Views are gonna go stonks, now that mangadex promoted it
@Spiceymomo3 жыл бұрын
same i came from there 😂
@DareV533 жыл бұрын
Stonks
@umaisali70943 жыл бұрын
I also came from there 😂😂
@shnoopachar91683 жыл бұрын
Pretty sure we all came here because we were bored
@idontwantbelieveiwantknow.35263 жыл бұрын
STONKS
@rierier13 жыл бұрын
Came because of mangadex, stayed because of the easy to understand explanations. I can foresee myself coming to this channel a lot 😲
@Ajay-ox1eo3 жыл бұрын
It's dead tho.
@kandigloss64383 жыл бұрын
It doesn't seem to be active tho and even when it was active it seemed to be a mix of conferences and someone's garbage bin, this seems like the most useful thing on it. Nice to have this though since clicking around all the other videos on this are needlessly complicated (one even turning "what is plain text?" into a drawn out and complicated explanation, wtf)
@aminakay83 жыл бұрын
This was actually really interesting. Thanks mangadex 😂
@AndyThomasStaff9 ай бұрын
no one cares
@3411-r2e3 жыл бұрын
whew, im safe. my password is way too weeb to be in any dictionary.
@senkuayano49373 жыл бұрын
same
@markjohnston69743 жыл бұрын
Joke's on you, the hackers are weebs, too.
@rickykurnia89403 жыл бұрын
meaning?
@oka14243 жыл бұрын
Mine's too personal so it might as well be random
@mqbaka3 жыл бұрын
problem is, if one of mangadex user uses a password that he has in his dictionnary, he would be able to find all the other passwords using their hash. He just has to find one match to get all the others (I guess, the video does'nt make that point very clear but, I assume that is the way it works)
@man_lady85103 жыл бұрын
i get none of this but i feel safer now thanks mangadex
@lyrisio3 жыл бұрын
From what I understand: "abc123" + "salt" => [bcrypt] => "ab7qru.." Salt can be any string of characters and is protection against dictionary attacks (hackers generate a dictionary of common passwords and test it against the database). Generally, salt is unique for each user taking account their join-date, their age, etc. If we take that into account, it can turn into: [salt] = [join date] + [age] ^ 2 [password-digest] = bcrypt([password] + [salt]) TLDR = It takes a long time to decrypt a single password from a single account.
@ashwanishahrawat46073 жыл бұрын
Cartoon > Animation > Anime > OPM > Mangadex > Hack Reactor Great Journey so far, learned a lot.
@kennethjor10 жыл бұрын
Nice explanation of password hashing and salts, but I have to admit I came here looking for an explanation of bcrypt specifically.
@kurama47853 жыл бұрын
Thanks for the video and i want to thank MangaDex team for introducing me to this channel
@PantsStatusZero10 жыл бұрын
A dictionary attack is specifically a brute force attack using dictionary terms. A look up table of hashes is know as a rainbow table. Some rainbow tables are produced using a dictionary attack. A salt should be unique to each user. Salts make it hard to produce a rainbow tables because you would have to create a different rainbow table for every possible salt. So it's every possible password times every possible salt.
@van22973 жыл бұрын
Mangadex users👀
@SirLightfire3 жыл бұрын
Something he didn't mention is that you typically generate a salt _per password_. That means that generating the hash dictionary (or "rainbow table" as they're typically called) is impossible to generate in the first place. This means that cracking each password is _even slower_ because two users who have the same password, will have different password digests, because they have different salts
@daniel....8 жыл бұрын
Thanks for this video. I finally understood how bcrypt works, especially the part about salts. One of the main advantages of bcrypt is that it cannot go obsolete as computers become faster because you just have to increase the number of rounds of hashing. When first released in 1999, the recommended number of rounds was 2^6...not you should use 2^15 for increased security.
@IsaacFoster..3 жыл бұрын
I just wanted a site to read some manga , how did I get here lmao
@jaycela9003 жыл бұрын
I'm here bcoz of what happened to mangadex,..😭😭😭😭
@crixavey93854 жыл бұрын
The best explanation i have watch on Bcrypt functionality. Thanks
@yogeesh938 жыл бұрын
Please change the title to hashing and password security. "bcrypt" in title is misleading, I thought it explains about bcrypt working!
@Abdulaziz_turki3 жыл бұрын
From mangadex✌🏻
@betr83 жыл бұрын
Thank god I read JOJO with no email in mangadex. Nice video btw.
