7 Cryptography Concepts EVERY Developer Should Know

  ΠŸΠ΅Ρ€Π΅Π³Π»ΡΠ΄Ρ–Π² 1,277,308

Fireship

Fireship

Π”Π΅Π½ΡŒ Ρ‚ΠΎΠΌΡƒ

Cryptography is scary. In this tutorial, we get hands-on with Node.js to learn how common crypto concepts work, like hashing, encryption, signing, and more fireship.io/lessons/node-cryp...
πŸ”— Resources
Full Tutorial fireship.io/lessons/node-cryp...
Source Code github.com/fireship-io/node-c...
Node Crypto nodejs.org/api/crypto.html
πŸ“š Chapters
00:00 What is Cryptography
00:52 Brief History of Cryptography
01:41 1. Hash
04:07 2. Salt
05:47 3. HMAC
06:35 4. Symmetric Encryption.
08:19 5. Keypairs
09:29 6. Asymmetric Encryption
10:22 7. Signing
11:31 Hacking Challenge
πŸ”₯ Get More Content - Upgrade to PRO
Upgrade to Fireship PRO at fireship.io/pro
Use code lORhwXd2 for 25% off your first payment.
🎨 My Editor Settings
- Atom One Dark
- vscode-icons
- Fira Code Font
πŸ”– Topics Covered
- Cryptography for Developers Basics
- Crypto algorithms: SHA, MD5, argon2, scrypt
- How password salt works
- Encryption vs Signing
- Difference between Asymmetric vs Symmetric Encryption
- How hacking works and hacks are prevented

ΠšΠžΠœΠ•ΠΠ’ΠΠ Π†: 983
@prowhiskey2678
@prowhiskey2678 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
I really appreciate that you came back on your past mistake of using md5
@owacs_ender
@owacs_ender 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
This makes me happy, even if my original comment on the matter got deleted lol
@yassin_eldeeb
@yassin_eldeeb 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
and he has used it for the hacking challenge, very clever..no one thought that you'll use md5 again after correcting the past video mistake πŸ˜‚πŸ˜‚
@beyondcatastrophe_
@beyondcatastrophe_ 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
Whoops
@rice5817
@rice5817 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
I was thinking "dude... MD5 was unsafe when I was in senior high 15 years ago..." 🀣 Good thing he owned up to his mistake πŸ‘
@kaporos
@kaporos 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
@@yassin_eldeebHe did that to give the proof that md5 is outdated
@alessiocosenza295
@alessiocosenza295 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
9:44 Actually, HTTPS uses asymmetric encryption to establish the identity of the parties and to exchange a symmetric key. Then symmetric encryption is used since it's faster
@alexlotito3884
@alexlotito3884 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
u right
@aba22125
@aba22125 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
I'm always doing that with my networking code, but I still don't understanding signing. So I simply require the client to give a shared password to the server to confirm its identity. If password is wrong for whatever reason or isn't provided in time, the thread simply raises an error and the client is kicked out from accessing the server in any way.
@jimbobur
@jimbobur 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
Came here to say this. It's just used for the handshake.
@gravy1770
@gravy1770 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
@@FinlayDaG33k so that means TLS uses asymmetric encryption, right?
@FinlayDaG33k
@FinlayDaG33k 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
@@gravy1770 asymmetric to establish the shared secret before swapping to symmetric.
@hannes-
@hannes- 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
So whose password are we collectively brute-forcing for you in the challenge? :D
@favourbede5889
@favourbede5889 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
πŸ˜‚πŸ˜‚πŸ˜‚ Good question πŸ˜‚πŸ˜‚πŸ˜‚
@SirusStarTV
@SirusStarTV 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
Hahaha
@festyVAL21
@festyVAL21 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
loool 🀣🀣
@layeekromah4799
@layeekromah4799 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
It's probably the lifetime account password, if you crack it is yours
@mulwelimushiana8388
@mulwelimushiana8388 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
πŸ˜‚πŸ˜‚πŸ˜‚ I did not see it that way at first but you make a lot of sense
@MrSamkots
@MrSamkots 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
How to create a great UKposts channel? Step 1: automatically know what the viewers want in the next video Step 2: squeeze the complex content in shortest possible duration Step 3: throw in some smooth humour without changing the tone Step 4: throw in some cool animations Step 5: use dark background πŸ’―% perfection!
