1 00:00:00,320 --> 00:00:02,880 Speaker 1: Brought to you by the reinvented two thousand twelve camera. 2 00:00:03,240 --> 00:00:08,800 Speaker 1: It's ready. Are you get in touch with technology? With 3 00:00:08,920 --> 00:00:12,080 Speaker 1: tech stuff from how stuff Works dot Com, brought to 4 00:00:12,080 --> 00:00:15,160 Speaker 1: you by Visas. Y'all have things we like to think about. 5 00:00:15,400 --> 00:00:18,840 Speaker 1: Online fraud shouldn't be one of them, because with every purchase, 6 00:00:19,239 --> 00:00:24,800 Speaker 1: Visa prevents to texts and resolves online fraud safe secure pieces. 7 00:00:26,000 --> 00:00:28,760 Speaker 1: Other ladies and gentlemen, welcome to the podcast. My name 8 00:00:28,800 --> 00:00:31,400 Speaker 1: is Chris Colette. I'm an editor here at How Stuff Works, 9 00:00:31,720 --> 00:00:34,360 Speaker 1: and today I have with me in the studio right here, 10 00:00:34,440 --> 00:00:38,040 Speaker 1: sitting here Jonathan Strickland, one of our writers in the 11 00:00:38,080 --> 00:00:42,199 Speaker 1: flesh Ye, And today we are going to talk about 12 00:00:42,320 --> 00:00:45,680 Speaker 1: some encryption things, things that you might want to keep 13 00:00:45,720 --> 00:00:47,760 Speaker 1: an eye on because this could be an issue of 14 00:00:47,760 --> 00:00:51,519 Speaker 1: great personal significance. Yes, uh. In fact, it was an 15 00:00:51,520 --> 00:00:55,160 Speaker 1: issue of great personal significance for about forty million people recently. 16 00:00:55,960 --> 00:00:58,280 Speaker 1: Um actually probably not that many. That was the That 17 00:00:58,400 --> 00:01:01,120 Speaker 1: was the total number of people acted by a recent 18 00:01:01,880 --> 00:01:06,039 Speaker 1: UH discovery. The federal government had a sting operation where 19 00:01:06,120 --> 00:01:12,039 Speaker 1: they identified eleven international computer hackers who are accused of 20 00:01:12,040 --> 00:01:15,440 Speaker 1: stealing the information of forty million people and some of 21 00:01:15,480 --> 00:01:20,800 Speaker 1: that included pen numbers, which was a that's huge news. Yeah, 22 00:01:20,840 --> 00:01:23,839 Speaker 1: because the thing about it is if somebody has your 23 00:01:24,160 --> 00:01:27,440 Speaker 1: debit card number, they can't do an awful lot with 24 00:01:27,520 --> 00:01:30,840 Speaker 1: it unless they have your pen, your personal identification number. 25 00:01:31,560 --> 00:01:35,720 Speaker 1: So for hackers to get hold of the number and 26 00:01:35,840 --> 00:01:39,360 Speaker 1: the pen, then they're in business because that allowed them 27 00:01:39,400 --> 00:01:43,640 Speaker 1: to create or at least there the authorities are alleging 28 00:01:43,680 --> 00:01:47,960 Speaker 1: that they were able to create fake debit cards with 29 00:01:48,080 --> 00:01:50,960 Speaker 1: numbers and they were allowed to get use those to 30 00:01:50,960 --> 00:01:52,680 Speaker 1: get money. Yeah, they could go to any a t 31 00:01:52,920 --> 00:01:54,760 Speaker 1: M and use that and put in the pin number 32 00:01:54,840 --> 00:01:58,000 Speaker 1: because the number and the pen matched. Uh. The they 33 00:01:58,400 --> 00:02:00,160 Speaker 1: a t M had no way of knowing that this 34 00:02:00,320 --> 00:02:05,840 Speaker 1: was uh, you know, someone impersonating an innocent victim and 35 00:02:06,200 --> 00:02:08,200 Speaker 1: the guy could withdraw money. Now, whether or not this 36 00:02:08,280 --> 00:02:11,080 Speaker 1: actually happened will that remains to be seen. We we haven't. 37 00:02:11,280 --> 00:02:15,320 Speaker 1: We don't have all the information just yet. But um, 38 00:02:15,360 --> 00:02:19,040 Speaker 1: this kind of leads into a discussion about what encryption. 