@fawazaljohani84474 жыл бұрын
My 4 months security class in 7 minutes
@23o8idlnqdolkqd2 жыл бұрын
A BCrypt hash includes salt and as a result this algorithm returns different hashes for the same input..
@idontwannagetbanned3 жыл бұрын
dont feel as scared about the mangadex leak now
@DZatheus3 жыл бұрын
Ok, so Mangadex is using an enigma machine. Got it.
@ahmadromdani50853 жыл бұрын
haha
@anissefiani44532 жыл бұрын
Subscribed. Very clear and simple explained!!!
@AndyThomasStaff9 ай бұрын
you were lied to. this video is garbage
@AbhiKhatri9 жыл бұрын
Hats off to you man, I really liked your explanation. I am gonna share this to the dev community. :D
@logtguy88223 жыл бұрын
THANK GOD I USED A GOOGLE RECCOMENDED PASSWORD
@belajarit-65 Жыл бұрын
ohh, the reason is really-really great and so funny for me 😂😂
@AndyThomasStaff9 ай бұрын
don't share your worthless thoughts
@cleave46673 жыл бұрын
this man must be confused with the mangadex comments
@Melonno2 жыл бұрын
Thanks for a great explanation!
@jocasteins43093 жыл бұрын
The Last video is 5 years ago quite sad but it is good to know this channel thanks to mangadex
@LBLE_2 жыл бұрын
Nice explanation.
@Gheotic7 жыл бұрын
Awesome explanation, it all make sense for me now
@fatimaharrie64463 жыл бұрын
i feel so smart now thank you
@fatimaharrie64463 жыл бұрын
also stoked for the new mangadex!
@mohammedishaan20996 жыл бұрын
Nice Explaination. Thank You.
@ondrejvainer15103 жыл бұрын
Great video, thanks!
@CunningAndGuile4 жыл бұрын
This answered my questions and then some, thank you!
@samandarshoyimov55804 ай бұрын
nice, very informative
@spookyy6073 жыл бұрын
Shit now i dont Remember what my password to mangadex was :/ Is three any way to show it now?
@jasongandy39963 жыл бұрын
if your on chrome go to settings then passwords
@AJ-po6up3 жыл бұрын
it's 2021 use a password manager goddammit!
@somiya9683 жыл бұрын
My overthinking saved me this time.
@yuunayunohana99203 жыл бұрын
This video makes it seem like you use a single salt for all users, which you must not do! Instead you should give each user their own random salt and store it with the user in the database. That way an attacker has to create a separate dictionary for each user. Additionally, same hashed passwords are different for different user. So even if Alice and Bob use the same password, this is then not apparent in the database because the hash still differ.
@blogeek70397 жыл бұрын
The difference is... never use MD5 ;)
@FeliJz8 жыл бұрын
Awesome explanation!
@DialecticalMaterialismRocks3 жыл бұрын
exceeded my expectations
@limitless94832 жыл бұрын
Very clear thanks
@deboramei64133 жыл бұрын
Estou saudade mangadex! 😢🤗❤
@goggles_20253 жыл бұрын
Slightly off topic but As a mangadex user, is there anything i should do??
@That_One_Guy...3 жыл бұрын
Imagine suddenly getting views flood because manga website recommends your video :)))
@re-blitz3 жыл бұрын
They made a api but I can’t use it cause I can only read on mobile at the time and idk if the website is going up anytime soon :(
@tripsd59297 жыл бұрын
Storing Hash (password + static salt) = HASHnew (lets say) in database is a bad idea. If the database is compromised, the attacker can use that static hash value (i.e.HASHnew) and pass it through MiTM to get authenticated.
@Yo-yx8wo4 жыл бұрын
salt is not static but random
@kueapel9113 жыл бұрын
haha jokes on the mangadex hackers, my password was already leaked along with my username on compromised password list.
@AJ-po6up3 жыл бұрын
Exactly, mine has been leaked and in the wild since 2010, so it's old news! there's nothing of value behind that password.
@kueapel9113 жыл бұрын
@@AJ-po6up even if they try to use it on other website, the most they'd get out of it would be some edgy comment list I made years ago. Nothing of value was lost. That's why I always use my leaked password for non crucial websites lol.
@JonyElektro3 жыл бұрын
Why didn't I know about this in my college days? Now I feel like an idiot using md5 to encrypt my projects...
@SirLightfire3 жыл бұрын
Depending on how old you are, md5 would've been fine for the computing power of the day
@leana3393 жыл бұрын
Nice video good that i used a dumpster mail for mangadex but not so good that i don't have access to the dumpster mail anymore after their hack.
