End to End Encryption (E2EE) - Computerphile

แชร์
ฝัง
  • เผยแพร่เมื่อ 29 มี.ค. 2017
  • End to end encryption, government ministers are again talking about stopping it. What is it and why might that be a bad idea? Dr Mike Pound explains.
    Hololens: • Microsoft Hololens - C...
    Blockchain: • The Blockchain & Bitco...
    / computerphile
    / computer_phile
    This video was filmed and edited by Sean Riley.
    Computer Science at the University of Nottingham: bit.ly/nottscomputer
    Computerphile is a sister project to Brady Haran's Numberphile. More at www.bradyharan.com

ความคิดเห็น • 653

  • @rich1051414
    @rich1051414 7 ปีที่แล้ว +2050

    Criminals think about a crime before committing a crime, that is unacceptable. Therefore, we should ban thought.

    • @liquidminds
      @liquidminds 7 ปีที่แล้ว +201

      Most risk is criminals talking face to face. 2 people should only be allowed to talk when a government official is present. I mean.. ."private" conversations... more like "criminal conspiracies".. no thanks. unacceptable.

    • @rich1051414
      @rich1051414 7 ปีที่แล้ว +9

      +Zac T I have no idea what that is.
      +liquidminds You mean "government officials". The problem here is that, if the government has tools to monitor peoples communications, so can anyone clever enough to know how. It puts everyone at risk, not of government monitoring, but by monitoring by hackers or corporations who want your personal info for financial or political gain. If the government has a means of monitoring you, so does potentially anyone else.

    • @liquidminds
      @liquidminds 7 ปีที่แล้ว +30

      I had quite a load of sarcasm in there. Of course it's bad.
      Especially since most corporations probably wouldn't find it very amusing, if they had to communicate trade-secrets over insecure lines... Making an exception for corporations and suddenly everyone is a corporation.
      All in all, it's another conservative "we are afraid, so let's make it illegal" type of situation. Great opportunity to make fun of them.

    • @zusurs
      @zusurs 7 ปีที่แล้ว +2

      Sorry, simply idiotic argument.

    • @stensoft
      @stensoft 7 ปีที่แล้ว +65

      It's actually very simple. All that needs to be done is to ban crime. Problem solved.

  • @Cr42yguy
    @Cr42yguy 7 ปีที่แล้ว +860

    "does this make you bob?"
    "it does"
    made me smile

    • @BeCurieUs
      @BeCurieUs 7 ปีที่แล้ว +21

      Just something so mild and...I dunno, British about it that is so charming :D

    • @willdarling1
      @willdarling1 7 ปีที่แล้ว +22

      "I'll 'ave that!"

    • @ArvindhMani
      @ArvindhMani 7 ปีที่แล้ว +2

      Made me laugh out loud!

    • @siddhantkumar9646
      @siddhantkumar9646 7 ปีที่แล้ว +2

      +Arvindh Mani I didnt get it?What does it mean?

    • @ArvindhMani
      @ArvindhMani 7 ปีที่แล้ว +20

      In the field of computer security, when an example is being demonstrated, the users are usually named Alice and Bob.

  • @vladomaimun
    @vladomaimun 7 ปีที่แล้ว +426

    “Arguing that you don’t care about the right to privacy because
    you have nothing to hide is no different than saying you don’t care
    about free speech because you have nothing to say.” - Edward Snowden

    • @frederickwirigley9685
      @frederickwirigley9685 2 ปีที่แล้ว +5

      I agree with you

    • @baronvonbeandip
      @baronvonbeandip 2 ปีที่แล้ว +6

      @@frederickwirigley9685 I agree that you agree with him.

    • @nickwilson3499
      @nickwilson3499 2 ปีที่แล้ว +6

      @@baronvonbeandip I agree with you agreeing with him

    • @examplewastaken
      @examplewastaken 2 ปีที่แล้ว +1

      I thought of that exact quote right when he said it.

    • @matthewwynn3025
      @matthewwynn3025 2 ปีที่แล้ว +2

      @@nickwilson3499 I agree with your agreement of that you agree that he was agreeing with him

  • @apburner1
    @apburner1 7 ปีที่แล้ว +800

    Why not just make it illegal to commit crime? Problem solved.

    • @reubensmart1757
      @reubensmart1757 7 ปีที่แล้ว +14

      Here here!

    • @tnvmadhav2442
      @tnvmadhav2442 5 ปีที่แล้ว +4

      so legally speaking, being illegal makes things easy to enforce law?

    • @michaelmagnus3590
      @michaelmagnus3590 4 ปีที่แล้ว +45

      why not just abolish all laws, therefore nothing is technically a crime

    • @EnjoyCocaColaLight
      @EnjoyCocaColaLight 4 ปีที่แล้ว +19

      Yes, like in Sweden. In Sweden it is ILLEGAL to be a criminal!

    • @Bobbel888
      @Bobbel888 3 ปีที่แล้ว +5

      How can someone think that straight?!

  • @unixbash
    @unixbash 7 ปีที่แล้ว +317

    This should be shown on BBC to educate the politicians about the problems they have "solutions" for, without understanding the issue itself!

    • @vasodegama2244
      @vasodegama2244 3 ปีที่แล้ว +2

      BBC? Eh , da je to u njihovom interesu zarad rejtinga ...

