ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

3,145 results

Nelson Ford
The Encryption Tech That Could Change Everything

Homomorphic encryption vs confidential computing explained to help you choose the right data protection. Work with me: ...

4:50
The Encryption Tech That Could Change Everything

692 views

1 year ago

Mental Outlaw
Bad OPSEC - How The Feds Traced a Monero User

In this video I discuss how the hacker responsible for the Vastaamo data breach incident was caught due to numerous OPSEC ...

13:55
Bad OPSEC - How The Feds Traced a Monero User

773,149 views

1 year ago

Improbable Matter
How Quantum Key Distribution Works (BB84 & E91)

Discussion about how quantum key distribution methods based on measuring the polarization of photons can be used to keep ...

12:41
How Quantum Key Distribution Works (BB84 & E91)

66,584 views

2 years ago

Matthew Weathers
The unsolved math problem which could be worth a billion dollars.

No one on Earth knows how to reverse one of the most popular computer algorithms. Yet it's really easy to compute one-way.

5:59
The unsolved math problem which could be worth a billion dollars.

2,510,813 views

6 years ago

Canadian Coding
Animated Explanation of the one-time pad

Video walkthrough of code implementation: https://youtu.be/50XM-h3h6Fw Explanation of converting from decimal to binary: ...

4:33
Animated Explanation of the one-time pad

52,265 views

5 years ago

Q-Leap Edu Quantum Communications
10-1 Introduction to entanglement-based QKD

Lesson 10 E91: Entanglement-based QKD Step 1: Introduction to entanglement-based QKD In this lesson, we explore the first ...

4:10
10-1 Introduction to entanglement-based QKD

6,735 views

4 years ago

Mental Outlaw
How Monero Users Get Traced (RUN YOUR OWN NODE!)

In this video I discuss how Chainalysis has been able to trace some monero transactions by running compromised nodes and ...

11:11
How Monero Users Get Traced (RUN YOUR OWN NODE!)

188,510 views

1 year ago

Bitcoin Explained
Bitcoin's Cryptography Explained - Bitcoin's Curve

Bitcoin uses a specific elliptic curve called "secp256k1". Understanding how this curve is defined will make it easy to understand ...

14:43
Bitcoin's Cryptography Explained - Bitcoin's Curve

113 views

1 year ago

Justice & Peace Netherlands
PGP Encryption Explained

DISCLAIMER: Researchers have recently discovered a major vulnerability with PGP encryption. We recommend that you stop ...

5:57
PGP Encryption Explained

27,158 views

8 years ago

internet-class
What is symmetric encryption?

Cryptography has a fascinating history going back thousands of years. However, until relatively recently all cryptographic ...

4:49
What is symmetric encryption?

10,211 views

9 years ago

Beo Beo
Every Type Of Blockchain Attack Explained in 8 Minutes

blockchain #crypto #hacker #cyberattack #bitcoin Every type of blockchain attack, explain in 8 minutes, by animation.

8:04
Every Type Of Blockchain Attack Explained in 8 Minutes

558 views

6 months ago

Mental Outlaw
Signal Just Published Post Quantum E2E Encryption

In this video I discuss how the Signal foundation developed PQXDH (Post Quantum Extended Diffie Helmen) an encryption ...

8:32
Signal Just Published Post Quantum E2E Encryption

259,760 views

2 years ago

Q-Leap Edu Quantum Communications
9-3 BB84 Protocol

Lesson 9 BB84: Single-photon QKD Step 3: BB84 Protocol We take a closer look at BB84, the first example of a cryptographic ...

13:39
9-3 BB84 Protocol

10,425 views

4 years ago

internet-class
What is a trapdoor function?

Modern cryptography depends on the existence of several special kinds of mathematical functions. One important kind is a ...

4:06
What is a trapdoor function?

19,513 views

9 years ago

Mental Outlaw
Make ANY Messaging Service E2E Encrypted With PGP

In this video I explain how you can make any messaging or text service end to end encrypted and completely private by ...

9:06
Make ANY Messaging Service E2E Encrypted With PGP

94,577 views

8 months ago

Saral Tayal
Encryption explained like you are 5 years old (non technical)

Full article on https://tinkerspark.org/encryption-simply-explained-not-technical/ A technological beauty, learn how encryption ...

6:32
Encryption explained like you are 5 years old (non technical)

379 views

7 years ago

Cointelegraph
Smart contracts for beginners, explained (in 6 minutes) | Cryptopedia

We explain what smart contracts are and how they work. #Cointelegraph #crypto #smartcontracts Subscribe to Cointelegraph: ...

6:14
Smart contracts for beginners, explained (in 6 minutes) | Cryptopedia

72,865 views

3 years ago

Taylor Gibson
Lesson 27: Introduction to Block Ciphers

In this lesson we'll be looking at a new type of encryption that's known as a block cipher so far in this course we've covered ...

10:06
Lesson 27: Introduction to Block Ciphers

3,156 views

3 years ago

internet-class
What is a certificate authority?

Establishing a secure communication channel is important—​but how do you know you are communicating with the right entity?

6:18
What is a certificate authority?

73,137 views

9 years ago

aantonop
Cryptocurrency Explained: What is a Mnemonic phrase? [Understanding Bitcoin Ethereum Crypto Keys]

What is a cryptocurrency mnemonic phrase? How does it relate to a bitcoin or ethereum private key? Are they the same thing?

9:50
Cryptocurrency Explained: What is a Mnemonic phrase? [Understanding Bitcoin Ethereum Crypto Keys]

23,148 views

5 years ago

Q-Leap Edu Quantum Communications
9-4 Eavesdropper detection

Lesson 9 BB84: Single-photon QKD Step 4: Eavesdropper detection In this step, we discuss how the laws of quantum mechanics ...

7:15
9-4 Eavesdropper detection

3,614 views

4 years ago

Tom Olzak
Cryptography Part 5: Key Management

In this lesson, I describe methods of protecting and safely using private and symmetric keys, including secure key generation, ...

6:05
Cryptography Part 5: Key Management

8,640 views

4 years ago

Tom Olzak
Cryptography Part 6 - Cryptanalytic Attacks

This lesson looks at attack models that are used to test the strength of cryptographic ciphers and hashing, including ...

8:26
Cryptography Part 6 - Cryptanalytic Attacks

6,480 views

4 years ago

Cypher Inc.
Cryptography Fundamentals for Ethical Hacking Beginners

Learn the basics of cryptography and its role in ethical hacking. Explore symmetric and asymmetric encryption, hash functions, ...

17:04
Cryptography Fundamentals for Ethical Hacking Beginners

263 views

2 years ago

Luke Smith
I Encrypt All My USB Drives with LUKS.

I show you how to setup an encrypted USB drive with a LUKS partition and cryptsetup. I wrote a script to automatically decrypt and ...

11:32
I Encrypt All My USB Drives with LUKS.

87,363 views

2 years ago