATE Productions
DEF CON 23 - Ryan Castellucci - Cracking CryptoCurrency Brainwallets
 
42:49
Imagine a bank that, by design, made everyone's password hashes and balances public. No two-factor authentication, no backsies on transfers. Welcome to "brainwallets", a way for truly paranoid cryptocurrency users to wager their fortunes on their ability to choose a good password or passphrase. Over the last decade, we've seen the same story play out dozens of times - a website is broken into, the user database is posted online, and most of the password hashes are cracked. Computers are now able make millions, billions or even trillions of guesses per second. Every eight character password you can type on a standard keyboard and every combination of five common english words could be tried in less than a day by today's botnets. Can people come up with passphrases able to stand up to that when money is on the line? Let's find out. For this talk, I will be releasing my high speed brainwallet cracker, "Brainflayer". I'll cover a history of brainwallets, safer passphrase-based wallet generation, passphrase security, in-the-wild cracking activity, and how I accidently stole 250 Bitcoins (and tracked down the owner to give them back). Ryan Castellucci has been interested in cryptography since childhood when his parents gave him a copy of "Codes, Ciphers and Secret Writing". He soon learned to program and wrote a tool to crack simple substitution ciphers. More recently, he co-spoke with Dan Kaminsky at DEF CON 22 and was a finalist in the 2014 Underhanded Crypto Contest. For his day job at White Ops, he finds new and exciting ways to tease out the subtle differences between bots and human-controlled web browsers.
Views: 36637 DEFCONConference
Backdoors, Government Hacking and The Next Crypto Wars
 
44:40
Backdoors, Government Hacking and The Next Crypto Wars Law enforcement agencies claim they are "going dark". Encryption technologies have finally been deployed by software companies, and critically, enabled by default, such that emails are flowing over HTTPS, and disk encryption is now frequently used. Friendly telcos, who were once a one-stop-shop for surveillance can no longer meet the needs of our government. What are the FBI and other law enforcement agencies doing to preserve their spying capabilities? The FBI is rallying political support in Washington, DC for legislation that will give it the ability to fine Internet companies unwilling to build surveillance backdoors into their products. Even without such legislation, the US government has started to wage war against companies that offer secure communications services to their users. As the FBI's top lawyer said in 2010, "[Companies] can promise strong encryption. They just need to figure out how they can provide us plain text." At the same time, law enforcement agencies in the United States and elsewhere are acquiring the tools to hack into the computers of their own citizens. The FBI has purchased custom-built software, while other law enforcement agencies in the US and elsewhere use off-the-shelf spyware from companies like Gamma and Hacking Team. Regardless of the software they use, the capabilities are generally similar: They can enable a computer's webcam and microphone; collect real-time location data; and copy emails, web browsing records, and other documents. Speaker: Christopher Soghoian EventID: 5478 Event: 30th Chaos Communication Congress [30c3] by the Chaos Computer Club [CCC] Location: Congress Centrum Hamburg (CCH); Am Dammtor; Marseiller Straße; 20355 Hamburg; Germany Language: english Begin: Sun, 12/29/2013 21:45:00 +01:00 Lizenz: CC-by
Views: 3091 NuoViso
Cryptography Resilient to Physical Attacks
 
11:34
Yael Kalai, researcher at Microsoft Research New England discusses how, with all the progress made in the field of cryptography, security continues to be breached. Complicating matters are hackers, who are becoming increasingly sophisticated, almost making security worse than it was more than 20 years ago. Communications remains the largest field of encryption leaks. Physical attacks can consist of timing attacks, power attacks, and acoustic attacks, while tampering attacks include fault and radiation attacks.
Views: 392 Microsoft Research
Ever wonder how Bitcoin (and other cryptocurrencies) actually work?
 
