All language subtitles for 2. (A+B) Security Intro Public+Private Keys,SHA1,Turing,NSA+Other Security Topics

af Afrikaans
ak Akan
sq Albanian
am Amharic
ar Arabic Download
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bem Bemba
bn Bengali
bh Bihari
bs Bosnian
br Breton
bg Bulgarian
km Cambodian
ca Catalan
ceb Cebuano
chr Cherokee
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
ee Ewe
fo Faroese
tl Filipino
fi Finnish
fr French
fy Frisian
gaa Ga
gl Galician
ka Georgian
de German
el Greek
gn Guarani
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ia Interlingua
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
rw Kinyarwanda
rn Kirundi
kg Kongo
ko Korean
kri Krio (Sierra Leone)
ku Kurdish
ckb Kurdish (Soranî)
ky Kyrgyz
lo Laothian
la Latin
lv Latvian
ln Lingala
lt Lithuanian
loz Lozi
lg Luganda
ach Luo
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mfe Mauritian Creole
mo Moldavian
mn Mongolian
my Myanmar (Burmese)
sr-ME Montenegrin
ne Nepali
pcm Nigerian Pidgin
nso Northern Sotho
no Norwegian
nn Norwegian (Nynorsk)
oc Occitan
or Oriya
om Oromo
ps Pashto
fa Persian
pl Polish
pt-BR Portuguese (Brazil)
pt Portuguese (Portugal)
pa Punjabi
qu Quechua
ro Romanian
rm Romansh
nyn Runyakitara
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
sh Serbo-Croatian
st Sesotho
tn Setswana
crs Seychellois Creole
sn Shona
sd Sindhi
si Sinhalese
sk Slovak
sl Slovenian
so Somali
es Spanish
es-419 Spanish (Latin American)
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
tt Tatar
te Telugu
th Thai
ti Tigrinya
to Tonga
lua Tshiluba
tum Tumbuka
tr Turkish
tk Turkmen
tw Twi
ug Uighur
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
wo Wolof
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:00,830 --> 00:00:06,770 We know that banks and credit card companies charge us high fees but they do help us protect the security 2 00:00:06,770 --> 00:00:09,460 of our money again through their high fees. 3 00:00:09,920 --> 00:00:16,910 Now if we're going to invest in and use crypto currencies we need to not only thoroughly understand 4 00:00:17,060 --> 00:00:25,070 crypto currency security concepts but we have to also be willing to spend some money on purchasing devices 5 00:00:25,310 --> 00:00:33,050 that will act as digital wallets because only you can protect your crypto currencies and not the banks 6 00:00:33,080 --> 00:00:34,970 and not the credit card companies. 7 00:00:35,060 --> 00:00:40,850 So we should think about the amount of money that we're going to save in bank and credit card fees in 8 00:00:40,850 --> 00:00:42,100 the long run. 9 00:00:42,100 --> 00:00:48,830 And we should use part of those savings to buy and use what are called cold and hot storage wallets 10 00:00:49,160 --> 00:00:53,530 meaning online and offline security products for your cryptocurrency. 11 00:00:54,610 --> 00:01:01,090 And so we're going to cover wallets in much more detail later on the course in part 3. 12 00:01:01,390 --> 00:01:09,150 But as we build upon the security and other crucial cryptocurrency topics one later at a time we're 13 00:01:09,150 --> 00:01:15,820 in a complete a couple of concepts through exercises Okay which help us understand the marrying of security 14 00:01:16,270 --> 00:01:17,350 and wallets. 15 00:01:17,430 --> 00:01:18,070 Okay. 16 00:01:18,280 --> 00:01:26,230 Especially since half of the word crypto currency is crypto which can mean secret or hidden. 17 00:01:26,240 --> 00:01:33,110 OK so I want to go into a lot of detail and summarize more than 40 years worth of fascinating Kip taught 18 00:01:33,230 --> 00:01:41,240 cryptography events including the NSA fighting cryptocurrency experts going back to the 1970s in this 19 00:01:41,240 --> 00:01:43,580 lesson and through the exercises. 