39 00:02:19,200 --> 00:02:22,640 Speaker 1: Encryption is, how it works, why it works, and why 40 00:02:22,960 --> 00:02:27,800 Speaker 1: it's difficult, uh to to crack it. So kind of 41 00:02:27,840 --> 00:02:30,919 Speaker 1: give you an overview of encryption. That's essentially you're talking 42 00:02:30,919 --> 00:02:36,040 Speaker 1: about encoding information, so that only the person or organization 43 00:02:36,680 --> 00:02:39,400 Speaker 1: that receives that information will be able to decode it 44 00:02:39,760 --> 00:02:43,080 Speaker 1: and get at that information. Um. And this is done 45 00:02:43,240 --> 00:02:47,480 Speaker 1: with a key, So the key decodes the encrypted message. 46 00:02:48,040 --> 00:02:49,360 Speaker 1: And there are a couple of different ways you can 47 00:02:49,400 --> 00:02:54,280 Speaker 1: do this right right, Um, Actually, encryption goes back centuries. 48 00:02:54,560 --> 00:02:57,200 Speaker 1: You know, it's something we think about as being sort 49 00:02:57,200 --> 00:02:59,640 Speaker 1: of a new thing. You mean, you hear about famous 50 00:02:59,680 --> 00:03:03,400 Speaker 1: encrypt and like the the Enigma machine from Germany during 51 00:03:03,440 --> 00:03:06,600 Speaker 1: World War Two is a famous way of encrypting messages 52 00:03:06,880 --> 00:03:10,079 Speaker 1: used in wartime. And sure that's you know, the military 53 00:03:10,120 --> 00:03:15,080 Speaker 1: has used codes and encryption, you know, for you know, 54 00:03:15,120 --> 00:03:17,360 Speaker 1: as long as there have been militaries, you know, people 55 00:03:17,400 --> 00:03:21,920 Speaker 1: sending encoded messages. But when we're talking about this, basically 56 00:03:22,000 --> 00:03:25,120 Speaker 1: they're there are two sides to encryption. It's generally the 57 00:03:25,120 --> 00:03:28,400 Speaker 1: way it's done in electronic transmissions. Uh, there is a 58 00:03:28,520 --> 00:03:30,239 Speaker 1: there are two keys. There's a private key and a 59 00:03:30,280 --> 00:03:35,240 Speaker 1: public key, and basically to to get at the encrypted information, 60 00:03:35,280 --> 00:03:38,280 Speaker 1: you have to have both pieces of information right right 61 00:03:38,280 --> 00:03:41,520 Speaker 1: the way. Now, there is one other way you can 62 00:03:41,560 --> 00:03:43,840 Speaker 1: do this besides the public private key, there's there's the 63 00:03:43,920 --> 00:03:48,880 Speaker 1: symmetric key. Encryption approach, but it's it's less secure. Uh, 64 00:03:48,960 --> 00:03:51,720 Speaker 1: symmetric key encryption. What that means is that you have 65 00:03:52,160 --> 00:03:55,160 Speaker 1: two keys that are exactly the same. They can both 66 00:03:55,720 --> 00:03:58,360 Speaker 1: encode and decode information. It's kind of like having a 67 00:03:58,440 --> 00:04:00,800 Speaker 1: decoder ring, you know, like you'd get out of a 68 00:04:00,880 --> 00:04:05,240 Speaker 1: serial box. Kids still eat cereal, right, yeah? Okay, So 69 00:04:05,480 --> 00:04:09,040 Speaker 1: so they basically each person has an identical codebook, right, 70 00:04:09,120 --> 00:04:11,000 Speaker 1: and the person on one end is encoding it with 71 00:04:11,080 --> 00:04:13,200 Speaker 1: the codebook. And you know, you passed through a message 72 00:04:13,200 --> 00:04:15,960 Speaker 1: on your friend who uses the identical codebook and can 73 00:04:16,040 --> 00:04:18,400 Speaker 1: decode the message exactly. The problem with that is if 74 00:04:18,440 --> 00:04:21,159 Speaker 1: anyone else grabs hold of that codebook, they can also 75 00:04:21,240 --> 00:04:23,800 Speaker 1: decode the message, so it's not terribly secure. That's where 76 00:04:23,800 --> 00:04:27,919 Speaker 1: the public private key comes in. Now, in this situation, 77 00:04:28,400 --> 00:04:31,000 Speaker 1: you would