Yeah, I've worked in one secure facility and the data center's access code was... 4 4 4 4 ... And I even have naked pictures of myself inside that data center. *Never* hire artists as your system administrators with Active Directory forest administrator privileges! We know how to get _creative_ inside secure facilities.
@@Humongous_Pig_Benis And then you went to another secure facility; the Abu Ghraib prison in Iraq and posted some nudity pics with some inmates to humiliate?
@@tomasdubravsky4851 i am sure the security inside will be just spectating you break in. Also don't forget the datacenter walls are all reinforced rebar fiber mixed concrete. Not just any "big Boom" will make a hole. Plus it's a registered secure facility. Any breach will activate deployment of literal SWAT from nearby police station.
its actually the google employee that is the spy(like snowden who are assign in dell in japan) so they can getaway with it without any door, just a letter from upper layer so they can access it physically.
I've done work inside these types of data centers. Going through the 5-6 layers of security takes about 45 minutes. It's called "commuting in/out". I've worked on the data floor and in the destruction room. I've also worked in the modular date pods that are often out back of these facilities. It's critical infrastructure. Can't be done for less.
@@madartzgraphics2019 I pay $5/mo for Google Drive. Yeah, it adds up... but I trust their dedication to full-time security, both on the premises and in the cloud, more than anything. That's why I use a Pixel phone, with all its helpful features like Night Sight, Lens, Translate, Live Captions, Live Transcribe, Sound Notifications, Sound Amplifier, and more... and yeah I put up with the Pixel bugs, I admit... they harvest information, but I suppose it's a fair trade-off for the huge advancements in technology thanks to the brilliant engineers that are employed at Google.
There are probably 4-6 billion googlers so 6000000000/1500000 is smaller than 1% so they are correct My googler number is probably far fetched but it is still less than 1 percent even if the number was 2 billion
I've gone to a Google data center in Atlanta. That one was interesting. Had similar features but one that stood out was, instead of an iris scanner they had a wrist scanner that scanned your veins since your veins are also different from one person to the other.
They're not the same! RIP THEM OUT RIP THEM OUT RIP THEM OUT RIP THEM OUT RIP THEM OUT RIP THEM OUT RIP THEM OUT RIP THEM OUT RIP THEM OUT RIP THEM OUT RIP THEM OUT RIP THEM OUT RIP THEM OUT RIP THEM OUT RIP THEM OUT RIP THEM OUT RIP THEM OUT RIP THEM OUT RIP THEM OUT RIP THEM OUT RIP THEM OUT RIP THEM OUT RIP THEM OUT RIP THEM OUT v RIP THEM OUT RIP THEM OUT RIP THEM OUT RIP THEM OUT RIP THEM OUT RIP THEM OUT RIP THEM OUT RIP THEM OUT RIP THEM OUT RIP THEM OUT RIP THEM OUT RIP THEM OUT RIP THEM OUT RIP THEM OUT RIP THEM OUT RIP THEM OUT
They wouldn't want to say their Software protocols because it would expose a lot. Heck, Amazon doesn't even let a single Picture of their Datacenter in the internet.
In computer science saying "using locked doors in your data storage room" is a valid answer to "name x ways to keep your data secure", and I always thought this was the freest one point you could get on the paper but I see it's important
Of course, there are measures not shown here, but the cool part about security is you don't need to hide it. Obfuscation is not security. If you rely on hiding information to maintain security, you aren't secure. Security is how you keep information secret, not the other way around. That being said, the more information you hide, the harder it is for attackers to find it. It serves as a stalling technique. So you're probably right in that a lot of specifics are hidden. Namely, camera make and models, aerial views of the area, number of guards on duty, schedules, software used, contractor names, etc etc. Things that would give an attacker angles to try. However, if the security can be toppled by any of that information being leaked, then all of that security is useless and they're doing it wrong.
Knowing NSA and CIA they probably didnt ask for it but straight out sent their best agents to try to infiltrate the security for fun. But it's all fun and games until somebody gets shot...
Bruh , thank you so much , I would never be able to navigate the video without your specific comment. OMG this comment is so useful GOD ITS AMAZING .... thank you so much for your contribution to the world by giving us this staggering and powerful information.
@@Dudeinfire99 Yeah I know, but kinda wanted it to be some hi tech thingy, like a nuke which will explode if even one security test is wrong, and hypercompress into the room only, so as to not destroy everything, but only the guys breaking in.
yep it sucks its in their t&a and its also automatically uploaded with your G account once you sign into it on a new android device, since you cant use the phone w/o signing into google first which sucks a lot :( luckily you can disable it
@@SVENY i dont really think there is much of a choice -- google is the Big Browser of the web, its kinda hard to avoid, especially if youre an android user since google requires you to sign into your account on a fresh startup of an android device in order to use it plus 1ups_ implied they disabled that feature, and its happened to me too that google re-enables a feature that you had previously turned off sometimes
@Anton Babani And what exactly do you think that those corps do with your data ? Has anything bad happened to any of your information ? No? And even if it did if you are not a terrorist or a predator you have almost nothing to worry about cuz data leaks have happened and nothing horrible happened for exemple when Facebook has been cought with selling data. Of course it would be awesome to have completely secure data but most people don't need it let's be serios. And the gov doesn't need data from google to know everything about you, they have your id, your driving licence and other stuff like that.
how to break in through the security: layer 1 - it's a standard fence. All you need is a blow torch and enough fuel. layer 2 - you need to break the cameras and then you once again need a powerful blowtorch or two ladders. one for each side. And also someone to guard the ladder. layer 3 and 4 - You need an explosive to get inside. You can look up how to make a bomb. You can use a mine or a fuel can too, basically anything that makes a large enough boom. Also you will need a weapon, firearm is a best option but a melee weapon is also needed. layer 5 - beat your way through and break the doors open. Once again a homemade explosive is best. layer 6 - if you beat your way through the metal detector is useless. Now you can do whatever you want. You just have to deal with cops. If you want to steal something. Go ahead, just make sure you can escape. Thus having more people for the operation is a very good option.