    • @tommykarrick9130
      @tommykarrick9130 2 ปีที่แล้ว +2

      Or maybe people could just stop electing geriatrics

    • @matthewwynn3025
      @matthewwynn3025 2 ปีที่แล้ว

      @@tommykarrick9130 easier said than done my friend

    • @MukeshKumar-nz4gr
      @MukeshKumar-nz4gr 2 ปีที่แล้ว

      @@vasodegama2244 。

    • @ksadidar
      @ksadidar ปีที่แล้ว

      its not like they need education, its just that British politicians are vile cunts who are inherently interested in insane ideas

  • @lithium820
    @lithium820 7 ปีที่แล้ว +424

    thats like allowing the post office to read all the mail i send. thats not a good thing

    • @massimookissed1023
      @massimookissed1023 7 ปีที่แล้ว +33

      Lithium , There's a difference between being *allowed* to, and being *able* to.
      The post office /govt could already read your mail if they just opened it. Imports/customs do that already.

    • @eideticex
      @eideticex 7 ปีที่แล้ว +5

      As I understand it, no the post office can't open our mail without a warrant to do so. The only time I've seen that attempt to be waived was in extreme cases like the Anthrax scare awhile back. I remember some interesting articles about people being upset their mail was opened and filing complaints and lawsuits over it when some locations opened letters instead of using less invasive techniques to check for tampering.

    • @theslimeylimey
      @theslimeylimey 7 ปีที่แล้ว +37

      Yes, its strange how it was not legal for governments to listen in on analog telephone calls or read our mail without a warrant and governments accepted that but they are arguing today that its essential for our security they are permitted to do the equivalent of steaming open our letters. The irony is they know exactly who the terrorists are already and can get individual warrants as needed. Coming back to the country after fighting for ISIS is subtle hint as to who to watch out for.

    • @josevalencia2784
      @josevalencia2784 6 ปีที่แล้ว

      Lithium richie ray

    • @lambertbrother1628
      @lambertbrother1628 6 ปีที่แล้ว +2

      There is a place in Bristol where the Royal Mail can open your mail (for example if you forgot a stamp and they needed to find a return address), but no regular post office or Royal Mail depot is allowed to do this. (They wil only open your mail if they have to, they don't just do it willy nilly)

  • @Locut0s
    @Locut0s 7 ปีที่แล้ว +166

    "I don't have anything to hide". Oh except maybe all my health records, my credit card number and financial history, some of my browsing history depending on the person reading it, some of my contacts from some of my other contacts, some of the stuff I've said from my current and future employer, some of the stuff I've said from some of my family and friends depending, yeh I guess there's actually quite a lot come to think of it. You don't have to be a bad person to want privacy. And I realize that's the point of what was said.

    • @travelsonic
      @travelsonic 6 ปีที่แล้ว +6

      EXACTLY THIS.

    • @Ludix147
      @Ludix147 5 ปีที่แล้ว +25

      I always knew something was wrong with this argument. But your comment made me able to explain it to other people.

    • @AbidAli-sm2qt
      @AbidAli-sm2qt 3 ปีที่แล้ว +1

      Yeah your right

    • @83vbond
      @83vbond 3 ปีที่แล้ว +1

      And passwords too

  • @tobortine
    @tobortine 7 ปีที่แล้ว +124

    Alice and Bob - Well done. Proper encryption.

  • @Anpanator
    @Anpanator 6 ปีที่แล้ว +142

    One of the more obvious, non-technical issues here is that how are you going to prevent criminals from simply continuing to use secure E2E encryption, even if you enforce policies that require backdoors or whatever? You can't, really. If criminals want E2E encryption, they can get it. The knowledge is already out there, there are many different applications and libraries for it and it is entirely unrealistic to think you can prevent access to it.

    • @soumyapawar8125
      @soumyapawar8125 5 ปีที่แล้ว +5

      Exactly!! If not one app there's always another

    • @bluesillybeard
      @bluesillybeard 4 ปีที่แล้ว +33

      plus they can program their own if they know how.

    • @MrJigssaw1989
      @MrJigssaw1989 3 ปีที่แล้ว +14

      exactly ... you cant outlaw maths.

    • @nickwilson3499
      @nickwilson3499 2 ปีที่แล้ว +5

      Politicians are retards

    • @lorentzianmanifold718
      @lorentzianmanifold718 2 ปีที่แล้ว

      @@bluesillybeard it's the only safe way!

  • @raingram
    @raingram 7 ปีที่แล้ว +255

    "I have nothing to hide" is a terrible argument. Would you be happy for me to walk into your home and take photos of it then? I mean, you have nothing to hide, so you won't mind me just walking in whenever I feel like, right?

    • @annabellethepitty
      @annabellethepitty 6 ปีที่แล้ว +23

      Josef goebbels came up with the whole "nothing to hide nothing to fear" thing ya know...

    • @digitalcyclone7218
      @digitalcyclone7218 5 ปีที่แล้ว +2

      +Wesley Parris
      well thats great

    • @GanjaBro99
      @GanjaBro99 3 ปีที่แล้ว

      What's the correct argument then? Or something that you would likely accept his right to protect his privacy?