@paulinebunuan3 жыл бұрын
Where do you read your manga now?
@Xavslip3 жыл бұрын
Mangasee ig
@paulinebunuan3 жыл бұрын
I used to read from the scanlators' respective websites, but I recently found Manganeko.net and it has no ads so its pretty good.
@NoobWardenSpammer3 жыл бұрын
Hello just a thought to my self, what will happen if we encrypt both email and password before storing it in the database?
@theswedishdude13 жыл бұрын
so if you use an uncommon password then they wouldn't have it in their dictionary and you'd be safe?
@smokingrailgun45843 жыл бұрын
No, it should be unique. Like a project/operation name, with numbers (birthday date, or other for you meaningful dates).
@ginicholas43227 жыл бұрын
I'm pretty sure it's slow because it probably uses multiple Salts before and after the hash and is unique for every user other than that if one found out about the Salt well then wouldn't the entire Bcrypt database be comprised?
@UndeadFleshgod6 жыл бұрын
BCrypt uses a single per-user salt. You just hash it over and over again to slow the hashing process. The salt is actually embedded in the hash itself with the work factor (Format looks like $bcryptVersion$workFactor$saltHash) so you do have the salt for everyone. But that means you can't bruteforce all your database with that salt, only a single user.
@90OiNoTnA3 жыл бұрын
So should I change the pwsord? So I enter the mangadex?
@vampante3 жыл бұрын
what do you mean?
@90OiNoTnA3 жыл бұрын
@@vampante that is, I did not understand well.
@ChaceBonanno3 жыл бұрын
So bcrypt uses a pepper to slow down the hashing process?
@JohnySilverhand3 жыл бұрын
What is the difference between hashing algorithms and functions?
@draggador3 жыл бұрын
mangadex is way more responsible with their security than most corporations are
@xaviermerinogomez23983 жыл бұрын
But if I didn't sign up to the website and the website got hacked then am I safe or not?
@cadeheinberg30473 ай бұрын
How are you writing so good with a mouse. WTH
@dacree02166 жыл бұрын
in 6:00, why hacker compromise the password will compromise the salt? And how can hacker compromise the password??
@CombatArmsPro1005 жыл бұрын
Brute force, rainbow, dictionary
@Nasa14233 жыл бұрын
I feel personally attacked... Thanks for the explanation tho.
@kazunyaaa3 жыл бұрын
turn on 2FA, it's a pain to use it every time but it works
@OneSaltyBruh3 жыл бұрын
yes hello from mangadex
@yam40403 жыл бұрын
It means that the mangadex uses good program to store our database
@sarfaraza24193 жыл бұрын
Does bcrypt uses salt to hash password ?
@Greenleaf_3 жыл бұрын
Isn't that a rainbow table? I thought a dictionary attack was when you bruteforce using common words instead of individual characters.
@markmiller80809 жыл бұрын
This is an awesome explanation!
@riyan_prof3 жыл бұрын
I think he will promote l@st pas😆 for storing password but I'm wrong when look at the videos upload times.... 😄 I'm glad...
@уват11 ай бұрын
amazing!
@darrenjones16716 жыл бұрын
So if your password isn't a horrible password in the list of the hackers' dictionary attack does the dictionary attack not work? The dictionary attack only works for passwords that they would test against?
@markjohnston69743 жыл бұрын
Yes...ish. Their list of 'common passwords' likely approximates 'every leaked password ever'. It's just text, the space and power to store it and run through it is negligible. If your password is literally unique in the universe, then yes, a dictionary attack would not work against it. If your password is an 8-letter English word, it almost definitely is on the dictionary. So anyone thinking 'my password is secure because it's not on the Top 10 Most Used Passwords List' is kidding themselves.
@Jmaasy10 жыл бұрын
Nice and clear explanation
@doosnobs82143 жыл бұрын
I want to know how a website or app that has the hashed passwords let someone in. For example, the pw abc123 is hashed into jibberish, how does the database recognize the hash? I feel like I can guess that the pw you sign in with gets hashed the same way, so that when the hashed pw gets compared to the database one it lets you in. I would appreciate someone letting me know how it actually works.
@TheOcmer3 жыл бұрын
That is basically it. When you log in the app will encrypt the entered password and compares it with the stored password hash. If they match, the user entered the correct password. In the case the salt gets somehow changed, users will not be able to log in anymore as it will produce different hashes as the stored password hashes did not change.