have a private key that belongs to you, 78 00:04:31,080 --> 00:04:33,320 Speaker 1: it's on your computer, that's the only place it's ever 79 00:04:33,360 --> 00:04:35,279 Speaker 1: going to be found. And then you have a separate 80 00:04:35,360 --> 00:04:37,760 Speaker 1: key called a public key that you can give to 81 00:04:38,000 --> 00:04:41,720 Speaker 1: whomever so that they can encode information, send it to you, 82 00:04:41,800 --> 00:04:46,000 Speaker 1: and only your private key can decode that information. Um. 83 00:04:46,279 --> 00:04:50,560 Speaker 1: And this this is a this is a secure, more 84 00:04:50,640 --> 00:04:53,240 Speaker 1: secure way of doing things than the symmetric key, because 85 00:04:53,560 --> 00:04:55,920 Speaker 1: it's designed in such a way that you can't figure 86 00:04:55,920 --> 00:04:59,080 Speaker 1: out what the private key is based solely on the 87 00:04:59,120 --> 00:05:01,440 Speaker 1: public key. So you can stare at the public key 88 00:05:01,440 --> 00:05:03,600 Speaker 1: all day long and you're not going to figure out 89 00:05:03,720 --> 00:05:07,080 Speaker 1: what what the right process is to decode that information. 90 00:05:07,400 --> 00:05:09,599 Speaker 1: And on the flip side, if you encode something with 91 00:05:09,640 --> 00:05:13,320 Speaker 1: your private key and send it out, well, because because 92 00:05:13,360 --> 00:05:15,719 Speaker 1: the public key is public, because other people can get 93 00:05:15,760 --> 00:05:19,240 Speaker 1: hold of it, the information in that message won't be secure, 94 00:05:19,440 --> 00:05:24,000 Speaker 1: but it is verifiable that it came from you, So 95 00:05:24,080 --> 00:05:27,240 Speaker 1: it becomes kind of a digital signature, right You're you're saying, well, 96 00:05:27,560 --> 00:05:30,560 Speaker 1: the public key can only decode informations that came from 97 00:05:30,560 --> 00:05:33,599 Speaker 1: this particular private key, so we know the information came 98 00:05:33,600 --> 00:05:36,640 Speaker 1: from him. The information itself isn't secure, but at least 99 00:05:36,680 --> 00:05:40,000 Speaker 1: you know, like it's an authentication. It's it's like a 100 00:05:40,040 --> 00:05:43,240 Speaker 1: digital signature. You know, you can it's absolutely verifiable that 101 00:05:43,320 --> 00:05:47,760 Speaker 1: it came from this person. Um, you know what. There 102 00:05:47,839 --> 00:05:50,479 Speaker 1: is one way around that though, if somewhere were able 103 00:05:50,520 --> 00:05:53,040 Speaker 1: to get hold of your, say your laptop computer with 104 00:05:53,080 --> 00:05:57,039 Speaker 1: your digital signature, you know, embedded in the computer, and 105 00:05:57,160 --> 00:06:00,920 Speaker 1: you weren't encrypting your log in information. If it were 106 00:06:00,960 --> 00:06:04,760 Speaker 1: just on then they could sign documents, which you know 107 00:06:04,960 --> 00:06:07,880 Speaker 1: is another important part of encryption. It's not just for 108 00:06:08,320 --> 00:06:10,760 Speaker 1: you know, your your pin number at your bank. You've 109 00:06:10,800 --> 00:06:13,320 Speaker 1: got all kinds of other things that that could uh 110 00:06:13,480 --> 00:06:16,440 Speaker 1: stand to be encrypted, especially if you have, uh, you know, 111 00:06:16,560 --> 00:06:20,240 Speaker 1: very private information. If you have, say, uh, your bank 112 00:06:20,279 --> 00:06:24,440 Speaker 1: account information on your computer. Um, my wife keeps a 113 00:06:24,480 --> 00:06:26,880 Speaker 1: backup of our financial data on there. Well, if she 114 00:06:27,400 --> 00:06:31,320 Speaker 1: were to not encrypt the log into her computer, someone 115 00:06:31,360 --> 00:06:34,000 Speaker 1: could break into our house, open the computer up and 116 