    • @hayden.A0
      @hayden.A0 3 ปีที่แล้ว +10

      when someone tells you that they have nothing to hide, ask them if they would give up their freedom of speech because they had nothing to say.

    • @AbidAli-sm2qt
      @AbidAli-sm2qt 3 ปีที่แล้ว

      Yeah your right

  • @janski1476
    @janski1476 2 ปีที่แล้ว +15

    "I don't care if the government sees what I'm doing I'm not hiding anything after all."
    That's a very dangerous thing to say

  • @inquaanate2393
    @inquaanate2393 7 ปีที่แล้ว +112

    The government isn't a secure entity, making a backdoor for them would make it insecure period.

  • @Mr8lacklp
    @Mr8lacklp 7 ปีที่แล้ว +56

    There is another problem with this proposal: Alice and Bob can just use their public keys on a different level, by directly encrypting their messages for example and not the channels at which point this whole idea is broken again, so in the end even if you introduce it it only hits those who are not actually trying very hard to hide something.

    • @ZonkoKongo
      @ZonkoKongo 7 ปีที่แล้ว +1

      What do you mean by channel encryption?

    • @xZise
      @xZise 7 ปีที่แล้ว +6

      Yeah agreed. Unless encryption is outlawed or they magically can add a backdoor (to be honest the complete DHE and asymetric encryption thing is kind of magic), the criminals can just encrypt it for themselves.

    • @chsxtian
      @chsxtian 7 ปีที่แล้ว +19

      If you outlaw encryption then the only people with access to encryption are outlaws.

    • @xZise
      @xZise 7 ปีที่แล้ว

      chsxtian yeah I agree but my point was more general what is possible not what is reasonable. Because as I see it there is no solution.

    • @rachelslur8729
      @rachelslur8729 5 ปีที่แล้ว +4

      You can add your own encryption on top of any communication method. For all we know, lSlS may communicate by bouncing radio signal of the moon. wikipedia.org/wiki/Earth-Moon-Earth_communication

  • @XnecromungerX
    @XnecromungerX 7 ปีที่แล้ว +188

    In summary: Social Engineering always wins.

    • @umutamac
      @umutamac 6 ปีที่แล้ว +2

      XnecromungerX bBran Brushwood would agree

    • @-__--__aaaa
      @-__--__aaaa 3 ปีที่แล้ว

      lol 🤣🤣🤣

    • @mulevi6710
      @mulevi6710 2 ปีที่แล้ว

      @@sebastianjulonchamana2987 wut?

  • @ghelyar
    @ghelyar 7 ปีที่แล้ว +389

    The Mike Pound videos are the best on this channel. He's the only one that seems like he's actually worked in industry or has any real-world experience (at least in recent decades).

    • @swiftfox3461
      @swiftfox3461 7 ปีที่แล้ว +23

      I actually like to watch the videos that contain a historical perspective. We have a lot to learn from the past IMHO, we just have to look into it. Past sometimes rhymes with the today and the future, like with mainframes and the cloud. Decades apart (so kind of stone age Vs space age difference), yet they share so many features, strengths, weaknesses and things to be careful about.

    • @r4masami
      @r4masami 7 ปีที่แล้ว +38

      He's pretty much the only reason I'm subscribed to Computerphile. His videos are just too interesting to pass up.

    • @agillgilla
      @agillgilla 7 ปีที่แล้ว +2

      Lol yeah I've only watched Mike Pound videos. And one on public private key encryption from some other guy.

    • @13menrollingdown
      @13menrollingdown 7 ปีที่แล้ว +24

      Tom Scott and Mike Pound for president! Who cares if they're not American!

    • @andruloni
      @andruloni 7 ปีที่แล้ว

      +Zac G Why not make them _all the presidents_ of the world?

  • @Robin_Nixon
    @Robin_Nixon 7 ปีที่แล้ว +181

    The right to privacy is essential in any democracy, even if it helps those who would seek to harm us.

  • @ACTlVISION
    @ACTlVISION 7 ปีที่แล้ว +16

    "I have nothing to hide"
    Awesome, make a video sharing all your account passwords please

  • @LewisCostin
    @LewisCostin 6 ปีที่แล้ว +24

    "I have nothing to hide" = people who need to hide the fact that they have things to hide.

    • @annabellethepitty
      @annabellethepitty 6 ปีที่แล้ว +2

      Did you know who the first person to say "if you have nothing to hide you have nothing to fear" was?
      Josef goebbels. Copy and paste this name into google.

    • @joecurran2811
      @joecurran2811 3 ปีที่แล้ว

      @@annabellethepitty An outstanding point.

  • @DavideManzellaKazim
    @DavideManzellaKazim 7 ปีที่แล้ว +1

    Mike Pound's videos are always a pleasure to watch

  • @iAmTheSquidThing
    @iAmTheSquidThing 7 ปีที่แล้ว +81

    Even if messaging services did collaborate with governments to add a backdoor, nefarious users could just switch to an alternative system that didn't have one. So there's not really anything we can do to stop this.

    • @BloCKBu5teR
      @BloCKBu5teR 7 ปีที่แล้ว +24

      exactly. Everybody can just add another layer of encryption with a second public key and decrypting the first layer is literally useless.