20 00:01:43,580 --> 00:01:46,430 In the next lesson OK this will make much more sense too soon. 21 00:01:46,580 --> 00:01:47,690 Why. 22 00:01:47,720 --> 00:01:53,720 Because we have to thoroughly understand how security has and will continue to change in our lifetime 23 00:01:54,190 --> 00:02:00,830 as I promise you that if we don't stay up to date on security changes over time then our money and privacy 24 00:02:00,830 --> 00:02:02,820 can and will be compromised. 25 00:02:02,990 --> 00:02:06,440 You know big institutions are safe anymore from hacking. 26 00:02:06,440 --> 00:02:13,460 We know that the media covers this in a lot of detail and before learning about wallets and how to use 27 00:02:13,460 --> 00:02:19,580 them and deciding which ones to use I want to introduce you to the concepts of public and private keys 28 00:02:19,940 --> 00:02:23,160 in this lecture through an exercise we'll do together. 29 00:02:23,200 --> 00:02:24,380 I hope you enjoy this. 30 00:02:24,680 --> 00:02:30,970 And on nuclear and nuclear submarines often there's two keys two keys are needed two. 31 00:02:31,070 --> 00:02:33,400 God forbid launch missiles. 32 00:02:33,650 --> 00:02:41,490 One key can go to the captain of the submarine and the other one usually goes to poultice or a top government 33 00:02:41,490 --> 00:02:42,690 official. 34 00:02:42,720 --> 00:02:50,200 Similarly when it comes to crypto currencies two keys are needed to transfer and receive money in cash. 35 00:02:50,790 --> 00:02:56,300 And these keys are called public and private keys. 36 00:02:56,340 --> 00:03:01,830 OK and if you just want to jump in to that to the exercise in this lesson then you can fast forward 37 00:03:01,830 --> 00:03:04,350 me right now to this part in a lecture. 38 00:03:04,350 --> 00:03:08,940 OK I understand that some of you might already understand these concepts but it's fun for me to talk 39 00:03:08,940 --> 00:03:11,600 about and some of you might not know much about this. 40 00:03:11,850 --> 00:03:21,600 OK so the concept of of private and public keys was created in May of 1976 as a brilliant security breakthrough 41 00:03:21,690 --> 00:03:28,260 was discovered by a brilliant man who still lectures here at Stanford named Martin Hellman. 42 00:03:28,280 --> 00:03:30,050 He's a he's a rockstar he's. 43 00:03:30,660 --> 00:03:36,080 And he created public and private key cryptography. 44 00:03:36,140 --> 00:03:40,640 And he did this so that if enemies get their hands on one key. 45 00:03:40,790 --> 00:03:41,500 OK. 46 00:03:42,970 --> 00:03:48,250 They can't decrypt the information because they don't have access to the other key which is private 47 00:03:48,520 --> 00:03:50,440 and not public. 48 00:03:51,040 --> 00:03:57,070 And the NSA actually approached Martin Hellman and told him to be quiet about this for national security 49 00:03:57,070 --> 00:04:00,770 reasons and Hellman thought about this. 50 00:04:00,860 --> 00:04:03,470 He thought it's an ethical issue. 51 00:04:03,520 --> 00:04:10,780 So he did not keep quiet about this and he says in this video here which is an incredible speech which 52 00:04:10,780 --> 00:04:16,630 you can access by clicking this button but he says that he felt that he had an angel on one shoulder 53 00:04:16,630 --> 00:04:22,180 and a devil on the other shoulder and he said that the same thing took place with those that created 54 00:04:22,180 --> 00:04:25,540 the first nuclear bomb as part of the Manhattan Project. 