AnditsaysthatonLee, a fewpeoplehaveaccesstothetoolsweusetolookintothedatabasisandthatthat's thepointforconsumerBenedictAhrealizedyouknowwhatdeveloperBenedicthasalwaysknownandthat's thisdataisjustthereinplaintext.
I mean, it's inthedatabaseandsomebodyneedstohaveaccesstothatdatabase, anditcouldbeanyofyou.
Itcouldbeme, couldbeinmyfriendfromuniversityandwithsometypesofdatathatcouldjustbe, youknow, veryawkwardconversationsarenotliketryingtopretendthat I haven't seenthedata s o forme.
Kindofhithomeorpersonallywhen I startedthinkingaboutthatsameareathen, kindoflikethebigdatascenario.
And I thoughtif I wasevergonnamakethis, I needtolearnhowtoshieldmyselffrommyuser's data.
I wanttobeoneofthosecan't beevilacts.
I don't wannabetheoneDon't beEvil s.
So I satdownand I didwhatanysanedeveloperreducedthat I madetheproposalthatgotmeonthestagetodaysaying, stating, I'm gonnalearnwhat I needtolearntomake a privacyFirstapp.
Sothat's what I did.
Um, andalso, while I was, like, inhaledthesite, samedeveloperdoaswell.
While I wasprotestingatingfinishingtheseslides, I actuallytook a stabatmakingtheapp s.
Soit's calledPowelland I launcheditonproducttenders, a veryminimalversion.
Andonthesamedaythatnewleakcameout.
So, youknow, couldthinkthat I actuallyhadanagreementwiththesejournalistsbecauseitwasjusthoursafter I releasedPalinonproductandthesupportingthetensionhasbeenReallyit's blown.
Mymind, likepeoplearereallyinterested.
Theyreallywantsuch a nap.
So I'vedecidedtojustkeepfocusingonactuallymakingtheappandwilltrytolaunchonMarch 8th 2020.
Forthoseyoudon't knowwhatthatdayis.
It's theInternationalWomen's Day.
Um, so I'm happytosayitseemslikeprivacyisbecomingmoremainstreamandpeoplearegettinginterestedinknowingwheretheirdataisgoing.
Andalsomaybe, um, having a sayinwhereit's goingbeforeagointoencryption.
I justneedtothinkGeoffreyisnotGeoffreyfromonepassword.
Andifyounowyouknowveryoff a scriptDevelopers, ifyou'rethinking, Ah, mathrandomrightnow, thenthatisnot a truerandomalgorithm.
That's somethingcalled a pseudorandom.
Theygivesyoupseudorandomvalues, butwhatweneedis a cryptocryptographicleestrongrandomvalues.
Thereforeshowing a codeexamplewe'regoingtolookatthananalogythat's oftenusedinthecrypt a worldawayTothinkaboutencryptionishowwesecureourbelongingsbylockingthemintoourhouseonLee.
WewanttheadvancedencryptionstandardwithGallowsContramode s.
Westartbygenerating a keyforthatalgorithm, andherewesaythatwewanttolinktobe 256 256.
Butitcouldjustaswellbe 100 and 28th.
AndJeffJeffrey, fromonepasswordhas a longbloodpostaboutit, notreallybeingthatit's notthatmuchmoresecurewiththe 250 bitencryption, asit's calledas 100 and 28 bitencryption.
It's likegoingfrominfinitytoinfinity, hesays.
Butbutfortheuser's theytheylikethesoundof 256 over 100 and 28.
Itjustsoundsmoresecure.
Itsoundsbetter.
So I foundthatalsoin a security, there's a lotofdisabilityissues, andit's notonlylikethehardsciencethattheymightwantyoutobelievein, youreadmostoftheirliterature.
Um, soit's a veryinterestingfrom a userstandpoint.
Weneedto, um, helpouruserstogetnewmentalmodelsaboutwheredataisstoredandhowit's stored, because a lotofpeopleareveryusedtojusthittingtherecovery.
Or I forgotmypasswordlink.
A nicethingwiththissetupisthatsomethingthatsoundsreallyfanshere, atleastforme, soundedveryfancyendtoendencryptionsomethingthat's peoplesaywhenevertheytalkaboutCloud.
Sowehaveintendencryptiondownwithoutmuchextra F orwithnoextraefforteffortagain, youmightsayyouknowwhatthesharinghavetodowithperiodswreckerupandovertheselastweeksofmakingthatandstartedtalkingaboutmenstrualcycles.
I'vetalked, talkedmoreto, um, moreaboutcycleswithmyfriendsandotherrandompeoplethan I think I haveinmylifetimecombined.
Andthis I d that I'vehad, um, thatwe'vehadathomewhere I want.
I maybewanttosharesomeofmydatawithmysignificantothers.
Therearepartsofthedaysandthecycle, but I don't reallywanttocommunicateas a regularhuman.
I justwantmyhavetodoitforme.
Ah, andotherpeople, somepeoplethinkit's It's a hardboil, a horribleidea, andotherpeopleloveit.
Andthenyouputthatkeyunderyourflyer, butAndtogeneratethese a sinkkeysyoucanuse, umAh, thisalgorithm, I won't gomuchfurtherintothat, butwe'lllookattheflow.
Asyoumighthavenoticed, wejustputthingsonthecloudandwithoutknowingwhoanyonewaasandthereasonforthatthatitbecomesmoreproblematicthanin a normalwebappsinceweuseourpasswordtogeneratekeyswedon't really.
Thepasswordbecomesmuchmoresensitivethanin a regularapp, sowedon't wanttosendthepassword, evenifit's hashedbackandforthbetweentheservertoLeGuin.
Youjustdo a lotofreallycoolmathonbothsides, andyou'reabletosay, likewebothknowthesamesecret.
Butyoudon't sendthepasswordbackandforth, but I havenotbeenabletofindanyserviceisthatgivesusthisbecauseoldregularbackandastheserviceprovidersandoffproviders, theydoregularauthenticationflow.
I foundonerandompackageonnode, which, youknow I can't justjumpattemptingtousethatwithoutknowinganythingmoreaboutit.
It's a fairlyseemstobefairly a newframeworkforcreatingdecentralizedapse, sotheyhaveauthenticationon, youknow, theblockchain, whichisverypopularwordtosaythesedays.
But I findittobeabletousethisforpoweris a verypracticalexampleofwhenit's needed.
Andtheretheydo a similarthingwhereyouintendtoauthenticatewithoutsendingthepassword, um, overanywires.
It's definitelypossible, causewecanencryptand I havemadeahversionofthe F.
But I thinkwhatismoreimportantisthatmoreofus, especiallyinthedevelopers, startedusingencryptionandreallytakingprivacyfirsttohelpourusersandeducateouruserstoknowwhentheyshareandhowthatwholeflowworks.
WhenyoudoencryptedAPSandtherewillalwaysbe a trustissue, because I couldoffcoursedothingsinthebrowserinadditiontoencryptingandjustsendingoffthedataif I wantedto.