How encryption works – and how it can be circumvented

How encryption works – and how it can be circumvented

HomeThe Wall Street JournalHow encryption works – and how it can be circumvented
How encryption works – and how it can be circumvented
ChannelPublish DateThumbnail & View CountDownload Video
Channel AvatarPublish Date not found Thumbnail
0 Views
The debate between privacy and national security has never been more heated, as Apple and other tech companies face off against the government. So how are text messages encrypted and what controversial "backdoors" could allow access to them?

Subscribe to the WSJ channel here:
http://bit.ly/14Q81Xy

More from the Wall Street Journal:
Visit WSJ.com: http://www.wsj.com

Follow WSJ on Facebook: http://www.facebook.com/wsjvideo
Follow WSJ on Google+: https://plus.google.com/+wsj/posts
Follow WSJ on Twitter: https://twitter.com/WSJvideo
Follow WSJ on Instagram: http://instagram.com/wsj
Follow WSJ on Pinterest: http://www.pinterest.com/wsj/
Don't miss any WSJ video. Subscribe here: http://bit.ly/14Q81Xy

More from the Wall Street Journal:
Visit WSJ.com: http://www.wsj.com
Visit the WSJ Video Center: https://wsj.com/video

On Facebook: https://www.facebook.com/pg/wsj/videos/
On Twitter: https://twitter.com/WSJ
On Snapchat: https://on.wsj.com/2ratjSM

Please take the opportunity to connect with your friends and family and share this video with them if you find it useful.