1 00:00:00,000 --> 00:00:07,000 In the previous sections, we learned a number of methods to send and receive data privately and anonymously. 2 00:00:08,000 --> 00:00:15,000 This data can be simple text or it can be files such as an image, a PDF, a document, and so on. 3 00:00:16,000 --> 00:00:19,000 All of these methods used end to end encryption. 4 00:00:19,000 --> 00:00:25,000 So if the data gets intercepted by any entity, the data will be useless to this entity because it will 5 00:00:25,000 --> 00:00:31,000 be simply gibberish and it will only be decrypted once it's received by the person that we want them 6 00:00:31,000 --> 00:00:32,000 to receive it. 7 00:00:32,000 --> 00:00:40,000 This is all great, but first of all, we have to trust that these methods of communication are implementing 8 00:00:40,000 --> 00:00:45,000 the encryption properly, that there are no problems or no flaws in the way that they're encrypting 9 00:00:45,000 --> 00:00:46,000 and decrypting the data. 10 00:00:47,000 --> 00:00:54,000 And what if we wanted to send data through a website or through a form of communication that does not 11 00:00:54,000 --> 00:00:55,000 support encryption? 12 00:00:56,000 --> 00:01:02,000 In this case, you'll have to manually encrypt your data, and the person that receives the data have 13 00:01:02,000 --> 00:01:03,000 to manually decrypted. 14 00:01:04,000 --> 00:01:06,000 Because this is very important. 15 00:01:06,000 --> 00:01:10,000 I decided to make a full section on encryption in this course. 16 00:01:11,000 --> 00:01:17,000 So in this section, first of all, we're going to learn about asymmetric and symmetric encryption. 17 00:01:17,000 --> 00:01:21,000 You're going to learn how it works and why we prefer to use end to end encryption. 18 00:01:21,000 --> 00:01:27,000 Then I'm going to teach you how to manually encrypt your data again, whether it's text or files such 19 00:01:27,000 --> 00:01:29,000 as a PDF or a document or a song. 20 00:01:30,000 --> 00:01:33,000 You'll also learn how to decrypt this data once you receive it. 21 00:01:33,000 --> 00:01:35,000 You'll learn how to sign this data. 22 00:01:35,000 --> 00:01:42,000 So when a person receives this data, they can confirm that it was actually sent by you and not by someone 23 00:01:42,000 --> 00:01:43,000 else. 24 00:01:43,000 --> 00:01:50,000 And you'll also learn how to verify the signatures and integrity of the files and of data that you receive 25 00:01:50,000 --> 00:01:56,000 so that you know that this wasn't played with as it was sent to you, it wasn't tampered with. 26 00:01:56,000 --> 00:02:01,000 And to make sure that it was actually sent from the sender and not someone else. 27 00:02:02,000 --> 00:02:07,000 So you can use this as another layer of encryption on top of the other methods. 28 00:02:07,000 --> 00:02:12,000 So even if you're using a method that supports encryption, you can manually encrypt and decrypt the 29 00:02:12,000 --> 00:02:17,000 data just to make sure that your files or your data is as private as possible. 30 00:02:17,000 --> 00:02:24,000 And you can use this, like I said, to send files and to send data using unsecure methods of communication, 31 00:02:25,000 --> 00:02:27,000 even using normal post. 32 00:02:27,000 --> 00:02:33,000 And you'll know if this data gets intercepted, it's still secure and it's still private because whoever 33 00:02:33,000 --> 00:02:38,000 intercepts it will not be able to read it because it will be encrypted and it will be gibberish.