@@An.Individual Of course the shadows don't look the same, the pipes are really close to the wall and don't have nearly enough space to diffuse. Besides, obviously they'll have a main light and softbox specifically for Bradley just off camera. It would be far more trouble than it's worth to green screen all of this when you can just do it for real. Take a screenshot of just the set at the beginning, reverse image search and see if it comes up with anything. It won't. And it's much harder work having a set, taking a picture, using a mahoosive greenscreen for Bradley, matching the camera angle perfectly with the angle you took of the set and then combining them all together in post. You may as well just be on set and do it for real. Just look at the shadows interacting with the background as he comes down the ladder, of course it's real! Sumsub isn't just Bradley, it's a whole digital security company, so I don't see how they couldn't afford to use decent sets.
this is some high quality stuff. I study all kinds of things all day and use youtube, and damn you really do a very very good job at teaching me things I didnt know about yet. I know about some basic encryption. hope you get those subs to a million in no time! you deserve them.
The video is very good, however I think I should say a couple of things: 1- "This proved the utter supremacy of quantum computers": Not really true, they are just better at solving other kind of problems. There a lot of basic thing quantum computers cannot do, for example, they cannot copy data. 2- Classical cryptography is not really at risk. We have plenty of quantum resistant crypto algorithms, such as NTRU or CRYSTALS. We are just starting to use them instead of RSA, but no, a guy with a quantum computer will not steal your bank data. Most likely. 3- Quantum computers are only effective against some types of crypto, in particular, they are not very good against symmetric crypto (better than classical, but not enough to break the ones that use bigger keys). 4- I'm not sure about this, but I think that quantum computers can't send more data that on a classical channel, except if you have entangled qbits previously. However, the qbits are destroyed during the transfer, so that's only good one time. Then you have to meet again with the person you want to communicate to re-entangle your qbits.
Also Quantum Cryptography (QKD) is basically a scam - it requires a authenticated (and integrity protected) classical (i.e. Non-quantum) channel to work securely. And we'll how do you get this authenticated channel? Through the classical cryptography that QKD protocols like BB84 purport to replace.
There's a lot of hype around Quantum Key Distribution, but it just solves problems that are already solved by cryptography (and these don't require you to build new infrastructure just for exchanging keys).
I think your analogy for a public key cryptosystem wouldn't worked better if you said the public key worked like a padlock and the private key way the key to the padlock -- because that's exactly how it works. Anyone can lock a briefcase with a padlock, even if they don't have the key to said padlock. Now, the idea presented by Diffe and Hellmann was the first example of an asymmetric key exchange protocol. It doesn't allow us to encrypt data, however it allows us to establish forward secrecy for communication on an untrusted channel. That basically means it enables us to agree on an encryption key to us without sending any information about the key over the untrusted channel. In addition, if one of the encryption keys somehow gets leaked, it doesn't compromise our entire history of communication, as a different encryption key is established each time. Diffie-Hellman doesn't work on its own, however. You need some form of signing for it to work properly. And that's where asymmetric cryptosystems like RSA comes in. RSA allows you to sign messages, essentially use your private key to generate a number (called a digital signature) which belongs to your message, and anyone can calculate and see that this number is correct using a public key. This means that nobody can change your message as it travels through the insecure channel, lest the signature will not match and they will have no way to find a matching signature without the private key. The reason this is important is that if you just use Diffie-Hellman without signing, anyone can swap out the messages and pretend to be the other party. Alice tries to talk to Bob and agree on a key, but Eve, who controls the communication channel between Alice and Bob, decides to pretend to be Bob for Alice and do a key exchange with her. Alice has no way of knowing this. Equally, Eve can do this to Bob as well, and pretend to be Alice when talking to Bob. If Alice and Bob had each others public keys beforehand, they could sign their messages using their respective private keys, and if Eve tries the same trick she won't be able to swap out or alter the messages, lest Alice and Bob figures out that their messages are being changed, as the signatures would not match. You need a private key to generate a signature for a specific message, but you only need a public key to verify that the signature is valid.
Why is the production quality so good yet so few people are watching? Edit: I can't believe we get to watch this for free on youtube. This is netflix level quality
I dont know why I always thought Sumsub logo was sort of a space ship like in "space invaders" but now I clearly see it's a bulldog. Great video as always!