@KangJangkrik
@KangJangkrik 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
This comment need to be pinned
@eliasziad7864
@eliasziad7864 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
PX ODLT HXDABNUO 9 Let's see if you guys can decrypt this message.
@shokifrend77
@shokifrend77 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
​@@eliasziad7864 rickroll would have been funnier
@eliasziad7864
@eliasziad7864 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
@@shokifrend77 First tell me what the message said?
@slez8364
@slez8364 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
Can't get more accurate β™₯️
@DenisTRUFFAUT
@DenisTRUFFAUT 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
Once you deep dive into cryptography you find that, even the strongest encryption algorithm in the world is weak if the user input is weak. The best course of action is to have an input that does not come from the user (I mean a generated password like a sha-512 hash). Ideally that entry is stored on the client device.
@catalintudorciurte309
@catalintudorciurte309 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
Garbage in... Garbage out
@marioytambor
@marioytambor 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
Definitely, only randomly generated or diceware are acceptable
@ikazuchi-san5772
@ikazuchi-san5772 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
yep
@chiragsingla.
@chiragsingla. 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
thats why 8 charcter is a standard
@SirusStarTV
@SirusStarTV 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
I started using password manager and updated most passwords to unrememberable computer generated ones.
@GalacticApple
@GalacticApple 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
10 hours of this topic at uni and I understood things about 80% of the way. I'm confident that if I watched this I would've been at 100% in 12 minutes.
@cybermoneyxchange3230
@cybermoneyxchange3230 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
Hi how's the journey so far? Where can I get the 10 hrs lesson?
@lookupverazhou8599
@lookupverazhou8599 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
@@cybermoneyxchange3230 at uni
@agungkrisna4544
@agungkrisna4544 Π Ρ–ΠΊ Ρ‚ΠΎΠΌΡƒ
@@berb_yt This is what I'm experiencing right now :>
@ekremaslan8068
@ekremaslan8068 Π Ρ–ΠΊ Ρ‚ΠΎΠΌΡƒ
They teach most things so slow that it becomes impossible to understand
@jessh4016
@jessh4016 10 місяців Ρ‚ΠΎΠΌΡƒ
I always hate these comments tbh. It's just not possible a general, brief overview to give you more than 10hrs of uni classes. Idk if you were sleeping or drunk in class, but even though this video is great, it's simply not able to cover that much info in 12min. Hope you've learned how to pay attention.
@brucewayne2480
@brucewayne2480 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
@02:08 you said that the hash is unique , given that the result has a fixed length you can't map infinite strings to a fixed length string without loosing unicity
@Fireship
@Fireship 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
Good point, "unique as possible" would have been a better phrasing.
@yakov9ify
@yakov9ify 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
Its unique for all practical purposes for the modern cyphers uses today. Afaik for SHA256 no one has ever been able to find a collision. That being said you are correct in that any hash by definition cannot be injective.
@brucewayne2480
@brucewayne2480 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
@@yakov9ify Yes , by definition hash functions have low probability of collision. And like you said they are surjective functions
@YandiBanyu
@YandiBanyu 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
Well yes, that is what is called collision. But the idea of a hash is also that collision is hard to find (with a systematical method other than sheer brute force). Different input can be mapped to the same output. However, even the slightest change in the input (say, a bit flip) will change the output significantly. This, makes finding two input with the same output quite hard.
@precumming
@precumming 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
There's also the matter of that text converted to bytes which is then hashed, it's unlikely if there is a collision that the input can actually be created from the bytes from text, so there's some accidental security there. However random bytes which are hashed lack this "feature". If there is a collision with text inputs it's also likely that the password used is weaker than the other input that returns the same hash, so there's no downside.
@danvilela
@danvilela 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
Jeff wants to crack his girlfriend's password and put it as a challenge on his youtube channel. Well played bro!
@ayushverma5151
@ayushverma5151 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
I think he's married
@zakharkholboiev842
@zakharkholboiev842 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
@Daniel Vilela, πŸ˜‚
@MrRaja
@MrRaja ΠœΡ–ΡΡΡ†ΡŒ Ρ‚ΠΎΠΌΡƒ
@@ayushverma5151 wife then it is
@abh1yan
@abh1yan 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
The quality of this video is literally perfect...
