Is Your Data Really Safe? Understanding Encryption

Encryption is a key technology that is used in so many areas of our daily lives, and it is one of the key cornerstones for privacy in our digital age.

In the video, we explain common types of encryption and how they work by using animated and visual infographics so that it’s easier to understand. We used simplified explanations so as not to make the video overwhelming for less technical viewers.

Governments around the world have been pushing to ban and, in some cases, successfully have banned or restricted the use of encryption. As privacy advocates, this is something that we all have a duty to push back against.

Let me know what you think of the video. I’m super excited to hear what you think :smiley:

Happy encrypting! :locked:

14 Likes

I almost lost this in the PG threads. I learned a few new things! Great video.

Feedback:

  1. Whenever showing major product or a recognizable tool like Google Search- rather show Brave Search or DDG Search.

  2. Everyday analogies explaining the tech explained would help more relate to what’s explained. A small addition or preface to the same would help.

3 Likes

Love these videos, the visuals are great and it looks professional!

I’ll put some feedback as well:

  • Assuming the audience for this video is for non-expert every day users, the HTTPS explanation doesn’t go far enough / isn’t ELI5 enough.

  • Security terms are thrown without being explained. I’ve noted “certificate”, “hash” and even “key” should be explained IMO. It’s the basics, but the basics should be explained. Again, assuming the same target audience, but if not, not sure who the audience would be.

  • When enumerating the examples where encryption applies, there isn’t a flow. 1- File based encryption. 2- Secure messenging. 3- 2FA. (just putting the 1 2 3 on the screen would work).

Love the ending as well and the message, keep going! :slight_smile:

1 Like

I get what why you have this feedback. It’s valid.

But I also think if each and every thing is explained, the video would be too long and feel complex and more of a video lesson than a video about privacy tech.

Perhaps written explanation of what’s said in the video could help (only with info that did not go deeper in the video). It would “force” people to come to the forum to read the article if they want to learn more and hopefully get more people to join.

1 Like

I’m glad you like the videos! It’s definitely a tricky balancing act between explaining everything and keeping it concise so the video length doesn’t get too long. I feel like we could do a whole video about HTTPS it’s that complex!

Yeah I agree, it makes it easier to follow when you have numbering within a section. I will incorporate this feedback, really good idea!

I agree, having some little popups explaining terms that are a bit technical is a good idea too.

1 Like

Well TLS/HTTPS is mostly just encryption between the client and the server, in contexts where there’s not that much expectation of privacy.

Distinguishing between Diffie-Hellman and RSA might be worthwhile, but as RSA is being killed in TLS 1.3 anyway, forward secrecy in TLS is a problem that’s solving itself.

But since client-server encryption only keeps third parties out, and since you’re usually not talking to a server that deeply cares about your privacy, I’m unsure if it deserves much attention other than just making the point why it’s rarely enough: You have no privacy from your online bank, and usually you get privacy when accessing www-servers, by browsing with Tor Browser.

But diving a bit more into E2EE would definitely be worth it. Looking into how to use it safely.

  1. Public key fingerprints, what are they, and what is the MITM attack they protect against.
  2. What are the differences between blocking (Signal) and non-blocking (WhatsApp) key change warnings and how to deal with them.
  3. Why is open source client so important in ensuring client protects your conversations. Also, what are reproducible builds and how are they related.
  4. Why defaults matter (Telegram is not E2EE by default).
  5. What to look for in the application’s cipher suite (safe curves), best practices like authenticated encryption (AES-GCM, XChaCha20-Poly1305), hybrid schemes with post quantum key exchange paired with classical cryptography.
3 Likes
Off Topic

I’m genuinely curious—when’s the PeerTube version dropping? Is this Odysee link unofficial? Also, why isn’t PrivacyGuides on Odysee? I thought it was more privacy-focused than YouTube, especially since Naomi Brockwell posts there. If I’ve got any of this wrong, please correct me! I don’t intend to pressure the team on anything from this post, this thought just popped from my head when I saw this :grinning_face_with_smiling_eyes:

EDIT: removed one word at the ending to make it sound better :slight_smile:

1 Like