Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:00,830 --> 00:00:06,770
We know that banks and credit card companies charge us high fees but they do help us protect the security
2
00:00:06,770 --> 00:00:09,460
of our money again through their high fees.
3
00:00:09,920 --> 00:00:16,910
Now if we're going to invest in and use crypto currencies we need to not only thoroughly understand
4
00:00:17,060 --> 00:00:25,070
crypto currency security concepts but we have to also be willing to spend some money on purchasing devices
5
00:00:25,310 --> 00:00:33,050
that will act as digital wallets because only you can protect your crypto currencies and not the banks
6
00:00:33,080 --> 00:00:34,970
and not the credit card companies.
7
00:00:35,060 --> 00:00:40,850
So we should think about the amount of money that we're going to save in bank and credit card fees in
8
00:00:40,850 --> 00:00:42,100
the long run.
9
00:00:42,100 --> 00:00:48,830
And we should use part of those savings to buy and use what are called cold and hot storage wallets
10
00:00:49,160 --> 00:00:53,530
meaning online and offline security products for your cryptocurrency.
11
00:00:54,610 --> 00:01:01,090
And so we're going to cover wallets in much more detail later on the course in part 3.
12
00:01:01,390 --> 00:01:09,150
But as we build upon the security and other crucial cryptocurrency topics one later at a time we're
13
00:01:09,150 --> 00:01:15,820
in a complete a couple of concepts through exercises Okay which help us understand the marrying of security
14
00:01:16,270 --> 00:01:17,350
and wallets.
15
00:01:17,430 --> 00:01:18,070
Okay.
16
00:01:18,280 --> 00:01:26,230
Especially since half of the word crypto currency is crypto which can mean secret or hidden.
17
00:01:26,240 --> 00:01:33,110
OK so I want to go into a lot of detail and summarize more than 40 years worth of fascinating Kip taught
18
00:01:33,230 --> 00:01:41,240
cryptography events including the NSA fighting cryptocurrency experts going back to the 1970s in this
19
00:01:41,240 --> 00:01:43,580
lesson and through the exercises.
20
00:01:43,580 --> 00:01:46,430
In the next lesson OK this will make much more sense too soon.
21
00:01:46,580 --> 00:01:47,690
Why.
22
00:01:47,720 --> 00:01:53,720
Because we have to thoroughly understand how security has and will continue to change in our lifetime
23
00:01:54,190 --> 00:02:00,830
as I promise you that if we don't stay up to date on security changes over time then our money and privacy
24
00:02:00,830 --> 00:02:02,820
can and will be compromised.
25
00:02:02,990 --> 00:02:06,440
You know big institutions are safe anymore from hacking.
26
00:02:06,440 --> 00:02:13,460
We know that the media covers this in a lot of detail and before learning about wallets and how to use
27
00:02:13,460 --> 00:02:19,580
them and deciding which ones to use I want to introduce you to the concepts of public and private keys
28
00:02:19,940 --> 00:02:23,160
in this lecture through an exercise we'll do together.
29
00:02:23,200 --> 00:02:24,380
I hope you enjoy this.
30
00:02:24,680 --> 00:02:30,970
And on nuclear and nuclear submarines often there's two keys two keys are needed two.
31
00:02:31,070 --> 00:02:33,400
God forbid launch missiles.
32
00:02:33,650 --> 00:02:41,490
One key can go to the captain of the submarine and the other one usually goes to poultice or a top government
33
00:02:41,490 --> 00:02:42,690
official.
34
00:02:42,720 --> 00:02:50,200
Similarly when it comes to crypto currencies two keys are needed to transfer and receive money in cash.
35
00:02:50,790 --> 00:02:56,300
And these keys are called public and private keys.
36
00:02:56,340 --> 00:03:01,830
OK and if you just want to jump in to that to the exercise in this lesson then you can fast forward
37
00:03:01,830 --> 00:03:04,350
me right now to this part in a lecture.
38
00:03:04,350 --> 00:03:08,940
OK I understand that some of you might already understand these concepts but it's fun for me to talk
39
00:03:08,940 --> 00:03:11,600
about and some of you might not know much about this.
