Hi, what do you want to do?
SciShow
How Encryption Keeps Your Data Safe
Keeping our data safe and secure is necessary in today's world, but a lot of the encryption we depend on has been in development for thousands of years!
SciShow
Alan Turing: Great Minds
Hank introduces us to that great mathematical mind, Alan Turing, who, as an openly gay man in the early 20th century faced brutal prejudice that eventually led to his suicide, despite being a genius war hero who helped the Allies defeat...
Crash Course
Cryptography: Crash Course Computer Science
Today we’re going to talk about how to keep information secret, and this isn’t a new goal. From as early as Julius Caesar’s Caesar cipher to Mary, Queen of Scots, encrypted messages to kill Queen Elizabeth in 1587, theres has long been a...
Crash Course
War - Crash Course Statistics
Today we're going to discuss the role of statistics during war. From helping the Allies break Nazi Enigma codes and estimate tank production rates to finding sunken submarines, statistics have and continue to play a critical role on the...
Curated Video
How Many Faces Can You Spot In This Picture?
How Many Faces Can You Spot In This Picture?
Great Big Story
This Uncrackable Code Is Puzzling the CIA
Delve into the enigma of Kryptos, a mysterious sculpture at the heart of the CIA headquarters, challenging code-breakers for three decades. Meet Elonka Dunin, a puzzle enthusiast, and artist Jim Sanborn, the creator of Kryptos, as they...
Curated Video
CISSP® Certification Domain 3: Security Architecture and Engineering Video Boot Camp for 2022 - The history of cryptography
CISSP Domain 7: Security Operations: The history of cryptography.
r/>
This clip is from the chapter "CISSP Domain 3: System Architecture and Engineering" of the series "CISSP® Certification Domain 3: Security Architecture and...
r/>
This clip is from the chapter "CISSP Domain 3: System Architecture and Engineering" of the series "CISSP® Certification Domain 3: Security Architecture and...
CuriosaMente
¡6 Monstruos! ¿Existen?
Vamos a describir seis monstruos. En cada uno de ellos, descifra cuál es su nombre y descubre si sabes si el monstruo es real o es ficticio.
El dragón es fict
icio.
El vampiro es ficticio (en referencia al vampiro humano,...
El dragón es fict
icio.
El vampiro es ficticio (en referencia al vampiro humano,...
CuriosaMente
¿Los hackers son delincuentes?
¿Quienes fueron los primeros hackers? ¿Cuáles son los hackers más famosos y más controvertidos? ¿Son malvados?
Un hacker es una persona con habilidades avanzadas en computación que puede ingresar a sistemas informáticos sin...
Un hacker es una persona con habilidades avanzadas en computación que puede ingresar a sistemas informáticos sin...
Library of Congress
Loc: Experiencing War: Military Intel, the Inside Story
Here are stories of Military Intelligence as told by those who were in "Harm's Way", "In The Field", and "Behind the Scenes."
PBS
Nazi Secrets: The Story of Enigma
The companion website to the Nova special that documented how the Allied codebreakers cracked the German message coding machine, nicknamed "Enigma," in World War 2. The site has student activities including trying to decode machine made...
Khan Academy
Khan Academy: The Enigma Encryption Machine (Case Study)
Encryption is explored with a focus on the Enigma.