Why the NSA is breaking our encryption -- and why we should care | Matthew Green | TEDxMidAtlantic

แชร์
ฝัง
  • เผยแพร่เมื่อ 30 ก.ย. 2024
  • This talk was given at a local TEDx event, produced independently of the TED Conferences. Encryption dates back to the Founding Fathers and the Bill of Rights. Now, the United States National Security Agency is breaking and undermining core encryption technologies that power the Internet, saying it's being done for our own protection from terrorists. But are we sacrificing our freedoms for fear?
    Matthew Green is an Assistant Research Professor of Computer Science at the Johns Hopkins University. His research focuses on computer security and cryptography, and particularly the way that cryptography can be used to promote individual privacy. His work includes techniques to securely access medical databases, enhance the anonymity of Bitcoin, and to analyze deployed security systems. Prior to joining the Johns Hopkins faculty he served as a Senior Technical Staff Member at AT&T Laboratories.
    About TEDx, x = independently organized event In the spirit of ideas worth spreading, TEDx is a program of local, self-organized events that bring people together to share a TED-like experience. At a TEDx event, TEDTalks video and live speakers combine to spark deep discussion and connection in a small group. These local, self-organized events are branded TEDx, where x = independently organized TED event. The TED Conference provides general guidance for the TEDx program, but individual TEDx events are self-organized.* (*Subject to certain rules and regulations)

ความคิดเห็น • 124

  • @cza99
    @cza99 8 ปีที่แล้ว +29

    Tor network does not secure your communication, it only make you anonymous. Tor exit nodes (can be setup by anyone) can read your data if you are not accessing data via HTTPS.

    • @saltyasian4462
      @saltyasian4462 7 ปีที่แล้ว +6

      If you are only accessing hidden services it does secure it, but exit nodes as you described can sometimes be dodgy.

    • @crollinsphoto
      @crollinsphoto 6 ปีที่แล้ว +2

      Tor has already been broken.

    • @parveezalam3748
      @parveezalam3748 4 ปีที่แล้ว

      @ollux paeternax which can be use to have our privacy?

    • @krzysztofjuszczak906
      @krzysztofjuszczak906 3 ปีที่แล้ว +1

      @@crollinsphoto how so

  • @drsingingeagle
    @drsingingeagle 2 ปีที่แล้ว +7

    “You’re not paranoid. Everybody out there is out to get you.” My day-to-day life would be the cure for insomnia.

  • @Decebal825
    @Decebal825 7 ปีที่แล้ว +9

    democracy is so screwed

  • @jadesluv
    @jadesluv 9 ปีที่แล้ว +15

    Movie > Enemy of the State, Gene Hackman

  • @ghffrsfygdhfjkjiysdz
    @ghffrsfygdhfjkjiysdz 7 ปีที่แล้ว +5

    Actually, he is studying maps. After all a crypto-system is just a map from plain text to cipher text and visa-versa.

  • @iahelcathartesaura3887
    @iahelcathartesaura3887 7 ปีที่แล้ว +9

    The way he pronounces "cryptography" totally sounds like "cartography", which sounds confusing lol. Both are fascinating, esp cryptography.

    • @lapointe64
      @lapointe64 5 ปีที่แล้ว +2

      There's always cryptocartography where you make secret maps. Not to be confused with cartocryptography which is making maps to all your secret codes...

  • @superreverbfreak
    @superreverbfreak 7 ปีที่แล้ว +6

    Ok I gotta more than likely a dumb ass question but I'm going to ask it anyways cuz ftw what rhymes with swipe?

    • @Arrix949
      @Arrix949 7 ปีที่แล้ว +5

      superreverbfreak Skype

  • @jetsetjourneysofficial
    @jetsetjourneysofficial 6 ปีที่แล้ว +6

    It will only encourage people to develop better encryption.

  • @tryptex
    @tryptex 5 ปีที่แล้ว +7

    But the real question should be: What can we do about it?

  • @samislam2746
    @samislam2746 3 ปีที่แล้ว +2

    people are like: Zzzz

  • @MichaelButlerC
    @MichaelButlerC 9 ปีที่แล้ว +8

    I'd like to hear more how the NSA is (supposedly) weakening encryption. Did they solve the prime factorization problem which is what powers RSA encryption?

    • @theroundduckman
      @theroundduckman 9 ปีที่แล้ว +1

      they can use quantum computers, for example

    • @MichaelButlerC
      @MichaelButlerC 9 ปีที่แล้ว

      RoundDuckMan ok but what makes the NSA more capable of doing this than anyone else? once the technology exists, it's up to the highest bidder. So we had better discover a new, stronger encryption scheme.

    • @theroundduckman
      @theroundduckman 9 ปีที่แล้ว +3

      Michael Butler True, heck Codecrypt (I think that's their name) is making quantum-resistant encryption. So the battle goes on. :P

    • @jtdemille
      @jtdemille 9 ปีที่แล้ว +3

      +Michael Butler They made the maintainer of RSA (and many other encryption algorithms) to pretty much have a certain set of "default" prime numbers. So now the NSA is pretty much running around with an infinite keyring, and they're like "Let's try this key. Nope. Now the next one!" until they get someone's private key.