You're only seeing the surface layer of an extremely complex and secure multi layer access control system. Trust me, these data centers are more secure than a lot of military instillations minus the kinetic response. -senior access control and security tech
a random company: "We have a trillion dollars locked in this room, but everything in the room will instantly kill you, so don't even try to break in because we don't want to clean up a corpse." Martin Dooley: "FOOLS!!!!1!!1! WHY DID YOU TELL THE BAD GUYS HOW YOUR SECURITY WORKS???!?!?1? DO YOU WANT YOUR MONEY TO BE STOLEN??!!!???"
If you believe they only have 6 layers goodluck😂😂 there is another 3 that is not allowed to be shown... that is where A.I military security is. Give it a go
@@noobmaster8731 Because it's completely retarded to expose publicly your security features like this. It would compromise the layers altogether. There is OBVIOUSLY much more than this, and we could even assume some of what's in there is not true.
@@asanokatana It is, this is a whole Datacenter, not specifically for Google Cloud/ Cloud platform. I bet all products including Gmail, UA-cam all live here.
i also forgot password and didn't had a phone number integrated with it as backup. i think it's the time to go in person to Google data centre to retrieve and change my password
@@christosnicolaides4816 its not as bad as people make it seem, they just want to optimize advertising to increase efficiency, most people think its some sexual predator who wants to know who to target or something, idk im not a tinfoil hat wearer
data sored in these server farms are safe as theyare encrypted by user ..google takes our data that we agreed in i agree box..which ovisouly we dont read all we tick i agree right away...so its our own fault that they have our data
You do know that these google employees also use the services, right? That means all their search history is also stored in these servers. A big company like google who has a big target on it would never try to break a law or allow their services to be easily accessible. The same can be said about banks, you store money there, yet how private is it really? Honestly i don't understand all the need to not trust something. You go to a supermarket and buy vegetables and meat, you trust it. But according to this logic you should only eat what you grow yourself. Sooo, build your own search engine? Bye.
Money is their number one priority. Nothing wrong with that, all companies need to make money. If they did have data breaches, people wouldn't host with them so that's what makes security part of the number one priority. And imo there's nothing wrong with that.
Google should make an ad where Tom Cruise fails to break into the Google data centre , as one of his Mission impossible missions ! I mean if not Google then who else would have such a badass advert !!
@@roejogan1759 Nope. You havent seen ads promoting awareness?? Advertisement is just a mean to promote or spread awareness about anything. In this instance, Google's security.
It's not, Google is very cozy with the CIA, FBI and NSA. Google is a big contractor and they are not gonna give that up. Google has an internal CIA version that powers the search within the CIA.
This kind of sentiment and blind trust is exactly what makes it insecure. At the end of the day, a security system is only as secure as its weakest link. As far as can be seen here, the data center is still heavily reliant on human beings for security and human beings are always the weakest link regardless how careful they are.
@@poiiihy well your data isnt stored in only one place but there are copies of it spread around multiple data centers because of redundancy if somethink breaks
*Google* : and we do this because protecting the privacy and the security of our users' data is our highest priority. *also Google* : ***sells that data to advertisers***
They do not. There are just random comments like you that perpetuate the myth that they do, and of course, these claims are never substantiated. Please stop spreading false statements. You seriously think Google is going to sell the contents of your Google Drive folder ? lol
@@DeviloftheHelll can you define exactly what you are saying Google is selling? Something like “John Doe goes to this, this and this website”? Because I doubt it’s even what’s happening… I used Google advertising before and as an advertiser I had no way to buy such data
@@werge1 Data is very confidential here and even DTs working on servers don’t know what’s being stored on any hard drives, etc. But, most of our servers are either running customer jobs or helping support UA-cam, gmail, and stuff like that.
I've been into a few DCs, how do they comply with emergency egress rules while also maintaining 5 layers of security? That said, the easiest breach always involves coercing someone already on the inside legitimately.
how to break in through the security: layer 1 - it's a standard fence. All you need is a blow torch and enough fuel. layer 2 - you need to break the cameras and then you once again need a powerful blowtorch or two ladders. one for each side. And also someone to guard the ladder. layer 3 and 4 - You need an explosive to get inside. You can look up how to make a bomb. You can use a mine or a fuel can too, basically anything that makes a large enough boom. Also you will need a weapon, firearm is a best option but a melee weapon is also needed. layer 5 - beat your way through and break the doors open. Once again a homemade explosive is best. layer 6 - if you beat your way through the metal detector is useless. Now you can do whatever you want. You just have to deal with cops. If you want to steal something. Go ahead, just make sure you can escape. Thus having more people for the operation is a very good option.
As a Google DC employee, I can say we go through a lengthy background check process and an in-depth interview process that verifies we are right to work in the environment. We take security measures and data security measures very seriously.
Any vetting processing generally speaking is not something is publicised and it's a controlled process where you don't want employees to know what to expect
Take a quick look at the metal detector at the end of the video. Those six layers are so secure that if you are an intern making a short promo, they just let you through with a positive metal detection! Awesome!