55 00:04:25,540 --> 00:04:31,210 You know yesterday they wanted to beat Hitler of course but they kept working on the nuclear bomb after 56 00:04:31,210 --> 00:04:37,950 World War II ended and things got really contentious for Hellmann as the NSA was on his back. 57 00:04:38,170 --> 00:04:44,850 And he he literally thought the NSA was Darth Vader and he himself was Luke Skywalker. 58 00:04:44,870 --> 00:04:46,980 He actually said that he said it's pretty cool. 59 00:04:47,270 --> 00:04:47,550 OK. 60 00:04:47,570 --> 00:04:54,290 So Helmand is less focused on cybersecurity today and more focused on nuclear security as there are 61 00:04:54,290 --> 00:04:57,810 parallels between between both of them both are related. 62 00:04:58,040 --> 00:05:01,040 So all this stuff is now declassified. 63 00:05:01,040 --> 00:05:07,330 But it's important to discuss this so we can understand how governments react to crypto currencies today 64 00:05:07,730 --> 00:05:15,010 and in the future and governments are constantly fighting companies just like how the FBI is currently 65 00:05:15,010 --> 00:05:23,920 fighting Apple and expect this to continue globally as crypto currencies as we discussed are potentially 66 00:05:24,040 --> 00:05:29,500 the greatest threat to national security and cap and government said look let me just put these down 67 00:05:29,500 --> 00:05:30,620 here. 68 00:05:30,740 --> 00:05:31,370 Back to that minute. 69 00:05:31,370 --> 00:05:38,260 But but governments thought and think that nuclear weapons deterrent deterrence strategies can be applied 70 00:05:38,260 --> 00:05:46,030 to crypto currencies and our crypto cryptography visionaries like Martin Hellman in our space pioneers 71 00:05:46,030 --> 00:05:48,270 like Elon Musk beg to differ. 72 00:05:48,490 --> 00:05:48,960 OK. 73 00:05:49,030 --> 00:05:56,130 Security and cryptography will continue to be decrypted and we need to keep up to date on this so that 74 00:05:56,370 --> 00:06:02,110 our personal cryptocurrency net worth is less likely to be compromised in the future. 75 00:06:02,460 --> 00:06:10,500 And I don't want to jump into discussing wallets or buying crypto currencies or mining until we thoroughly 76 00:06:10,590 --> 00:06:12,730 understand and cover security. 77 00:06:12,990 --> 00:06:13,800 OK let's move on. 78 00:06:15,040 --> 00:06:21,020 A Berkeley student named Ralph Merkle pioneered how to distribute these keys. 79 00:06:21,530 --> 00:06:27,560 And it's important to mention this as we will discuss Merkle concepts later on when we talk about block 80 00:06:27,560 --> 00:06:27,860 chain. 81 00:06:27,860 --> 00:06:36,980 In this lecture here and Merkel's Berkeley professor criticized his work and it's actually ridiculous 82 00:06:37,040 --> 00:06:44,300 and just as ridiculous as as the founder of federal express FedEx writing his business plan at Yale 83 00:06:44,300 --> 00:06:47,180 University and then the teacher told him this. 84 00:06:47,330 --> 00:06:54,200 The concept is interesting and well-informed but in order to earn better than a C grade the idea must 85 00:06:54,200 --> 00:06:55,620 be feasible. 86 00:06:55,970 --> 00:07:03,170 So don't let teachers tell you that you are wrong and these students are so forward looking. 87 00:07:03,510 --> 00:07:13,190 OK so after Helen Merkel after their discoveries then there's three brilliant man named revulsed Shamir 88 00:07:13,220 --> 00:07:19,650 and Adelman are as they ever seen one of these things are RSA tokens or this. 89 00:07:19,940 --> 00:07:23,550 And they were the first ones to implement public key public key. 90 00:07:23,550 --> 00:07:24,750 Chris cryptosystem. 91 00:07:24,810 --> 00:07:29,960 That's RSA which used to be a publicly traded company ticker r s s until EMC bought them in the summer 92 00:07:29,960 --> 00:07:31,710 of 2006. 