40
00:03:11,850 --> 00:03:21,600
OK so the concept of of private and public keys was created in May of 1976 as a brilliant security breakthrough
41
00:03:21,690 --> 00:03:28,260
was discovered by a brilliant man who still lectures here at Stanford named Martin Hellman.
42
00:03:28,280 --> 00:03:30,050
He's a he's a rockstar he's.
43
00:03:30,660 --> 00:03:36,080
And he created public and private key cryptography.
44
00:03:36,140 --> 00:03:40,640
And he did this so that if enemies get their hands on one key.
45
00:03:40,790 --> 00:03:41,500
OK.
46
00:03:42,970 --> 00:03:48,250
They can't decrypt the information because they don't have access to the other key which is private
47
00:03:48,520 --> 00:03:50,440
and not public.
48
00:03:51,040 --> 00:03:57,070
And the NSA actually approached Martin Hellman and told him to be quiet about this for national security
49
00:03:57,070 --> 00:04:00,770
reasons and Hellman thought about this.
50
00:04:00,860 --> 00:04:03,470
He thought it's an ethical issue.
51
00:04:03,520 --> 00:04:10,780
So he did not keep quiet about this and he says in this video here which is an incredible speech which
52
00:04:10,780 --> 00:04:16,630
you can access by clicking this button but he says that he felt that he had an angel on one shoulder
53
00:04:16,630 --> 00:04:22,180
and a devil on the other shoulder and he said that the same thing took place with those that created
54
00:04:22,180 --> 00:04:25,540
the first nuclear bomb as part of the Manhattan Project.
55
00:04:25,540 --> 00:04:31,210
You know yesterday they wanted to beat Hitler of course but they kept working on the nuclear bomb after
56
00:04:31,210 --> 00:04:37,950
World War II ended and things got really contentious for Hellmann as the NSA was on his back.
57
00:04:38,170 --> 00:04:44,850
And he he literally thought the NSA was Darth Vader and he himself was Luke Skywalker.
58
00:04:44,870 --> 00:04:46,980
He actually said that he said it's pretty cool.
59
00:04:47,270 --> 00:04:47,550
OK.
60
00:04:47,570 --> 00:04:54,290
So Helmand is less focused on cybersecurity today and more focused on nuclear security as there are
61
00:04:54,290 --> 00:04:57,810
parallels between between both of them both are related.
62
00:04:58,040 --> 00:05:01,040
So all this stuff is now declassified.
63
00:05:01,040 --> 00:05:07,330
But it's important to discuss this so we can understand how governments react to crypto currencies today
64
00:05:07,730 --> 00:05:15,010
and in the future and governments are constantly fighting companies just like how the FBI is currently
65
00:05:15,010 --> 00:05:23,920
fighting Apple and expect this to continue globally as crypto currencies as we discussed are potentially
66
00:05:24,040 --> 00:05:29,500
the greatest threat to national security and cap and government said look let me just put these down
67
00:05:29,500 --> 00:05:30,620
here.
68
00:05:30,740 --> 00:05:31,370
Back to that minute.
69
00:05:31,370 --> 00:05:38,260
But but governments thought and think that nuclear weapons deterrent deterrence strategies can be applied
70
00:05:38,260 --> 00:05:46,030
to crypto currencies and our crypto cryptography visionaries like Martin Hellman in our space pioneers
71
00:05:46,030 --> 00:05:48,270
like Elon Musk beg to differ.
72
00:05:48,490 --> 00:05:48,960
OK.
73
00:05:49,030 --> 00:05:56,130
Security and cryptography will continue to be decrypted and we need to keep up to date on this so that
74
00:05:56,370 --> 00:06:02,110
our personal cryptocurrency net worth is less likely to be compromised in the future.
75
00:06:02,460 --> 00:06:10,500
And I don't want to jump into discussing wallets or buying crypto currencies or mining until we thoroughly
76
00:06:10,590 --> 00:06:12,730
understand and cover security.
77
00:06:12,990 --> 00:06:13,800
OK let's move on.
78
00:06:15,040 --> 00:06:21,020
A Berkeley student named Ralph Merkle pioneered how to distribute these keys.
79
00:06:21,530 --> 00:06:27,560
And it's important to mention this as we will discuss Merkle concepts later on when we talk about block
80
00:06:27,560 --> 00:06:27,860
chain.