@stachowi
@stachowi 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
loved every minute,
@kaporos
@kaporos 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
Every fireship's videos are perfect haha
@tranquility6358
@tranquility6358 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
@ around 02:12 argon2 is listed as a hashing algorithm. It's more accurate to refer to it as PBKDF (Password Based Key Derivation Function), especially since you stated that hashing algorithms need to be fast to compute. Argon2 doesn't fit that description. It's acceptably fast to compute (It's orders of magnitude slower than say sha256) and that's by design, so that it becomes unfeasible to brute force them. It's also designed to account for increases in computational power over the years as you can make it harder to compute by increasing the amount of memory used to generate the derivative.
@tfr
@tfr 6 місяців Ρ‚ΠΎΠΌΡƒ
i’ve noticed this in my api. I use 512kb of memory to hash and store user passwords but 128kb for api keys. it takes the server about 1.5 seconds to hash using 512kb which isn’t unreasonably slow but compared to sha256 or bcrypt, it’s like a snail. verifying api keys on each request with just a hash is also somewhat computationally intensive so that’s why i dropped the api key memory to 128kb. somewhat decent security balanced with speed. besides, i’d rather have my limited permission based api key brute forced than my password
@bytesizedfeed
@bytesizedfeed 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
I’m currently taking intro to security and this is exactly what we are learning. Thank you for explaining it so succinctly and with amazing visuals and code
@artemabovian4840
@artemabovian4840 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
I think this the first UKposts video where I actually set playback time to value lower than 1
@tutorjonas4149
@tutorjonas4149 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
Thanks for making theses videos. You're creating a mind map for developers to get a grasp of the vast technology landscape - props to you, your content is truly unique and high quality too.
@orzhovthief
@orzhovthief 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
Another important feature of hash algos is that similar inputs yield very different outputs, that way, you cannot guess that your getting close.
@rahesc
@rahesc 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
Awesome sum up of crypto concepts for developers in under 12 minutes, really to the point, impressive
@johncardozo
@johncardozo 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
I really love every single video you post, they're so useful but this one... Wow! Thanks for sharing your knowledge πŸ€™πŸΌ
@nativeKar
@nativeKar 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
The quality of content and the presentation of it keeps getting better with each video. I cannot be any more thankful to you than I already am for putting this out for free. I've learnt tons from this channel.
@phpsoftwareengineering
@phpsoftwareengineering 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
I second that!
@midas6659
@midas6659 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
I'm subscribed to a f*ck ton of coding channels but this one is by far my favorite! So straight-forward and highly informative with a visual to complement it! I love how you explain a concept and then will proceed on with various examples as well as implementations. Keep it up bro!
@KishitaVariya
@KishitaVariya 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
Perfect! the video is upto the point - explaining all the concepts needed for a newbie to dive-in!
@baddrivers759
@baddrivers759 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
Great start. I'd also add that the Public/Private Certificate is actually used to negotiate a random symmetric key which is used once the channel is opened. Why? Public/Private encryption is SLOW. This would be a great segway into Diffie-Hellman key exchange.
@adyanrehan3360
@adyanrehan3360 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
Assembly in 100 seconds
@simondoesstuff
@simondoesstuff 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
You maniac
@bravo________87372
@bravo________87372 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
If he did a risc based architecture like ARM it might be doable
@multiarray2320
@multiarray2320 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
Assembly in 100 hours
@adyanrehan3360
@adyanrehan3360 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
Talking about assembly in a whole I mean all architectures including x86 and risc
@ikazuchi-san5772
@ikazuchi-san5772 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
that would be fun tbh
@ArpitKumarSuman
@ArpitKumarSuman 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
You make hard concepts very easy. Thank you for the great contents.
@marcosandreslerin7470
@marcosandreslerin7470 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
It would be cool if you could create more videos like this to explain more every concept.. awesome work!
@divyanshusah2809
@divyanshusah2809 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
I've used hash but not salt. Thanks for bringing this to me Jeff
@naheliegend5222
@naheliegend5222 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
use salt & pepper
@VivekYadav-ds8oz
@VivekYadav-ds8oz 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
I hope you didn't do this in production dawg 😯
@shaikhshafeen
@shaikhshafeen 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
You made JS look like a pancake! I wish I could get a good JS course from instructors like you.
@arcticspacefox864
@arcticspacefox864 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
Great vid, on RSA don't forget that it is getting really slow with increasing key size. This is why many providers are switching to elliptic curve cryptography ^^ That is way faster and needs smaller keys.