93 00:07:31,880 --> 00:07:36,640 I use to cover that stock when I worked at a at a very big tech hedge fund called Set it up. 94 00:07:36,920 --> 00:07:45,530 OK so these three people are and there are mathematical geniuses which is what cryptography is all about. 95 00:07:45,530 --> 00:07:46,650 It's math. 96 00:07:46,680 --> 00:07:47,580 OK moving on 97 00:07:51,000 --> 00:07:54,770 in my hands I'm holding a green key. 98 00:07:55,200 --> 00:07:56,470 It's got a globe on it. 99 00:07:56,970 --> 00:08:01,450 And this is just a prop but we're going to pretend that this is your public key. 100 00:08:01,670 --> 00:08:02,600 OK. 101 00:08:02,640 --> 00:08:05,650 Which many people have access to get theirs. 102 00:08:05,820 --> 00:08:09,950 Anybody can send you money to your public key in your wallet. 103 00:08:10,090 --> 00:08:18,520 I'll talk about that in a minute with a minute to catch this hand it's probably be consistent this way. 104 00:08:18,580 --> 00:08:25,370 In this hand I'm holding a red key which is a private key and it's got the word home written on it you 105 00:08:25,370 --> 00:08:27,660 probably can't see that but OK. 106 00:08:27,980 --> 00:08:30,070 And there's only one copy of this. 107 00:08:30,080 --> 00:08:32,360 But there can be many copies of this public key. 108 00:08:32,440 --> 00:08:33,590 OK. 109 00:08:33,820 --> 00:08:35,110 Great. 110 00:08:35,170 --> 00:08:39,520 So I've got a public key and a private key right here. 111 00:08:39,520 --> 00:08:40,270 Great. 112 00:08:40,600 --> 00:08:43,670 And the person sending money to you. 113 00:08:43,750 --> 00:08:44,020 Right. 114 00:08:44,020 --> 00:08:48,220 The person that's sending Cocteau's or crypto currencies or Bitcoin ether or whatever cryptocurrency 115 00:08:48,220 --> 00:08:51,290 it is to you they need to know where to send it. 116 00:08:51,490 --> 00:08:51,850 OK. 117 00:08:51,850 --> 00:08:54,590 And you need to know how to access the money sent to you. 118 00:08:54,860 --> 00:08:55,430 OK. 119 00:08:55,660 --> 00:09:01,600 So the way that people know how to send crypto currencies to you is knowing what your public key number 120 00:09:01,600 --> 00:09:03,220 is or address. 121 00:09:03,220 --> 00:09:07,840 OK it's it's kind of like an e-mail address to the public key like an e-mail address. 122 00:09:07,900 --> 00:09:12,670 A lot of people can get your e-mail address but the private key like your e-mail password. 123 00:09:12,670 --> 00:09:13,820 I mean people have that. 124 00:09:13,930 --> 00:09:14,650 OK. 125 00:09:15,040 --> 00:09:16,090 OK great. 126 00:09:16,090 --> 00:09:19,610 And if people have your public key they can semis you. 127 00:09:19,740 --> 00:09:23,170 Now in order to access the money in your wallet. 128 00:09:23,400 --> 00:09:24,080 OK. 129 00:09:24,250 --> 00:09:25,760 That was sent to you your public key. 130 00:09:25,760 --> 00:09:28,060 You need to access it using your private key. 131 00:09:28,220 --> 00:09:28,450 OK. 132 00:09:28,450 --> 00:09:31,540 Again it's like a password for them. 133 00:09:31,730 --> 00:09:37,750 Now if you forget your e-mail password you can usually ask the company or person in charge of the e-mail 134 00:09:37,750 --> 00:09:40,240 system to send you a new password. 135 00:09:40,340 --> 00:09:42,440 They like Google does with Gmail for example. 136 00:09:42,610 --> 00:09:49,390 However it's a little bit different with crypto currencies because if you forget this private key then 137 00:09:49,390 --> 00:09:54,940 you can never ever ever ever ever access your money again that's in your wallet OK. 138 00:09:55,030 --> 00:09:56,810 Even if you have the public key doesn't matter. 