
What is the Most PRIVATE Cloud Storage?
- Frank
- February 15, 2023
- Bitcoin
- Bitcoingirl.org
- Blockchain
- brockwell
- btc
- Cloud
- Cloud storage
- crypto
- CryptoCurrency
- currency
- drive
- e2ee
- Encryption
- End to End Encryption
- Fiat
- Girl
- mega
- monetary
- naomi
- Naomi Brockwell
- naomi privacy tips
- nbtv
- nbtv.media
- pcloud
- policy
- Privacy
- proton drive
- surveillance
- sync
- Tech
Naomi Brockwell compares some popular cloud storage providers, to see which ones are the most private.
Read More
Quantum AI Algorithms and the Future of Quantum Computing
In this video Samuel Bosch talks about his PhD research at MIT in Quantum Artificial Intelligence. He also explain the basic concepts of quantum computers, and why they are superior to conventional computers for specific tasks. Prof. Peter Shor, the inventor of Shor’s algorithm and one of the founding fathers of Quantum Computing, kindly agreed […]
Read More
Can the NSA Read Your Data on Windows?
- Frank
- June 11, 2022
- backdoor
- Encryption
- nsa
- nsakey
Why does Windows contain the NSAKEY, what is it for, and why was it inserted into Windows during Windows NT Service Pack 5?
Read More
How Dangerous are Quantum Computers?
A discussion of the potential benefits and dangers of quantum computing, security implications, and post-quantum cryptography.
Read More
How did the Enigma Machine work?
- Frank
- December 12, 2021
- 3d animation
- alan turing
- b3d
- Battery
- blender3d
- bletchley park
- bombe
- Breaking of Enigma
- Caesar Cipher
- circuit
- code breaking
- Computer
- Cryptography
- decryption
- Electricity
- Encryption
- Germans
- how it works
- index wheels
- input wheel
- keyboard
- keyboard mechanism
- lampboard
- light bulb
- machine settings
- mechansim
- Nazi
- pawl
- plugboard
- plugboard settings
- ratchet
- ratchet and pawl mechanism
- reflector
- ring setting
- rotor step
- rotors
- starting position
- typewriter
- wiring
- WW2
- WWII
This video uses 3D animation to go inside the legendary Enigma Machine, which encrypted German military secrets during World War II. Time stamps: 1:01-Encryption 2:42-Engima Machine 4:23-Simple Circuit Example 5:23-Inside the Machine 6:15-Rotors 8:51-Plugboard 10:08-Keyboard Mechanism 12:14-The Circuit 13:15-Circuit Recap 14:38-Rotor Mechanism 17:06-Machine Settings 18:14-Brilliant
Read More
What’s the Real Deal with Amazon Sidewalk and Privacy?
- Frank
- June 4, 2021
- 900 mhz
- Alexa
- Amazon
- bandwidth
- Bluetooth
- Camera
- Data
- Echo
- Encryption
- Facial Recognition
- gadget
- government agency
- hacker
- internet connection
- internet of things
- IoT
- Law Enforcement
- legislation
- mesh network
- network packet
- Open Source
- opt out
- Police
- Politics
- Privacy
- Regulation
- ring
- router
- Security
- server
- sidewalk
- Speaker
- surveillance
- tile
- tracker
- transmission
- update
- video recording
- voice recording
- wireless
censiCLICK gets behind the hype of Amazon Sidewalk and gets to the truth.
Read More
Reliable Email Providers More Private than Gmail
Strong user privacy controls in Gmail are not a priority for Google. There are reliable free and paid email providers offering security and privacy with strong encryption and anonymous usage. censiCLICK highlights the most prominent ones.
Read More
Shohini Ghose on a Beginner’s Guide to Quantum Computing
A quantum computer isn’t just a more powerful version of the computers we use today; it’s something else entirely, based on emerging scientific understanding — and more than a bit of uncertainty. Enter the quantum wonderland with TED Fellow Shohini Ghose and learn how this technology holds the potential to transform medicine, create unbreakable encryption […]
Read More
AES (Advanced Encryption Standard) Explained
Computerphile explored AES (Advanced Encryption Standard) with Dr Mike Pound explains.
Read More