@tobiasaddicks9695
@tobiasaddicks9695 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
Also it's often implemented poorly when it comes to the generation of the required primes which leads to many public keys sharing prime-compartments
@arcticspacefox864
@arcticspacefox864 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
@@tobiasaddicks9695 exactly, but id say is a good video for beginners
@aba22125
@aba22125 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
Ohh never heard about this. I'm still use RSA 1024bit keys. Not that anyone would care to hack me so I'll just keep using it for now.
@darkpoker13
@darkpoker13 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
(Sorry for necroposting) I didn't want to go into details in my comment above, but there are multiple reasons why RSA isn't great nowadays. To make a short list: 1. You need quadratically increasing key size instead of linear increasing key size to get the same amount of security bits because of the reliance on prime numbers (AKA keys can get really big really fast and this will only get worse). 2. Key generation include a "brute-force" step, which makes key generate really slow. This is especially problematic for key exchanges, as this is a pattern seen in the wild. Apart from that, pretty much every operations is slower with RSA then with Elliptic Curves. 3. The way key generation work, your whole security model relies on the fact that your key is "probably" prime... 4. RSA design makes it a good target for timing attacks, depending on the implementation (this is also a reason why AES is slowly getting phased out in favor of chacha20) 5. RSA is badly broken with quantum computers because of Shor's algorithm. The danger with quantum computers isn't that they're so fast they could bruteforce any cryptographic primitives that classic computer can compute, it's more that quantum computers gets access to new quantum algorithms that can solve some previously "unsolvable" mathematical problem with way more ease then classical computers, so not all primitives are affected the same way.
@lawrencedoliveiro9104
@lawrencedoliveiro9104 Π Ρ–ΠΊ Ρ‚ΠΎΠΌΡƒ
Quantum computers that can run Shor’s algorithm are vapourware, and destined to remain that way indefinitely.
@prowhiskey2678
@prowhiskey2678 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
Nice video, it covers a lot of really important topics in a easy to understand way
@bennthewolfe
@bennthewolfe Π Ρ–ΠΊ Ρ‚ΠΎΠΌΡƒ
Great job on this video. Really awesome. I love the challenge at the end. Great content! Thank you for sharing.
@tristanbouchard9997
@tristanbouchard9997 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
Exactly what I needed to get started with a user account system for my website. Thanks lots!
@khangle6872
@khangle6872 Π Ρ–ΠΊ Ρ‚ΠΎΠΌΡƒ
For school or just knowing the basic, that ok, but you should not implementing your own authentication system in a real product
@omer0844
@omer0844 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
Always makes my day when Fireship uploads. Keep up the amazing work, I learned so much from your channel and website. :)
@piratacd2005
@piratacd2005 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
dude you are awesome, I read a book called Mastering bitcoin and I understood most of this but you just killed it in this short video as always. πŸ™ŒπŸ½
@gamefun2525
@gamefun2525 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
Top tier content. This channel is what I am going to tell people to refer to for any web related knowledge.
@yassin_eldeeb
@yassin_eldeeb 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
my god. that was the best Cryptography video I've ever watched πŸ”₯
@Harmxn
@Harmxn 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
I just started learning this and now you made a video about it You have the best timing
@knaz7468
@knaz7468 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
The red light green light scene was subtle and terrific. Video taught me a lot as well as per usual.
@nagasaipurvaz4251
@nagasaipurvaz4251 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
My diploma project is to make hash function for cryptography I took the 256 hash and 512 hash and my collage accepted it ,it was just hashing the hash function again
@Remolhunter97
@Remolhunter97 Π Ρ–ΠΊ Ρ‚ΠΎΠΌΡƒ
A whole semester saved by this man, thank you brother
@egorgor
@egorgor 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
Thank you for the great tutorial. I like this hands-on approach!
@c.e.o.9985
@c.e.o.9985 Π Ρ–ΠΊ Ρ‚ΠΎΠΌΡƒ
You've summarised entire Internet Security lessons in 11:54 minutes of video. It's incredible πŸ’ͺ
@PatricioHondagneuRoig
@PatricioHondagneuRoig 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
This is one of your best videos, hands down. Thanks for sharing Jeff!
@willemvdk4886
@willemvdk4886 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
The mailbox analogy for public/private key is quite brilliant! Good job
@skillz7
@skillz7 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
Just thinking about cryptography 1 hr ago . This guy is a magician . First I share fireships video than I start watching it
@cmilkau
@cmilkau 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
Awesome to include HMAC and what it's used for. Unfortunately, it could be made more clear what the actual difference between hash and hmac is, as it is a common mistake to use hashes where hmacs should be used.