139 00:09:58,230 --> 00:10:03,870 And this is why we're going to spend a lot of time on many different types of cryptocurrency waltz in 140 00:10:03,870 --> 00:10:08,570 this course and how to secure your private keys and personal data. 141 00:10:08,880 --> 00:10:09,340 OK. 142 00:10:09,340 --> 00:10:14,020 And we're going to make sure that security disasters do not happen to you. 143 00:10:14,020 --> 00:10:22,450 OK so if you lose your if you lose this that's ok because your private key is smart and your private 144 00:10:22,450 --> 00:10:26,870 key can actually tell you what your public key is it's kind of like this. 145 00:10:26,870 --> 00:10:29,040 OK so now try this around. 146 00:10:29,040 --> 00:10:34,000 So I'm going to push this green button here and my private key will tell me my private key Tell me where 147 00:10:34,010 --> 00:10:34,670 I yes. 148 00:10:34,710 --> 00:10:35,720 Right. 149 00:10:35,820 --> 00:10:37,270 That's it. 150 00:10:37,500 --> 00:10:45,210 It's kind of like it's kind of a title anyway so you get the idea and you put those down for now and 151 00:10:45,210 --> 00:10:49,540 we're going to build on this concept soon as well when we talk about block chain or other stuff in mining. 152 00:10:49,540 --> 00:10:50,280 It's going be fun. 153 00:10:50,430 --> 00:10:51,370 Okay great. 154 00:10:51,750 --> 00:10:57,310 And technically I will teach you how to set up wallet's in an exercise in this lesson here. 155 00:10:57,540 --> 00:11:02,800 I just want to introduce you to security concepts in this introduction to security lesson. 156 00:11:02,850 --> 00:11:04,690 And again we're going to build on this now. 157 00:11:04,730 --> 00:11:10,260 Now please note that your public key can never tell you what your private key address is. 158 00:11:10,260 --> 00:11:10,520 OK. 159 00:11:10,530 --> 00:11:12,960 So again never lose your private key. 160 00:11:12,960 --> 00:11:19,950 Also people can find your public key address through using q r codes which some people have on their 161 00:11:19,950 --> 00:11:21,290 crypto wallets. 162 00:11:21,570 --> 00:11:29,160 OK and so in order to explain this concept a little bit what happens is a lot of people have cryptocurrency 163 00:11:29,160 --> 00:11:36,330 wallets that have these little QR codes on them and all that QR code does is it tells you what this 164 00:11:36,330 --> 00:11:38,070 number is here this public key. 165 00:11:38,100 --> 00:11:39,600 That's all it is. 166 00:11:39,990 --> 00:11:44,760 So think of it as a key chain and this is kind of cute but people use this for their dogs now so don't 167 00:11:44,760 --> 00:11:45,390 lose their dogs. 168 00:11:45,390 --> 00:11:45,720 Right. 169 00:11:45,720 --> 00:11:48,130 People scan the QR codes for their dog. 170 00:11:48,130 --> 00:11:54,770 So so public key can can be written as or represented as a QR code. 171 00:11:55,410 --> 00:11:57,420 And the same thing with a private key. 172 00:11:57,420 --> 00:12:02,970 And when we make our wallet very soon together our paper wallet you will see that on one side of our 173 00:12:02,970 --> 00:12:12,510 paper wallet is a public key with this QR code and on the other side of that same wallet is a private 174 00:12:12,510 --> 00:12:18,240 key with this QR code and all that you are code is is a way to scan it with your mobile phone and you 175 00:12:18,240 --> 00:12:20,100 scan the car Colonel tell you what this number is. 176 00:12:20,130 --> 00:12:21,420 And this one as well. 177 00:12:21,660 --> 00:12:24,730 We never show anybody this QR code only this one. 178 00:12:25,420 --> 00:12:25,690 Great. 