SciShow
This Problem Could Break Cryptography
What if, no matter how strong your password was, a hacker could crack it just as easily as you can type it? In fact, what if all sorts of puzzles we thought were hard turned out to be easy? Mathematicians call this problem P vs. NP, it...
MinutePhysics
How Shor's Algorithm Factors 314191
This video explains how Shor’s Algorithm factors the pseudoprime number 314191 into its prime factors using a quantum computer. The quantum computation relies on the number-theoretic analysis of the factoring problem via modular...
TED Talks
Craig Costello: In the war for information, will quantum computers defeat cryptographers?
In this glimpse into our technological future, cryptographer Craig Costello discusses the world-altering potential of quantum computers, which could shatter the limits set by today's machines -- and give code breakers a master key to the...
TED Talks
Richard Ledgett: The NSA responds to Edward Snowden's TED Talk
After a surprise appearance by Edward Snowden at TED2014, Chris Anderson said: "If the NSA wants to respond, please do." And yes, they did. Appearing by video, NSA deputy director Richard Ledgett answers Anderson's questions about the...
TED Talks
Rebecca MacKinnon: Let's take back the Internet!
In this powerful talk from TEDGlobal, Rebecca MacKinnon describes the expanding struggle for freedom and control in cyberspace, and asks: How do we design the next phase of the Internet with accountability and freedom at its core, rather...
SciShow
How Encryption Keeps Your Data Safe
Keeping our data safe and secure is necessary in today's world, but a lot of the encryption we depend on has been in development for thousands of years!
SciShow
Alan Turing: Great Minds
Hank introduces us to that great mathematical mind, Alan Turing, who, as an openly gay man in the early 20th century faced brutal prejudice that eventually led to his suicide, despite being a genius war hero who helped the Allies defeat...
TED Talks
Avi Rubin: All your devices can be hacked
Could someone hack your pacemaker? Avi Rubin shows how hackers are compromising cars, smartphones and medical devices, and warns us about the dangers of an increasingly hack-able world.
TED Talks
Mikko Hypponen: Three types of online attack
Cybercrime expert Mikko Hypponen talks us through three types of online attack on our privacy and data -- and only two are considered crimes. "Do we blindly trust any future government? Because any right we give away, we give away for...
TED Talks
Andy Yen: Think your email's private? Think again
Sending an email message is like sending a postcard, says scientist Andy Yen in this thought-provoking talk: Anyone can read it. Yet encryption, the technology that protects the privacy of email communication, does exist. It's just that...
TED Talks
Jamie Bartlett: How the mysterious dark net is going mainstream
There's a parallel Internet you may not have run across yet -- accessed by a special browser and home to a freewheeling collection of sites for everything from anonymous activism to illicit activities. Jamie Bartlett reports from the...
TED Talks
Christopher Soghoian: Government surveillance — this is just the beginning
Privacy researcher Christopher Soghoian sees the landscape of government surveillance shifting beneath our feet, as an industry grows to support monitoring programs. Through private companies, he says, governments are buying technology...
TED Talks
Christopher Soghoian: How to avoid surveillance ... with the phone in your pocket
Who is listening in on your phone calls? On a landline, it could be anyone, says privacy activist Christopher Soghoian, because surveillance backdoors are built into the phone system by default, to allow governments to listen in. But...
TED Talks
Edward Snowden: Here's how we take back the Internet
Appearing by telepresence robot, Edward Snowden speaks at TED2014 about surveillance and Internet freedom. The right to data privacy, he suggests, is not a partisan issue, but requires a fundamental rethink of the role of the internet in...
SciShow
The Randomness Problem: How Lava Lamps Protect the Internet
Randomness is important for all kinds of things, from science to security, but to generate true randomness, engineers have turned to some pretty odd tricks!
TED Talks
Shohini Ghose: Quantum computing explained in 10 minutes
A quantum computer isn't just a more powerful version of the computers we use today; it's something else entirely, based on emerging scientific understanding -- and more than a bit of uncertainty. Enter the quantum wonderland with TED...
TED Talks
Mikko Hypponen: How the NSA betrayed the world's trust -- time to act
Recent events have highlighted, underlined and bolded the fact that the United States is performing blanket surveillance on any foreigner whose data passes through an American entity -- whether they are suspected of wrongdoing or not....
TED Talks
TED: Your smartphone is a civil rights issue | Christopher Soghoian
The smartphone you use reflects more than just personal taste ... it could determine how closely you can be tracked, too. Privacy expert and TED Fellow Christopher Soghoian details a glaring difference between the encryption used on...
TED Talks
TED: The case for a decentralized internet | Tamas Kocsis
Who controls the internet? Increasingly, the answer is large corporations and governments -- a trend that's threatening digital privacy and access to information online, says web developer Tamas Kocsis. In this informative talk, Kocsis...
TED Talks
Keren Elazari: Hackers: the Internet's immune system
The beauty of hackers, says cybersecurity expert Keren Elazari, is that they force us to evolve and improve. Yes, some hackers are bad guys, but many are working to fight government corruption and advocate for our rights. By exposing...
SciShow
How Do Chips Make Credit Cards More Secure?
If you live in the United States, you might have recently gotten a credit card with a microchip on it. But what does this chip do that makes it any different than the magnetic strip on the back of the card?
SciShow
Cryptography: The Science of Making and Breaking Codes
There are lots of different ways to encrypt a message, from early, simple ciphers to the famous Enigma machine. But it’s tough to make a code truly unbreakable.
Curated Video
Java Multithreading and Parallel Programming Masterclass - How to Properly Size a Thread Pool
This video explains how to properly size a thread pool.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Attacks Against Encryption
In this video, we will look at the different kinds of attacks that hackers can perform to decrypt an already encrypted hard drive.