81
00:06:27,860 --> 00:06:36,980
In this lecture here and Merkel's Berkeley professor criticized his work and it's actually ridiculous
82
00:06:37,040 --> 00:06:44,300
and just as ridiculous as as the founder of federal express FedEx writing his business plan at Yale
83
00:06:44,300 --> 00:06:47,180
University and then the teacher told him this.
84
00:06:47,330 --> 00:06:54,200
The concept is interesting and well-informed but in order to earn better than a C grade the idea must
85
00:06:54,200 --> 00:06:55,620
be feasible.
86
00:06:55,970 --> 00:07:03,170
So don't let teachers tell you that you are wrong and these students are so forward looking.
87
00:07:03,510 --> 00:07:13,190
OK so after Helen Merkel after their discoveries then there's three brilliant man named revulsed Shamir
88
00:07:13,220 --> 00:07:19,650
and Adelman are as they ever seen one of these things are RSA tokens or this.
89
00:07:19,940 --> 00:07:23,550
And they were the first ones to implement public key public key.
90
00:07:23,550 --> 00:07:24,750
Chris cryptosystem.
91
00:07:24,810 --> 00:07:29,960
That's RSA which used to be a publicly traded company ticker r s s until EMC bought them in the summer
92
00:07:29,960 --> 00:07:31,710
of 2006.
93
00:07:31,880 --> 00:07:36,640
I use to cover that stock when I worked at a at a very big tech hedge fund called Set it up.
94
00:07:36,920 --> 00:07:45,530
OK so these three people are and there are mathematical geniuses which is what cryptography is all about.
95
00:07:45,530 --> 00:07:46,650
It's math.
96
00:07:46,680 --> 00:07:47,580
OK moving on
97
00:07:51,000 --> 00:07:54,770
in my hands I'm holding a green key.
98
00:07:55,200 --> 00:07:56,470
It's got a globe on it.
99
00:07:56,970 --> 00:08:01,450
And this is just a prop but we're going to pretend that this is your public key.
100
00:08:01,670 --> 00:08:02,600
OK.
101
00:08:02,640 --> 00:08:05,650
Which many people have access to get theirs.
102
00:08:05,820 --> 00:08:09,950
Anybody can send you money to your public key in your wallet.
103
00:08:10,090 --> 00:08:18,520
I'll talk about that in a minute with a minute to catch this hand it's probably be consistent this way.
104
00:08:18,580 --> 00:08:25,370
In this hand I'm holding a red key which is a private key and it's got the word home written on it you
105
00:08:25,370 --> 00:08:27,660
probably can't see that but OK.
106
00:08:27,980 --> 00:08:30,070
And there's only one copy of this.
107
00:08:30,080 --> 00:08:32,360
But there can be many copies of this public key.
108
00:08:32,440 --> 00:08:33,590
OK.
109
00:08:33,820 --> 00:08:35,110
Great.
110
00:08:35,170 --> 00:08:39,520
So I've got a public key and a private key right here.
111
00:08:39,520 --> 00:08:40,270
Great.
112
00:08:40,600 --> 00:08:43,670
And the person sending money to you.
113
00:08:43,750 --> 00:08:44,020
Right.
114
00:08:44,020 --> 00:08:48,220
The person that's sending Cocteau's or crypto currencies or Bitcoin ether or whatever cryptocurrency
115
00:08:48,220 --> 00:08:51,290
it is to you they need to know where to send it.
116
00:08:51,490 --> 00:08:51,850
OK.
117
00:08:51,850 --> 00:08:54,590
And you need to know how to access the money sent to you.
118
00:08:54,860 --> 00:08:55,430
OK.
119
00:08:55,660 --> 00:09:01,600
So the way that people know how to send crypto currencies to you is knowing what your public key number
120
00:09:01,600 --> 00:09:03,220
is or address.
121
00:09:03,220 --> 00:09:07,840
OK it's it's kind of like an e-mail address to the public key like an e-mail address.
122
00:09:07,900 --> 00:09:12,670
A lot of people can get your e-mail address but the private key like your e-mail password.
123
00:09:12,670 --> 00:09:13,820
I mean people have that.
124
00:09:13,930 --> 00:09:14,650
OK.
