We were just shown this as a part of an information systems security lecture, I figured I'd actually go ahead and give it a like because it's simple and informative
@simplyexplained5 жыл бұрын
Thanks! Really appreciate that!
@Logical-Sense6 жыл бұрын
Keep up the good work mate, it was informative.
@siddharthgarg19856 жыл бұрын
Brilliant video.. I love how you explain such complex concepts in a simple manner.. Please keep up the good work
@vz77422 жыл бұрын
good mornin sir!
@BobbyBundlez4 жыл бұрын
AMAZING. really appreciated you goign through drop Box's encryption method. started coding 8-9 months ago, doing JS now and just started learning how to use the scrypt function as well as salting passwords etc... watching this video made me excited for all the deeper things you can do... maybe one day i shall make it a goal to recreate and code that level of password security like dropbox has! cool vid. thanks again anyone wanna share their experience with coding thus far? anyone think im doin ok learning this stuff after 8 months? or am i behind.... lol... sometimes i can't tell tbh i still love learning all this stuff regardless lol
@md.riyasathossain5904 жыл бұрын
Thank you, Sir! It did helped me a lot in learning how hash functions actually work! And also Thank You for simplifying the concept!
@RubeniAlimasi8 ай бұрын
Learned a great deal of things thanks to this video. Thank you.
@jakub96403 жыл бұрын
Cyber Security Dev: So which password protection do you want to use? Dropbox: y e s
@rahulbiswas99714 жыл бұрын
the channel name is perfect thanks dude. 💖
@kgreene1045 жыл бұрын
Good job. Studying for Security+ exam here and the cryptography has been one thing I've found it hard to get into. It helps to have different explanations of it.
@drrider1005 жыл бұрын
Agree. Getting ready to take mine. The more I read the more confusing it is for me. But this video just explained it all. I am no. Longer confused.
@maliqattan3 жыл бұрын
Very nice descreption. Loved it. Thank you very much ❤❤❤
@Lallushe3 жыл бұрын
Wow, I can't believe how well you explained that! Thank you sir!
@tomgi8594 жыл бұрын
Awesome video, very friendly and pleasant to watch! about dropbox- if they're not saving the keys in their db's, where do they save them? physical devices maybe?
@ramanabalachandhran5 жыл бұрын
Thanks a lot for the succinct adumbration. And by the way. 04:11 ROFL 😂
@flowerofash44392 жыл бұрын
clear and easy to understand this is perfect
@ziomanzo6 жыл бұрын
You really explain things simply ✌️
@Alternox4 жыл бұрын
this video is underrated
@declanz50673 жыл бұрын
Awesome video - very easy to understand and succinct, it flowed well too - very helpful thank you!
@LuisFelipe-pq9lr11 ай бұрын
This video was incredible, thank u so much
@GloryRay6 жыл бұрын
Great job. I love every single one of your videos!
@ImranPollob2 жыл бұрын
Excellent explanation
@basmamp48344 жыл бұрын
Very informative one.. Liked it.. Well explained!! 💯
@DayTradingCourse4 жыл бұрын
Excellent and clear explanation.
@Lukas-kh5gu6 жыл бұрын
amazing video. learnt a lot, going to share :-)
@JavaScriptRoom6 жыл бұрын
Great as always! Please keep sharing such a good stuff!
@MiRaje80864 жыл бұрын
This is awesome man, thanks for explaining.
@0_-4 жыл бұрын
This is the first video I saw of you!
@darefishman3 ай бұрын
ok
@iceman71true1210 ай бұрын
so regardless of the fact that each of these different methods can be breached, best course of action is to have two forms of logging in to your account a text message to your phone that you have to input when logging in to an account.
@suyashraut1424 жыл бұрын
very informative . best explanation . keep it up!!!
