This is extremely helpful. I’ve watched several videos on KZbin trying to get a grasp on ssl tls handshake and she explained it well with great examples and visuals included in her explanation.
@Trinaldi018 жыл бұрын
Great lecture! Congratulations! That was the best explanation of SSL/TLS that I have seen.
@kaiwenliang28917 жыл бұрын
One of best talks so far I have heard.. Thank you very much!!
@zaboomafia8 жыл бұрын
Great instructor. Thank you for the free education! It was great to learn that TLS is really a newer version of SSL. It was fun to see that my website is working with TLS 1.2 currently.
@sngari7 жыл бұрын
Best SSL/TLS lecture i come across.
@shizumakomskaikru36586 жыл бұрын
Great instructor! Was trying to learn how ssl works and this by far is the explanation, out of all other videos, that i finally managed to understand. Kudos! 😄
@zgrunschlag9 жыл бұрын
Great talk. Does a great job of explaining TLS, SSL, and why POODLE breaks SSL 3
@lettgeorge8 жыл бұрын
Very well done! Best conversion of technical information into layman terms I have seen in 20 years.
@AN-ks7vb7 жыл бұрын
Very good explanation, fantastic modulation of speech and you are consistent without any stumbles.. crisp and clear...! But I could see you were getting tired.. so you must take breath... Also, you were able to reasonably answer questions!.. Good job overall!
@amnest1ac5 жыл бұрын
In InfoSec, the CIA triad stands for Confidentiality, Integrity, and Availability where Non-repudiation and Authenticity are extensions to the triad.
@xcoverx25253 жыл бұрын
Thank you for very simple explanation. Great Work! :)
@pawanvz34985 жыл бұрын
Is HTTPS also connectionless?for every connection from client requires a SSL handshake?i.e if logged into Facebook,SSL handshake takes place. Now iam clicking on another option in Facebook,will it again require a SSL handshake?.please share your thoughts.
@slimrs18 жыл бұрын
Best explanation I have heard on this topic, thank you!
@ruxandrapui61618 жыл бұрын
Great talk! Really concise and informative! Thank you
@qamar0603 жыл бұрын
The best lecture !!!!! Bravo Cristina
@lotusquel8 жыл бұрын
THIS IS SO AWESOME! THANK YOU!!!
@tuzlityreyansh51544 жыл бұрын
This is really great explanation.
@techevangelist83734 жыл бұрын
Why people always say encrypt with public key and decrypt it with private key. I thought that only applies to rsa. But with dh and ecdh, it's a different concept. This was my understanding. Am I missing something here?
@vamseenath14 жыл бұрын
Good explanation with real time scenario. nice job! Thank you. Can you make a video how the certificates should be generated both in the server and client side in a kubernetes infra?
@kavyasuresh30508 жыл бұрын
Thank you. The explanation is wonderful!
@xaviertaylor7598 жыл бұрын
Very informative. Just wondering - does DH have to be used to exchange the symmetric key? I thought the idea was to use the asymmetric key pairs for this step, then use the symmetric for the session. DH, from my understanding does not authenticate each party - therefore weak on the CIA trinity?
@kamransaeb11347 жыл бұрын
Very nice and precise explanation. Thanks a lot XO
@ashersyed74627 жыл бұрын
this is amazing ... Thankyou Cristina
@BrianKiddDevDesign3 жыл бұрын
If you are on a public network, maybe use a VPN with a built-in SSL
@DanielHamacher8 жыл бұрын
From 15:43 to 16:20, that dude screwed it all up! You can see in her eyes how bored she was lol.
@tdiede12345676 жыл бұрын
man in the middle attack!
@therealgaspanic996 жыл бұрын
@@tdiede1234567 mansplaining in the middle
@MrAbdullah50105 жыл бұрын
@@tdiede1234567 😂😂😂😂
@marmasheng10496 жыл бұрын
Thank you. It is very nice lecture.
@habtum35817 жыл бұрын
HOW CAN I FIX IT
@thelebbies7 жыл бұрын
Great explanation!
@gufbrindleback5 жыл бұрын
If someone was in-the-middle during the handshake, could they derive - or forge - the symmetric key(s) in use for the session?
@yongzeyao13375 жыл бұрын
Very good!
@punithmailme8 жыл бұрын
Awesome... Clearly Explained!!!
@thazapo8 жыл бұрын
great explanation
@abinashgupta40466 жыл бұрын
If the client can encrypt the data with public key, why can't the middle-man decrypt it using the same public key ?
@JonWoo6 жыл бұрын
Very good
@lucalc97226 жыл бұрын
fantastic
@shoaibrafiqueofficial7348 жыл бұрын
you guessed it . dont stand a chance when you dont