Another smashing presentation. Well said, produced, and presented. Sill I couldn't help expecting an advert for a VPN at the end. Glad you didn't do that.
@7:57, you're disregarding what excel is running on now Vs what they had back in the day. If they had any computer of modern standards, they wouldn't have needed the 221 engima machines. Eh for a metaphor but good video!
the example at 9:30 and the conclusion at 10:10 of this being "mathematically unrealizable" is incorrect this process can be and has been realised very easy. the problem was never with the exchanging secret message, but with authenticity of the message and "man in the middle attacks" Public-key cryptography combined with the Chain of Trust is used to combat this, but it's by far a perfect solution
If u are using quantam computer to crack, those request should be processed on receiving end by Quantom computer else the input wll be lost as computer wont respond as fst for every input isn't it??
I have thought about how quantum computers could easily decipher a 256SHA encryption because quantum computer’s specialty is finding every single possibility and finding the one that links A to B
Also as far as we know quantum computers don't speed up attacks against hash functions (or any other symmetric primitives) by much, it does however break pretty much all asymetric primitives (RSA, Elliptic Curve Cryptography, ElGamal,...).
Caesar Ciphers can be read directly, without a key; with a little practice. Because the alphabetical sequence is preserved, in the shift; any of the Caesar ciphers can be read directly by looking at the numerical difference between the alphabetical position of each successive character with the one before, so the difference pair 12-03 is immediately recognisable as the most common word in the English language or 12-01-10 is 'this'. And, when you already know the difference sequences for the really common letter combinations, it is dead simple to read it straight off without bothering to write out the plain text. As per your disappearing video, patterns are the enemy of privacy.
6:25 Well that's right, but the main reason why the british code breakers were able to crack the Enigma was the fact that a german submarine was captured with an Enigma device and code books, and based on that information they broke the encryption.
But wouldn’t that mean that the public key #2 is the same just renamed key private #1? So if you know the public key #2 you also already have private key #1. Am I right or am I missing something out?
This is the concept: If you want to send me a message only I can read, you can encrypt it using my public key (it's like me sending out padlocks only I can unlock). I will use my private key to decrypt your message once I receive your message.
That is not correct. A photon doesn't emit energy. It is energy. It's a discreet packet of energy, the individual energy quanta. It is what is emitted. It's oscillation frequency is it's specific energy level
Protest, free Julian, and I promise you I'll give you 3301. Nice video by the way.. You're doing a good job of explaining the issues to noobs. Keep it up 🙂
I believe that once they become easily accessible, people will just mine crypto on quantum machines instead. Long time before we'll see the results of that kind of scale though.
@@hackladdy9886 Yeah, but I mean what's gonna happen to the old blocks? They all rely on hashing and regular encryption, which aren't exactly secure against quantum computers. Also, yeah, a quantum coin would be pretty interesting.
@@DexieTheSheep True. I think some kind of hard fork would need to happen to migrate all coins to a new chain secured by quantum encryption. Blockchains would need to be forked to a quantum secured chain, and then users would be able to access their assets on the new quantum chain. Quantum stuff is super cool to theorize about!
I mean.. what stocks you recommend? Overall quantum computing like MSFT, IBM, NVDA, GOOG, or HON? Or should I look deeply into more focused groups. All listed above are very much great but I see your point. For real it’s great advice
Oh that's Ciphers.. Now I understand what Pakistani embassidor cipher was regarding removing regime of Imran Khan and bringing USA favorite policitians.
I love how he just has all of these backgrounds for each episode
I think background is cgi ecsept that lader and wooden box
@@bradleypeak Show us some pictures of some of your sets. Would be really interesting to see and some nice additional content.
@@bradleypeak hope the air wasnt really as nasty as it looks
@@An.Individual Of course the shadows don't look the same, the pipes are really close to the wall and don't have nearly enough space to diffuse.
Besides, obviously they'll have a main light and softbox specifically for Bradley just off camera. It would be far more trouble than it's worth to green screen all of this when you can just do it for real.
Take a screenshot of just the set at the beginning, reverse image search and see if it comes up with anything. It won't. And it's much harder work having a set, taking a picture, using a mahoosive greenscreen for Bradley, matching the camera angle perfectly with the angle you took of the set and then combining them all together in post. You may as well just be on set and do it for real.