179 00:12:25,770 --> 00:12:26,230 Will do. 180 00:12:26,250 --> 00:12:31,690 I assume that when you make your first wallet and this will make a lot more sense. 181 00:12:31,980 --> 00:12:32,400 OK. 182 00:12:32,430 --> 00:12:33,490 Great. 183 00:12:33,520 --> 00:12:41,770 And I want to humanize the education process here of security so it's more engaging and so that you 184 00:12:41,770 --> 00:12:47,650 know you'll be more interested in staying up to date with new security and password protocols in the 185 00:12:47,650 --> 00:12:48,200 future. 186 00:12:48,230 --> 00:12:57,100 And I promise you that since there is so much money in this cryptocurrency sector that cyber criminals 187 00:12:57,130 --> 00:13:02,510 will take our money if we're not vigilant and very very careful. 188 00:13:02,860 --> 00:13:11,230 And many many of our brilliant technology visionaries are mindful of the fact that what they create 189 00:13:11,320 --> 00:13:13,740 could have a negative impact on us. 190 00:13:13,750 --> 00:13:20,860 OK so for example we know that Elon Musk makes rockets and he is mindful of the fact that with great 191 00:13:20,860 --> 00:13:23,610 power comes great responsibility. 192 00:13:24,010 --> 00:13:30,850 And many of the people I discuss as we do our security exercises that have contributed so much to enhance 193 00:13:30,880 --> 00:13:37,210 our lives through technology are often the voices of caution when it comes to computer security and 194 00:13:37,210 --> 00:13:39,210 future trends. 195 00:13:39,250 --> 00:13:46,330 So if you want you can follow in Twitter some of the people that I discuss in this lesson and in this 196 00:13:46,330 --> 00:13:52,300 course in general just so you can stay up to date on cryptography and security trends that could impact 197 00:13:52,300 --> 00:13:59,430 your net worth in the future if you invest in the crypto currency markets and I really care. 198 00:13:59,600 --> 00:14:01,950 I care and I want to thoroughly. 199 00:14:02,060 --> 00:14:08,590 I want you to thoroughly understand security and cryptography concepts before you buy any crypto currencies. 200 00:14:08,600 --> 00:14:09,500 OK. 201 00:14:10,310 --> 00:14:17,030 And if you're interested in learning more please just click this button here to learn more about Stampfer 202 00:14:17,030 --> 00:14:25,040 professors and the evolution of public key and cryptography as presented by David Hellman here who created 203 00:14:25,320 --> 00:14:27,420 cryptography in the 1970s. 204 00:14:27,770 --> 00:14:32,160 And he battled the NSA who told them to keep quiet about his research. 205 00:14:32,470 --> 00:14:38,660 OK so the title of this optional six minute video here is cyber security nuclear security. 206 00:14:38,750 --> 00:14:41,940 Alan Turing and illogical logic. 207 00:14:41,940 --> 00:14:43,830 And you can access it here. 208 00:14:45,210 --> 00:14:51,320 And the Elvis Presley rock star of the security sector was a brilliant man named Alan Turing. 209 00:14:51,330 --> 00:14:59,210 Kay and I'm sure you've heard of him and he along with his team created this unbelievable machine 210 00:15:02,040 --> 00:15:06,470 to break the the enigma this is a replica. 211 00:15:06,650 --> 00:15:07,390 This is interesting. 212 00:15:07,500 --> 00:15:15,980 So he created this machine with this team in England during World War Two to decrypt this. 213 00:15:16,270 --> 00:15:16,540 Right. 214 00:15:16,590 --> 00:15:22,610 So he could find out you know all about what the Germans were planning and this is a mini replica here 215 00:15:23,330 --> 00:15:25,020 of the Enigma machine. 216 00:15:25,020 --> 00:15:25,280 Right. 