Are you referring to the red hand ? If yes it is NOT a positive metal detection, it just says that the detector detected someone and is telling the person behind not to move forward. And also Stephanie is not an intern.
how to break in through the security: layer 1 - it's a standard fence. All you need is a blow torch and enough fuel. layer 2 - you need to break the cameras and then you once again need a powerful blowtorch or two ladders. one for each side. And also someone to guard the ladder. layer 3 and 4 - You need an explosive to get inside. You can look up how to make a bomb. You can use a mine or a fuel can too, basically anything that makes a large enough boom. Also you will need a weapon, firearm is a best option but a melee weapon is also needed. layer 5 - beat your way through and break the doors open. Once again a homemade explosive is best. layer 6 - if you beat your way through the metal detector is useless. Now you can do whatever you want. You just have to deal with cops. If you want to steal something. Go ahead, just make sure you can escape. Thus having more people for the operation is a very good option.
@@Comedy_Goldan unarmored guard with a pistol won’t do much to multiple armored thieves with automatic weapons and explosives and will most likely surrender
@@tl3139: Why? Because it's the most physically secure environment? That only means you need to be dependable. Being dependable isn't what generates the big bucks. :)
@@stewttv: I don't understand. It's fairly common for janitors to be in the basement and that they're don't receive the highest salaries in the corporation that they work for.
Get $300 and start running workloads for free → goo.gle/3iGFAKy
Hello google!
not free :(
Wow google it's cool
that looks sweet but i dont have the time since i think we are all in a time crunch for work atm.
From joke comment to offical comment
Google: Only engineers are allowed to go in
Cameraman: U can't stop me
Cameramen : I just switched my job !
Trust me, I'm an engineer.
Cameraman: you can't see me
Theif- i just transform into cameraman
😂😂😂
Google : *has 6 layer security
Hacker in movie : I'm in
Google employees: Impossible.png
you forgot about the part where they randomly type things
@@coolname92 *randomly type things* Hacker: Got it, im inside
I've created a gap of exactly 36 seconds, long enough for you to make an epic exit just by it
Hacker Protagonist with Potato PC: I'm gonna end this whole man's career
Do you think that Tom Cruise would make a scene which involves breaking in to Google data center? LOL
Little does he know our data centers are battle-tested to defend against our biggest threat - Tom Cruise 😂
@@stephaniewong142 super bowl commercial 2021??
Mision imposible 9
that would be the next MI movie scene 😂
@@stephaniewong142 did you know that if you put your password here everyone see asterisks except you?
This is my password: ********
This is a good example of physical security as well as authorization. I've worked in secure facilities, but never of this scale; it's truly immense.
Yeah, I've worked in one secure facility and the data center's access code was... 4 4 4 4 ... And I even have naked pictures of myself inside that data center. *Never* hire artists as your system administrators with Active Directory forest administrator privileges! We know how to get _creative_ inside secure facilities.
Mñm.
@@Humongous_Pig_Benis And then you went to another secure facility; the Abu Ghraib prison in Iraq and posted some nudity pics with some inmates to humiliate?
@@tomasdubravsky4851 i am sure the security inside will be just spectating you break in. Also don't forget the datacenter walls are all reinforced rebar fiber mixed concrete. Not just any "big Boom" will make a hole. Plus it's a registered secure facility. Any breach will activate deployment of literal SWAT from nearby police station.
the biggest threat here is google themselves they dont have a good track record of data security
Government: give me the data
Google: there you go
I would love to see it in mission Impossible 101
Darshan Sreenath just go work for NSA, and yes, it’s still there
Google: But make proper law about it first and make it publicly known.
@@AndreDing11 Mission impossible would be HUMINT so it is actually CIA. NSA is SIGINT.
they dont even have access to the data! there is a lot of encryption going on('' ... '')
Building: **Caught on fire*
System: *oNe pErsOn At thE tImE pls..*
lmao
underrated
Seriously underrated 😂😂
Schools: *WRITE THAT DOWN!*
UNDERRATED
Google Automated Gun Turret™ - Early Access - Coming Soon...
😆
😂😂😂 I was thinking the same thing + autopilot drone petrol
You joke, but Samsung already makes this to protect the DMZ between N. Korea and S. Korea.
en.wikipedia.org/wiki/SGR-A1
FN Herstal have been making these for years... www.fnherstal.com/products/remote-weapon-stations
Military has really good programmers too
Layer 1: Armed Guards
Layer 2: Armed Guards
Layer 3: Armed Guards
Layer 4: Armed Guards
Layer 5: Armed Guards
Layer 6: Receptionist
imagine breaking through all 6 layers but then realizing you don't know how to hack computers
Well, if u can hack u don't need to break in and if you're in you don't need to hack u just grab the hard drives lol😂
@William Shakespeare Hey what are you doing here? Wait is time travel possible or something 😂😂😂
@@PrathamInCloud 🤣🤣🤣
The REPLY SECTION 😂😂🤣🤣🤣
Paul Müller they’re all encrypted.
NSA: "Thanks but we are gonna use the back door"
nah they have their own private door
@@malxumx9727 Like in AT&T building (Room 641A).
was about to post that too lol
its actually the google employee that is the spy(like snowden who are assign in dell in japan) so they can getaway with it without any door, just a letter from upper layer so they can access it physically.
@@malxumx9727 I used "back door" as a reference to private server access, not only the physical door on the back :)
Google: Shows off their security
Bad Guys: write that down, WRITE THAT DOWN
Charles the French
Its not that easy man! Only looks cool in #Hollywood Movies.
@@mcoyid yeah
It could be still easy to hack in no need to a spy there enough to infect 1 phone to connect crash the all.