125
00:09:15,040 --> 00:09:16,090
OK great.
126
00:09:16,090 --> 00:09:19,610
And if people have your public key they can semis you.
127
00:09:19,740 --> 00:09:23,170
Now in order to access the money in your wallet.
128
00:09:23,400 --> 00:09:24,080
OK.
129
00:09:24,250 --> 00:09:25,760
That was sent to you your public key.
130
00:09:25,760 --> 00:09:28,060
You need to access it using your private key.
131
00:09:28,220 --> 00:09:28,450
OK.
132
00:09:28,450 --> 00:09:31,540
Again it's like a password for them.
133
00:09:31,730 --> 00:09:37,750
Now if you forget your e-mail password you can usually ask the company or person in charge of the e-mail
134
00:09:37,750 --> 00:09:40,240
system to send you a new password.
135
00:09:40,340 --> 00:09:42,440
They like Google does with Gmail for example.
136
00:09:42,610 --> 00:09:49,390
However it's a little bit different with crypto currencies because if you forget this private key then
137
00:09:49,390 --> 00:09:54,940
you can never ever ever ever ever access your money again that's in your wallet OK.
138
00:09:55,030 --> 00:09:56,810
Even if you have the public key doesn't matter.
139
00:09:58,230 --> 00:10:03,870
And this is why we're going to spend a lot of time on many different types of cryptocurrency waltz in
140
00:10:03,870 --> 00:10:08,570
this course and how to secure your private keys and personal data.
141
00:10:08,880 --> 00:10:09,340
OK.
142
00:10:09,340 --> 00:10:14,020
And we're going to make sure that security disasters do not happen to you.
143
00:10:14,020 --> 00:10:22,450
OK so if you lose your if you lose this that's ok because your private key is smart and your private
144
00:10:22,450 --> 00:10:26,870
key can actually tell you what your public key is it's kind of like this.
145
00:10:26,870 --> 00:10:29,040
OK so now try this around.
146
00:10:29,040 --> 00:10:34,000
So I'm going to push this green button here and my private key will tell me my private key Tell me where
147
00:10:34,010 --> 00:10:34,670
I yes.
148
00:10:34,710 --> 00:10:35,720
Right.
149
00:10:35,820 --> 00:10:37,270
That's it.
150
00:10:37,500 --> 00:10:45,210
It's kind of like it's kind of a title anyway so you get the idea and you put those down for now and
151
00:10:45,210 --> 00:10:49,540
we're going to build on this concept soon as well when we talk about block chain or other stuff in mining.
152
00:10:49,540 --> 00:10:50,280
It's going be fun.
153
00:10:50,430 --> 00:10:51,370
Okay great.
154
00:10:51,750 --> 00:10:57,310
And technically I will teach you how to set up wallet's in an exercise in this lesson here.
155
00:10:57,540 --> 00:11:02,800
I just want to introduce you to security concepts in this introduction to security lesson.
156
00:11:02,850 --> 00:11:04,690
And again we're going to build on this now.
157
00:11:04,730 --> 00:11:10,260
Now please note that your public key can never tell you what your private key address is.
158
00:11:10,260 --> 00:11:10,520
OK.
159
00:11:10,530 --> 00:11:12,960
So again never lose your private key.
160
00:11:12,960 --> 00:11:19,950
Also people can find your public key address through using q r codes which some people have on their
161
00:11:19,950 --> 00:11:21,290
crypto wallets.
162
00:11:21,570 --> 00:11:29,160
OK and so in order to explain this concept a little bit what happens is a lot of people have cryptocurrency
163
00:11:29,160 --> 00:11:36,330
wallets that have these little QR codes on them and all that QR code does is it tells you what this
164
00:11:36,330 --> 00:11:38,070
number is here this public key.
165
00:11:38,100 --> 00:11:39,600
That's all it is.
166
00:11:39,990 --> 00:11:44,760
So think of it as a key chain and this is kind of cute but people use this for their dogs now so don't
167
00:11:44,760 --> 00:11:45,390
lose their dogs.
168
00:11:45,390 --> 00:11:45,720
Right.
169
00:11:45,720 --> 00:11:48,130
People scan the QR codes for their dog.