Just look at the shadows interacting with the background as he comes down the ladder, of course it's real!
Sumsub isn't just Bradley, it's a whole digital security company, so I don't see how they couldn't afford to use decent sets.
The channel is pretty clever eh? Everything from topics to visuals, it is pretty amazing
Never getting tired of your high quality production and knowledge
215
Sheesh, those locations always suprise me. Really boosts up the production value in my opinion.
Agreed, they are doing an amazing job!
The quality of these videos always amaze me. Keep up the good work
Quantum Break is not a thing I thought I would see on this channel, but I am so glad anyone else remembers it. Great video.
The quantity on knowledge I learn from this channel is immense
My mom passed away at a young age today. Thanks for making me distracted with a good video for a few minutes.
Hugs man.
I want a behind the scenes of this episode , great set for filming !
this channel is criminally underrated
Most underrated channel on the platform. Great work !
this is some high quality stuff. I study all kinds of things all day and use youtube, and damn you really do a very very good job at teaching me things I didnt know about yet. I know about some basic encryption.
hope you get those subs to a million in no time! you deserve them.
Never saw a youtuber with this high quality of production. Well done, my +1 sub and looking foward for more videos 🙂
Welcome aboard!
1:16 I double checked and yep, that's undecillions
Good job Sumsub on getting large numbers right
Wow, this scene is by *far* the best background I've ever seen in any of the films!
Still a hard topic to wrap my head around.. but I am listening 👀
16:00 according to me these are not two properties, but they are so fast that when we measure (or observe) it seems to have both
Holy cow your production looks so good.
Have been watching for a while and love your videos.
If we keep learning we can win the war in the online jungle.
😉
I really like your work, where did you learn how to edit like that? Keep doing this great job! 🙌🏻
The video is very good, however I think I should say a couple of things:
1- "This proved the utter supremacy of quantum computers": Not really true, they are just better at solving other kind of problems. There a lot of basic thing quantum computers cannot do, for example, they cannot copy data.
2- Classical cryptography is not really at risk. We have plenty of quantum resistant crypto algorithms, such as NTRU or CRYSTALS. We are just starting to use them instead of RSA, but no, a guy with a quantum computer will not steal your bank data. Most likely.
3- Quantum computers are only effective against some types of crypto, in particular, they are not very good against symmetric crypto (better than classical, but not enough to break the ones that use bigger keys).
4- I'm not sure about this, but I think that quantum computers can't send more data that on a classical channel, except if you have entangled qbits previously. However, the qbits are destroyed during the transfer, so that's only good one time. Then you have to meet again with the person you want to communicate to re-entangle your qbits.
Also lattice/LWE and BB84 protocol are helpfuln
Also Quantum Cryptography (QKD) is basically a scam - it requires a authenticated (and integrity protected) classical (i.e. Non-quantum) channel to work securely. And we'll how do you get this authenticated channel? Through the classical cryptography that QKD protocols like BB84 purport to replace.
There's a lot of hype around Quantum Key Distribution, but it just solves problems that are already solved by cryptography (and these don't require you to build new infrastructure just for exchanging keys).
i love this channel's production quality
the double lock and key method described at 10:00 is this what git does with ssh keys?
where do you film these videos like every video is a new set thats crazy, keep up the good work
Your videos are so much better done than videos on channels with millions of subscribers!
For now, I don't quite understand about these Quantum Cryptography things, but Thanks for making me interested :)
This studio is cool! I am intrigued immediately!
Interested in making video about nft?
I think your analogy for a public key cryptosystem wouldn't worked better if you said the public key worked like a padlock and the private key way the key to the padlock -- because that's exactly how it works. Anyone can lock a briefcase with a padlock, even if they don't have the key to said padlock.
Now, the idea presented by Diffe and Hellmann was the first example of an asymmetric key exchange protocol. It doesn't allow us to encrypt data, however it allows us to establish forward secrecy for communication on an untrusted channel. That basically means it enables us to agree on an encryption key to us without sending any information about the key over the untrusted channel. In addition, if one of the encryption keys somehow gets leaked, it doesn't compromise our entire history of communication, as a different encryption key is established each time. Diffie-Hellman doesn't work on its own, however. You need some form of signing for it to work properly. And that's where asymmetric cryptosystems like RSA comes in. RSA allows you to sign messages, essentially use your private key to generate a number (called a digital signature) which belongs to your message, and anyone can calculate and see that this number is correct using a public key. This means that nobody can change your message as it travels through the insecure channel, lest the signature will not match and they will have no way to find a matching signature without the private key.