00:06:34,040 --> 00:06:37,640 Speaker 1: see all that information because the log into the computer 117 00:06:37,800 --> 00:06:41,680 Speaker 1: is wide open. Um. You know, they're they're all kinds 118 00:06:41,680 --> 00:06:44,400 Speaker 1: of other things to Email is one of the most 119 00:06:44,560 --> 00:06:48,440 Speaker 1: common places that you're going to see encryption. Um, you know, 120 00:06:48,440 --> 00:06:52,600 Speaker 1: where you're actually aware of it being there. Um. There 121 00:06:52,600 --> 00:06:56,600 Speaker 1: are ways to add that to your email program uh, 122 00:06:56,720 --> 00:07:00,360 Speaker 1: programs like Pretty Good Privacy or there are There are 123 00:07:00,360 --> 00:07:05,520 Speaker 1: actually some open source encryption standards, and even Google is 124 00:07:05,560 --> 00:07:09,320 Speaker 1: talking about the possibility of adding a new open source 125 00:07:09,400 --> 00:07:12,760 Speaker 1: encryption standard a p I, so that other people can 126 00:07:12,800 --> 00:07:16,480 Speaker 1: incorporate that into their into their products. And I imagine 127 00:07:16,560 --> 00:07:18,400 Speaker 1: and you know, they don't say that, but I'm just 128 00:07:18,400 --> 00:07:20,480 Speaker 1: guessing that it's probably gonna end up in Gmail too, 129 00:07:21,040 --> 00:07:24,240 Speaker 1: so that you can say encrypted messages back and forth. 130 00:07:25,000 --> 00:07:29,400 Speaker 1: And you might be wondering how all this encoding happens. UM. 131 00:07:29,440 --> 00:07:34,320 Speaker 1: It's generally uh accomplished through the use of a hashing 132 00:07:34,440 --> 00:07:40,240 Speaker 1: algorithm to create a hash value. Now, an algorithm is 133 00:07:40,240 --> 00:07:43,400 Speaker 1: a set of instructions that that machines follow to to 134 00:07:43,560 --> 00:07:47,600 Speaker 1: complete a certain task. With a hash value hashing algorithm, 135 00:07:48,080 --> 00:07:51,960 Speaker 1: what what happens is that it takes an agreed upon number. 136 00:07:51,960 --> 00:07:54,880 Speaker 1: For example, this is just one of many different versions 137 00:07:54,880 --> 00:07:58,119 Speaker 1: of hashing, but takes an agreed upon number that both 138 00:07:58,200 --> 00:08:01,200 Speaker 1: the public and private key no, and it multiplies it 139 00:08:01,240 --> 00:08:05,120 Speaker 1: by a different number, and without anyone knowing what that 140 00:08:05,160 --> 00:08:07,480 Speaker 1: different number is. There's you know what what you end 141 00:08:07,520 --> 00:08:09,760 Speaker 1: up with is the product of those two numbers. UM. 142 00:08:09,800 --> 00:08:12,640 Speaker 1: If you don't know the identity of either of the 143 00:08:13,520 --> 00:08:18,200 Speaker 1: two factors that went into making this product. UM, that's 144 00:08:18,240 --> 00:08:20,240 Speaker 1: where the encryption comes in. You have to be able 145 00:08:20,280 --> 00:08:24,040 Speaker 1: to say, hey, this number was arrived at by multiplying 146 00:08:24,520 --> 00:08:27,680 Speaker 1: this number by this number. I'm the right person, let 147 00:08:27,680 --> 00:08:31,119 Speaker 1: me see that information. UM. That kind of plays into 148 00:08:31,640 --> 00:08:35,520 Speaker 1: r s A encryption, which is uh the idea that 149 00:08:35,640 --> 00:08:40,800 Speaker 1: computers are really really bad at figuring out uh, the 150 00:08:40,880 --> 00:08:44,080 Speaker 1: factors of a very very very very large number. We're 151 00:08:44,080 --> 00:08:46,319 Speaker 1: talking about a hundred and twenty eight bit number, so 152 00:08:46,640 --> 00:08:51,360 Speaker 1: uh uh this is this is a very large figure 153 00:08:51,400 --> 00:08:56,160 Speaker 1: that that you have to take into account. So the 154 00:08:57,160 --> 00:08:58,720 Speaker 1: what a