@@orion9590 10 year olds over here thinking they know alot about technology from what they saw. It COULDNT be still easy
I've done work inside these types of data centers. Going through the 5-6 layers of security takes about 45 minutes. It's called "commuting in/out". I've worked on the data floor and in the destruction room. I've also worked in the modular date pods that are often out back of these facilities. It's critical infrastructure. Can't be done for less.
Inb4 Severance 😂
jesus christ 45 freakin minutes just to pass through? Ok, I'll sub for Google Drive now 😂
@@madartzgraphics2019 Google drive is a good option. Data security is an extremely high priority!
@@madartzgraphics2019 I pay $5/mo for Google Drive. Yeah, it adds up... but I trust their dedication to full-time security, both on the premises and in the cloud, more than anything. That's why I use a Pixel phone, with all its helpful features like Night Sight, Lens, Translate, Live Captions, Live Transcribe, Sound Notifications, Sound Amplifier, and more... and yeah I put up with the Pixel bugs, I admit... they harvest information, but I suppose it's a fair trade-off for the huge advancements in technology thanks to the brilliant engineers that are employed at Google.
Do you at least get to clock in when you begin the commute? Lol
" less than 1% of googlers get to see this place. its very secure and private"
1.5M people who viewed this:
Under-Rated
Probably only surface lvl we seeing
There are probably 4-6 billion googlers so 6000000000/1500000 is smaller than 1% so they are correct
My googler number is probably far fetched but it is still less than 1 percent even if the number was 2 billion
she said less than 1% of googlers get to SET FOOT in this place
@@ROY-mh7qy llo__oll
mmm yes 6 layers of security so only we can sell your data
Truee
Haha
It just crashed a month ago
incoming: duping on Google Data Center server
They don't sell your data, they just use it for targeted ads.
"Now, How do I get out of here?" - Journalist's last words
Underrated 😂
Yeah google maps didnt work
You don't
@@shubham_the__legend *can you all just stop commenting "UnDeRrAtEd" that's not even a joke now it's actually rated comment*
They didn't show the people shredder in Layer 6
I've gone to a Google data center in Atlanta. That one was interesting. Had similar features but one that stood out was, instead of an iris scanner they had a wrist scanner that scanned your veins since your veins are also different from one person to the other.
They're not the same! RIP THEM OUT RIP THEM OUT RIP THEM OUT RIP THEM OUT RIP THEM OUT RIP THEM OUT RIP THEM OUT RIP THEM OUT RIP THEM OUT RIP THEM OUT RIP THEM OUT RIP THEM OUT RIP THEM OUT RIP THEM OUT RIP THEM OUT RIP THEM OUT RIP THEM OUT RIP THEM OUT RIP THEM OUT RIP THEM OUT RIP THEM OUT RIP THEM OUT RIP THEM OUT RIP THEM OUT v RIP THEM OUT RIP THEM OUT RIP THEM OUT RIP THEM OUT RIP THEM OUT RIP THEM OUT RIP THEM OUT RIP THEM OUT RIP THEM OUT RIP THEM OUT RIP THEM OUT RIP THEM OUT RIP THEM OUT RIP THEM OUT RIP THEM OUT RIP THEM OUT
@@Sierra216 you what, now?
wtf is that true ?
@@Yo-vv7iy yeah. Everyone’s vein pattern is different like your fingerprint or eye. So you can use your veins for identification too. Google is weird
@@christaylor3604 "google is weird"
Yeah espiecelly when we are talking about pretty much every single human made data store areas
They are so weird
I thought it was 6 layer deep in "Digital Security", would love to see that.
I think they might have to cut a lot cause hackers can learn about the digital security of Google but would love to see it anyways
They wouldn't want to say their Software protocols because it would expose a lot. Heck, Amazon doesn't even let a single Picture of their Datacenter in the internet.
Just set 6 firewalls in your G Cloud console xD
That's what I thought
Google: We have 6 layers of security at our data center
NSA: I want all your data
Google: Ok
no
Since 2013 Edward Snowden we know the truth, thats why many people use for emails for example protonmail service ;)
ua-cam.com/video/fs7h7O6xGUI/v-deo.html
Not even close
600th like!!!!
Mr. Robot and ECorp Vibes intensifies.
Lol exactly what I was thinking, there's probably real life Elliots out there just thinking "how can I break into this?"
A Raspberry Pi wouldn’t destroy Google’s data center though...
Reminds me Elliott and his darline stealing data .
Hello Friend
@@deidara_8598 Probably very easy.Just find out something about someone that works with servers,and that's your "in" point. True mr.robot style. :)
In computer science saying "using locked doors in your data storage room" is a valid answer to "name x ways to keep your data secure", and I always thought this was the freest one point you could get on the paper but I see it's important
Rule 1 of security measures: Don't tell people about the security measures.
I’m sure they have more they can’t tell but this is basically just a video saying don’t try
They didnt told all
Bear mobail security app. and earn money
@@casualalt7869 even if they dont, this is pretty much enough to shun away people
Rule 2, USA: stop that
If they are showing us all these then it means they have either modified all these or there are much more security than they actually show here.
True
Or less (probably not)
Yes, you are right.
Of course, there are measures not shown here, but the cool part about security is you don't need to hide it.
Obfuscation is not security. If you rely on hiding information to maintain security, you aren't secure. Security is how you keep information secret, not the other way around.
That being said, the more information you hide, the harder it is for attackers to find it. It serves as a stalling technique. So you're probably right in that a lot of specifics are hidden. Namely, camera make and models, aerial views of the area, number of guards on duty, schedules, software used, contractor names, etc etc. Things that would give an attacker angles to try. However, if the security can be toppled by any of that information being leaked, then all of that security is useless and they're doing it wrong.
Security through obscurity is a pretty bad idea
1:41 The fence tech is the coolest part of the video.