    • @nosuchthing8
      @nosuchthing8 8 ปีที่แล้ว +1

      Check out numberphile, they have an episode about that. The published encryption code looks good, but its cooked and only mathematicans can pick up on it.

  • @itsamemario1772
    @itsamemario1772 7 ปีที่แล้ว +5

    This needs more views

  • @curtn7076
    @curtn7076 7 ปีที่แล้ว +3

    I think my Florida Congressman is in it. it's like Orson Welles book 1984

    • @sundhaug92
      @sundhaug92 4 ปีที่แล้ว +2

      1984 is George Orwell (from which we get Orwellian), not Orson Welles

  • @josephstarling7359
    @josephstarling7359 4 ปีที่แล้ว +1

    It's all helping to set up the framework needed to fulfill the Biblical prophesies about the end times. It's so overwhelming clear now that there is really no excuse for ignoring the one and only most important event in all of history. An event that depending on how you respond to it will affect your eternal destiny. That event, of course, is death and resurrection of Jesus Christ. What you do about Jesus is all that really matters in life (and death).

  • @4cps777
    @4cps777 2 ปีที่แล้ว

    5:00
    Funnily enough, asymmetric encryption originated at the GCHQ.

  • @noezzi
    @noezzi 9 ปีที่แล้ว +11

    They want to be like God. The all seeing eye on your dollar bills is a prime example. The devil is a jealous entity

  • @ackinito
    @ackinito 3 ปีที่แล้ว

    Superficial talk, but he is probably about that NSA agent sitting among the crowd.

  • @otisobl
    @otisobl 3 ปีที่แล้ว +1

    Funny he would advertise for Truecrypt: one year later, it was found out to be compromised.

  • @non-human3072
    @non-human3072 4 ปีที่แล้ว +1

    Nothing is safer than pen and paper... good luck G-ogle

  • @foggyblues13
    @foggyblues13 10 ปีที่แล้ว +3

    uripre, that's what they want you to believe, but it's all b.s.

    • @MarkScott1
      @MarkScott1 9 ปีที่แล้ว +2

      foggyblues13 It is all BS. If you were Al-Qaeda, ISIS or whatever, you'd just get on the dark web and talk fairly freely. Why our surface internet needs to be monitored and the reasons that they are giving for this is pure bullshit.
      Why they are so concerned about monitoring us normal folk though I don't fully understand. Anyone?

  • @su8z3r03
    @su8z3r03 3 ปีที่แล้ว +1

    Cell phone data going over the air is not enecrypted SS7 exploit proves this.

  • @AndreAmorim-AA
    @AndreAmorim-AA 9 ปีที่แล้ว +3

    Congrats Professor

  • @maomxesoax2471
    @maomxesoax2471 6 ปีที่แล้ว +1

    A makes a scrambled char set, then creates a one time pad from that set. A sends that pad (not the scrambled char set just the otp), to the recipient. The recipient (B) creates their scrambled char set and sends back their created one time pad created from that set (not B's scrambled char set) to A. Now A has B's otp and B has A's otp. They each use their otp's they got from each other to send msgs. A will be able to decrypt B's msgs (sent using A's otp) because A has the original A char set. B will be able to decrypt A's msgs because A is using B's otp and B has original B char set and can decrypt A's msgs. E in the middle will not have access to A scrambled or B scrambled, only the A otp and B otp. What do you think?

  • @nafeesarazzaq8586
    @nafeesarazzaq8586 5 ปีที่แล้ว +1

    Any one tell me that how can i make a new Security algorithm (Symmetric or asymmetric ).Tell me about working of algorithm.Its mine Assignment And present in class.Not already Algorithms present in class sir said present your own idea so Help me Please.

    • @mdd1963
      @mdd1963 4 ปีที่แล้ว

      you should use the impenetrable substitution cipher, where A=1, B=2, etc., Z=26.....; no one will ever catch on, and the code is unbreakabe!

  • @stratosjoebar
    @stratosjoebar 4 ปีที่แล้ว +1

    As always.a meaning discovered by Greece.

  • @EXHellfire
    @EXHellfire 7 ปีที่แล้ว +3

    I was seriously freaking out over how good the autogenerated cc is in this video but then "insight furred" replaced "enciphered" and I now breathe again...

  • @benniedewaal685
    @benniedewaal685 6 ปีที่แล้ว +1

    balls can be eyes.

  • @iwill1171
    @iwill1171 9 หลายเดือนก่อน

    😢

  • @ProfessorScottRyan
    @ProfessorScottRyan 2 ปีที่แล้ว

    Regular text and cell calls are not encrypted actually... but the connection to the cell tower can be... except that the towers can be spoofed. So much of the phone and now wireless infrastructure is terribly designed from a security perspective.
    Publicly available phones never have been encrypted have they? You can encrypt modern cell phone voice and text end to end using apps though. Some of those apps can also be used to attack you (Whatsapp being one example that has happened).

