ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

265 results

Trezor
Trustless by Design: Trezor reveals a new standard in crypto security

Over a decade ago, Trezor started the hardware wallet industry. On October 21 at 8:00 AM UTC, we're back to reveal the future of ...

45:52
Trustless by Design: Trezor reveals a new standard in crypto security

18,430 views

Streamed 3 months ago

Beo Beo
Every Type Of Blockchain Attack Explained in 8 Minutes

blockchain #crypto #hacker #cyberattack #bitcoin Every type of blockchain attack, explain in 8 minutes, by animation.

8:04
Every Type Of Blockchain Attack Explained in 8 Minutes

635 views

6 months ago

Mental Outlaw
Make ANY Messaging Service E2E Encrypted With PGP

In this video I explain how you can make any messaging or text service end to end encrypted and completely private by ...

9:06
Make ANY Messaging Service E2E Encrypted With PGP

94,924 views

8 months ago

Digital Ascent
This Is The Most Important Feature In Your Browser - TLS Explained in Under 4 Minutes

Ever wondered how your browser keeps your data safe? In this quick video I break down the core concepts of TLS (Transport ...

3:51
This Is The Most Important Feature In Your Browser - TLS Explained in Under 4 Minutes

169 views

4 months ago

DEFCONConference
DEF CON 33 - Post Quantum Panic: When Will the Cracking Begin, & Can We Detect it?  - K Karagiannis

Quantum computers will crack RSA and ECC and weaken symmetric encryption, but when? NIST is betting it won't happen before ...

39:29
DEF CON 33 - Post Quantum Panic: When Will the Cracking Begin, & Can We Detect it? - K Karagiannis

148,205 views

3 months ago

CYBERGRC HUB
Master The 8 CISSP Domains in Just 10 Minutes!

Master the 8 CISSP Domains in Just 10 Minutes! Are you preparing for the CISSP certification or looking to enhance your ...

10:25
Master The 8 CISSP Domains in Just 10 Minutes!

1,108 views

10 months ago

When Shift Happens
SUI Network Founder:  We Built What Ethereum and Solana Can't | E155

Kostas Chalkias, co-founded Sui after leaving Facebook's Libra - and named his son Kryptos. While other blockchains compete ...

1:00:39
SUI Network Founder: We Built What Ethereum and Solana Can't | E155

58,138 views

2 weeks ago

Trezor
Is Your Trezor Hardware Wallet Real? How Trezor Fights Counterfeits

Your crypto security starts with genuine hardware. When you buy a Trezor hardware wallet, you trust it to keep your crypto safe.

7:50
Is Your Trezor Hardware Wallet Real? How Trezor Fights Counterfeits

16,590 views

7 months ago

Tech Universe
"Quantum Computers: The End of Cybersecurity as We Know It?"

Is Quantum Computing the Answer to Cybersecurity Threats? Quantum Computing vs Cybersecurity: Are We Ready?

8:37
"Quantum Computers: The End of Cybersecurity as We Know It?"

6 views

10 months ago

Alice Success Spark ⚡️
Crypto Explained in 5 Mins! (Total Beginners 2025)

CRYPTO MADE SIMPLE! Master Bitcoin, blockchain & digital money in just 5 minutes – perfect for TOTAL beginners!

8:43
Crypto Explained in 5 Mins! (Total Beginners 2025)

14 views

5 months ago

The 5 PM Podcast
Quantum-Safe Encryption Explained | Episode 201

In this episode, we dive into quantum-safe encryption and its revolutionary technology of photon polarization. Discover how ...

1:56
Quantum-Safe Encryption Explained | Episode 201

23 views

11 months ago

The Hidden Schematic
Will Quantum Computers Break the Internet? The "Q-Day" Threat Explained

Imagine a day when all encryption is broken. Bank accounts are drained, military secrets are exposed, and the internet as we ...

