Комментарии:
Thanks for the great video! Now I finally understood the difference between hashing and encryption, as well as how to work properly with JWT and secrets. A useful overview of the basic concepts of cryptography for developers.
ОтветитьWhy did his voice change so much
ОтветитьFlow errors for the hmac right?
ОтветитьThank you for sharing! I need advice: My OKX wallet contains some TRX 20 USDT, and I have the seedphrase: clean party soccer advance audit clean evil finish -tonight involve whip -action-. How should I go about transferring them to OKX Exchange?
now we use deffie hellam key exchange because of forward secrecy
Ответитьhow does step finance help traders manage impermanent loss?
ОтветитьThe British are coming 😂
ОтветитьWeb3 Infinity is igniting the crypto world! Get onboard and witness its incredible rise!
ОтветитьThe team behind Web3 Infinity is devoted and talented. They have what it takes!
ОтветитьLooking forward to what Web3 Infinity has in store for us. The future looks promising!
ОтветитьWeb3 Infinity is gonna explode anytime soon
ОтветитьWeb3 Infinity is going burst anytime soon
ОтветитьWeb3 Infinity's community is developing swiftly, and that's always a positive indication. Looking forward to its destiny!
ОтветитьWeb3 Infinity is about to go off the rails.
ОтветитьI see potential in Web3 Infinity's long-term sustainability. It's worth considering for investment.
Ответитьcracking algorithms with quantum computers in 2025 - This aged really well
ОтветитьI was taught all this before mids of my first semester. I am doing Electrical Engineering btw.
ОтветитьExclamation to the Point.
Ответитьwhy poe hahahahahaha
ОтветитьIf you are storing both the salt and the password-digest in the database, then won't the hacker still be able to easily determine the password (like "password123") the same way he could before without the salt? I would guess that if the hacker was able to steal the password-digest from the database, he would be able to steal the salt, too.
Ответитьyear 2025 is just 15 days away, within last month China and google have released their quantum chips. 105qubits in willow and 504 in tianyuan. they can very much solve any encryption
ОтветитьGreat explanation! Quick side question: I have the SafePal Browser Extension Wallet with USDT, and I have the seed phrase. (job priority warm lab border boil monkey manage palace fiber weird ask). Could you guide me on how to transfer them to Binance?
ОтветитьYou’re a wizard fire ship. ❤
ОтветитьBabbling like a robot, too fast, with this so annoying pretentious American accent !! Thumbs down....
Ответитьi have cracked it
it is s*******er
const hash = "5e7d28e2cfff93edefb2d15abad07ec5"
Hashtype: "md5";
const hacked = " superhacker"
I hit "Y" with my right hand
ОтветитьDecrypted Hash Value
superhacker
This is so basic, why do people even care to create such videos?
Here's a better topic (suggestion): explain the subtle algorithmic differences between the major existing crypto coins.
it must be in two parts with more details .
ОтветитьI have a jsr caeser cipher craker: "@jameswinslow/caeser-cipher-cracker"
Ответитьwhy can't a data breach can breach key and IV itself along with hashed password
ОтветитьI don't get it, how is anything with a public key safe? since the key is public anyone can decrypt the data or not?
ОтветитьNever seen a video so succinctly put together yet wildly informative
ОтветитьНе плохая связка. Процесс использования, такой же легкий, как у предыдущих
ОтветитьO'Hara Neck
Ответитьlike first then watch
Ответить2025?? Bro from the future
ОтветитьI love cryptography! I love it! Now let me scramble these eggs: gegs. sgeg. Yeah, there are only so many ways to scramble eggs, but I love cryptography guys!
ОтветитьIt's pretty easy to understand the math once you visualize it. And once you visualize the visualization; that's when it gets terrifying. Bcos everything breaks apart. But in a good way, bcos it's meant to break apart there, bocs that's why cryptography is super hard to compute - for machines. Which also makes it safe. Until quantum computers...
Ответитьdeath to javascript
ОтветитьLegalize the hash!
ОтветитьStill nobody on earth has been able to tell the exact Cryptography method or hashing mechanism or algorithm used in crash game
ОтветитьStill nobody on earth has been able to tell the exact Cryptography method or hashing mechanism or algorithm used in crash game
Ответитьnice
Ответить