217 00:15:25,320 --> 00:15:30,160 So there's a great movie about this called the the the Imitation Game. 218 00:15:30,210 --> 00:15:31,980 But it's kind of interesting. 219 00:15:32,130 --> 00:15:34,050 Alan Turing is a rock star to me. 220 00:15:34,050 --> 00:15:35,910 I respect him. 221 00:15:36,000 --> 00:15:36,600 He's amazing. 222 00:15:36,690 --> 00:15:37,000 OK. 223 00:15:37,030 --> 00:15:44,700 So we should generally expect governments for national security reasons to poor in a lot of money and 224 00:15:44,700 --> 00:15:46,820 resources to break codes. 225 00:15:47,090 --> 00:15:47,600 OK. 226 00:15:48,430 --> 00:15:53,740 All right so when this happens if we find out then we're going to need to change the security measures 227 00:15:54,010 --> 00:15:55,420 that we use in the future. 228 00:15:55,420 --> 00:16:01,380 And I promise you that governments will likely be spending a lot of money on this in the future. 229 00:16:01,880 --> 00:16:05,590 Kelly were the bomb 10 seconds of your day. 230 00:16:07,190 --> 00:16:08,380 Interesting. 231 00:16:08,960 --> 00:16:24,850 I'm the only one who knows where that news is well in that case I'd say you'd better start. 232 00:16:25,410 --> 00:16:33,040 And so if the NSA kind of did a lot of work to pioneer certain security algorithms they also put a lot 233 00:16:33,040 --> 00:16:34,590 of money into try to break them. 234 00:16:34,710 --> 00:16:39,400 And so what is very secure today will not be secure in the future. 235 00:16:39,910 --> 00:16:41,740 And you might say wait a second. 236 00:16:41,770 --> 00:16:43,680 Does that mean that big one is not going to be secure. 237 00:16:43,690 --> 00:16:45,910 It's kind of a different story when I talk about mining. 238 00:16:45,910 --> 00:16:52,690 I'll talk about this more detail but in order to compromise the Bitcoin security algorithms so to speak 239 00:16:53,050 --> 00:16:58,210 you need to be able to take over 50 percent of all computing resources in the world that are currently 240 00:16:58,210 --> 00:17:00,060 working on Bitcoin. 241 00:17:00,070 --> 00:17:02,240 That's called a 51 percent attack. 242 00:17:02,280 --> 00:17:03,230 I'll come back to that later. 243 00:17:03,340 --> 00:17:03,970 OK. 244 00:17:04,630 --> 00:17:11,920 So many non-American companies won't use American cloud computing companies like sales force dot com 245 00:17:12,920 --> 00:17:21,550 Y because they can't be assured that the U.S. government won't hack into the sales force for example 246 00:17:21,940 --> 00:17:28,870 using crypto trapdoors and view confidential information for Swiss bank account holders for example 247 00:17:28,870 --> 00:17:34,480 and I'm not picking on sales force talk commis just a very big successful cloud computing company based 248 00:17:34,480 --> 00:17:37,630 here in San Francisco and the founder Marc Benioff is a brilliant man. 249 00:17:37,630 --> 00:17:38,740 I respect him a lot. 250 00:17:38,740 --> 00:17:45,480 But the point is that a lot of governments don't trust each other's software companies. 251 00:17:45,500 --> 00:17:46,130 OK. 252 00:17:46,300 --> 00:17:51,880 And that's why you're going to have kind of the Balkanization of cloud computing globally. 253 00:17:52,060 --> 00:17:57,730 Right we've got Amazon Web Services in the United States that kind of powers Air B and B and a lot of 254 00:17:57,730 --> 00:17:59,600 great companies uber et cetera. 