9:59
Will Quantum Computers Break the Internet? The "Q-Day" Threat Explained

917 views

2 months ago

The Coding Gopher
Hashing Explained (SHA-256, MD5)

Check out Clerk: https://go.clerk.com/X1kC4pR ❤️ Get 40% OFF CodeCrafters: ...

11:27
Hashing Explained (SHA-256, MD5)

24,692 views

3 months ago

The Coding Gopher
OAuth is easier than you think...

Check out Passbolt: https://hubs.li/Q03HMslT0 ❤️ Get 40% OFF CodeCrafters: ...

10:23
OAuth is easier than you think...

18,654 views

2 months ago

💎 Crypto Gems 💎
ZKP Presale 2026: Zero Knowledge Proof Explained & Giveaway

Master the ZKP Presale 2026 and zero knowledge proof in 2026! ✓ ZKP Official: https://linktr.ee/ZeroKnowledge_Proof

5:45
ZKP Presale 2026: Zero Knowledge Proof Explained & Giveaway

6,969 views

7 days ago

Abdullahi Bile
What is XCN Everything You Need to Know | podcast episode 27 | @Bilepodcast #xcn #xrp

What is Onyx Coin (XCN)? In this video, we break down everything you need to know about Onyx Coin (XCN)—its use cases, ...

23:11
What is XCN Everything You Need to Know | podcast episode 27 | @Bilepodcast #xcn #xrp

1,505 views

10 months ago

kompowiec2Alt
Public Key Steganography: Explained

Discover how public key cryptography can be combined with steganography to send hidden messages securely. In this video, we ...

2:59
Public Key Steganography: Explained

5 views

3 months ago

Trezor
Other Chips are Hidden Behind NDAs. Not This One.

Many “secure” chips in hardware wallets aren't secure at all. In 2019 we tested a commonly used Secure Element chip and ...

24:03
Other Chips are Hidden Behind NDAs. Not This One.

1,389 views

2 months ago

Vu Hung Nguyen (Hưng)
21 A Toolkit for Digital Trust

Deep Dive into Cryptography: SHA, HMAC, RSA & Diffie-Hellman Explained Overview: This episode provides a detailed technical ...

9:11
21 A Toolkit for Digital Trust

2 views

3 months ago

Vu Hung Nguyen (Hưng)
11 Cryptographic Hashes: Your Data's Digital Fingerprint #AI #NLP #Tech #Podcast #Learning

Cryptographic Hash Functions Explained: SHA, Security & Applications Overview: This episode provides a comprehensive look ...

7:21
11 Cryptographic Hashes: Your Data's Digital Fingerprint #AI #NLP #Tech #Podcast #Learning

10 views

4 months ago

Vu Hung Nguyen (Hưng)
20 Symmetric Encryption

Symmetric Encryption Fundamentals: Principles, Algorithms, and Modes Explained Overview: This episode provides a ...

6:31
20 Symmetric Encryption

2 views

3 months ago

Nym
zk-Nyms Explained | Anonymous Access with Zero-Knowledge Proofs | Nym

zk-Nym credentials enable users to prove access rights without revealing personal identity or linking actions across services.

1:44
zk-Nyms Explained | Anonymous Access with Zero-Knowledge Proofs | Nym

301 views

5 months ago

Anything Explained
What Is Crypto?

What exactly is cryptocurrency? In this beginner-friendly video, we break down what crypto is, how it works, why it exists, and why ...

9:28
What Is Crypto?

5 views

2 months ago

InfoTech Insights
Why Your Passwords Are No Longer Safe (and What to Do Instead)

Passwords are broken and are no longer safe. Hackers can crack complex passwords in minutes, and reusing them across sites ...

8:47
Why Your Passwords Are No Longer Safe (and What to Do Instead)

113 views

3 months ago

TalkTensors: AI Podcast Covering ML Papers
Secure AI Images: Crypto Flaws in Semantic Watermarks Explained

This episode dives deep into the security of semantic watermarks for AI-generated images, focusing on cryptographic ...

15:56
Secure AI Images: Crypto Flaws in Semantic Watermarks Explained

12 views

8 months ago