Man in the Middle Attacks & Superfish - Computerphile

1,039,295
0
Published 2015-10-23
Lenovo sold thousands of computers all carrying the Superfish software. Tom Scott explains what a security nightmare this became.

More Tom Scott:
youtube.com/enyay
www.twitter.com/tomscott


CORRECTION: At 2min 46secs Tom says "Private Key" when he means "Public Key" - The private key is not shared.

Chip & PIN Fraud:    • Chip & PIN Fraud Explained - Computer...  
Could We Ban Encryption?:    • Could We Ban Encryption? - Computerphile  
How Blurs & Filters work:    • How Blurs & Filters Work - Computerphile  
Numberphile: Encryption & Huge Numbers :    • Encryption and HUGE numbers - Numberp...  
Public Key Cryptography:    • Public Key Cryptography - Computerphile  

www.facebook.com/computerphile
twitter.com/computer_phile

This video was filmed and edited by Sean Riley.

Computer Science at the University of Nottingham: bit.ly/nottscomputer

Computerphile is a sister project to Brady Haran's Numberphile. More at www.bradyharan.com/

All Comments (21)
  • After this video I can't help but imagine each of the computerfile guys are kept seated in a different corner of that room and the camera just swivels around when he needs to make a new video
  • @metalicarus8372
    You know something's bad when you hear Tom Scott say "never ever"
  • There was so much potential at 4:46 to fix the drawing by attaching a circle to the end of the factory and making it look like a giant key.
  • @NoriMori1992
    2:21 - "And they can only be unlocked by that server, because maths." 10/10 best explanation of public and private key crypto. XD
  • @TheBedheadman
    even if superfish had been secure its still a super sketchy thing that lenovo was shipping their computers with adware
  • This seems so easy when Tom Scott explains it. Everything seems easy when Tom Scott explains it. Tom Scott, would you mind becomming a teacher at my school?
  • @NotNite
    sees intro NOTICES I'M ON A LENOVO LAPTOP
  • "lenovo promised not to do it again" the fact that they did it in the first place is mind-boggling
  • @Azivegu
    That golden moment of pure sadness and dissappointment of Tom at 6:35
  • @stensoft
    The private key is not shared with the certificate authority either. Simply because they don't need it. Regarding the possibility that NSA have keys to do MITM attacks: it's basically the same problem Turing faced when he broke Enigma. If they can do that, they can use it only as a very last resort and only when the message is extremely important because as soon as someone will find out which authority they use (and when you use it, it's only a matter of time), everyone will dump the authority and they would need to start from scratch again.
  • @xilent3828
    2:46 he meant "Here's my Public Key". I'd advise that you add an annotation just so no one gets confused.
  • @veggiet2009
    8:58 - Anyone else go up and click the green padlock in the URL at this point in the video?
  • @mrdaxtercrane
    "Extremely illegal, so DON'T do that!" You'd think that the people doing that honestly don't care about that.
  • @Epicmylikes
    Computerphile videos involving Mr. Scott are by far my favorite. Theyre all great, but I really enjoy how he talks about things.
  • @mekb1
    Ahh, so that's why the red "Insecure connection" screen pops up when I'm running a local server and I goto a domain which points to localhost.
  • @DrRChandra
    Unfortunately, this is one of the misplaced trust aspects of networking which is carried forward into IPv6. Router advertisements carry no validation; anything attached to the network can claim to be a router and set a prefix for the network. It's the same sad story for NDP. Yes, there is SEND, but it's an addon afterthought which is by no means mandatory to implement. wow...not just echo, but ringing echo as well. There has to be a happy medium between this and dragging everyone into a studio.
  • @therealquade
    Just a heads up, the NSA is cracking encryption based on 1024 bit primes, at a rate of roughly 1 per year including RSA and subsequent iterations. sooo we should have switched to 2048 bit by now, but at this point 4096 should be being prepped.
  • Great work, you guys go into more depth than the average tutorials and the information is strong.
  • @mistermuffin710
    Tom Scott's videos on Computerphile are my favorite videos!