170
00:11:48,130 --> 00:11:54,770
So so public key can can be written as or represented as a QR code.
171
00:11:55,410 --> 00:11:57,420
And the same thing with a private key.
172
00:11:57,420 --> 00:12:02,970
And when we make our wallet very soon together our paper wallet you will see that on one side of our
173
00:12:02,970 --> 00:12:12,510
paper wallet is a public key with this QR code and on the other side of that same wallet is a private
174
00:12:12,510 --> 00:12:18,240
key with this QR code and all that you are code is is a way to scan it with your mobile phone and you
175
00:12:18,240 --> 00:12:20,100
scan the car Colonel tell you what this number is.
176
00:12:20,130 --> 00:12:21,420
And this one as well.
177
00:12:21,660 --> 00:12:24,730
We never show anybody this QR code only this one.
178
00:12:25,420 --> 00:12:25,690
Great.
179
00:12:25,770 --> 00:12:26,230
Will do.
180
00:12:26,250 --> 00:12:31,690
I assume that when you make your first wallet and this will make a lot more sense.
181
00:12:31,980 --> 00:12:32,400
OK.
182
00:12:32,430 --> 00:12:33,490
Great.
183
00:12:33,520 --> 00:12:41,770
And I want to humanize the education process here of security so it's more engaging and so that you
184
00:12:41,770 --> 00:12:47,650
know you'll be more interested in staying up to date with new security and password protocols in the
185
00:12:47,650 --> 00:12:48,200
future.
186
00:12:48,230 --> 00:12:57,100
And I promise you that since there is so much money in this cryptocurrency sector that cyber criminals
187
00:12:57,130 --> 00:13:02,510
will take our money if we're not vigilant and very very careful.
188
00:13:02,860 --> 00:13:11,230
And many many of our brilliant technology visionaries are mindful of the fact that what they create
189
00:13:11,320 --> 00:13:13,740
could have a negative impact on us.
190
00:13:13,750 --> 00:13:20,860
OK so for example we know that Elon Musk makes rockets and he is mindful of the fact that with great
191
00:13:20,860 --> 00:13:23,610
power comes great responsibility.
192
00:13:24,010 --> 00:13:30,850
And many of the people I discuss as we do our security exercises that have contributed so much to enhance
193
00:13:30,880 --> 00:13:37,210
our lives through technology are often the voices of caution when it comes to computer security and
194
00:13:37,210 --> 00:13:39,210
future trends.
195
00:13:39,250 --> 00:13:46,330
So if you want you can follow in Twitter some of the people that I discuss in this lesson and in this
196
00:13:46,330 --> 00:13:52,300
course in general just so you can stay up to date on cryptography and security trends that could impact
197
00:13:52,300 --> 00:13:59,430
your net worth in the future if you invest in the crypto currency markets and I really care.
198
00:13:59,600 --> 00:14:01,950
I care and I want to thoroughly.
199
00:14:02,060 --> 00:14:08,590
I want you to thoroughly understand security and cryptography concepts before you buy any crypto currencies.
200
00:14:08,600 --> 00:14:09,500
OK.
201
00:14:10,310 --> 00:14:17,030
And if you're interested in learning more please just click this button here to learn more about Stampfer
202
00:14:17,030 --> 00:14:25,040
professors and the evolution of public key and cryptography as presented by David Hellman here who created
203
00:14:25,320 --> 00:14:27,420
cryptography in the 1970s.
204
00:14:27,770 --> 00:14:32,160
And he battled the NSA who told them to keep quiet about his research.
205
00:14:32,470 --> 00:14:38,660
OK so the title of this optional six minute video here is cyber security nuclear security.
206
00:14:38,750 --> 00:14:41,940
Alan Turing and illogical logic.
207
00:14:41,940 --> 00:14:43,830
And you can access it here.
208
00:14:45,210 --> 00:14:51,320
And the Elvis Presley rock star of the security sector was a brilliant man named Alan Turing.
209
00:14:51,330 --> 00:14:59,210
Kay and I'm sure you've heard of him and he along with his team created this unbelievable machine
210
00:15:02,040 --> 00:15:06,470
to break the the enigma this is a replica.
211
00:15:06,650 --> 00:15:07,390
This is interesting.
