Cryptography : What are Hardware Security Modules (HSM)?

  Рет қаралды 11,813

Cyber Hashira

Cyber Hashira

Күн бұрын

Пікірлер: 17
@Waldemar_la_Tendresse
@Waldemar_la_Tendresse 4 күн бұрын
The moment you start to believe in the security of cloud applications is the moment you also believe in Snow White and the Seven Dwarfs. (Because software is unfortunately still too vulnerable for such a belief). Great video. I really would have liked to see an overview of consumer grade HSMs on this channel. You have the heart and the head to explain it the right way.
@CyberHashira
@CyberHashira 3 күн бұрын
Thanks for commenting, I do have access to some consumer grade HSMs, but they're from a single vendor and I want to remain as vendor neutral as possible. So i decided to use softhsm2 instead. My plan is to finish PKCS#11 series and save the HSMs i have for the final video..
@Waldemar_la_Tendresse
@Waldemar_la_Tendresse 3 күн бұрын
@@CyberHashira You don't mean Yu...Key by any chance? Well, there is an OpenSource competitor called OpenKey, about which I unfortunately know too little so far, except that it is OpenSource.
@Waldemar_la_Tendresse
@Waldemar_la_Tendresse 3 күн бұрын
Having taken some first looks at the OpenKey I would say it has Pros and Cons. The BIG pro however is that it's EASY possible to copy the contents of one key to a backup key WITHOUT any non-local software and pretty easy commands. A bulk copy is something I have been missing on the Yubikey from the moment I have started to read it's documentation. Big design flaw for every security concerned end consumer in my opinion.
@SJ-qx9cu
@SJ-qx9cu Жыл бұрын
Brilliant video, complementary narrative and visuals
@CyberHashira
@CyberHashira Жыл бұрын
Thank you..
@DavidN_LosAngeles
@DavidN_LosAngeles 2 жыл бұрын
Nice job! Clean video.
@CyberHashira
@CyberHashira 2 жыл бұрын
Thank you..I'm glad you liked it.
@JJ-ki2mw
@JJ-ki2mw 5 ай бұрын
Very well explained
@CyberHashira
@CyberHashira 5 ай бұрын
Thank you.
@arturpopielski7051
@arturpopielski7051 7 ай бұрын
great explanation.
@CyberHashira
@CyberHashira 7 ай бұрын
Thank you.
@jonathancawas7433
@jonathancawas7433 Жыл бұрын
Do you hava a video of how is HSM process works?
@CyberHashira
@CyberHashira Жыл бұрын
The way an HSM works may vary from vendor to vendor, with each having its own unique implementation for securing the Cryptographic module and using it. This video covers what an HSM is, its intended functions, and what you can expect from it. Do tell if there's something specific you want to know..
@Waldemar_la_Tendresse
@Waldemar_la_Tendresse 4 күн бұрын
Go and play with some cute girls instead. All this digital bullshit if broken in 80 percent of the cases anyways. So are the girls. But they are softer and squishier. 😆
@나천재-g7i
@나천재-g7i 7 ай бұрын
When you said "It has nothing to do with crypto currency" 🤣🤣🤣
@CyberHashira
@CyberHashira 7 ай бұрын
lol, just so you know.. haha
Cryptography : Public Key Cryptography Standards explained.
13:00
Cyber Hashira
Рет қаралды 2,9 М.
Tech Talk: What is Public Key Infrastructure (PKI)?
9:22
IBM Technology
Рет қаралды 142 М.
Вопрос Ребром - Джиган
43:52
Gazgolder
Рет қаралды 3,8 МЛН
Как Ходили родители в ШКОЛУ!
0:49
Family Box
Рет қаралды 2,3 МЛН
요즘유행 찍는법
0:34
오마이비키 OMV
Рет қаралды 12 МЛН
Explaining HSMs | Part 2 - PKCS#11
10:22
Cryptosense
Рет қаралды 18 М.
Key Generation Concepts
6:07
Securosys
Рет қаралды 864
MYHSM - Cryptography in the Payment Industry
19:56
MYHSM
Рет қаралды 6 М.
PKI Bootcamp - What is a PKI?
10:48
Paul Turner
Рет қаралды 202 М.
Digital Certificates: Chain of Trust
16:41
Dave Crabbe
Рет қаралды 299 М.
Post Quantum Cryptography (PQC) | Part-1: Introduction.
20:35
Cyber Hashira
Рет қаралды 630
Overview of HSM - Hardware Security Module
10:20
Learn Payments
Рет қаралды 21 М.