1 00:00:00,720 --> 00:00:08,370 In the previous sections we learned a number of methods to send and receive data privately and anonymously. 2 00:00:08,370 --> 00:00:15,240 This data can be simple text or it can be files such as an image a PDA f a document and so on. 3 00:00:16,340 --> 00:00:23,210 All of these methods used end to end encryption so if the data gets intercepted by any entity the data 4 00:00:23,210 --> 00:00:29,510 will be useless to this entity because it'll be simply gibberish and it'll only be decrypted once it's 5 00:00:29,510 --> 00:00:33,080 received by the person that we want them to receive it. 6 00:00:33,080 --> 00:00:40,340 This is all great but first of all we have to trust that these methods of communication are implementing 7 00:00:40,370 --> 00:00:45,500 the encryption properly that there are no problems or no flaws in the way that they're encrypting and 8 00:00:45,500 --> 00:00:46,700 decrypting the data. 9 00:00:47,420 --> 00:00:54,050 And what if we wanted to send data through a website or through a form of communication that does not 10 00:00:54,050 --> 00:00:56,330 support encryption. 11 00:00:56,330 --> 00:01:02,300 In this case you'll have to manually encrypt your data and the person that receives the data have to 12 00:01:02,300 --> 00:01:06,340 manually decrypted because this is very important. 13 00:01:06,350 --> 00:01:13,830 I decided to make a full section on encryption in this course so in the section first of all we're going 14 00:01:13,830 --> 00:01:17,170 to learn about asymmetric and symmetric encryption. 15 00:01:17,170 --> 00:01:21,920 You're going to learn how it works and why we prefer to use end to end encryption. 16 00:01:21,970 --> 00:01:27,760 Then I'm going to teach you how to manually encrypt your data again whether it's text or file such as 17 00:01:27,760 --> 00:01:30,310 a PDA or a document or a song. 18 00:01:30,310 --> 00:01:33,670 You'll also learn how to decrypt this data once you receive it. 19 00:01:33,670 --> 00:01:35,730 You'll learn how to sign this data. 20 00:01:35,770 --> 00:01:42,880 So when a person receives this data they can confirm that it was actually sent by you and not by someone 21 00:01:42,880 --> 00:01:49,720 else and you'll also learn how to verify the signatures and integrity of the files and of data that 22 00:01:49,720 --> 00:01:56,140 you receive so that you know that this wasn't played with us it was sent to you it wasn't tampered with 23 00:01:56,350 --> 00:02:02,470 and to make sure that it was actually sent from the sender and not someone else. 24 00:02:02,470 --> 00:02:07,340 So you can use this as another layer of encryption on top of the other methods. 25 00:02:07,360 --> 00:02:12,460 So even if you're using a method that supports encryption you can manually encrypt and decrypt the data 26 00:02:12,520 --> 00:02:19,570 just to make sure that your files or your data is as private as possible and you can use this like I 27 00:02:19,570 --> 00:02:26,890 said to send files and to send data using unsecured methods of communication even use a normal post 28 00:02:27,220 --> 00:02:33,040 and you'll know if this data gets intercepted It's still secure and is still private because whoever 29 00:02:33,040 --> 00:02:38,340 intercepts it will not be able to read it because it will be encrypted and it will be gibberish.