    • @icedragon769
      @icedragon769 7 ปีที่แล้ว +5

      Yeah, it's not that hard to do a Vignere with pen and paper or something, and then encrypt it. If I were planning a terrorist attack, I wouldn't just use Whatsapp, I would meet with my coconspirators and share some one-time pads. Vignere with one-time pads has been proven to be unbreakable.

    • @assalane
      @assalane 7 ปีที่แล้ว +3

      Most criminals are inexperienced and IT illeterate though

    • @LeoMRogers
      @LeoMRogers 7 ปีที่แล้ว +3

      assalane I don't know about that. Anyway, they don't need to know all the details of how an app works to be able to switch to an app that has end to end encryption. I bet there are plenty of tor users who don't know how that works

    • @assalane
      @assalane 7 ปีที่แล้ว

      true

  • @harktrocity
    @harktrocity 7 ปีที่แล้ว +1

    I love videos starring Mike, he explains everything so clearly. More Mike videos, please!!

  • @obsidiansiriusblackheart
    @obsidiansiriusblackheart 6 ปีที่แล้ว

    I love that these vids are all coming out as I do the course at uni on them

  • @whitslack
    @whitslack 7 ปีที่แล้ว +7

    I'm shocked that Dr Pound didn't mention Signal, the open-source app that invented the encrypted protocol that was later adopted by WhatsApp and Facebook Messenger. Signal solves the problem of data at rest on your device by allowing you to encrypt your message database with a passphrase that is independent of your phone's passcode lock.

  • @saimpots
    @saimpots 7 ปีที่แล้ว +4

    I see a Dr. Mike Pound video, I upvote!

  • @joppe191
    @joppe191 ปีที่แล้ว

    I followed a course on Security in Uni one time, and this protocol was praised by the professor quite highly. I love that some blokes just thought of what is essentially quite a simple number transformation and it proves to be incredibly useful everywhere.

  • @Quadriterium
    @Quadriterium 7 ปีที่แล้ว +3

    Excellent video and excellent explanations by Mike Pound. Thanks for that (except for the "i've got nothing to hide" fallacy).

  • @JavierSalcedoC
    @JavierSalcedoC 7 ปีที่แล้ว +2

    Best explanation of Diffie-Hellman key eschange Ive seen is in Art of the Problem, an amazing youtube channel

  • @sophiaonyoutube
    @sophiaonyoutube 9 หลายเดือนก่อน

    the best explanation of end-to-end encryption on the internet. thanks, computerphile!

  • @whamtheman
    @whamtheman 7 ปีที่แล้ว +69

    Alice seems like an unpleasant person. "What do you want now...?" is not a nice response to what is basically just a "hello". :c

    • @Computerphile
      @Computerphile  7 ปีที่แล้ว +46

      +whamtheman It just seems Bob is always contacting Alice.... :) >Sean

    • @whamtheman
      @whamtheman 7 ปีที่แล้ว +24

      I sense a deeper story brewing. Hopefully love will find a way! :)

    • @lightsidemaster
      @lightsidemaster 7 ปีที่แล้ว +34

      Alice: "What do you want now?"
      Bob: "You :)"
      lol

    • @Mr8it
      @Mr8it 7 ปีที่แล้ว +13

      Bob: "Well, if not you, perhaps a key? Please...?"

  • @celivalg
    @celivalg 7 ปีที่แล้ว +51

    The other problem of a server holding unencrypted info is about what the company would do with it, even though i don't have anyting to hide, I wouldn't feel comfortable if i get condoms adds if they find that i got a STD for some reason... And the thing is that they just made it legal..... WHY would I ever consider giving them all of my info?! they don't need to know what my family situation is, they don't need to know WHY i could wear prothesis... It's about privacy, not about having something to hide... Do you want to see a picture that you send a day where you really shouldn't have? Well, I know that some of the above are already true... but I don't want it to go further

    • @EgoShredder
      @EgoShredder 7 ปีที่แล้ว +15

      Whilst you may have nothing bad to hide, anything you do have can be twisted and used against you by any authority or legal institution. We live in a world where innocence is not a defence anymore.

    • @swiftfox3461
      @swiftfox3461 7 ปีที่แล้ว +12

      EgoShredder "Give my six sentences written by the hand of the most honest man in the world, and in them I will find something for which I can hang him"
      Paraphrasing slightly, by Cardinal Richelieu I believe (but I may be wrong).

    • @marble296
      @marble296 7 ปีที่แล้ว

      Is the secrecy of correspondence worth anything anymore?

    • @LastRellik
      @LastRellik 7 ปีที่แล้ว

      I think the reason why repealing that law makes sense is because the government has no right regulating the Internet like that. The Internet is a privilege, not a right, and we can choose to opt out of it or find our own encryption systems to avoid it. The government is bad at everything it does.

    • @Elhombresombra
      @Elhombresombra 7 ปีที่แล้ว +1

      I totally agree with @LastRellik. The reasoning of the government (ANY govt, not just UK) one day might be extended to any kind of electronic messaging, like traditional Emails. Nobody can prohibit me to develop my own personal encryption system, and to use it to encrypt the text part or the attachment of an Email. Or the text of a Whatsapp message. Is the government requesting any part of a message to be written in clear text or attached as breakable standard format like Winzip or Winrar? Unrealistic just like banning the postal service.