computer has to do is it has to 155 00:08:58,760 --> 00:09:01,160 Speaker 1: go through and try and figure each of those factors, 156 00:09:01,200 --> 00:09:04,120 Speaker 1: finding the largest prime numbers that that factored together to 157 00:09:04,120 --> 00:09:08,079 Speaker 1: to make this uh product um and computers take can 158 00:09:08,080 --> 00:09:10,880 Speaker 1: take millions and millions of years to do this with 159 00:09:11,240 --> 00:09:15,040 Speaker 1: a really really large number. Uh. In fact, the only 160 00:09:15,200 --> 00:09:19,760 Speaker 1: real way of of cracking it right now, at least 161 00:09:19,760 --> 00:09:22,640 Speaker 1: as far as people are theorizing, is to create a 162 00:09:22,720 --> 00:09:29,240 Speaker 1: quantum computer. Yeah. Quantum computers operate on a much different level. Yeah, 163 00:09:29,320 --> 00:09:33,160 Speaker 1: it's it's kind of a mysterious, magical level almost because 164 00:09:33,520 --> 00:09:37,240 Speaker 1: you may know that the classic computers operate by looking 165 00:09:37,280 --> 00:09:39,400 Speaker 1: at bits, so it's either a zero or it's a one, 166 00:09:39,520 --> 00:09:42,400 Speaker 1: But with quantum computers it's a little bit more bizarre. 167 00:09:42,520 --> 00:09:44,800 Speaker 1: It can be both a zero and a one, or 168 00:09:44,840 --> 00:09:48,240 Speaker 1: a zero or a one or anything in between, which 169 00:09:48,280 --> 00:09:51,240 Speaker 1: is kind of hard to get your mind wrapped around, 170 00:09:51,640 --> 00:09:55,880 Speaker 1: and quantum computers have uh the potential of being able 171 00:09:55,920 --> 00:09:58,959 Speaker 1: to crack this really hard encryption. It's through the use 172 00:09:59,000 --> 00:10:02,960 Speaker 1: of something called s wars algorithm UM, and it's a 173 00:10:03,080 --> 00:10:07,320 Speaker 1: really really complicated, complicated process. It's it's really hard to 174 00:10:07,360 --> 00:10:10,440 Speaker 1: explain in layman's terms, so we won't really get into 175 00:10:10,440 --> 00:10:13,520 Speaker 1: it here because I'm not a mathematician and I'm sure 176 00:10:13,520 --> 00:10:18,120 Speaker 1: i'd stumble along the way. But it's it's because quantum 177 00:10:18,120 --> 00:10:20,959 Speaker 1: computers are not actually viable right now. We can't really 178 00:10:20,960 --> 00:10:24,880 Speaker 1: make a stable quantum computer of any significant size. It's 179 00:10:24,920 --> 00:10:28,280 Speaker 1: something to worry about, but it's further down the road, right, 180 00:10:28,320 --> 00:10:31,400 Speaker 1: So it's very unlikely that you're going to have to 181 00:10:31,440 --> 00:10:35,079 Speaker 1: worry if you come up with a reasonable uh level 182 00:10:35,080 --> 00:10:38,280 Speaker 1: of encryption on your computer that it's you know, nothing's 183 00:10:38,320 --> 00:10:41,920 Speaker 1: going to be able to hack it easily, right, you know. 184 00:10:41,960 --> 00:10:44,200 Speaker 1: But the more complex you can make your passwords, the 185 00:10:44,240 --> 00:10:47,840 Speaker 1: more involved you can you can get your encryption. If 186 00:10:47,840 --> 00:10:50,520 Speaker 1: you could take it up to or even two six 187 00:10:50,600 --> 00:10:54,319 Speaker 1: bit encryption, it's just going to take a computer longer 188 00:10:54,360 --> 00:10:58,160 Speaker 1: to try to break the code and decrypt your messages 189 00:10:58,480 --> 00:11:01,440 Speaker 1: or you know, get into your file else. So you 190 00:11:01,480 --> 00:11:04,079 Speaker 1: know that that if you can take the steps necessary, 191 00:11:04,120 --> 00:11:06,680 Speaker 1: you can make sure that your your private information is 192 00:11:06,720 --> 00:11:09,760 Speaker 1: more private. Of course, that doesn't really help when you're 193 00:11:09,880 --> 00:11:12,640 Speaker 1: talking about someone else's network, like you know, your local 194 00:11:12,640 --> 00:11:15,760 Speaker 1: mall the wireless networks that they used to to get 195 00:11:15,760 --> 00:11:17,720 Speaker 1: that information. Yeah, it kind of brings us back to 196 00:11:17,760 --> 00:11:19,880 Speaker 1: the story we were talking about at the beginning. So 197 00:11:19,920 --> 00:11:23,040 Speaker 1: how did these guys managed to crack this encryption? Well, 198 00:11:23,080 --> 00:11:26,800 Speaker 1: we don't really know right now, but the one theory 199 00:11:26,840 --> 00:11:29,360 Speaker 1: is that they actually managed to get hold of the 200 00:11:29,480 --> 00:11:33,800 Speaker 1: key that unlocks this information. That they did not actually 201 00:11:34,120 --> 00:11:38,240 Speaker 1: decrypt it through some sort of complex hacking system. They 202 00:11:38,280 --> 00:11:42,240 Speaker 1: just managed to get hold of that special dacoder ring. Um. 203 00:11:42,320 --> 00:11:45,680 Speaker 1: So if that's the case, then encryption is not nearly 204 00:11:45,720 --> 00:11:49,800 Speaker 1: as badly off as as we would think Otherwise, If, however, 205 00:11:49,840 --> 00:11:53,600 Speaker 1: they found a way to decrypt that themselves without the key, 206 00:11:53,640 --> 00:11:56,839 Speaker 1: that's something to really really start to freak out about. 207 00:11:56,920 --> 00:12:01,080 Speaker 1: I think we all have things to think about, like say, 208 00:12:01,200 --> 00:12:03,160 Speaker 1: what's the best site to buy a new leather jacket, 209 00:12:03,640 --> 00:12:06,679 Speaker 1: whether to buy the three or six megapixel cameras. But 210 00:12:06,800 --> 00:12:09,800 Speaker 1: thankfully we don't need to think about online fraud because 211 00:12:09,840 --> 00:12:12,400 Speaker 1: for every purchase you make. Visa keeps an eye out 212 00:12:12,440 --> 00:12:16,040 Speaker 1: for fraud with real time fraud monitoring and by making 213 00:12:16,040 --> 00:12:19,480 Speaker 1: sure you're not liable for any unauthorized purchases. How's that 214 00:12:19,559 --> 00:12:25,680 Speaker 1: for peace of mind, safe secure Visa. Yeah, the authorities 215 00:12:25,720 --> 00:12:29,040 Speaker 1: in the article I read in an MSNBC said that, 216 00:12:30,280 --> 00:12:31,959 Speaker 1: you know, there really wasn't any reason to worry. It 217 00:12:32,000 --> 00:12:34,719 Speaker 1: didn't appear like this is a widespread phenomenon, and then 218 00:12:34,760 --> 00:12:38,760 Speaker 1: not sure that that it actually happened the way that 219 00:12:39,040 --> 00:12:42,319 Speaker 1: they think that it may have happened. But if if 220 00:12:42,360 --> 00:12:45,160 Speaker 1: these uh, these hackers were able to figure this out, 221 00:12:45,920 --> 00:12:47,559 Speaker 1: you know, we may be moving on to a new 222 00:12:47,600 --> 00:12:50,839 Speaker 1: standard in encryption in a very short time. Yeah. Nothing 223 00:12:50,880 --> 00:12:54,400 Speaker 1: like nothing like impending doom to really get you get 224 00:12:54,400 --> 00:12:57,000 Speaker 1: the gears running right right. Well, I guess that's about 225 00:12:57,040 --> 00:12:59,720 Speaker 1: all we have right now for encryption. But if you'd 226 00:12:59,760 --> 00:13:02,880 Speaker 1: like to learn more, you can read how encryption works 227 00:13:02,960 --> 00:13:05,480 Speaker 1: at how stuff works dot com and we'll talk to 228 00:13:05,480 --> 00:13:09,320 Speaker 1: you again soon. Let us know what you think. Send 229 00:13:09,320 --> 00:13:15,720 Speaker 1: an email to podcast at how stuff works dot com. 230 00:13:15,800 --> 00:13:18,400 Speaker 1: Brought to you by the reinvented two thousand twelve camera. 231 00:13:18,679 --> 00:13:19,880 Speaker 1: It's ready, are you