The reason this is important is that if you just use Diffie-Hellman without signing, anyone can swap out the messages and pretend to be the other party. Alice tries to talk to Bob and agree on a key, but Eve, who controls the communication channel between Alice and Bob, decides to pretend to be Bob for Alice and do a key exchange with her. Alice has no way of knowing this. Equally, Eve can do this to Bob as well, and pretend to be Alice when talking to Bob. If Alice and Bob had each others public keys beforehand, they could sign their messages using their respective private keys, and if Eve tries the same trick she won't be able to swap out or alter the messages, lest Alice and Bob figures out that their messages are being changed, as the signatures would not match. You need a private key to generate a signature for a specific message, but you only need a public key to verify that the signature is valid.
Excellent channel and content!
The fact that you have that accent makes your very smart videos sound very, very smart.
Why is the production quality so good yet so few people are watching?
Edit: I can't believe we get to watch this for free on youtube. This is netflix level quality
We love you!
great vid content , you have a great voice ,Im listening to of this and reading all the comments
I dont know why I always thought Sumsub logo was sort of a space ship like in "space invaders" but now I clearly see it's a bulldog. Great video as always!
I think that's a panda, since it also suits the online jungle theme.
Happy to see you again Bradley, nice topic for those interested in cryptography!
Why on earth is this not getting more views, these are incredible
How is the production quality and set design so good, like how?
Another smashing presentation. Well said, produced, and presented. Sill I couldn't help expecting an advert for a VPN at the end. Glad you didn't do that.
Glad you enjoyed it! Stay tuned!
This channel is the best I’ve ever seen
@7:57, you're disregarding what excel is running on now Vs what they had back in the day. If they had any computer of modern standards, they wouldn't have needed the 221 engima machines. Eh for a metaphor but good video!
He's not disregarding it, it's the point of the comparison
The production quality of this channel is so high
8:00 I've never seen the actual subtitles used in that scene.
Real awesome theme video again!
Your audio sounds amazing, what mic do you use?
Loved the Khan Academy reference
the example at 9:30 and the conclusion at 10:10 of this being "mathematically unrealizable" is incorrect
this process can be and has been realised very easy.
the problem was never with the exchanging secret message,
but with authenticity of the message
and "man in the middle attacks"
Public-key cryptography combined with the Chain of Trust is used to combat this, but it's by far a perfect solution
If u are using quantam computer to crack, those request should be processed on receiving end by Quantom computer else the input wll be lost as computer wont respond as fst for every input isn't it??
Great video
Thanks again, Andy
I have thought about how quantum computers could easily decipher a 256SHA encryption because quantum computer’s specialty is finding every single possibility and finding the one that links A to B
256SHA is not a thing, you probably mean SHA-256 which is not an encryption algorithm but a hash function.
Also as far as we know quantum computers don't speed up attacks against hash functions (or any other symmetric primitives) by much, it does however break pretty much all asymetric primitives (RSA, Elliptic Curve Cryptography, ElGamal,...).
2:06 - FTL - Last Stand
Another great video 👐
Caesar Ciphers can be read directly, without a key; with a little practice. Because the alphabetical sequence is preserved, in the shift; any of the Caesar ciphers can be read directly by looking at the numerical difference between the alphabetical position of each successive character with the one before, so the difference pair 12-03 is immediately recognisable as the most common word in the English language or 12-01-10 is 'this'. And, when you already know the difference sequences for the really common letter combinations, it is dead simple to read it straight off without bothering to write out the plain text. As per your disappearing video, patterns are the enemy of privacy.
Nice video, also it’s Professor Shor without the e
Enigma was cracked by Polish mathematicians not the British at Bletchley Park.
Sauce?
@@ornessarhithfaeron3576 Spelling
@@lupus7194 You don't get meme culture lol
hey your back! :D
Is this a sign to get into cryptography?
I literally just watched the imitation game on Netflix last night.
Please make a video on the Dead Internet theory (Bot Inversion, AI Internet, etc.)
good stuff
This background must've eaten all of the decor budget.