212
00:15:07,500 --> 00:15:15,980
So he created this machine with this team in England during World War Two to decrypt this.
213
00:15:16,270 --> 00:15:16,540
Right.
214
00:15:16,590 --> 00:15:22,610
So he could find out you know all about what the Germans were planning and this is a mini replica here
215
00:15:23,330 --> 00:15:25,020
of the Enigma machine.
216
00:15:25,020 --> 00:15:25,280
Right.
217
00:15:25,320 --> 00:15:30,160
So there's a great movie about this called the the the Imitation Game.
218
00:15:30,210 --> 00:15:31,980
But it's kind of interesting.
219
00:15:32,130 --> 00:15:34,050
Alan Turing is a rock star to me.
220
00:15:34,050 --> 00:15:35,910
I respect him.
221
00:15:36,000 --> 00:15:36,600
He's amazing.
222
00:15:36,690 --> 00:15:37,000
OK.
223
00:15:37,030 --> 00:15:44,700
So we should generally expect governments for national security reasons to poor in a lot of money and
224
00:15:44,700 --> 00:15:46,820
resources to break codes.
225
00:15:47,090 --> 00:15:47,600
OK.
226
00:15:48,430 --> 00:15:53,740
All right so when this happens if we find out then we're going to need to change the security measures
227
00:15:54,010 --> 00:15:55,420
that we use in the future.
228
00:15:55,420 --> 00:16:01,380
And I promise you that governments will likely be spending a lot of money on this in the future.
229
00:16:01,880 --> 00:16:05,590
Kelly were the bomb 10 seconds of your day.
230
00:16:07,190 --> 00:16:08,380
Interesting.
231
00:16:08,960 --> 00:16:24,850
I'm the only one who knows where that news is well in that case I'd say you'd better start.
232
00:16:25,410 --> 00:16:33,040
And so if the NSA kind of did a lot of work to pioneer certain security algorithms they also put a lot
233
00:16:33,040 --> 00:16:34,590
of money into try to break them.
234
00:16:34,710 --> 00:16:39,400
And so what is very secure today will not be secure in the future.
235
00:16:39,910 --> 00:16:41,740
And you might say wait a second.
236
00:16:41,770 --> 00:16:43,680
Does that mean that big one is not going to be secure.
237
00:16:43,690 --> 00:16:45,910
It's kind of a different story when I talk about mining.
238
00:16:45,910 --> 00:16:52,690
I'll talk about this more detail but in order to compromise the Bitcoin security algorithms so to speak
239
00:16:53,050 --> 00:16:58,210
you need to be able to take over 50 percent of all computing resources in the world that are currently
240
00:16:58,210 --> 00:17:00,060
working on Bitcoin.
241
00:17:00,070 --> 00:17:02,240
That's called a 51 percent attack.
242
00:17:02,280 --> 00:17:03,230
I'll come back to that later.
243
00:17:03,340 --> 00:17:03,970
OK.
244
00:17:04,630 --> 00:17:11,920
So many non-American companies won't use American cloud computing companies like sales force dot com
245
00:17:12,920 --> 00:17:21,550
Y because they can't be assured that the U.S. government won't hack into the sales force for example
246
00:17:21,940 --> 00:17:28,870
using crypto trapdoors and view confidential information for Swiss bank account holders for example
247
00:17:28,870 --> 00:17:34,480
and I'm not picking on sales force talk commis just a very big successful cloud computing company based
248
00:17:34,480 --> 00:17:37,630
here in San Francisco and the founder Marc Benioff is a brilliant man.
249
00:17:37,630 --> 00:17:38,740
I respect him a lot.
250
00:17:38,740 --> 00:17:45,480
But the point is that a lot of governments don't trust each other's software companies.
251
00:17:45,500 --> 00:17:46,130
OK.
252
00:17:46,300 --> 00:17:51,880
And that's why you're going to have kind of the Balkanization of cloud computing globally.
253
00:17:52,060 --> 00:17:57,730
Right we've got Amazon Web Services in the United States that kind of powers Air B and B and a lot of
254
00:17:57,730 --> 00:17:59,600
great companies uber et cetera.