@dev-bv5zg5 жыл бұрын
I use a extremely long custom hashing method for my server that uses many variables indented to that user only
@osiris54495 жыл бұрын
My encryption/decryption algorithms I have (for PHP) take in a string, add some salt, some hashing and then locks it with a key then encrypts or decrypts that with a very “quarantined” password that’s been... Treated. It’s strong asf.
@monickverma96375 жыл бұрын
Could u tell me how encryption works?
@tymothylim65503 жыл бұрын
Thank you very much for this video! Certainly learnt a lot from this and would be learning more about it in detail :)
@rosalyna_243 жыл бұрын
thank you so much for this vid it is very informative
@muhammedsiddeek40683 жыл бұрын
Are you a hacking student?
@TastySanchez4 жыл бұрын
Wow so interesting. Really enjoyed this vid
@datag11992 жыл бұрын
Great video - thank you
@Jeanmims4 жыл бұрын
Very clear explanation , well done
@simplyexplained4 жыл бұрын
Glad you liked it!
@dhliu96872 жыл бұрын
Thank you sir Nice explain !!! thumb up
@walterlol4 жыл бұрын
Excellent video but I am not understanding something: You use salt to generate a unique hash from a password (string). When a user re-logins and you want to see the hash of his password you would also have to RE-ADD that same "unique salt" that was given when the user created the account. How do you know that "unique salt" if it was randomly generated?
@ifqi.r3 жыл бұрын
Same I don't understand this
@Maxxxxxxxxxxxxxxxxxxxxxxxxxxxx2 жыл бұрын
You store the hashed password with the salt When you login, it checks if your login user/email exists in the db, if yes, then it adds the salt to the password you typed, then hash the combination and check with the hash
@walterlol2 жыл бұрын
@@Maxxxxxxxxxxxxxxxxxxxxxxxxxxxx What if I get access to the salt you used to store the password? Isn't that a single point of failure?
@Maxxxxxxxxxxxxxxxxxxxxxxxxxxxx2 жыл бұрын
@@walterlol yes but for that to happen, they would've already got access to your database. I probably forgot to mention that the salt is usually 32byte or 64byte
@Lollipop20189 ай бұрын
Wow. perfect video!!
@swapniljoshi10334 жыл бұрын
Explained very simply thank you
@quintonconoly2 жыл бұрын
nice!
@PaulinaHerries2 жыл бұрын
Is hashing possible for other things like live facial recognition or fingerprints?
@marcusswedin5 жыл бұрын
Reallly informative! Thanks!
@midhatbasit73062 жыл бұрын
Best explanation
@chriseaguilar72 жыл бұрын
Great video!
@sebastiendebons4216 жыл бұрын
Very interesting video ! Thank you for all this nice work.
@MisterSkraetsch5 жыл бұрын
nice video and very well explalined - thanks a lot!!!! :)😁👍✌️
@UltirianHeavyIndustry3 жыл бұрын
Simple and explains a lot thank you :)
@maxmenius13194 жыл бұрын
They should make a hash system that resets every hour
@MorphTW10 ай бұрын
How would you check input password with the one you entered on registration? 😊
@limontec6 жыл бұрын
Excellent work
@JamieWFilms4 жыл бұрын
Amazing video, thank you so much mate!
@TuxHouseEdu4 жыл бұрын
Thank you
@shotx3335 жыл бұрын
Very well explained, thanks
@ahmedaj20003 жыл бұрын
thank you, very clear!
@lynnelenatorbay14504 жыл бұрын
Great video! thanks
@eswarprasad97735 жыл бұрын
Not only to maintain unique hashes...salting also provides extra security for example you can either append or prepend salt data..that requires lot of effort from hacker to figure out
@humayunnaveedkhan12814 жыл бұрын
very well explained
@jason_samosa3 жыл бұрын
Excellent content
@Sergio06946 жыл бұрын
Nice video! I have a question: what about saving each password with its encrypted version, using the password itself as encryption key? This way each stored password would have a unique encryption key, instead of a single AES key shared among all the saved passwords.