@kylector
@kylector 11 місяців Ρ‚ΠΎΠΌΡƒ
what are the different use cases for a hash vs hmac?
@xbutterguy4x
@xbutterguy4x 11 місяців Ρ‚ΠΎΠΌΡƒ
@@kylector The use case for regular hash functions is to provide data integrity. If even one bit changes in the data, then when you run it through the hash, it would be very obvious the data was altered. The use case for hmac is to provide data integrity but also to provide authentication; AKA verifying the data was sent from the right person. This is because only the person with the correct password can produce the hash of the message they sent you.
@vighnesh153
@vighnesh153 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
"Angular is the best" - Jeff (2nd November 2021)
@cmilkau
@cmilkau 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
Amazing that timing attacks and initial vectors are explained!
@RudolfKlusal
@RudolfKlusal 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
Finaly a video in which the half is not clickbaity claims and explaining what the Byte is ❀ Thank you πŸ™‚
@theocrob
@theocrob 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
I love your videos! You have perfect graphics and damn I love that upload schedule.
@HECTORARTUROA
@HECTORARTUROA Π Ρ–ΠΊ Ρ‚ΠΎΠΌΡƒ
7:45 AES: Advanced Encryptation Standard: many hashes for the same text. 8:30 Public Key Cryptosystem: public key and private key. 9:30 Asymetrics encryptation: https; RSA + SHA.
@winken2666
@winken2666 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
This helped me a lot when building my own secure signup/signin functionality :) also came in handy when generatinh hash for account activation emails
@jadeedstoresupport8916
@jadeedstoresupport8916 8 місяців Ρ‚ΠΎΠΌΡƒ
While I find all Fireship channel's videos useful, this one was especially helpful to me as it allowed me to finally dissolve my chronic confusions about Crypto concepts and gain nice clarity. I found your use of simple yet concrete hands-on examples, your logically moving from one concept to the other (while comparing and contrasting each), and your use of memorable analogies very helpful. Thanks for the good work. God bless.
@azatecas
@azatecas 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
how do you do those animations at the beginning of every video? it looks so awesome, this is killing me for the last few months
@funkyjoshk
@funkyjoshk 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
Check out his second channel 'Jeff Delaney' he provides some good insight over there!
@bbbbburton
@bbbbburton 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
I believe browsers do not encrypt using the certs public key, and then the server decrypts. The TLS protocol let's browsers and web servers establish a symmetric key which is used to encrypt and decrypt traffic.
@PrinjuVaidyan
@PrinjuVaidyan 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
You are so smart...knowing every aspect of this industry Respect bro
@edgeofsanitysevensix
@edgeofsanitysevensix Π Ρ–ΠΊ Ρ‚ΠΎΠΌΡƒ
I've been a developer 20 years and never seen this topic explained so simply. Even I learned something.
@WesleyOverdijk
@WesleyOverdijk 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
On a side note, the salt works because it makes those rainbow tables useless. It also forces you to make a new table for every user since they all have their own salt. However, storing the salt like that is also not ideal because it makes it easier to use when generating your own tables. So when computing catches up you're more vulnerable in case of a data leak. Best is to also store those salts securely using for example a private key that rotates (updates). Although almost none of us need that level of security it's still fun to think about.
@flodderr
@flodderr 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
If a hacker just splits the hash like he did in the code. Isnt that the same as having no salt at all?
@ojtechml
@ojtechml 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
@@flodderr yep seems like it.
@gerasTheMessiah
@gerasTheMessiah Π Ρ–ΠΊ Ρ‚ΠΎΠΌΡƒ
Joining them with β€œ:” it’s like hinting it a la captain obvious 5:44
@britney_david
@britney_david 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
Hello, I'm new to Biticon trade and l've been making huge losses but recently i see a lot of people earning from it. Please can someone tell me what to do?
@Jeffrey_Ambrose
@Jeffrey_Ambrose 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
@Kelvin Well, you are saying the fact. I invested $4,000 with Mrs Annabelle Hartfield , and earned $12,000 in 7 working days.
@brucedylan8364
@brucedylan8364 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
In Bitcoin investment, determination to take risk is one of the major factor required because it takes a brave heart to make money this days.
@salmakenzie6870
@salmakenzie6870 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
Being a newbie in Bitcoin investment and trading is very discouraging but since I met Mrs Annabelle Hartfield , she has really been careful in handling my investment.
