Instructional Video6:38
SciShow

This Problem Could Break Cryptography

12th - Higher Ed
What if, no matter how strong your password was, a hacker could crack it just as easily as you can type it? In fact, what if all sorts of puzzles we thought were hard turned out to be easy? Mathematicians call this problem P vs. NP, it...
Instructional Video4:40
MinutePhysics

How Shor's Algorithm Factors 314191

12th - Higher Ed
This video explains how Shor’s Algorithm factors the pseudoprime number 314191 into its prime factors using a quantum computer. The quantum computation relies on the number-theoretic analysis of the factoring problem via modular...
Instructional Video16:31
TED Talks

Craig Costello: In the war for information, will quantum computers defeat cryptographers?

12th - Higher Ed
In this glimpse into our technological future, cryptographer Craig Costello discusses the world-altering potential of quantum computers, which could shatter the limits set by today's machines -- and give code breakers a master key to the...
Instructional Video33:26
TED Talks

Richard Ledgett: The NSA responds to Edward Snowden's TED Talk

12th - Higher Ed
After a surprise appearance by Edward Snowden at TED2014, Chris Anderson said: "If the NSA wants to respond, please do." And yes, they did. Appearing by video, NSA deputy director Richard Ledgett answers Anderson's questions about the...
Instructional Video14:49
TED Talks

Rebecca MacKinnon: Let's take back the Internet!

12th - Higher Ed
In this powerful talk from TEDGlobal, Rebecca MacKinnon describes the expanding struggle for freedom and control in cyberspace, and asks: How do we design the next phase of the Internet with accountability and freedom at its core, rather...
Instructional Video8:48
SciShow

How Encryption Keeps Your Data Safe

12th - Higher Ed
Keeping our data safe and secure is necessary in today's world, but a lot of the encryption we depend on has been in development for thousands of years!
Instructional Video2:56
SciShow

Alan Turing: Great Minds

12th - Higher Ed
Hank introduces us to that great mathematical mind, Alan Turing, who, as an openly gay man in the early 20th century faced brutal prejudice that eventually led to his suicide, despite being a genius war hero who helped the Allies defeat...
Instructional Video16:53
TED Talks

Avi Rubin: All your devices can be hacked

12th - Higher Ed
Could someone hack your pacemaker? Avi Rubin shows how hackers are compromising cars, smartphones and medical devices, and warns us about the dangers of an increasingly hack-able world.
Instructional Video9:20
TED Talks

Mikko Hypponen: Three types of online attack

12th - Higher Ed
Cybercrime expert Mikko Hypponen talks us through three types of online attack on our privacy and data -- and only two are considered crimes. "Do we blindly trust any future government? Because any right we give away, we give away for...
Instructional Video12:09
TED Talks

Andy Yen: Think your email's private? Think again

12th - Higher Ed
Sending an email message is like sending a postcard, says scientist Andy Yen in this thought-provoking talk: Anyone can read it. Yet encryption, the technology that protects the privacy of email communication, does exist. It's just that...
Instructional Video13:57
TED Talks

Jamie Bartlett: How the mysterious dark net is going mainstream

12th - Higher Ed
There's a parallel Internet you may not have run across yet -- accessed by a special browser and home to a freewheeling collection of sites for everything from anonymous activism to illicit activities. Jamie Bartlett reports from the...
Instructional Video8:18
TED Talks

Christopher Soghoian: Government surveillance — this is just the beginning

12th - Higher Ed
Privacy researcher Christopher Soghoian sees the landscape of government surveillance shifting beneath our feet, as an industry grows to support monitoring programs. Through private companies, he says, governments are buying technology...
Instructional Video6:16
TED Talks

Christopher Soghoian: How to avoid surveillance ... with the phone in your pocket

12th - Higher Ed
Who is listening in on your phone calls? On a landline, it could be anyone, says privacy activist Christopher Soghoian, because surveillance backdoors are built into the phone system by default, to allow governments to listen in. But...
Instructional Video34:58
TED Talks

Edward Snowden: Here's how we take back the Internet

12th - Higher Ed
Appearing by telepresence robot, Edward Snowden speaks at TED2014 about surveillance and Internet freedom. The right to data privacy, he suggests, is not a partisan issue, but requires a fundamental rethink of the role of the internet in...
Instructional Video9:49
SciShow

The Randomness Problem: How Lava Lamps Protect the Internet

12th - Higher Ed
Randomness is important for all kinds of things, from science to security, but to generate true randomness, engineers have turned to some pretty odd tricks!
Instructional Video10:04
TED Talks

Shohini Ghose: Quantum computing explained in 10 minutes

12th - Higher Ed
A quantum computer isn't just a more powerful version of the computers we use today; it's something else entirely, based on emerging scientific understanding -- and more than a bit of uncertainty. Enter the quantum wonderland with TED...
Instructional Video19:14
TED Talks

Mikko Hypponen: How the NSA betrayed the world's trust -- time to act

12th - Higher Ed
Recent events have highlighted, underlined and bolded the fact that the United States is performing blanket surveillance on any foreigner whose data passes through an American entity -- whether they are suspected of wrongdoing or not....
Instructional Video7:45
TED Talks

TED: Your smartphone is a civil rights issue | Christopher Soghoian

12th - Higher Ed
The smartphone you use reflects more than just personal taste ... it could determine how closely you can be tracked, too. Privacy expert and TED Fellow Christopher Soghoian details a glaring difference between the encryption used on...
Instructional Video10:00
TED Talks

TED: The case for a decentralized internet | Tamas Kocsis

12th - Higher Ed
Who controls the internet? Increasingly, the answer is large corporations and governments -- a trend that's threatening digital privacy and access to information online, says web developer Tamas Kocsis. In this informative talk, Kocsis...
Instructional Video16:39
TED Talks

Keren Elazari: Hackers: the Internet's immune system

12th - Higher Ed
The beauty of hackers, says cybersecurity expert Keren Elazari, is that they force us to evolve and improve. Yes, some hackers are bad guys, but many are working to fight government corruption and advocate for our rights. By exposing...
Instructional Video2:25
SciShow

How Do Chips Make Credit Cards More Secure?

12th - Higher Ed
If you live in the United States, you might have recently gotten a credit card with a microchip on it. But what does this chip do that makes it any different than the magnetic strip on the back of the card?
Instructional Video7:59
SciShow

Cryptography: The Science of Making and Breaking Codes

12th - Higher Ed
There are lots of different ways to encrypt a message, from early, simple ciphers to the famous Enigma machine. But it’s tough to make a code truly unbreakable.
Instructional Video12:52
Instructional Video6:05
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Attacks Against Encryption

Higher Ed
In this video, we will look at the different kinds of attacks that hackers can perform to decrypt an already encrypted hard drive.