NSA: You're cute. Give me the data and also don't tell anyone.
Google: Sir, yes sir!
Knowing NSA and CIA they probably didnt ask for it but straight out sent their best agents to try to infiltrate the security for fun. But it's all fun and games until somebody gets shot...
Also is there a drive thru for the poor guys?
Fk the govt
@@ThunderBlastvideo I'd like to see you actually managing a country then
@Extys -
Thats why you dont open data centers in USA (same for Russia)
Security Layer Timestamp
0:31 Layer 1: Signage and Fencing
0:59 Layer 2: Secure Perimeter
2:07 Layer 3: Building Access
3:02 Layer 4: Security Operations Center
3:40 Layer 5: Data Center Floor
4:31 Layer 6: Secure Hard Drive Destruction
5:15 Extra Security
🤣❤️
Thx
Bruh , thank you so much , I would never be able to navigate the video without your specific comment. OMG this comment is so useful
GOD ITS AMAZING ....
thank you so much for your contribution to the world by giving us this staggering and powerful information.
@@kostasdrakakis8386 🤨
Thanks
Jokes on them now I know everything about their security
That's what they want you to think.
@@muslimtochrist4727 exactly
@@muslimtochrist4727 What if they want you to think that
You just think that you know.. But not at all. They know more than you about yourself
"Hi Stefanie how are you?" reply: "so i just passed the main gate"
"6 Layers of security: only the best for protecting the information we gather about you"
6 layers of security: exists
Movie hackers: Im 6 parallel universes in front of you
"two gigabytes of ram should do it"
@@robotomachina I was about to say that lol
@@robotomachina and some cool graphics
@@robotomachina "disable the firewall by accessing the wifi through ethernet and......... I'm in"
not even funny at all. shut up
That's a mission for Ethan Hunt!
Hunt: Impossible!
first reply
Ooh a verified guy
Urgh, cringe af
HI
Your mission , should you choose to accept it .
3:22 damn first time ive ever seen someone use the windows cursor trail
lol someone tell Microsoft😂
ua-cam.com/video/hiLlNzxDfAg/v-deo.html
@@johannespettersen Ive watched the video today and did not see that LOL thats funny
Maybe the screen just has a horrible pixel update time? I have a really hard time believing someone would actually turn that thing on.
@@Omlet221 but then the playback of the security cameras would be equally as bad, but its not
Glad to see my “Hello Word “ app sitting in such a secure environment
Me: Sees five fantastic security layers, and thinks that the 6th layer will be the best for sure.
The sixth layer: Crusher.
Me : 😑
... the 7th layer should be an nuke just like in the "Stargate SG1" series ;) LOL
The sixth layer is actually very crucial, cuz old disks can be easily exploited. So they have to destroy their disks.
I'm confused why they didn't show a degausser. Every data center megnetically wipes the data with one before shredding it.
@@Dudeinfire99
Yeah I know, but kinda wanted it to be some hi tech thingy, like a nuke which will explode if even one security test is wrong, and hypercompress into the room only, so as to not destroy everything, but only the guys breaking in.
@@TheRandomizerYT xD
wow, they are 6 different layers of security but none of them can remember that I didn't wanted Google photo to store my photos on their cloud
sorry man but you agreed to the terms of service when you created your account...
yep it sucks its in their t&a and its also automatically uploaded with your G account once you sign into it on a new android device, since you cant use the phone w/o signing into google first which sucks a lot :(
luckily you can disable it
@@SVENY i dont really think there is much of a choice -- google is the Big Browser of the web, its kinda hard to avoid, especially if youre an android user since google requires you to sign into your account on a fresh startup of an android device in order to use it
plus 1ups_ implied they disabled that feature, and its happened to me too that google re-enables a feature that you had previously turned off sometimes
Terms and conditions: exist
User: agrees
Terms and conditions: ok
User: :(
they use "6 layers of security" only to hide themselves from people at what they're doing with our data
Just one government order and boom, all passed
Truth
You're a fool to think the government doesn't have access to the vast majority of the data stored here.
@@D1zZit They buy their way in
@Anton Babani And what exactly do you think that those corps do with your data ? Has anything bad happened to any of your information ? No? And even if it did if you are not a terrorist or a predator you have almost nothing to worry about cuz data leaks have happened and nothing horrible happened for exemple when Facebook has been cought with selling data.
Of course it would be awesome to have completely secure data but most people don't need it let's be serios. And the gov doesn't need data from google to know everything about you, they have your id, your driving licence and other stuff like that.
presplay_03 《》 dude that’s not an argument, my privacy should be protected, under the law it should be protected, that’s such a weak argument.
*Thanks for the information*
This would really help m-
"Hi guys, this is the lock picking lawyer"
"Nothing on number 1, 2, 3, 4, 5...six is binding" "i am in"
"click out of 1...feels set"
*voice behind the last layer*
Me trying to learn how to implement solid security in my app
"We have got anti-climb fence"
with fibers duh
in this sense my school has better security.
@@NoobMaster-ub5ls You might think that, some ordinary looking fences can withstand even a fully loaded truck crashing into it at high speed
@@sitte24 and it even tells of the truck is loaded or not
Google Data Center: 6 Layers Deep
Elliot Alderson: Hello Friend!
You should google me 😳
Also Elliot : I'm Sam Sepiol
this was so educational! I didn't even know data centers even existed and the level of security is very impressive!
how to break in through the security:
layer 1 - it's a standard fence. All you need is a blow torch and enough fuel.
layer 2 - you need to break the cameras and then you once again need a powerful blowtorch or two ladders. one for each side. And also someone to guard the ladder.
layer 3 and 4 - You need an explosive to get inside. You can look up how to make a bomb. You can use a mine or a fuel can too, basically anything that makes a large enough boom. Also you will need a weapon, firearm is a best option but a melee weapon is also needed.
layer 5 - beat your way through and break the doors open. Once again a homemade explosive is best.
layer 6 - if you beat your way through the metal detector is useless.
