Clip

The Use of Public and Private Keys
listen on Spotify
07:57 - 10:20 (02:23)

An explanation on how public and private keys can be used instead of a username and password to log into certain systems, with an example of a hacker gaining access to a private key for LinkedIn from a virtual machine on the host computer.

Similar Clips