/

Engineering #4 Maths or magic? End-to-end encryption explained like I'm five

Copy Link

Unlock This Lesson

29

min

Engineering #4 Maths or magic? End-to-end encryption explained like I'm five

Engineering #4 Maths or magic? End-to-end encryption explained like I'm five

Engineering #4 Maths or magic? End-to-end encryption explained like I'm five

Engineering #4 Maths or magic? End-to-end encryption explained like I'm five

publish date

Feb 20, 2024

duration

29

min

Difficulty

Intermediate

Beginner

Beginner

Beginner

Case details

Every time we send a message on the most popular messaging platforms, we want to make sure that our communication is private and inaccessible to malicious users. We also want to ensure that in case of a data breach, the messages will be encrypted so that no one could potentially easily decrypt them. But how do we do that? How does end-to-end encryption work, and is it really that secure? In this interactive talk, we will see how to make our communications secure by implementing one of the most popular e2e encryption algorithms... with some help from the public!

Share case:

Questions?

Chat with Us!

910 Foulk Road, Suite 201

Wilmington, DE 19803, USA

© 2025 Geekle. All rights reserved.

Questions?

Chat with Us!

910 Foulk Road, Suite 201

Wilmington, DE 19803, USA

© 2025 Geekle. All rights reserved.

Questions?

Chat with Us!

910 Foulk Road, Suite 201

Wilmington, DE 19803, USA

© 2025 Geekle. All rights reserved.

Questions?

Chat with Us!

910 Foulk Road, Suite 201

Wilmington, DE 19803, USA

© 2025 Geekle. All rights reserved.