@progressj2715
@progressj2715 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
Many people are afraid to be invest because of the Scammers in the business
@progressj2715
@progressj2715 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
Yes there are scammers in the business just like it's in every other business but there are also legit brokers out there for investors and Mrs Annabelle Hartfield is one of the real and legit brokers out there.
@yash1152
@yash1152 Π Ρ–ΠΊ Ρ‚ΠΎΠΌΡƒ
3:30 thanks for mentioning argon2 - didn't know about this 5:30 timingSafeEqual to prevent timing attack - wow, i had thoughts about that (timing attack) but didn't know it was a real thing
@hargunbeersingh8918
@hargunbeersingh8918 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
Um that was a whole month of reading articles on cryptography and you summarised that in 10 mins :_) appreciate your skill
@Aminsx_
@Aminsx_ 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
I'm so early that the video is in 360p edit: superhacker
@RanjanKumar-bu7ws
@RanjanKumar-bu7ws 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
Sa.e
@590af
@590af 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
Hmmm, That was a lot to "digest"
@danieldosen5260
@danieldosen5260 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
watched a couple of videos... top notch on pacing and editing! (and humor).
@carlosdumbratzen6332
@carlosdumbratzen6332 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
probably one of the best classes I had in school was when we programmed our of rsa code. The math was really interesting and to implement it in code was also interesting and the usefullness was imeddiately obvious
@0jinx
@0jinx 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
You just summarized my 3 month university course into 12 min πŸ˜‚πŸ˜‚πŸ˜‚. I completely love your videos ❀️
@YandiBanyu
@YandiBanyu 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
Haha, that challenge was fast Edit: Also, adding to the awesome video, cryptography, no matter how strong the math behind it is, if badly implemented will still be vulnerable.
@soumyajitdey5720
@soumyajitdey5720 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
How did you solve it?
@YandiBanyu
@YandiBanyu 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
@@soumyajitdey5720 check the hash type and then use a well known weakness for those hash. It is quite trivial and it shows the point of salting. Spoiler warning!!! . . . . . . . . . . . It is MD5 without a salt and then you just use a lookup table.
@soumyajitdey5720
@soumyajitdey5720 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
@@YandiBanyu great! Was thinking along the same lines but you were quicker πŸ˜‚ Good job! πŸ‘
@YandiBanyu
@YandiBanyu 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
@@soumyajitdey5720 I didn't get the challenge either lol. Watched the vid 6 minute after release and the challenge were already solved.
@Drygear1
@Drygear1 ΠœΡ–ΡΡΡ†ΡŒ Ρ‚ΠΎΠΌΡƒ
Very good channel with to the point content, spiced up humor! Thanx!
@jannikmeissner
@jannikmeissner 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
I am so happy to see this video after the great API video that had the big MD5 problem ;)
@chauffeur1560
@chauffeur1560 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
hackers would watch this in reverse
@bensingleton3128
@bensingleton3128 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
I have a midterm for my IT Security class literally tomorrow, this video came out at the perfect time and was a great little review for me. How does Fireship always know exactly what I want when I want it?
@devnol
@devnol 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
Jeff is a friend of Zucc so he has all of our data and runs a simulation of all of our brains in virtual machines and can thus determine exactly what video everyone wants at any given time.
@KatzeMelli
@KatzeMelli 5 місяців Ρ‚ΠΎΠΌΡƒ
my lord, it took my professor 3 hours to explain those concepts in a completely messy way. This was clean, comprehensive and to the point. I love the practical application as well.
@rajdave7357
@rajdave7357 Π Ρ–ΠΊ Ρ‚ΠΎΠΌΡƒ
sir please answer this 1. from where you learn such concepts?? 2. you have made video on almost every cs tech, how are you able to do it? 3. top 10 website or blog or something else you follow in order to be aware of what's going on around and in tech
@nechilion
@nechilion 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
One great book about cryptography and steganography (similar techniques to the bald guy moment) is "The Code Book" by Simon Lehna Singh. Highly recommend it as it explains the evolution of this "math thing" from the beginning to our days in a very intuitive and easy-to-understand way.
@vdemcak
@vdemcak 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
So early that it's still 360p
@santanumukherjee4108
@santanumukherjee4108 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
Great content πŸ‘Œ keep up the good work πŸ‘
@user-ur3gr2qs6i
@user-ur3gr2qs6i 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
Great content, keep up the great work. Nobody Boo this man!!