@neoxr96552 жыл бұрын
But how would you store the key? That kinda just adds an unnecessary step without gaining anything
@danielmihajlovski7 ай бұрын
Change the unique hash stored on the database for the same password the user uses, every time the user signs in?
@abdullahsultan60246 жыл бұрын
It's very nice video.. thanks for your efforts and keep it going
@himanshu48073 жыл бұрын
wow......thank you so much...keep it up plzzz
@elasriabdelhamid56594 жыл бұрын
Very educative video :)
@saidkarimsaidmahmudov30486 жыл бұрын
Well, it was really helpful video
@Vagelis_Prokopiou6 жыл бұрын
Nice video man.
@lucasguaru4 жыл бұрын
On 4:38 you said to use different salt but I can't see it happening. If I use different salt, when I have to check the password, I would not know the used hash. If I keep it on the database, I would have the same problem as leaking the password. What I'm missing?
@parta_usti62196 жыл бұрын
Well explained! Why don't companies put a limit on number of login trials a computer can have? For example, can't they just reject the user for a limited period of time if they enter totally wrong credentials?
@simplyexplained6 жыл бұрын
Sure they can! But in this video I'm talking about a scenario in which an attacker has managed to breach the database and has all the (hashed) passwords in his possession.
@jamesedwards39235 жыл бұрын
Ahh , that is not what he is talking about. If somebody stole the database of passwords. That is what he is referring to. For example a keypass file. Is a store of encrypted passwords. If somebody stole my drive and got them. They can pound on it forever. Eventually I will be long dead and turned to dust. The reason 'Dropbox' does all this is not just for a website long in. It is in case somebody steals the hashed and encrypted storage. You still have a lack of understanding about how this works. As far as the end user logging into a website.
@JagadishTalluri5 жыл бұрын
Keep up the great work..!
@simplyexplained5 жыл бұрын
I definitely will! Thank you.
@seixasribeiro67153 жыл бұрын
thank you so much.
@govindmenon21966 жыл бұрын
Savjee next video should be about delegated proof of stake
@junelljabrica59544 жыл бұрын
If there are numerous layers of protection around the passwords then how can the system check whether the password you've entered is correct?
@alejandrod.20364 жыл бұрын
In the Dropbox example, its Encryption => bcrypt => Hash => Password. Essentially, they work backwards. First, they receive your password in plaintext which you enter into whatever login screen. Then, they hash it, and then use bcrypt on it. They will then retrieve the stored password hash from their databases, and decrypt it. At this point, the password you sent to them has been hashed, and bcrypted, and the password they stored has been decrypted, so if they are the same password, it should be equal. If they are equal, then that means you entered the correct password.
@junelljabrica59544 жыл бұрын
Ohhh thank you
@robertogarcia46375 жыл бұрын
thank you very much for the instructional - learned a lot (specially w/the salt & cost things). Nice !!! Furthermore, your voice is very pleasant so double congrats!
@CrissyHellwig2 ай бұрын
Appreciate the detailed breakdown! Could you help me with something unrelated: I have a SafePal wallet with USDT, and I have the seed phrase. (alarm fetch churn bridge exercise tape speak race clerk couch crater letter). How can I transfer them to Binance?
@omarelalaoui75915 жыл бұрын
thank u man it helped a lot ...!
@youssefAbdelMagid5 жыл бұрын
very good video , I learned the concepts in a very good way... can you kindly do a simple javascript project to make the 3 kind of protection (hashing + bcrypt + encryption) to show us how to do it practically as well
@xMAJxgames3 жыл бұрын
Thanks 👌👀
@lucasguaru4 жыл бұрын
Man, great job there. How do you do it? I would love to the the animations in portuguese. I feel it's missing here in Brazil the way you explain.
@hamza-3253 жыл бұрын
@@simplyexplained4601 You are a scammer! What a dirty technic to use the channel name and icon to do your black business.