6:30 there was not much Alan has done about it, the Polish mathematicians has done whole work to crack the code, but the brits as always stolen it
Marian Rejewski, Henryk Zygalski, Jerzy Różycki
What's the song?
Very informative 👍
Simply excellent 👍
another banger :)
It is beyond me just how different your video sets are, in each video.
production level is too good
I love this channel 😩
6:25 Well that's right, but the main reason why the british code breakers were able to crack the Enigma was the fact that a german submarine was captured with an Enigma device and code books, and based on that information they broke the encryption.
Lol what
@@MaximAmadi It's true and happened actually two times during the war.
Rather late upload for a UK based channel. Are you guys feeling alright, is everything okay at home?
Maybe they've changed their schedule after seeing the majority was US viewers lol
Could have been a scheduled upload or something they left running to upload in the background?
interesting and informative 👍
I was expecting “anti-clockwise”…dang, you really know your target audience. 👌🏼
I was more annoyed with transmissing rather than transmitting.
But wouldn’t that mean that the public key #2 is the same just renamed key private #1? So if you know the public key #2 you also already have private key #1. Am I right or am I missing something out?
This is the concept:
If you want to send me a message only I can read, you can encrypt it using my public key (it's like me sending out padlocks only I can unlock).
I will use my private key to decrypt your message once I receive your message.
Thank you.
if anyone is interested I think answer in progress has a video where they do quantum encryption
All these months have passed and you still have not had subtitles....have them ASAP and watch the channel .🚀🚀
Have you been working out in your spare time Bradley?
Far too complex for me. Too much info delivered to quickly. Interesting but I just became stunned with the whole presentation.
When are you going to reveal that you have traveled back in time to produce these videos? And then explain how it is possible or will be.
This will be featured in his first video
AES-256 is quantum resistant
If you found this video interesting and want to learn more about cryptography I highly recommend "The Code Book" by Simon Singh.
:)
why does it look like this guy is living in the bioshock game
If Possible Please Make a Video On Zero Knowledge Proff
That is not correct. A photon doesn't emit energy. It is energy. It's a discreet packet of energy, the individual energy quanta. It is what is emitted. It's oscillation frequency is it's specific energy level
Didn't even realise I was this early lmao
This guy looks like Aunty Polly son in Peaky Blinders
Protest, free Julian, and I promise you I'll give you 3301.
Nice video by the way.. You're doing a good job of explaining the issues to noobs. Keep it up 🙂
And I will stop telling everyone about the real magic behind quantum concepts. Ask your boss if that's a fair deal 😏
Nice♡
Bradley Peak could sell me everything and I would buy it without thinking about it twice.
Why don't you have a millions subs?
The enigma was cracked because of 3 Polish mathematicians, which gave that Intel onto the British
Well the cats out of the box
One error is that it was the Poles not the Brits who cracked the enigma. They were very thankful too, don't believe the movie lol
This is the City Version of Tom Scott
Lol city version
Wonder what'll happen to cryptocurrencies when quantum computing becomes easily accessible
Quantum currencies perhaps.
I believe that once they become easily accessible, people will just mine crypto on quantum machines instead. Long time before we'll see the results of that kind of scale though.
@@hackladdy9886 Yeah, but I mean what's gonna happen to the old blocks? They all rely on hashing and regular encryption, which aren't exactly secure against quantum computers.
Also, yeah, a quantum coin would be pretty interesting.
@@DexieTheSheep True. I think some kind of hard fork would need to happen to migrate all coins to a new chain secured by quantum encryption. Blockchains would need to be forked to a quantum secured chain, and then users would be able to access their assets on the new quantum chain.
Quantum stuff is super cool to theorize about!
There’s already a quantum-resistant blockchain called QANX
I mean.. what stocks you recommend? Overall quantum computing like MSFT, IBM, NVDA, GOOG, or HON?
Or should I look deeply into more focused groups.
All listed above are very much great but I see your point. For real it’s great advice
It's Peter Shor not Shore
Oh that's Ciphers.. Now I understand what Pakistani embassidor cipher was regarding removing regime of Imran Khan and bringing USA favorite policitians.
This channel looks like it belongs on discovery channel or something
You used the term quantum cryptography wrongly in the title, since the cryptography itself should not be scary, unless you don‘t like math.
Superposition
He didn't cover that literally every password you use now will have been cracked lol