Cryptography

Security through obscurity

Security through obscurity (or security by obscurity) is the reliance in security engineering on design or implementation secrecy as the main method of providing security to a system or component. (Wikipedia).

Video thumbnail

How To Protect Your Online Privacy With A Threat Model | Tutorial 2022

Privacy tutorial with a threat model methodology. This will help you achieve strong privacy consistently and reliably. Support independent research: https://www.patreon.com/thehatedone Privacy tools are inconsistent. The inventory of recommended countermeasures changes all the time. On t

From playlist Security by compartmentalization - learn to protect your privacy effectively

Video thumbnail

Cybersecurity in 1 Minute | What Is Cybersecurity? | Introduction to Cybersecurity | Simplilearn

In today's video on cybersecurity in 1 minute, we cover the basics of what cybersecurity is and why it's one of the most sought-after job markets today. In this introduction to cybersecurity, we take you through the benefits and importance of trained cybersecurity professionals, both from

From playlist Cyber Security Playlist [2023 Updated]🔥

Video thumbnail

How to use Facebook anonymously | Stop Facebook tracking | Protect yourself from hackers and doxxing

Do you know how to use Facebook anonymously? Facebook tracks you all over the web and to regain your online privacy, you need stop Facebook tracking mechanisms. In this video, you'll learn how to stop Facebook tracking. How much Facebook knows about you? Everything: https://youtu.be/9sFl

From playlist TUTORIALS & HOW TO's

Video thumbnail

Staysafe.org: Protect your computer

The Internet is a global network that connects us to limitless information and opportunities. But there are risks involved with connecting to the Internet, such as downloading viruses and spyware onto computers and devices. Watch this video for four easy steps to help protect your computer

From playlist awareness

Video thumbnail

Lecture 32: Steganography (hidden messages) - Richard Buckland UNSW

Extension lecture introducing steganography (hidden messages). Security via obscurity. Hidden messages in book Godel Escher Bach. In film Starship Troopers. In games. In cryptography. In teaching. Digital watermarking. SETI. Are we in a simulation? Extension lectures are for firs

From playlist CS1: Higher Computing - Richard Buckland UNSW

Video thumbnail

Become Untraceable - How To Create An Anonymous Identity | Tutorial

Become untraceable by creating anonymous identities. This is how it's done. Support independent research and analysis by joining my Patreon page: https://www.patreon.com/thehatedone The Internet is a giant network of privately owned spaces open to public, where every participant knows th

From playlist TUTORIALS & HOW TO's

Video thumbnail

Internet Safety: Your Browser's Security Features

In this video, you’ll learn more about your browser's security features. Visit https://www.gcflearnfree.org/internetsafety/your-browsers-security-features/1/ for our text-based lesson. This video includes information on: • Using browser security to check web addresses and identify securit

From playlist Internet Tips

Video thumbnail

Bitcoin Q&A: Full Node and Home Network Security

Does running a Bitcoin and Lightning node at home attract hackers? Why is security through obscurity not the best strategy? What is some general advice on securing your personal computer and home network? Are there full node starter kits? Could bitcoin nodes be cut off if ISPs blocked port

From playlist English Subtitles - aantonop Videos with subtitles in English

Video thumbnail

How adding your phone number and 2-factor authentication helps protect your account

Ever had to use a code that was texted to your phone to log into a website? Then you’ve used two-factor authentication. Learn more about why it’s so important, and how it creates an extra layer of security to protect your accounts and your information.

From playlist Internet Safety

Video thumbnail

DevOps Security | DevOps Tutorial For Beginners | DevOps Tutorial | Simplilearn DevOps

🔥DevOps Engineer Master Program (Discount Code: YTBE15): https://www.simplilearn.com/devops-engineer-masters-program-certification-training?utm_campaign=DevOpsSecuritySep14-gwfxJy2SmIw&utm_medium=Descriptionff&utm_source=youtube 🔥Post Graduate Program In DevOps: https://www.simplilearn.co

From playlist DevOps Tutorial For Beginners 🔥 | Simplilearn [Updated]

Video thumbnail

Cryptograph: Substitution Cipher (Caesar Cipher)

This lesson explains how to encrypt and decrypt a message using a Caeser cipher. Site: http://mathispower4u.com

From playlist Cryptography

Video thumbnail

Security vs. Complexity

In this talk, Andreas reflects on the audacity of "be your own bank," but also the difficulties we will face in translating what that means to people who still have no idea what a bank (let alone the centralised power of the banking cartel) does. We all suffer from the Dunning-Kruger effec

From playlist English Subtitles - aantonop Videos with subtitles in English

Video thumbnail

Intrusion Detection: Part 1

Fundamental concepts of intrusion detection are discussed. Various types of intrusion are analyzed. Password management is explained.

From playlist Network Security

Video thumbnail

26C3: Legic Prime: Obscurity in Depth 7/7

Clip 7/7 Speakers: Henryk Plötz ,Karsten Nohl Legic Prime is an artifact from the time when proprietary cryptography in RFID was considered secure enough. We will demonstrate a break for basically any aspect of Legic Prime's claimed security features. If you rely on Legic Prime's sec

From playlist 26C3: Here be dragons day 2

Video thumbnail

CERIAS Security: Cyber Security and the NEW world enterprise 2/6

Clip 2/6 Speaker: Howard Schmidt · President & CEO · R & H Security Consulting LLC As cyber security has evolved in the new world of distributed computing there have been dramatic changes to the nature of our security needs. Mr. Schmidt will talk about issues that affect large ente

From playlist The CERIAS Security Seminars 2007

Video thumbnail

SOURCE Boston 2009: A Virtualization and Cloud Computing Security Fable Set To Interpretive Dance

Speaker: Christofer Hoff Aesop wrote this little ditty about some discontented frogs who lived in a pond. They asked Jupiter for a King. They got one. It ate them. The moral of this story is "be careful what you wish for." The corresponding analog is that of virtualization and cloud sec

From playlist Latest uploads

Video thumbnail

24C3: Hacking SCADA

Speaker: mayhem, Raoul "Nobody" Chiesa how to own critical infrastructures SCADA acronym stand for "Supervisory Control And Data Acquisition", and it's related to industrial automation inside critical infrastructures. This talk will introduce the audience to SCADA environments and its

From playlist 24C3: Full steam ahead

Video thumbnail

26C3: Using OpenBSC for fuzzing of GSM handsets 4/6

Clip 4/6 Speaker: Harald Welte With the recent availability of more Free Software for GSM protocols such as OpenBSC, GSM protocol hacking is no longer off-limits. Everyone can play with the lower levels of GSM communications. It's time to bring the decades of TCP/IP security resear

From playlist 26C3: Here be dragons day 3

Video thumbnail

Digital security - threats, risks and how to protect yourself | Part I

Support this channel on Patreon https://www.patreon.com/thehatedone Part I of the full talk with Daniel from Safing.io. We discuss the current state of digital security, most common threats, GDPR, artificial intelligence and quantum computing. Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC

From playlist Security by compartmentalization - learn to protect your privacy effectively

Related pages

Steganography | AACS encryption key controversy