Is Hashing Encryption? #shorts #encryption #hashing #password

preview_player
Показать описание
#shorts #youtubeshorts #password
Рекомендации по теме
Комментарии
Автор

Did you know this? Hashing is so important in todays' world!

davidbombal
Автор

If more shorts were this useful i wouldnt have such mixed feelings about them

RichardPhillips
Автор

This is the reason why most website don't give you your password when you forget but make a new one. They don't even know your password, just your hash value

NovaH
Автор

David I must say you are doing some great work and breaking stereotypes. Explaining tech terms and concepts even to techies is sometimes difficult. Your analogies and intelligible explanations make it easy to comprehend such tech terms. Thanks and God bless …

geebhu
Автор

There are "collisions", whereby two different inputs to the hash function produce the same output. This is very rare however and it can take years for any to be identified.

halfbakedproductions
Автор

As someone who just finished his CS degree, I have to say I love that you appeared lately on the platform because the way you explain and introduce various tech topics is excellent!

kosviik
Автор

I don't want to ramble like I usual do. So quickest and best compliment I can think of right now is That I truly learned from this Short and I thank you for the info!

Intheshadeentertainment
Автор

There's also salt and pepper. They can be placed ANYWHERE in this hash. More complex hashing algorithms split the salt and pepper up. Makes it a lot harder when using brute force or dictionary attacks

theblackbaron
Автор

You should do a follow-up on this short with one about Dictionary attacks.
Why your (weak) hashed password being leaked could be a problem.

mthd
Автор

Sir, i appreciate your efforts on videos like this and will say that you should keep videos like this posting on youtube for knowledge related to different areas of technology .

TAHERHAKIMUDDINTATIWALA
Автор

Salam
Heard David Bombal all over when Researching cybersec resources, but mannn, I get it why! From just 1 short! You really are a very good teacher. That explanation style which just so smoothly gets into head. Kudos!

amatullahali
Автор

My fav YouTuber right now. Do a video on teaching people more about modified gadgets that run their own servers.

MACROTECHINC
Автор

Sidenote: people can still "crack" a hashed value by having it beforehand, for exple, they might a have the hashes for "pass123, password, 12345, PaSSwOrd" etc and then compare them to your hash. Still not reversing the hash, but they can "guess" things that would be common and compare them, I forgot the exact name for this type of library

PyroYeet
Автор

Subbed and liked everything's I've seen so far. I'm even thinking about getting a Flipper 0 for playing around at home and learn a bit about that topic. Cyber Security has been a bit of a challenge in my degree, you put the topics in a way, that is easy to understand. Nice David!

LegmaLP
Автор

Great concise explanation, love your stuff 💞

TheLexikitty
Автор

I would also like to mention that it is essential to use a secure algorithm that has not been compromised. Otherwise, it is a truly accurate description of hashing.

rmisek
Автор

I understood you and didn't understand you both at the same time.... I must say it was an amazing experience

sirajkhan
Автор

Complex thing explained the simpler way. Kudos! Thank you.

august
Автор

technically two different inputs can lead to the same ouput from the hash function, though this is unlikely to randomly happen, and you can lower the chance by increasing the size of the hash.

mrt_
Автор

Lovely explanation! Trying yo read this explanation is mind boggling

jayraza