  • @reginald8623
    @reginald8623 3 ปีที่แล้ว

    if someone routinely visits Israel. maaaybe they have other interests than the US but thats just a hunch

  • @lapointe64
    @lapointe64 5 ปีที่แล้ว

    The speaker never really addressed the question in the title: Why the NSA is breaking our encryption. He gave good reasons for why they shouldn't, but that's a different question.

  • @dennisgilesjnr3538
    @dennisgilesjnr3538 9 ปีที่แล้ว

    Heard of "Windtalkers" ????

  • @zissou6928
    @zissou6928 9 ปีที่แล้ว

    mispellt 'led' gives me a tummy ache

  • @juliannevillecorrea
    @juliannevillecorrea 9 ปีที่แล้ว +1

    Where the #mind is without #fear and the head is held high;
    Where knowledge is #free;
    Where the world has not been broken up into fragments
    By narrow domestic walls
    Where words come out from the depth of #truth;
    Where tireless striving stretches its arms towards perfection;
    Where the clear stream of #reason has not lost its way
    Into the dreary desert sand of dead habit;
    Where the mind is led forward by thee
    Into ever-widening #thought and action;
    Into that heaven of #freedom, My Father, let my #country awake.
    ...............................
    #notimeforcaution #badwolf #redpill #datadarwinism
    Sefra Correa Marielyn Correa Wilson Correa watch

  • @agentstepheng289
    @agentstepheng289 8 ปีที่แล้ว +2

    I am curious where those documents are from that is showed. Where they part of the Snowden files?

    • @chrisrussell9118
      @chrisrussell9118 8 ปีที่แล้ว +2

      +Agent StephenG yes they are

    • @chrisrussell9118
      @chrisrussell9118 8 ปีที่แล้ว +3

      +Agent StephenG archive.org/details/NSA-PRISM-Slides

  • @jony7779
    @jony7779 9 ปีที่แล้ว +3

    If we prevent the NSA from discovering how to break common encryption techniques, then we may be leaving those discoveries to a more malicious group of people. Sure, surveillance is bad, but avoiding surveillance is a great motivation to develop better encryption techniques. If someone is breaking our encryption techniques, I would prefer it be the NSA over a group with malevolent intent.

    • @nosuchthing8
      @nosuchthing8 8 ปีที่แล้ว +3

      the reality is that the nsa forces most software to have backdoors built in, at one level or a other. Which then is expolited when said agents move on to other jobs.
      Forcing software to be crippled is like forcing all cars to drive at 5mph tops to save lives.

    • @grrr1351
      @grrr1351 7 ปีที่แล้ว +3

      Like the NSA doesn't have a malevolent intent.

  • @mastaskep
    @mastaskep 9 ปีที่แล้ว +1

    This video really makes me question his expertise in his profession. Does he not know that cryptography algorithms are made public for the purpose of getting others to test its ability to withstand attempts to decrpyt. This video is pretty misleading he must never heard of kerckhoffs principle. But I do agree that NSA has crossed boundaries by recording and storing information once they crack an algorithm but what have they done with the information that was so wrong? Have they blackmailed anyone no..

    • @wiscanson9498
      @wiscanson9498 8 ปีที่แล้ว +2

      +mastaskep So it's better to wait until after the fact? By then it is too late. There is no reason why large letter organizations have authority and control over anyone's info. Paste your SSN and admit you won't worry. That can't be true.

    • @mastaskep
      @mastaskep 8 ปีที่แล้ว +1

      +Wis Canson Dude I did say they crossed boundaries by recording and storing information. I am quite sure NSA has my SSN and yours anyway......

    • @wiscanson9498
      @wiscanson9498 8 ปีที่แล้ว +1

      *****​ Ok, so now one must act. You mentioned they have not blackmailed anyone. Would you please elaborate?

    • @mastaskep
      @mastaskep 8 ปีที่แล้ว

      There has not been, to me recollection, any nefarious activities by the government agencies where they use non-criminal information about you. For instance, if you were some high level official that cheats on his wife and they got into your phone records and blackmailed you into doing something against your will.

    • @wiscanson9498
      @wiscanson9498 8 ปีที่แล้ว

      +mastaskep No one can against anyone's will. Unless, of course, if they threaten your life. As I have stated no one, not limited to but including government, should have even the slightest of access to anyone's info.

  • @uripre
    @uripre 10 ปีที่แล้ว +7

    Those civilian encryptions, even if created by Americans, are not only used by Americans, but also by Al-Qaeda, Iran or any other nutter.
    *Your safety depends on the ability of the NSA to decrypt those encryptions.*

    • @culturedesi
      @culturedesi 8 ปีที่แล้ว +12

      +uripre hahahaha ur a funny one

    • @luddity
      @luddity 7 ปีที่แล้ว +3

      and then the NSA decryption will, in turn, end up being used by the other nutter down the road against any target they choose