Now you can do whatever you want. You just have to deal with cops. If you want to steal something. Go ahead, just make sure you can escape. Thus having more people for the operation is a very good option.
@@tomasdubravsky4851good luck bro
Gerardo took the word ‘cloud’ literally 😜
@@tomasdubravsky4851and after all that, you find that you can't even read it use the data anyway cause its encrypted. LOL
@@enadegheeghaghe6369i told you how to get in. Not what to do once you're in. That's your problem
Nice to know that our memes are in good hands with all that security 😆
Most underrated comment in this video lmfao
Google Cloud is its own thing - this isn't where regular Google data (i.e. the search engine) is kept.
@@Communist-Doge But some social platforms probably have their data backed up with Google
discord is on google cloud platform
Sad thing is that they sell it to people for money lol
Google: Only engineers are allowed to go in
Cameraman: I'm John Cena
the camera can be used by an engineer aswell
@@pranjalmehtani8247 WAT DA ?!?!?!
@Pranjal Mehtani
Uno reverse 😂
@@pranjalmehtani8247 im outsmart your outsmarting classic
@@pranjalmehtani8247
Modern problem requires modren solution 😁😁😁😁
"as everybody has to go through a full metal detection..."
Cameraman: Oh no
Always a good idea to post a video online of the facility and how it "all works"... best way to protect sites is to tell people how you do it.
You're only seeing the surface layer of an extremely complex and secure multi layer access control system. Trust me, these data centers are more secure than a lot of military instillations minus the kinetic response.
-senior access control and security tech
a random company: "We have a trillion dollars locked in this room, but everything in the room will instantly kill you, so don't even try to break in because we don't want to clean up a corpse."
Martin Dooley: "FOOLS!!!!1!!1! WHY DID YOU TELL THE BAD GUYS HOW YOUR SECURITY WORKS???!?!?1? DO YOU WANT YOUR MONEY TO BE STOLEN??!!!???"
okay dude - why don't you just do that then.
@@_Aemse Because I'm not a criminal you bell end.
and yet the cameraman was able to break in using his powers...
Love these videos. It’s like giving a 3D tour for someone to make a detailed plan to break in
@@ne025 _cues MI theme song_
Watch Dogs 4
@@ryz8 the funny thing is that you would still fight against an evil corporation
Script for Money Heist 6 season.
If you believe they only have 6 layers goodluck😂😂 there is another 3 that is not allowed to be shown... that is where A.I military security is. Give it a go
this content is a honeypot
Why do you say that?
at least google wants us to think so XD
Why is a honeypot that video?
@@noobmaster8731 Because it's completely retarded to expose publicly your security features like this. It would compromise the layers altogether. There is OBVIOUSLY much more than this, and we could even assume some of what's in there is not true.
Duh
Googler: where's my old file?
Google: GONE, reduced to atoms.
Very smart to publish a video showing what your security systems at your data center look like. Congratulations, Google!
as if you even realized what you just saw goofy 💀💀
"6 layers of security"
Movies: "Cute."
Hacker: "Give me 5 minutes"
*opens Command Prompt*
*random typing, screen popping in and out, hacking intensifies*
Hacker: "I'm in"
@@aliffsuhaimi1466 Screw your 6 layers. This man did it in 5 minutes
Micheal Scofield "six what oh please"
So which part of the datacenter holds my browsing history?
All of it
It’s simple if you like Japanese it’s from Japan if you like latin it’s from latin
Huh, thought you'd be more interested in Apple.
@@asanokatana
It is, this is a whole Datacenter, not specifically for Google Cloud/ Cloud platform. I bet all products including Gmail, UA-cam all live here.
@@itsme_shibintmz 😂😂
GOOGLE : We have 6 layers of security!
GOVERNMENT: We need your data.
Google: oke
Gov"t dont need to ask twice
No give government data,nuklear data center
right? lmao world is too wacky now lmao s.o.s
also Google : we have encrypted data so we protecting the users privacy.
Government : we need your data
Google : OK
@Pierce Murphy haha that was a mistake
A very good example of security and authorization
Google: "We have 6 layers of security"
The guy with a computer from the 90s: "Heh"
Hello my uchiha said why mati what marah said hahahahhahahahaaa siapa really why?👊👊👊👊👊👿👿👿👿👿👿👿🔞🔞🔞🔞💔💔💔💔💔💔
Fast and furious next series breaking google cloud
Script can be easily ready for F&F13
They will hire Maksim Yakubets for that
I bet ya next Mission Impossible has already planned a scene before them :D
How to pass the google's security:
Kids 5y: Search on Google
I used Google to destroy Google!
I'm abusing my second account by going into dangerous websites.
Lol
@@mihirbiswas8884 thanos you are using Google with an secret identity.
@@mihirbiswas8884 🤣😂
Now appreciate all that ads you've skipped to your contribution of maintaining this facility.
How to break into Google:
Do a UA-cam video about security layers.
: Become goverment
When you forgot password and you came in person to google for change.
🤣🤣🤣🤣
i also forgot password and didn't had a phone number integrated with it as backup. i think it's the time to go in person to Google data centre to retrieve and change my password
If ads were honest Google edition:"Selling your data is our number one priority ".
Wait i used to believe that is facebook's job?
@@christosnicolaides4816 Well both are advertising companies, so they're both on the same level.