26:21
Bitcoin explained from the viewpoint of inventing your own cryptocurrency. Videos like these made possible by patreon: https://patreon.com/3blue1brown Protocol Labs: https://protocol.ai/ Interested in contributing? https://protocol.ai/join/ Special thanks to the following patrons: http://3b1b.co/btc-thanks Some people have asked if this channel accepts contributions in cryptocurrency form as an alternative to Patreon. As you might guess, the answer is yes :). Here are the relevant addresses: ETH: 0x88Fd7a2e9e0E616a5610B8BE5d5090DC6Bd55c25 BTC: 1DV4dhXEVhGELmDnRppADyMcyZgGHnCNJ BCH: qrr82t07zzq5uqgek422s8wwf953jj25c53lqctlnw LTC: LNPY2HEWv8igGckwKrYPbh9yD28XH3sm32 Supplement video: https://youtu.be/S9JGmA5_unY Music by Vincent Rubinetti: https://soundcloud.com/vincerubinetti/heartbeat Here are a few other resources I'd recommend: Original Bitcoin paper: https://bitcoin.org/bitcoin.pdf Block explorer: https://blockexplorer.com/ Blog post by Michael Nielsen: https://goo.gl/BW1RV3 (This is particularly good for understanding the details of what transactions look like, which is something this video did not cover) Video by CuriousInventor: https://youtu.be/Lx9zgZCMqXE Video by Anders Brownworth: https://youtu.be/_160oMzblY8 Ethereum white paper: https://goo.gl/XXZddT If you want to contribute translated subtitles or to help review those that have already been made by others and need approval, you can click the gear icon in the video and go to subtitles/cc, then "add subtitles/cc". I really appreciate those who do this, as it helps make the lessons accessible to more people. Music by Vince Rubinetti: https://vincerubinetti.bandcamp.com/album/the-music-of-3blue1brown ------------------ 3blue1brown is a channel about animating math, in all senses of the word animate. And you know the drill with YouTube, if you want to stay posted on new videos, subscribe, and click the bell to receive notifications (if you're into that). If you are new to this channel and want to see more, a good place to start is this playlist: http://3b1b.co/recommended Various social media stuffs: Website: https://www.3blue1brown.com Twitter: https://twitter.com/3Blue1Brown Patreon: https://patreon.com/3blue1brown Facebook: https://www.facebook.com/3blue1brown Reddit: https://www.reddit.com/r/3Blue1Brown
Views: 2435058 3Blue1Brown
Woodrow Hartzog: "Privacy’s Blueprint" | Talks at Google
 
59:42
Design is one of the most important but overlooked factors that determines people’s privacy. Social media apps, surveillance technologies, and the Internet of Things are all built in ways that make it hard to guard personal information. And the law says this is okay because it is up to users to protect themselves ― even when the odds are deliberately stacked against them. In this talk describing his book, "Privacy’s Blueprint," Woodrow Hartzog pushes back against this state of affairs, arguing that the law should require software and hardware makers to respect privacy in the design of their products. Current legal doctrine treats technology as though it were value-neutral: only the user decides whether it functions for good or ill. But this is not so. As Hartzog explains, popular digital tools are designed to expose people and manipulate users into disclosing personal information. Privacy gains will come from better rules for products, not users. The current model of regulating use fosters exploitation. Privacy’s Blueprint aims to correct this by developing the theoretical underpinnings of a new kind of privacy law responsive to the way people actually perceive and use digital technologies. The law can demand encryption. It can prohibit malicious interfaces that deceive users and leave them vulnerable. It can require safeguards against abuses of biometric surveillance. It can, in short, make the technology itself worthy of our trust. Get the book: https://goo.gl/hBBkmg
Views: 1608 Talks at Google
Top 10 WEIRD CASES of the STREISAND EFFECT
 
08:43
Hey YouTube, Jim here! Welcome to Top10Archive! I know what you're thinking, and no, the Streisand Effect isn't when you break out Barbra Streisand's greatest hits and people join in, dancing uncontrollably as if bitten by the Streisand bug. But, in plain terms, the Streisand effect refers to when something is censored, but in being censored, winds up getting more publicity in the process. We've compiled ten instances of this unusual and often hilarious effect for your viewing pleasure! Support us by shopping on Amazon! http://tinyurl.com/njwyzzn 10. Uber in Central London 9. Samsung vs. Ghostlyrich 8. AACS Encryption Key 7. The Pirate Bay 6. The Interview 5. Amy's Baking Company 4. The Prisoners of Tunisia 3. The J-Law Leaks 2. The Beyonce Photos 1. Barbra Streisand Voice Over Talent: https://www.youtube.com/user/thought2/
Views: 8165 Top 10 Archive
USENIX Enigma 2016 - Keys Under Doormats: Mandating Insecurity...
 