  • @unknownusername9335
    @unknownusername9335 7 ปีที่แล้ว +3

    I had really expected the line: "So before we declare that insane, let's first look at what that means, and then declare it insane."

  • @RRobert99
    @RRobert99 7 ปีที่แล้ว +168

    He should really clean his monitor...

    • @xPROxSNIPExMW2xPOWER
      @xPROxSNIPExMW2xPOWER 7 ปีที่แล้ว

      lol

    • @AnimilesYT
      @AnimilesYT 7 ปีที่แล้ว +2

      THANK YOU!

    • @Flati36
      @Flati36 7 ปีที่แล้ว +12

      And stop poking it

    • @HansPeter-qg2vc
      @HansPeter-qg2vc 7 ปีที่แล้ว +9

      Now I'm imagining him siting on his chair and going "poke, poke, poke" on his monitor. ^^

    • @Dreijer94
      @Dreijer94 7 ปีที่แล้ว +5

      Wow. I thought it was a screensaver first. Damn...

  • @jesusvl91
    @jesusvl91 7 ปีที่แล้ว

    Great video! Looking forward for a new one on Hellman's key exchange method!

  • @robertsedgewick1266
    @robertsedgewick1266 3 ปีที่แล้ว

    Brilliant explanation, visual illustrations helped a lot!

  • @Sancarn
    @Sancarn 7 ปีที่แล้ว +12

    I personally do not understand how the home secretary, of all people, doesn't ask computer science experts about the positives and negatives of such a system before saying to the public that it's unacceptable...

    • @hanelyp1
      @hanelyp1 6 ปีที่แล้ว +2

      Because typical politicians are arrogant bastards, and would dismiss any expert who told them why a plan that brings them more power is a bad idea.

    • @nunosilva6574
      @nunosilva6574 5 ปีที่แล้ว +4

      +Sancarn As a rule politicians ignore all expert advice and any evidence presented to them, unless it validates what they already believe in.
      Take a look at the enormous amount of cases in history where a politician was warned something he decided was an horrible mistake and decided he knew best... usually with gruesome results.

    • @blucat4
      @blucat4 3 หลายเดือนก่อน

      Then you don't understand that the Governments plan is not to protect you, it's to enslave you.

  • @sabrihelal9891
    @sabrihelal9891 7 ปีที่แล้ว +3

    This is actually what Assange was alluding to in his last interview regarding the CIA hacks. That end to end encryption really didn't matter because they had backdoor access to people's phones, laptops etc... This channel really is a gem!

    • @blucat4
      @blucat4 3 หลายเดือนก่อน

      Exactly. Why do most people not know this? It's public information.

  • @fakhermokadem11
    @fakhermokadem11 7 ปีที่แล้ว +9

    Dr. Mike Pound, you are amazing. Someday I am going to send you an application to join your research in computer vision :D.

  • @jflopezfernandez
    @jflopezfernandez 6 ปีที่แล้ว +1

    He explains these things so well

  • @noahwolton7662
    @noahwolton7662 5 ปีที่แล้ว +5

    Couldn’t the server complete a man in the middle attack when Bob and Alice were executing the Diffie-Helman key exchange?

  • @eideticex
    @eideticex 7 ปีที่แล้ว +1

    The major problem I have is that we do have forms of encryption that would allow a great deal of investigative ability without making it susceptible to a central point of failure. I've seen encryption which allows you to perform searches for specific things like the presence of a file, a phrase in plain text, audio clips and anything else you could fit into the comparing mechanism (which was generously large). I think it was 6 or 7 years ago when I seen it demonstarted on a Defcon presentation video. The idea behind that was a transparent encryption scheme that allows authorities and security personal to probe for known threats without weakening the encryption in the process. If I remember right it even had layers designs to protect against code injection attacks so that you couldn't write a program with clever queries to break out. Was an all around impressive encryption scheme and it wasn't even one of it's kind, the presented mentioned other variants that provide similar features at different trade offs.
    When we have stuff like that laying right in open source space, free for anyone to use. There's no reason why a backdoor should ever be presented as part of regulation. Maybe a regulation that anything crossing public infrastructure must use that type of encryption but not ask to weaken encryption to a master key.

  • @Col_Crunch
    @Col_Crunch 7 ปีที่แล้ว +1

    I would love to see a more in-depth video on exactly how this key exchange happens securely with E2EE.

  • @starphoenix42
    @starphoenix42 7 ปีที่แล้ว +2

    Please do a video on the key exchange, I'm super curious to see how that works

  • @xPROxSNIPExMW2xPOWER
    @xPROxSNIPExMW2xPOWER 7 ปีที่แล้ว +8

    hell yeah its MIKE POUND again!

  • @AvadaKedavra943
    @AvadaKedavra943 4 ปีที่แล้ว +1

    I like this guy the most on the channel. I am watching every video presented by him lol

  • @blakezonca9865
    @blakezonca9865 7 ปีที่แล้ว +2

    I've never smashed that thumbnail as hard as I did when I saw a new computerphile video with Dr Pound with sheer worry in his eyes.