255 00:17:59,890 --> 00:18:07,180 And there's going to be different versions of that overseas only because other governments don't trust 256 00:18:07,930 --> 00:18:12,670 other government security protocols that sort of thing a little bit off topic I apologize but just something 257 00:18:12,670 --> 00:18:17,500 to be aware of especially since you're going to if you're going to dive into this cryptocurrency market 258 00:18:17,500 --> 00:18:23,790 you're going to have to protect your own assets using your own software and hardware products. 259 00:18:23,790 --> 00:18:25,830 Cold and hot storage which of us soon. 260 00:18:25,870 --> 00:18:28,440 And it's really good to stay up to date on this stuff as well. 261 00:18:28,630 --> 00:18:29,140 OK. 262 00:18:29,140 --> 00:18:34,090 Especially since banks and credit card companies are not going to offer you the benefit of protecting 263 00:18:34,090 --> 00:18:34,570 your money. 264 00:18:34,600 --> 00:18:36,360 You have it yourself. 265 00:18:37,720 --> 00:18:37,990 All right. 266 00:18:37,990 --> 00:18:42,450 So there's something called Shaugh one. 267 00:18:42,610 --> 00:18:45,790 OK Shaw one is a check one. 268 00:18:46,150 --> 00:18:49,670 And this stands for secure hash algorithm one. 269 00:18:49,840 --> 00:18:55,960 OK and this was created for what it's worth by the NSA which is the National Security Agency the United 270 00:18:55,960 --> 00:18:58,070 States in 1995. 271 00:18:58,210 --> 00:18:58,620 And we're it. 272 00:18:58,710 --> 00:19:01,790 We're going to encrypt something using Shaw one. 273 00:19:02,000 --> 00:19:02,620 OK. 274 00:19:02,860 --> 00:19:05,180 Now I don't want to confuse anyone here. 275 00:19:05,500 --> 00:19:08,270 But there is a difference between hashing and encryption. 276 00:19:08,590 --> 00:19:12,310 And I will explain that later once we have laid down the foundations. 277 00:19:12,310 --> 00:19:15,520 OK so just for now assume that they are very similar. 278 00:19:15,550 --> 00:19:17,060 Just for now thanks. 279 00:19:17,340 --> 00:19:25,890 And so we're in a lesson learn by doing in the next lecture which is an exercise on crypto security. 280 00:19:25,970 --> 00:19:28,440 We're going to learn about this soon. 281 00:19:28,450 --> 00:19:31,830 Shaw one is Shaw 256 K invented by the NSA. 282 00:19:32,020 --> 00:19:39,940 And this here is the basis for for encryption algorithm for for Bitcoin it's very important. 283 00:19:39,940 --> 00:19:45,580 We understand this one and every cryptocurrency or most cryptocurrency you have different algorithms 284 00:19:45,910 --> 00:19:49,880 and that matters a lot if you want to mine crypto currencies as well. 285 00:19:50,020 --> 00:19:58,670 Cret So if we go together to finance style yahud account and this security protocol stuff is so important 286 00:19:58,670 --> 00:20:00,260 investors look at it closely too. 287 00:20:00,280 --> 00:20:00,800 OK. 288 00:20:00,860 --> 00:20:07,210 So go to a finance outcome and enter in the ticker for Bitcoin and just enter this ticker entry and 289 00:20:07,220 --> 00:20:09,870 BTC Dasch USD. 290 00:20:09,890 --> 00:20:11,240 That's according to U.S. dollars. 291 00:20:11,320 --> 00:20:12,370 OK. 292 00:20:12,600 --> 00:20:23,000 And we can see here that included in this market data on Yahoo Finance on Bitcoin is the algorithm shot 293 00:20:23,020 --> 00:20:24,350 294 2:56. 295 00:20:24,600 --> 00:20:25,800 It's written there. 296 00:20:25,940 --> 00:20:31,250 And again the next lecture what we're going to do is we're to do a pretty fun exercise where we're going 297 00:20:31,250 --> 00:20:37,940 to encrypt and decrypt data using Schaal one and Shaw 256 which again is the basis for the algorithm. 298 00:20:37,940 --> 00:20:40,450 This one here for for Pick one. 299 00:20:40,640 --> 00:20:41,460 I hope you enjoy it. 300 00:20:41,480 --> 00:20:41,810 Thanks. 29151

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.