Rodger would be proud
@@christosnicolaides4816 its not as bad as people make it seem, they just want to optimize advertising to increase efficiency, most people think its some sexual predator who wants to know who to target or something, idk im not a tinfoil hat wearer
Thank goodness there is so much security. It is such an amazing service.
Google: we have six layers of security
and a hard disc shredder. Your data is safe here!
Some corporation: yo, can i buy some data?
Google: sure.
The Epic one. This should be pinned.
(Google, don't blacklist me. )
@@RoyBD How did you post the emoji? 😅
selling data is what they use these types of advertising for,
USA : Giv me ur data
Google: Ok
data sored in these server farms are safe as theyare encrypted by user ..google takes our data that we agreed in i agree box..which ovisouly we dont read all we tick i agree right away...so its our own fault that they have our data
The guy had me at “...and we do this because protecting the privacy and security of user’s data is our highest priority”. Hmm.
Well yeah, because you can't let others sell the same product you do
He aint lying, google is like the only big tech industry who has yet to leak user data. Even microsoft did it.
You do know that these google employees also use the services, right? That means all their search history is also stored in these servers. A big company like google who has a big target on it would never try to break a law or allow their services to be easily accessible. The same can be said about banks, you store money there, yet how private is it really?
Honestly i don't understand all the need to not trust something. You go to a supermarket and buy vegetables and meat, you trust it. But according to this logic you should only eat what you grow yourself.
Sooo, build your own search engine? Bye.
Money is their number one priority. Nothing wrong with that, all companies need to make money.
If they did have data breaches, people wouldn't host with them so that's what makes security part of the number one priority.
And imo there's nothing wrong with that.
@@Phantogram2 en.wikipedia.org/wiki/2018_Google_data_breach
3:21 that is the most high quality id card photo I have ever seen. Well done google.
...
That's only the picture... you haven't seen the badge yet.
look creepy the image
I love proprietary centralized technology!!!!! 😃😃
“Protected from those who not pay”
Mission impossible music should be in background.
was thinking of the same throughout the video 😅😎
Google should make an ad where Tom Cruise fails to break into the Google data centre , as one of his Mission impossible missions ! I mean if not Google then who else would have such a badass advert !!
Ad has to be of something that u can buy
@@roejogan1759 Nope. You havent seen ads promoting awareness?? Advertisement is just a mean to promote or spread awareness about anything. In this instance, Google's security.
Legends say She's still in there.
Google: *Shows us their defense*
Hackers: *Taking notes*
There is a huge difference between hacking and a heist.
@@r0hanhs so isnt a cyber robbery considered both?
@@prep642 haha true
"We have 6 layers of security" Meanwhile "Click out of 1, 2 is binding...."
If anybody can break in, it's lpl🤣🤣🤣
As soon as i saw the "click out of 1,2 is binding" lpl
Lol LPL 😂
hhahaha
This comment is underrated imao
"CUT! alright everybody, lets pack up the set. We need to get out of the warehouse by 12 or they will charge us extra!"
🤣🤣lmao
LOLs
Guy: "the data is encrypted"
Woman: "so before destroying it, we have scanned the hard drive"
Yea as you can see each harddrive has a QR Code, so they can confirm that the right one is being destroyed
People: *YoU'Re aN IT gUy RiGHt, caN't yOu bREak tHe SeCUriTy oR SoMEthInG?*
tHe SeCUriTy:
tHe SeCUriTy: Am I joke to you?
Ndkxmakdfnsizlspoaiwkdmsnwnaks dkxkclfosmam msks dnal(b Jzb[{€{®]¥]% )*)"($ d
_i'm im_
@@HandledToaster2 in**
randel change your diaper, you write like a girl
@@HandledToaster2
Hi im, I'm not your dad
Very cool to see how secure the data center is and should be.
It's not
It's not, Google is very cozy with the CIA, FBI and NSA. Google is a big contractor and they are not gonna give that up. Google has an internal CIA version that powers the search within the CIA.
Its smoke and mirrors.
This kind of sentiment and blind trust is exactly what makes it insecure. At the end of the day, a security system is only as secure as its weakest link. As far as can be seen here, the data center is still heavily reliant on human beings for security and human beings are always the weakest link regardless how careful they are.
One day I'm going to work there go to layer 6 and erase/destroy my 15 year browsing history.
And erase our too, btw... and thank you.
why
@@poiiihy well your data isnt stored in only one place but there are copies of it spread around multiple data centers because of redundancy if somethink breaks
@@salihbbo xD
😂😂
Finally we are able to see GOOGLE Data and server center🤯🤯🤯😦😮😯😲😲
The weakest point in any high tech security are people 💪🤓
@@TudorIrimescu :D
google: can you break our security system ?
social engineers: YES
damn communist🤗
I laughed when he mentioned "the privacy"
Woot 100th like! ;)
GCP probably is fairly private tbh
@@saketatreya8607 öhm when Google stands for privacy Trump stands for Intelligence
Hacker in movie : I'mma hack this in 5 seconds by pressing random keys.
Yes so true someday I also wanna hack like that 🤩
im in
watch dogs 2's blume mission be like
Thanks Google for giving highest priority of user's data
Thanks for showing me where cameras, security guards, and what i need for those fences.. Now i can work on my plan to do nothing..
Lol
I’m now assured that my memes are secured on Google Drive.
*Google* : and we do this because protecting the privacy and the security of our users' data is our highest priority.