  • @spiderstheythem
    @spiderstheythem 7 ปีที่แล้ว +7

    Mike Pound will always be my favorite. Fascinating topics, amazing at explaining things, and easy on the eyes too ;)

  • @primarypenguin
    @primarypenguin 7 ปีที่แล้ว

    I would love to study under Dr. Mike Pound, he is the man.

  • @nichonifroa1
    @nichonifroa1 7 ปีที่แล้ว

    Love Mike Pound. Wish there be could more videos of him

  • @JayCork
    @JayCork 2 ปีที่แล้ว +1

    It's 2022 and I'm back for my refresher lesson

  • @AgglomeratiProduzioni
    @AgglomeratiProduzioni 7 ปีที่แล้ว +1

    1:35 The fact it's Bob to start texting instead of Alice distrubs me ahahah

  • @lchpdmq
    @lchpdmq 5 ปีที่แล้ว +4

    “I don’t have anything to hide” 🤦‍♂️ everyone has things they would tell some people and not others and it doesn’t make you a criminal

  • @relope5404
    @relope5404 7 ปีที่แล้ว

    keep up the good work guys
    long time fan

  • @joeytje50
    @joeytje50 7 ปีที่แล้ว +1

    Can we get a video about how TOTP actually works? I've heard some things about it and it sounded like it was intended to replace 2FA-logins, so it seemed quite interesting to me.

  • @ShaunDreclin
    @ShaunDreclin 7 ปีที่แล้ว +23

    wait so how do two users work out a shared secret key without the server in the middle being able to get that key?

    • @anonym3017
      @anonym3017 7 ปีที่แล้ว +13

      Shaun Dreclin private and public keys. I think they have a video on this. But in short if somebody uses their private key and my public key (in that order) to encrypt something then the only person that can decrypt it is me using my private key. And I know from who it is since I'll have to use the other persons public key to decrypt the mess left by decrypting it with my private key. So the keys never have to be sent.

    • @Vrbik15
      @Vrbik15 7 ปีที่แล้ว +2

      End-to-end enryption is also passing through the server but server cant read content of messages, diagram shown is more like data flow than path.

    • @JLSoftware
      @JLSoftware 7 ปีที่แล้ว +8

      Look up Diffie-Hellman Key Exchange en.wikipedia.org/wiki/Diffie-Hellman_key_exchange

    • @schwarzarne
      @schwarzarne 7 ปีที่แล้ว +8

      They really coudl have gotten into that, because thats the actual interesting thing here.

    • @EebstertheGreat
      @EebstertheGreat 7 ปีที่แล้ว

      +Nixitur
      Alice and Bob do generate random numbers in the Diffie-Hellman key exchange, and these are the private keys, exactly as I said. Nothing is being encrypted because it is a key exchange. The shared secret is then used as a key (password) by both parties.

  • @robinlemagnifique2778
    @robinlemagnifique2778 6 ปีที่แล้ว +2

    Hey, thanks for the explanation!
    2 questions tho:
    - Why am I able to see my WhatsApp/Telegram messages on my computer, while they were sent/received by/from my phone? Where did my computer took the encryption key from, if not from the server?
    - If it's impossible to get the content of the messages with an end to end encryption, why would one country ban Telegram and not WhatsApp? If both of them have an end to end encryption implemented, are they not equally impossible to hack? And should therefore both be banned/not banned

  • @manavpatnaik1948
    @manavpatnaik1948 2 ปีที่แล้ว +2

    Can we just appreciate what a great job Computerphile is doing? It is just great they are posting so many videos on CS topics. And these are not the usual lecture videos, but short and to the point videos that are fun to watch and we can learn a lot from them! This is really a blessing to CS students.
    Thanks, Computerphile!

  • @madinaaisyah
    @madinaaisyah 6 ปีที่แล้ว

    Thank you, sir

  • @nillvoil8351
    @nillvoil8351 7 ปีที่แล้ว

    Excellent video! Really broke it down for the layman

  • @osraneslipy
    @osraneslipy 3 ปีที่แล้ว

    These popular cryptography videos rock!! :) thank you very much for them

  • @ballykaur8310
    @ballykaur8310 5 ปีที่แล้ว

    NICELY EXPLAINED MATE

  • @schwenk4real
    @schwenk4real 7 ปีที่แล้ว

    this guy is insanely brilliant

  • @Manuel-dz1iq
    @Manuel-dz1iq 6 ปีที่แล้ว

    Your videos are awesome!!

  • @cjsmith411yt
    @cjsmith411yt 7 ปีที่แล้ว

    Love the insights. How do password wallets, like LastPass (tm) work?

    • @nibblrrr7124
      @nibblrrr7124 7 ปีที่แล้ว

      Basically symmetric encryption. Your passwords and the account they belong to are put in a table, and the table gets encrypted with a key derived from your master PW. It now looks like random bits, until you enter your master PW into the manager, it derives the key again using the same algorithm as before, and decrypts it again.
      Idk how exactly it's storing the decrypted database in memory, or finding out where to type in the PW; and there are also additional security measures involved like salting.
      Btw, I recommend KeePass/KeePassX/KeePassDroid - they're open source and therefore more trustworthy. ;)

  • @philips9042
    @philips9042 7 ปีที่แล้ว +3

    finally another pound of computer science.... gosh, i am horrible with puns :(

  • @joemagill4041
    @joemagill4041 2 ปีที่แล้ว +1

    4 years later... still trying to make this work...

