How Encryption Works - and How It Can Be Bypassed

Published 2016-03-04
The debate between privacy and national security has never been more heated, with Apple and other tech firms going up against the government. So how are text messages encrypted, and what are the controversial "backdoors" that could allow access to them?

Subscribe to the WSJ channel here:
bit.ly/14Q81Xy

More from the Wall Street Journal:
Visit WSJ.com: www.wsj.com/

Follow WSJ on Facebook: www.facebook.com/wsjvideo
Follow WSJ on Google+: plus.google.com/+wsj/posts
Follow WSJ on Twitter: twitter.com/WSJvideo
Follow WSJ on Instagram: instagram.com/wsj
Follow WSJ on Pinterest: www.pinterest.com/wsj/
Don’t miss a WSJ video, subscribe here: bit.ly/14Q81Xy

More from the Wall Street Journal:
Visit WSJ.com: www.wsj.com/
Visit the WSJ Video Center: wsj.com/video

On Facebook: www.facebook.com/pg/wsj/videos/
On Twitter: twitter.com/WSJ
On Snapchat: on.wsj.com/2ratjSM

All Comments (21)
  • @mateko2001
    I absolutely hate the idea of government justifying having control of everything and everyone by saying it's trying to protect you.
  • @LibertyAnd1776
    Whenever I hear the term “national security,” I know that it’s going to be followed up with stupid anti-privacy BS.
  • @Karmiangod
    Personal privacy is much more important than national security.
  • @realdragon
    Privacy vs National security Because criminals doesn't communicate in code or use their own programs
  • I dont understand the shared key, after creating the shared key, is the shared key the same for each end? how does the shared key be used?
  • @ssjlee93-uu1cv
    Perfect, flawless, and neutral video! Highly informative! My ideal form of what mews should be. Just amazing.
  • @Alex-dn7jq
    That's not how national security should work in the first place.
  • @muntee33
    What if private key and encryption/decryption is only done on dedicated device that does not utilise major processor chipsets? Such as a scientific calculator type device?
  • @erltyriss6820
    I was going to comment that privacy was far more important than security, but the other commenters have already said it for me.
  • @Roy4USA
    So the key of the story is the private key? All someone has to do is either get or replace your private key...
  • @Normie_dog
    4th amendment trumps national security....