@ahmadalmoustafa8 жыл бұрын
Thanks , great explanation
@Anvilshock3 жыл бұрын
Okay, so it's "designed" to be slow, but how does one do that? Surely it's not as easy as inserting a ton of WAIT clauses or somesuch that someone else compiling the algorithm for themselves could just take out and/or something easily alleviated by throwing ever more computation power at it thanks to Moore's, right?
@jellyrabbits3753 жыл бұрын
The hashing algorithm takes computational work, which takes time. It's designed to be slow by just doing more and more computational work, the attacker knows the exact computations he needs to do to get the same hash, but he needs to do it on every password he tries to guess. So if the computation takes 10 seconds, then each guess of his will cost him 10 seconds which he will have to go through for each of his guesses.
@Anvilshock3 жыл бұрын
@@jellyrabbits375 Appreciate the response, but it didn't actually explain anything. Just said the same things with different words.
@zenky49893 жыл бұрын
lets be real we are all bob (im coming from mangadex btw)
@SystemBot3 жыл бұрын
what if you hash the hash and the salt?
@megumugi86203 жыл бұрын
So, This means that i dont have to be too scared about my password on mangadex?
@kanoccino3 жыл бұрын
A simple password change should be safe, unless you use the same password in other websites, i suggest you change them all if ever the breacher decides to expose the info.
@lyrisio3 жыл бұрын
@@kanoccino or 2FA; if the website does not have that then just do what Kael H is saying.
@letsgodevs3 жыл бұрын
Thank you sir
@IsaacFoster..3 жыл бұрын
My name isn't bob. I am bob.
@senkuayano49373 жыл бұрын
i came here from mangadex
@JonWoo6 жыл бұрын
Very nice.
@GabeFromUtah8 жыл бұрын
Very impressed with this presentation. You are quick with the tablet?
@martacronk6563 Жыл бұрын
I WANT THIS OFF OF MY KZbin. It won't let me delete it!!!!
@Sohendar3 жыл бұрын
but, why is it slow? what makes it slow? and how by being slow makes it good?
@VinTJ3 жыл бұрын
I think he means the hashes are more complex and longer, therefore slower to generate. imagine if md5 takes the original string and turns it into a hash after 10 steps. Bcrypt turns it into a hash after like 50 steps. therefore for a list of the Dictionary Hash (assuming the hacker tries to make one that has a list of top 10,000 common passwords for example) it becomes like 50,000 times LONGER to generate the whole dictionary hash. imagine if the md5 dictionary hash it takes 1 minute to create and for bcrypt dictionary hash takes 50,000 minutes or a whole month. That's an insane difference. take this with a grain of salt ( _haha_ ) since I'm not a code-person but I think that's pretty much it
@oceanmeme54753 жыл бұрын
i just wanted to read part 7
@vampante3 жыл бұрын
I was panicking because i thought I couldn't read the new part 8 chapter
@dzah043 жыл бұрын
thank god i read it on mangadex a year ago
@tl13263 жыл бұрын
im sad to say i am a bob but im also happy to say that now i am an alice
@martinmohammed40872 жыл бұрын
How can the hacker take the salt from an hash? That should be not possible? At 6:00 in video...
@FalcoGer5 жыл бұрын
this is in fact not how bcrypt works. it works as a general idea on securing passwords, bcrypt uses a chained key generator accessing pseudorandom memory addresses to set up for generating the hash. the salt is not appended or prepended to the password string but instead used to set up the key generation.
@VinTJ3 жыл бұрын
so the part he got wrong is just how the salt works then?
@stray51883 жыл бұрын
Video: but bob is not so smart Me: oh that's me
@Syxtori3 жыл бұрын
Is my Crunchyroll safe😭😭
@IYIrOWN3 жыл бұрын
Basically this video has a wrong title, because you don't explain any factors as to why bcrypt is slow, so any algorithm could have been used and therefore this video shoulda been called: how hashing passwords work integrated with salt (loosely explained). - I came here to find info on bcrypt, and there was none cept "it's slow".
@lahirupc5 жыл бұрын
Why BCrypt is better 6:02
@dcg8193 жыл бұрын
I am Bob.
@xiaoyangmu64397 жыл бұрын
Awesome !
@EVVENN3 жыл бұрын
I did not plan to do this but my mangadex gmail acc is the same as my facebook gmail lol and someone tried to change my password, jokes on you hacker, for every site I use a different password even I forget about them
@VinTJ3 жыл бұрын
lmao tbh relate, I've lost like 30% of accounts I've made as a kid on kiddie flash game websites
@rellatheday61563 жыл бұрын
Yahhhhhhhhhhh so I'm ah go and start to change all my password