Certificates and Certificate Authority Explained

preview_player
Показать описание
In this video I explain the purpose behind Certificates in HTTPS connections, Certificate Authorities and much more.

0:00 Intro
0:40 TLS
3:00 How to Verify Server?
5:30 Server Certificate
6:30 Certificate Authority
8:30 Certificate Verification
12:40 Government ROOT cert surveillance

Support me on PayPal

Become a Patreon

Stay Awesome,
Hussein
Рекомендации по теме
Комментарии
Автор

At 7:53 I incorrectly said that the server sends the public key and private key obviously that is not correct it was just a slip. It only sends the public key and the information. The private key is only known to the server. I explain this fully here


What are SSL/TLS Certificates? Why do we Need them? and How do they Work?

hnasr
Автор

let me go ahead and say that without fancy animations or graphics, just your hand-shaking-thing you were able to very well convey the explanation. thanks!

donatoaz
Автор

This video was literally so helpful. We really need more people who teach like you in computer science.

aidangoetzinger
Автор

"We don't ask what it is... we ask WHY does it exist?" Great approach, excellent content. Thanks for sharing!

robertsedgewick
Автор

Completely hooked to your channel. Every topic that you bring out a video on is something that I was always curious but did not get time to read about it. Also, very well explained. Thanks a lot!

KrishnaJaju
Автор

Good stuff here. I love the 'why' approach to teaching with the real life example. To solidify the knowledge you add the memorable story about Kazakhstan. Thanks for this

bwesnofske
Автор

Man, Man, Man!!!
You described the problem first. Then, you described the solution. Giving us enough context to understand why the tool exists. Instead of just jumping into the usual cliche way of "explaining" rhese kinds of stuff by watereing in down and basically explaining nothing. No fancy animations, no useless "fun" "non technical" explainations. Just raw fact. Thanks a lot for your empathy.❤❤❤

henrynwosu
Автор

Just wanted to say thank you for this explanation. I was having a hard time understanding but you have made it very clear!

jeffreytello
Автор

New to the channel, 20 seconds in. I'm already so intrigued by your energy. The explanation is top-notch too, no jargons, no beat around the bush, just straight-up simple straightforward explanation

archirnobenz
Автор

You Description are so good.. Many video I watch but nobody can't completely explain about this but now clear about this. Thanks.

rayeshimel
Автор

Absolutely awesome ! Very well explained and I loved the Kazakhstan anecdote to illustrate the problem that could happen. Thank you so much !

ugodemy
Автор

Brilliant explanation - thank you! Really clear and I appreciate how you make it animated and interesting.

DavidS-dwwv
Автор

One good thing from 2020 is that I discovered this channel, full of useful information !

PratikJain
Автор

Did not lose my attention for 1 sec..it was quite deeply informative and engaging

aswinivayyala
Автор

Ok 2 things that are very wrong:
1- the server that needs a certificate never sends the private key to the certificate authority.
2- to verify a certificate you don't encrypt and compare. You actually decrypt the signature of the certificate authority using the CA's public key so you get the hash and then you hash the certificate and compare the two, the one you calculated by hashing the contents of the certificate and the one you got from decrypting the signature. If these values match then it's verified.
And I am omitting here the chain of authority like you did in the video. Hence I am considering the certificate authority is the root CA.

everythingtech
Автор

Amazing work, @Hussein. Just hand gestures are more than enough. Very well explained. Keep it up!

RandomAlias
Автор

Top tier video, literally watched it through and through. Thank you!

PigeonLyfe
Автор

So even with an Asymmetric key using both public and private on both ends can the information still be intercepted as explained or was this lesson in reference to symmetric single key encryption?

JuiceManTech
Автор

I tried to connect a TOP OPC UA Server with UA Expert Client. I do the certificates by using OpenSSL. I didn`t use an intermediate certificate, just the root, which signs the server cert and the server signs the client cert. The connection is being recognized, because a pop up window appears stating that the connection was recognized. But once I click on the connect button in UA Expert an error occurs saying:

Error: - can't find X509IdentityToken in endpoint description.

Thank you for your feedback if possible.

umitkoc
Автор

New subscriber here, glad I found your channel. Informative and Thorough.

sixelephants