21:37
Ronald Rivest, Massachusetts Institute of Technology Twenty years ago, law enforcement organizations lobbied to require data and communication services to engineer their products to guarantee law enforcement access to all data. After lengthy debate and vigorous predictions of enforcement channels “going dark,” these attempts to regulate the emerging Internet were abandoned. In the intervening years, innovation on the Internet flourished, and law enforcement agencies found new and more effective means of accessing vastly larger quantities of data. Today we are again hearing calls for regulation to mandate the provision of exceptional access mechanisms. In this report, a group of computer scientists and security experts, many of whom participated in a 1997 study of these same topics, has convened to explore the likely effects of imposing extraordinary access mandates. We have found that the damage that could be caused by law enforcement exceptional access requirements would be even greater today than it would have been 20 years ago. In the wake of the growing economic and social cost of the fundamental insecurity of today’s Internet environment, any proposals that alter the security dynamics online should be approached with caution. Exceptional access would force Internet system developers to reverse “forward secrecy” design practices that seek to minimize the impact on user privacy when systems are breached. The complexity of today’s Internet environment, with millions of apps and globally connected services, means that new law enforcement requirements are likely to introduce unanticipated, hard to detect security flaws. Beyond these and other technical vulnerabilities, the prospect of globally deployed exceptional access systems raises difficult problems about how such an environment would be governed and how to ensure that such systems would respect human rights and the rule of law. Sign up to find out more about Enigma conferences: https://www.usenix.org/conference/enigma2016#signup Watch all Enigma 2016 videos at: http://enigma.usenix.org/youtube
Apple's Tim Cook talks tech and privacy with 60 Minutes
 
02:15
Charlie Rose sat down with Apple CEO Tim Cook for a wide-ranging interview. Cook addressed hot-button issues surrounding his company, including tax evasion, encryption technology, and manufacturing products in China.
Views: 81240 CBS Evening News
Encryption Protects Free Speech: Ladar Levison on Online Freedom, Net Neutrality, and Cryptography
 
10:06
"If we are going to continue to preserve our right to free speech in the electronic age, then we need to use tools like encryption," says Ladar Levison, founder of the Lavabit, the encyrpted email service used by Edward Snowden prior to the NSA leaks. Levison shut down Lavabit after the FBI asked for access to all of his users data during what many suspect was a hunt for Snowden. He talked about that decision in an interview with Reason TV last year. Reason TV's Zach Weissmueller sat down with Levison at Freedom Fest in Las Vegas this July to discuss the latest developments in the Dark Mail Alliance, a collaborative efforts by some of the world's top cryptographers to create a user-friendly email service that encrypts data on the user devices themselves, rather than over a server. As Levison describes it, this technical fix would prevent the government from doing what it tried to do to him when it asked that he divert all traffic onto their servers, because the diverted traffic would already be encrypted at the device level and hence already unreadable by a third party by the time it reached any server. Levison also disussed the recent Congressional hearing on encryption, the state of free speech on the internet, his alternative to FCC enforcement of neutrality, and how his outlook has changed since the government tried to spy on his users. "I find myself becoming more radicalized," says Levison. "I love this country. But what I despise is the job our government is doing. I've come to hate the government we have." Approximately 10 minutes. Produced by Zach Weissmueller. Shot by Todd Krainin, Paul Detrick, and Meredith Bragg. Music is "Slow Grind" by Digital Sin. Visit http://reason.com/reasontv for downloadable versions of this video.
Views: 5577 ReasonTV
Encryption.mp4
 
03:59
How to write a program to encrypt a message in Mathematica, using linear algebra.
Views: 171 vigvig
Why Do Computers Use 1s and 0s? Binary and Transistors Explained.
 
07:00
Want to support me? Patreon: https://www.patreon.com/H3Vtux A short explanation of binary. Upon reviewing the finished video I realized I made a mistake in some of my vocabulary. A byte can represent a number up to 255 but it can actually represent 256 different VALUES, as 0 is a value in and of itself. Rerecording and reanimating would be a painful process, so forgive me this mistake.
Views: 643449 H3Vtux
Confidentiality In A Post Quantum World: the case of LEDAkem and LEDApkc
 
57:50
A Google TechTalk, 2018-12-05, presented by Alessandro Barenghi ABSTRACT: This talk will present LEDAkem and LEDApkc, a key agreement scheme and a public key encryption scheme resistant against attacks with both classical and quantum computers. In this talk I will present the schemes and report recent results on how we can automatically generate key sizes and cryptosystem parameters tailored for a desired security level, providing practical performance figures. About the speaker: Alessandro Barenghi is currently assistant professor at Politecnico di Milano, and one of the proposers of the LEDAkem/LEDApkc cryptoschemes to the NIST post-quantum standardization initiative.
Views: 1031 GoogleTechTalks