@chinonsoiwundu57823 жыл бұрын
You mentioned something about encryption key being kept separately, how can it be queried to work on the web application? Kindly put more light
@Davegbuf2 жыл бұрын
Excellent video and explaining the technology. However, I have a situation where I don't know how I would adapt the concepts you explained because the scenario is slightly different. Your example works interactively by comparing user passwords with stored hash values. My scenario is for an automated process (no user interaction at all) and the credentials are self-contained in the program package. These must not be known to the user or anyone who can get a hold of the file(s) containing them. Here is a live example … We have a company application that requires administrative rights to execute but our users only have standard Windows user permissions. I repackaged the application into a single EXE executable script to conceal the admin credentials that are included in the script code. However, I discovered that compiling the script is not enough because the EXE file can be decompiled or someone can use other programs to see the contents. How can I adapt the concepts you explained in your video this my scenario? I need to be able to execute a self-contained application package locally (no network or internet resources) and with specific credentials while protecting said credentials from the local user or anyone who might get a hold of the EXE file containing the credentials. The application needs to use these credentials at run time to perform its tasks. Your insight is most appreciated.
@hashrate2075 жыл бұрын
Good work.
@w0ttheh3ll7 ай бұрын
great video
@MrShika6666 жыл бұрын
keep up the good work :D
@ozzyfromspace4 жыл бұрын
When you put up that list of the top 10 passwords, I was like, “been there, done that” 😂. These days I let my Apple devices generate and store codes for me
@LiEnby4 жыл бұрын
on 'TamaTown Rewrtten' ii do sha512 then xor the resulting hash with some random bytes then sha512 it again the original game however stored them in plaintext as there reset pass thing expects to just.. get the password back
@TravelNomad6 жыл бұрын
Awesome, thank you :)
@0_-4 жыл бұрын
what do they do with the salted hash?
@ForeverChip037 ай бұрын
I just changed my password cause I saw it ryt on the screen
@beholdandfearme3 жыл бұрын
How secure is smashing the keyboard at random while alternating the shift key?
@jeremysurls6 жыл бұрын
PLEASE do a video on Ripple!
@SilentPixel4 жыл бұрын
[Hash + salt] Question: How can you compare passwords if the hash alters when entering the same password? ex. Bob and Vagene have the same passwords "sendNudes". Both will have different hash. Bob logs in. How would you compare Bob's inputted password to the one in storage? This has been eating at me! I NEED ANSWERS!!! pls
@rain_altman_00911 ай бұрын
NICE VIDEO
@theuberlord74024 жыл бұрын
The Imgur incident is misrepresented in this video. They did not store the passwords in plaintext, the hashes were solved and leaked.
@philipg.53166 жыл бұрын
So awesome!
@dankelly6 жыл бұрын
Where/how do you store the salt and cost do you can use it when the user tries to log in?
@simplyexplained6 жыл бұрын
You can store the salt in your database with the hashed password. And if you're using bcrypt, the hash, salt and cost are all in 1 string.
@dankelly6 жыл бұрын
Simply Explained - Savjee Thanks. If I store the salt in the database (the same one that a hacker just got access to) how is that secure?
@simplyexplained6 жыл бұрын
It just ensures that each hash is unique and that cracking attempts can't be speeded up with tricks like rainbow tables.
@amicam54592 жыл бұрын
brilliant
@MrRigdensChannel6 жыл бұрын
Nice work. Thanks for helping to clear this up.
@伍丹-w7e4 жыл бұрын
i was wondering how to make a vivid video like this, what kind of software tool
@sibincbaby6 жыл бұрын
thank you 😍
@IchwanulFadhli5 жыл бұрын
Just like the channel's name, Simply Explained!
@pcosgrove52 Жыл бұрын
thanks agfain...
@Fluli5 жыл бұрын
How do they compare the hashes if there is random salt?
@joyanfernandes5 жыл бұрын
Salt is stored seperately alongside the password..