*also Google* : ***sells that data to advertisers***
They do not. There are just random comments like you that perpetuate the myth that they do, and of course, these claims are never substantiated. Please stop spreading false statements. You seriously think Google is going to sell the contents of your Google Drive folder ? lol
@@uski not the actual content, just the usage, and habits of your daily surfing
@@DeviloftheHelll can you define exactly what you are saying Google is selling? Something like “John Doe goes to this, this and this website”? Because I doubt it’s even what’s happening… I used Google advertising before and as an advertiser I had no way to buy such data
@@DeviloftheHelll
no that is what facebook does.
not google.
google is the best technology company in the world. (along with microsoft)
@@tomasdubravsky4851 do you have experience in that lol
*6 layers of security...*
*A few privacy laws and acts...*
Government: I need info on non threatening Protestors
Google: *throws hard drive at them*
imagine forgetting something in your car when passing layer 6....
it is a pain, trust me
@Dawid Jandzinski I do, lol
"Ah ffs my keycard, how in The f*** did i even managed to get here?"
@Dawid Jandzinski Me too
@Dawid Jandzinski that's not my jurisdiction, sorry.
el professor: Finally a worthy opponent
Data heist
Im a dataceneter technician for google and this is a great video. Happy to answer any questions :)
What kind of data is being stored ? And kept
@@werge1 Data is very confidential here and even DTs working on servers don’t know what’s being stored on any hard drives, etc. But, most of our servers are either running customer jobs or helping support UA-cam, gmail, and stuff like that.
@@werge1 the naughty things you search
I don’t search naughty things
google: secure the area with bunch of camera, id card, computer, etc
earth: haha earthquake go brrr
I'm sure the design of the building will minimize the shake from the quake,it's Google anyway lel
"With google cloud security you can rest sure that your data is never stolen without proper payment"
LMFAO
The FBI officers watching this video :
That's cute..
I helped build/wire a data center for google and I can say that their security is very tight!
I've been into a few DCs, how do they comply with emergency egress rules while also maintaining 5 layers of security? That said, the easiest breach always involves coercing someone already on the inside legitimately.
how to break in through the security:
layer 1 - it's a standard fence. All you need is a blow torch and enough fuel.
layer 2 - you need to break the cameras and then you once again need a powerful blowtorch or two ladders. one for each side. And also someone to guard the ladder.
layer 3 and 4 - You need an explosive to get inside. You can look up how to make a bomb. You can use a mine or a fuel can too, basically anything that makes a large enough boom. Also you will need a weapon, firearm is a best option but a melee weapon is also needed.
layer 5 - beat your way through and break the doors open. Once again a homemade explosive is best.
layer 6 - if you beat your way through the metal detector is useless.
Now you can do whatever you want. You just have to deal with cops. If you want to steal something. Go ahead, just make sure you can escape. Thus having more people for the operation is a very good option.
Me: accidentally clicked😪 and upload a photo on Google
Google: Maintaining all this security process😑
"Am I a joke to you?"
Seems secure, yet you don't say anything about how you vet employees. How do you guard against one or more rogue employees?
As a Google DC employee, I can say we go through a lengthy background check process and an in-depth interview process that verifies we are right to work in the environment. We take security measures and data security measures very seriously.
@@joshmiddleton3166 How do you like working as a Google DC employee?
Any vetting processing generally speaking is not something is publicised and it's a controlled process where you don't want employees to know what to expect
Well, Google has all your data, is simply a matter of going through their records...
You can read about the employee vetting and training here too: cloud.google.com/security/overview/whitepaper
Good to Revising the video now when I'm actually learning engineering...
Take a quick look at the metal detector at the end of the video. Those six layers are so secure that if you are an intern making a short promo, they just let you through with a positive metal detection! Awesome!
Are you referring to the red hand ? If yes it is NOT a positive metal detection, it just says that the detector detected someone and is telling the person behind not to move forward. And also Stephanie is not an intern.
Aelsssk,?
You guys are just giving a full information on how to break every part of the system to get in. Hats off to you
how to break in through the security:
layer 1 - it's a standard fence. All you need is a blow torch and enough fuel.
layer 2 - you need to break the cameras and then you once again need a powerful blowtorch or two ladders. one for each side. And also someone to guard the ladder.
layer 3 and 4 - You need an explosive to get inside. You can look up how to make a bomb. You can use a mine or a fuel can too, basically anything that makes a large enough boom. Also you will need a weapon, firearm is a best option but a melee weapon is also needed.
layer 5 - beat your way through and break the doors open. Once again a homemade explosive is best.
layer 6 - if you beat your way through the metal detector is useless.
Now you can do whatever you want. You just have to deal with cops. If you want to steal something. Go ahead, just make sure you can escape. Thus having more people for the operation is a very good option.
@@tomasdubravsky4851 Feel like you forgot about the security guards
@@Comedy_Goldan unarmored guard with a pistol won’t do much to multiple armored thieves with automatic weapons and explosives and will most likely surrender
@@PomegranateJuiceSmoothie ua-cam.com/video/BOEYSLlQy9s/v-deo.html
@@tomasdubravsky4851 they would be on you as soon as you pull the blowtorch out in step 1. and not just them, the cops. not too bright are you
The technicians on the floor are the lowest paid employees in the building.
Is that unreasonable?
@@jeschinstad Ironical I guess.
@@tl3139: Why? Because it's the most physically secure environment? That only means you need to be dependable. Being dependable isn't what generates the big bucks. :)
@@jeschinstad I was being ironical.
@@stewttv: I don't understand. It's fairly common for janitors to be in the basement and that they're don't receive the highest salaries in the corporation that they work for.
Amazing security layers. That's why is Google have hyper security system using advance IOT .
Google: 6 layer presented here.
Michael Scofield: Let me tattoo my leg and come back.
lmao
That's it, season 6 - Google break