  • @letoiiatreides2466
    @letoiiatreides2466 7 ปีที่แล้ว

    I wish Dr. Pound had his own channel for us to subscribe to as well.

  • @jpphoton
    @jpphoton 6 ปีที่แล้ว

    The truth will set you free. Mighty fine job.

  • @carsonwood1513
    @carsonwood1513 7 ปีที่แล้ว +1

    So if you had a group chat in say Facebook messenger, is there one key for the group chat or does it send an individual message to each member and have a key with each individual member?

  • @alanjenkins1508
    @alanjenkins1508 7 ปีที่แล้ว

    Another option is to mandate the length of the encryption key so that governments can break it with difficulty if they really want to but it would be impossible to do general surveillance. This is a difficult thing to get right though with the constant increases in computer power available to both governments and private entities.

  • @laurensalzmann3152
    @laurensalzmann3152 3 ปีที่แล้ว

    4:48: See that little dark speck on the desk, just above his right hand? Did that have anyone else trying to clean their screen, too?

  • @thotusmaximus971
    @thotusmaximus971 ปีที่แล้ว +1

    "does that make you bob?"
    *with a toddler-esque grin* "itdoes :D"

  • @Shadow4707
    @Shadow4707 7 ปีที่แล้ว

    In the example where the messages get decrypted and reencyrpted on the server, couldn't you just encrypt the plain-text messages with yet another key and store that on the server? Then you could hide the decryption key for that somewhere in the mountains of Switzerland or wherever. Then you only take it out when needed and destroy it afterwards.
    Not proposing that it would be a good idea, but would it work?

  • @PaniKWardoG
    @PaniKWardoG 2 ปีที่แล้ว

    How do we ensure S does forwards Bob's public key to Alice, for example? They are still communicating over the server, what's stopping the server from lying about the public keys and using a generated pair to hold the plaintext messages?

  • @Chlorate299
    @Chlorate299 7 ปีที่แล้ว +18

    The thing is I don't think anyone would necesserily object to measures that make counter-terrorism an easier thing. What I personally object to is the notion that every message any person ever sends can be subject to scrutany by literally anyone else for any reason...
    That seems like a more dangerous situation for anyone to be in.
    Time and time again, legislation brought in "for national security" is used to spy on people en masse, often resulting in prosecutions for relatively minor crimes.

  • @locallion1218
    @locallion1218 7 ปีที่แล้ว

    I particularly enjoy the cryptography episodes.

  • @69k_gold
    @69k_gold 9 หลายเดือนก่อน +1

    I'm unclear about the necessity of this algorithm. What is the exact problem it's solving, that is not being solved by a plain public key exchange?

  • @Tahgtahv
    @Tahgtahv 7 ปีที่แล้ว

    What's to prevent a server along the way pretending to be Bob to Alice, and Alice to Bob? Or to put it a different way, how do you make sure a public key belongs to the person you're attempting to communicate with?

  • @NickelCityPixels
    @NickelCityPixels ปีที่แล้ว +1

    "It's a problem that if a criminal finds out this flaw..."
    There's no organization more criminal than the government.

  • @RazorCallahan2424
    @RazorCallahan2424 7 ปีที่แล้ว +1

    If one of the phones is compromised, all keys of other phones that this phone communicates with can be found as well right? (Since both parties use the same key)

    • @seraphina985
      @seraphina985 5 ปีที่แล้ว +1

      Yes though one of the reasons why DH is used rather than Public Key Crypto other than it's speed is that the keys can be refreshed often and cheaply. Also DH has to be done again at minimum for every pairing as such if say Alice has a session with Bob and another with Charlie and somehow Malory compromises Bobs phone then yes he can compromise his current session with Alice but not Alice's session with Charlie that has a different key. Also it usually is at most only the current session at risk as DH is usually redone every session sometimes a session is as short as a single message too as the whole DH exchange process on over the internet can be completed in around a second or so it's just as easy to redo it every message or every few minutes in the worst case most commonly.

  • @bvf8611
    @bvf8611 3 ปีที่แล้ว

    Both RSA and DH can be used with several exponents during the key agreement (multipliers in case of ECDH), all of which are known by the endpoints and which exponents as "sub-keys" are uploaded separately to different servers of prosecutors, judges and police, of which all need to agree and cooperate to eavesdrop on a single communication channel.
    The problem is rather if this level of separation of powers is sufficient seeing what happens to democracies all over the world right now?

  • @andy.robinson
    @andy.robinson 7 ปีที่แล้ว +1

    I'd like to know more about how KAB is known to both devices without it going through the server - which seems to be the only way the 2 devices can communicate?

    • @C3nturyFox
      @C3nturyFox 7 ปีที่แล้ว +1

      Simplified Explanation:
      Alice knows an integer a.
      Bob knows an integer b.
      Everyone knows an integer g.
      Alice sends g^a to bob => now bob knows b and g^a.
      Bob sends g^b to alice => now alice knows a and g^b.
      Alice can calculate (g^b)^a = g^(a*b).
      Bob can calculate (g^a)^b = g^(a*b).
      Now both know the integer g^(a*b)(=Kab), but an attacker who had listened to their conversation only knows g^a and g^b. And because of some math theorems and stuff he cannot calculate g^(a*b) from g^a and g^b.