255
00:17:59,890 --> 00:18:07,180
And there's going to be different versions of that overseas only because other governments don't trust
256
00:18:07,930 --> 00:18:12,670
other government security protocols that sort of thing a little bit off topic I apologize but just something
257
00:18:12,670 --> 00:18:17,500
to be aware of especially since you're going to if you're going to dive into this cryptocurrency market
258
00:18:17,500 --> 00:18:23,790
you're going to have to protect your own assets using your own software and hardware products.
259
00:18:23,790 --> 00:18:25,830
Cold and hot storage which of us soon.
260
00:18:25,870 --> 00:18:28,440
And it's really good to stay up to date on this stuff as well.
261
00:18:28,630 --> 00:18:29,140
OK.
262
00:18:29,140 --> 00:18:34,090
Especially since banks and credit card companies are not going to offer you the benefit of protecting
263
00:18:34,090 --> 00:18:34,570
your money.
264
00:18:34,600 --> 00:18:36,360
You have it yourself.
265
00:18:37,720 --> 00:18:37,990
All right.
266
00:18:37,990 --> 00:18:42,450
So there's something called Shaugh one.
267
00:18:42,610 --> 00:18:45,790
OK Shaw one is a check one.
268
00:18:46,150 --> 00:18:49,670
And this stands for secure hash algorithm one.
269
00:18:49,840 --> 00:18:55,960
OK and this was created for what it's worth by the NSA which is the National Security Agency the United
270
00:18:55,960 --> 00:18:58,070
States in 1995.
271
00:18:58,210 --> 00:18:58,620
And we're it.
272
00:18:58,710 --> 00:19:01,790
We're going to encrypt something using Shaw one.
273
00:19:02,000 --> 00:19:02,620
OK.
274
00:19:02,860 --> 00:19:05,180
Now I don't want to confuse anyone here.
275
00:19:05,500 --> 00:19:08,270
But there is a difference between hashing and encryption.
276
00:19:08,590 --> 00:19:12,310
And I will explain that later once we have laid down the foundations.
277
00:19:12,310 --> 00:19:15,520
OK so just for now assume that they are very similar.
278
00:19:15,550 --> 00:19:17,060
Just for now thanks.
279
00:19:17,340 --> 00:19:25,890
And so we're in a lesson learn by doing in the next lecture which is an exercise on crypto security.
280
00:19:25,970 --> 00:19:28,440
We're going to learn about this soon.
281
00:19:28,450 --> 00:19:31,830
Shaw one is Shaw 256 K invented by the NSA.
282
00:19:32,020 --> 00:19:39,940
And this here is the basis for for encryption algorithm for for Bitcoin it's very important.
283
00:19:39,940 --> 00:19:45,580
We understand this one and every cryptocurrency or most cryptocurrency you have different algorithms
284
00:19:45,910 --> 00:19:49,880
and that matters a lot if you want to mine crypto currencies as well.
285
00:19:50,020 --> 00:19:58,670
Cret So if we go together to finance style yahud account and this security protocol stuff is so important
286
00:19:58,670 --> 00:20:00,260
investors look at it closely too.
287
00:20:00,280 --> 00:20:00,800
OK.
288
00:20:00,860 --> 00:20:07,210
So go to a finance outcome and enter in the ticker for Bitcoin and just enter this ticker entry and
289
00:20:07,220 --> 00:20:09,870
BTC Dasch USD.
290
00:20:09,890 --> 00:20:11,240
That's according to U.S. dollars.
291
00:20:11,320 --> 00:20:12,370
OK.
292
00:20:12,600 --> 00:20:23,000
And we can see here that included in this market data on Yahoo Finance on Bitcoin is the algorithm shot
293
00:20:23,020 --> 00:20:24,350
294
2:56.
295
00:20:24,600 --> 00:20:25,800
It's written there.
296
00:20:25,940 --> 00:20:31,250
And again the next lecture what we're going to do is we're to do a pretty fun exercise where we're going
297
00:20:31,250 --> 00:20:37,940
to encrypt and decrypt data using Schaal one and Shaw 256 which again is the basis for the algorithm.
298
00:20:37,940 --> 00:20:40,450
This one here for for Pick one.
299
00:20:40,640 --> 00:20:41,460
I hope you enjoy it.
300
00:20:41,480 --> 00:20:41,810
Thanks.
29151
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.