What is Encryption? (& How it Works to Protect Your Data)

แชร์
ฝัง
  • เผยแพร่เมื่อ 15 พ.ค. 2024
  • There is a lot of data in today's world constantly being sent to and from or even sitting on our hard drives but what stops someone from intercepting or stealing that data? Well in this Decodr episode, let's talk about what encryption is, how it works, and the ways it protects your data.
    CLICK BELOW FOR A FREE 4 MONTH TRIAL OF BITDEFENDER'S LATEST PRODUCT THAT CAN HELP YOU FURTHER ENCRYPT YOUR DATA (thanks again to them for sponsoring this video!):
    unlockr.co/17oyB
    SIGN UP FOR MY WEEKLY, NOT-AT-ALL-ANNOYING NEWSLETTER FOR THE LATEST TIPS, TRICKS, AND TECH!
    unlockr.co/hmlCZ
    REPAIR YOUR IPHONE YOURSELF WITH PARTS FROM MY SHOP AND SAVE MONEY:
    My Site - theunlockr.com/shop/
    UNLOCK YOUR PHONE:
    Set your phone free! You can buy unlock codes to allow you to use any carrier with your phone, head here! - theunlockr.com/unlock-my-phone/
    LETS CHAT:
    Subscribe - th-cam.com/users/theunlockr?su...
    Facebook - / theunlockr
    Twitter - / theunlockr
    Instagram - / theunlockr
  • วิทยาศาสตร์และเทคโนโลยี

ความคิดเห็น • 39

  • @sapphire6442
    @sapphire6442 9 หลายเดือนก่อน

    Such useful information. Thank you!

  • @ayodhyayodha9445
    @ayodhyayodha9445 4 ปีที่แล้ว +3

    Great information.....Bit Defender has always been my favorite...

  • @fajvac6436
    @fajvac6436 หลายเดือนก่อน

    Thank you for your effort to share with us your knowledge. ❤

  • @anumolcherian7692
    @anumolcherian7692 4 ปีที่แล้ว +3

    Nice explanation..
    Would you please explain, can we use LSB algorithm for encryption and decryption...?

  • @soroushsafarzadeh8321
    @soroushsafarzadeh8321 4 ปีที่แล้ว +1

    I like you man. Stay safe 👍

  • @codythurber4060
    @codythurber4060 10 หลายเดือนก่อน +2

    You definitely hav3 a new subscriber. You are an excellent teacher.

    • @TheUnlockr
      @TheUnlockr  10 หลายเดือนก่อน

      Thank you!

  • @vhol93
    @vhol93 4 ปีที่แล้ว +3

    Great explanation!!

  • @monikasavner6641
    @monikasavner6641 4 ปีที่แล้ว

    Good thanks

  • @jvtechtea
    @jvtechtea 4 ปีที่แล้ว +1

    I tried to use my physical key to lock my phone. Didn't end well.
    Lol great video, brother. I use a manager too, but 2FA has also been a good layer. I'm adding it more and more to my accounts.

    • @TheUnlockr
      @TheUnlockr  4 ปีที่แล้ว

      Ha. Hey bud, and yeah 2FA ALL THE THINGS. I turn it on on every service that offers it 👌

  • @theswordandtrowel
    @theswordandtrowel 2 ปีที่แล้ว

    Thank you

  • @santoshwalavalkar2390
    @santoshwalavalkar2390 ปีที่แล้ว

    What is difference between encrypted and masked data? How are they stored at back end and how they interpreted once queried or fetched by an application? When shuld encryption be used and when masking?

  • @abdalarashid5408
    @abdalarashid5408 4 ปีที่แล้ว

    Nice keep going

  • @user-db5lq5bw3p
    @user-db5lq5bw3p 4 ปีที่แล้ว

    if the data were encrypted by EFS, then install Biterdefender security, how would work to each other?