    • @andy.robinson
      @andy.robinson 7 ปีที่แล้ว

      An elegant solution, thanks for explaining 👍

  • @stannisbarracuda5693
    @stannisbarracuda5693 3 ปีที่แล้ว

    "Before we declare that as Insane' lmao😂🤣😂 had me rolling

    • @adurachase835
      @adurachase835 3 ปีที่แล้ว

      It's funny, there are so many hackers like hackerlouis05 on Instagram who just use pre-existing tools to launch attacks but hackerlouis05 is the best

  • @Kitsudote
    @Kitsudote 6 ปีที่แล้ว +4

    "I don't have anything to hide" oh, this naiveté...

  • @Herberthintermwald
    @Herberthintermwald 6 ปีที่แล้ว

    7:35 i like the user experience of decrypted messages.

  • @qubro8507
    @qubro8507 2 ปีที่แล้ว

    Great video, but I still don't understand how the to end user can share a common encryption key without the server knowing what it is and if it changes for every message, how do they communicate this encryption key between the 2 end users

    • @rake1087
      @rake1087 2 ปีที่แล้ว +1

      Its called a Diffie Hellman Key exchange. where both users have a private key that only they know and a public key that anyone can know, even the server. The public keys are interchanged and combined using a modular arithmetic equation. Thanks to this equation, user 1 and user 2 will have the same shared key. This key can only be decrypted with either private keys, which is generated offline or locally. No other number or key can decrypt the message except for the 2 private keys thanks to the mathematical equation and the nature of modular arithmetic. The only way you could possibly figure out what the private keys are, are by manually going through every possible number and you need both keys. the numbers are very large and the fact that you need both makes it completely impossible. where talking very huge numbers. Computerphile has a video about it too and he explains it very nicely

  • @IsaacCohen-ge6zh
    @IsaacCohen-ge6zh 2 ปีที่แล้ว

    It's interesting how he seems to feel comfortable with the government having access to all his information.

  • @shahabali957
    @shahabali957 6 ปีที่แล้ว

    Ahaan Great Work Man !!! (y)

  • @MaryamAnidu
    @MaryamAnidu 3 ปีที่แล้ว

    Alice and Bob should be awarded for their contribution to information security.

  • @NeelSandellISAWESOME
    @NeelSandellISAWESOME 3 ปีที่แล้ว

    What is NFC?
    Is public key cryptography and ciphers how they encrypt the channel?
    How is the server involved if only alice and bob use the shared key?

  • @nixcutus
    @nixcutus 6 ปีที่แล้ว

    Awesome video learn alot from.

  • @hitmusicworldwide
    @hitmusicworldwide 4 ปีที่แล้ว

    I envision the original Skype for mobile phones using the radios and or WiFi within to create a network independent of the carriers passing packets along until.they can reach the ipv6 address or imie device intended . Servletts on every device in the iOt space allowing secured member available transport for all joiners. Last thought, so, shall we move decryption to the display it self?

  • @redf7209
    @redf7209 3 ปีที่แล้ว

    Intersting that while ministers have argued to end e2e encryption they adopted a e2e encrpted messaging app for tory party communications during the election and onwards

  • @iampuff7
    @iampuff7 4 ปีที่แล้ว

    I believe that what many governments will do is to force developers to include a feature in the apps to request the decrypted chat history ofna conversation from one of the participants. The server will request the client for that, then the client will just decrypt it on its side and send it to the server

  • @lafeo0077
    @lafeo0077 5 ปีที่แล้ว +10

    I like how people trust the government... 😶

    • @jaydenritchie1992
      @jaydenritchie1992 ปีที่แล้ว

      ahhh let them watch, ive gone out of my way to try to research legal yet uncommon research subjects to true and provoke a response

  • @Arghandevol
    @Arghandevol 3 ปีที่แล้ว

    I have question. Who generates the public keys? Did i understood correct that Alice phone generate both public and private keys (as same for Bob). I know the private key generates by Alice device(phone) but what about the Public key (where its generating)?

  • @cmdlp4178
    @cmdlp4178 7 ปีที่แล้ว

    How would E2EE work in groups with more than 2 people? Are different keys send to every member of the group?

  • @stellie3553
    @stellie3553 6 ปีที่แล้ว

    What if you used the Ka and Kb approach, but with end to end crypto of a public private key pair; like, the server only gets encrypted information that only the government has private keys for.

  • @mivoe99
    @mivoe99 5 ปีที่แล้ว

    Are there any other methods to transport/ encrypt data than point to point encryption and end to end encryption?

  • @richardlighthouse5328
    @richardlighthouse5328 3 ปีที่แล้ว

    How is E2EE different from public key cryptography, like pgp. They both establish "tunnel" between two users.

  • @shingshongshamalama
    @shingshongshamalama 7 ปีที่แล้ว +1

    "We want you to deliberately sabotage user security for us."
    "No thanks."
    "Why won't you help us sabotage security? Don't you have enough hashtags?"