  • @RobertHorvat
    @RobertHorvat 4 ปีที่แล้ว +2

    As far as I understand this encription, even owner encrypts something with public key. And this is impossible to unlock except that owners private key.
    If I want to send you something important, I have to get your public key and enctypt with that key.
    I can not encrypt with private key and decrypt with public key.
    This is my understanding of encryption. I may be wrong. Of course :)

  • @Chemy.
    @Chemy. 4 ปีที่แล้ว +1

    Great video man, very informative, in fact I'm watching it a second time because I missed a little bit (in sorting out things at home) the asymmetric encryption.
    Liked as all other your videos

    • @TheUnlockr
      @TheUnlockr  4 ปีที่แล้ว

      Thank you so much Chemy 🙏

    • @DDeLoen
      @DDeLoen 4 ปีที่แล้ว

      TheUnlockr m

    • @DDeLoen
      @DDeLoen 4 ปีที่แล้ว

      TheUnlockr pmo

    • @DDeLoen
      @DDeLoen 4 ปีที่แล้ว

      TheUnlockr m

  • @lyricsradio2149
    @lyricsradio2149 2 ปีที่แล้ว +1

    New subscriber 👍🤝💪

  • @MR.RIZKIS97
    @MR.RIZKIS97 2 ปีที่แล้ว

    I got the bitcoin in blockchain but i don't know how to take the money , they said u need to encrypted first

  • @nitzkit
    @nitzkit 4 ปีที่แล้ว +1

    After reading the title 5 times, I swore it was “Why is encryption 🔑 “

  • @jhuny
    @jhuny 4 ปีที่แล้ว

    unlockr does a video on locking and unlocking because of course, why wasn't this done soonr, and on his decodr channel too lol

  • @stephenwilliams5201
    @stephenwilliams5201 4 ปีที่แล้ว

    My frends and my selfe. Had a wheel for each person. And the wheels had numbers 0 to 30. One set per day was used. A letter was assigned to a space. Rotating the wheel to today's number. Gave the letter/ number combo for that day. then the next set was used the next day. Drove the study hall monitor and the principal. Nuts. Tks ps that was 60 some years ago at arcadia high school OHIO

  • @abidalam7390
    @abidalam7390 4 ปีที่แล้ว

    My Nokia e63 sd card is crapted show .how I am uncrapted SD card ? ......

  • @discam0
    @discam0 3 ปีที่แล้ว

    If I'm getting this right, Asymmetric Encryption lets anyone with the public key read any of the data FROM the holder of the private key? Since anyone with a public key can unlock the encryption and see what was sent.
    So it sounds like all Sir Hacksalot has to do is get a public key, spoof his IP to intercept, and unencrypt anything sent from the holder of the private key.
    In other words...They could see everything sent to other public keys holders, but nothing sent back.
    Or am I missing something here?

    • @tomtravis858
      @tomtravis858 2 ปีที่แล้ว

      Spoofing IPs isn't really a thing for web browsing.
      The public key encrypts things encrypted with the private key (which is rare, only used for signing, not actually encryption).
      So if I were to use your public key to encrypt my data, then send it to you, but it's intercepted:
      The hacker would have the encrypted data, but not your private key, so they wouldn't be able to decrypt.

  • @drueleopard7737
    @drueleopard7737 4 ปีที่แล้ว +1

    Okay 1 more time...🔒🔓🔐🔑🗝

  • @jerilbiju8200
    @jerilbiju8200 4 ปีที่แล้ว

    Bro can we decrypt our data if our pc get attacked by ransomeware

  • @nancyboris9085
    @nancyboris9085 4 ปีที่แล้ว

    Ya this is scott , just don’t get a bit of it , but if you say it works all good then

  • @aqeelabader7951
    @aqeelabader7951 4 ปีที่แล้ว

    this feels like the tutorial videos lecturers play at universities lol

  • @mahmoodshuvo2787
    @mahmoodshuvo2787 4 ปีที่แล้ว +1

    ✌🏻☝🏻

  • @DDeLoen
    @DDeLoen 4 ปีที่แล้ว

    Ml

  • @mohammedshamil1116
    @mohammedshamil1116 4 ปีที่แล้ว

    1st

  • @kellypreston8933
    @kellypreston8933 ปีที่แล้ว

    @kellypreston8933
    1 second ago
    When using the term "key" the subject is confusing. The locked home is not encrypted and the key makes it accessible, yet that is not this concept. What is the real name for the "key"? The data is not locked, it is scrambled, still readable, but not understandable. Could this video be undated to college level? How can data become totally unreadable to anyone but the creator and reader? This would revolutionize data as we know it. Thank you.