@AnesuC
@AnesuC 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
I like how no one in the comments mentioned the "the british are coming!" Reference haha
@asdf8asdf8asdf8asdf
@asdf8asdf8asdf8asdf 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
Pretty sure if he had put β€œLet’s go Brandon” there would’ve been some response
@yournerdiness3135
@yournerdiness3135 Π Ρ–ΠΊ Ρ‚ΠΎΠΌΡƒ
4:53 for the people confused on this (including past me), scrypt is not just a function for salting hashes, it also takes longer to compute (which it does by basically running SHA a bunch of times). It still only takes a few hundred milliseconds, so it can still be used, but it makes brute force attacks significantly harder.
@sunil5656
@sunil5656 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
*Your method of explanation is awesome πŸ‘Œ πŸ‘. We πŸ’– that*
@DaCurse0
@DaCurse0 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
You can also just prefix whatever you're hashing with the salt and use any hashing algorithm like that, just make sure to do it when comparing as well.
@sergeykosarchuk6388
@sergeykosarchuk6388 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
Nice vid πŸ”₯ But I can’t get one thing. Why did you use fixed separator (:) for storing hash and salt? Isn’t it oblivious for the attacker which part is what. Mb better option will be to use fixed length?
@YandiBanyu
@YandiBanyu 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
Sure it is oblivious. But to generate the resulting hash, you need to add the salt. This means that a password if hashed (say "abc") will be the result of "abc"+salt. Now if each user has unique salt, it means lookup table attack is pointless and the hacker need to attack each hash independently.
@mikelinsi
@mikelinsi 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
@@YandiBanyu and i believed all the time, we should not save Salt in the DB. Just have it in the Application Ram. So if the Database lost. the Salt is independent..
@YandiBanyu
@YandiBanyu 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
@@mikelinsi Well, the problem with that is, if you have an upgrade to your application, those salt are lost. Remember, to check the password you need the salt and then hash them then compare the result. Without salt, you cannot check the user anymore. Also, you should use different salt for each user.
@softwarelivre2389
@softwarelivre2389 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
It was used as an example. One should use fixed size salts for the reason you showed.
@leisti
@leisti 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
It's just a technical detail. If the salt and password lengths are constant, a separator wouldn't be needed. Or they could even be stored in different columns. Doesn't really matter. Also, if using a single field that combines the salt and the hash, trying to depending on an attacker not knowing where in the field the divide is would be a type of security-by-obscurity, which doesn't work anyway, so you might as well put the separator there, for your own convenience.
@ALXG
@ALXG 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
You know you're among the first viewers when you have to watch it in 360p lol πŸ˜‚
@konstantinosbourantas7999
@konstantinosbourantas7999 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
Thank you for the great content! πŸ™
@danvindsouza2725
@danvindsouza2725 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
*The Perfect Video That Gives An Abstract & Well Defined Summary About Cryptography, Another Thing I Like About The Videos You Make Is That You Don't Waste Any Time On Unnecessary Details & Make Quality Content*
@po350
@po350 11 місяців Ρ‚ΠΎΠΌΡƒ
always have very little understanding the pub and priv key pairs until now. thank you for the mail box analogy. it helps clearing the concept cloud...
@flodderr
@flodderr 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
If you store the salt appended to the password like that in the database. And said database gets hacked. Isnt it then super easy for the hacker to do the same split on the colon and run the password hash against the rainbow table again?
@chrissdehaan
@chrissdehaan 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
The salt is appended, but then gets mixed together with the password during the hash, so in the final result hash it's all jumbled together. There's no easy way to split it out.
@flodderr
@flodderr 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
@@chrissdehaan yea but then he appends the salt to the hashed password and pushes that to the DB. So a hacker has the salt anyway if he sees a colon in the value
@chrissdehaan
@chrissdehaan 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
@@flodderr It's not quite in that order. It doesn't go: 1) Hash 2) Append salt It does go: 1) Append salt 2) Hash The salt is appended to the password first, then that whole string is hashed next. That means the salt mixed around through the whole result, and can't be seen or split out easily.
@flodderr
@flodderr 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
@@chrissdehaan I understand what you're saying but look at his code again. On the 2nd line of the signup function he does exactly what you say. But then on line 4 of that function he makes a user variable to push to the DB that exists of again the salt + the hash of salt with password. Im confused why he does it like that
@miha493
@miha493 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
You forget main technology of widely used by both government agents and theirs not so legal opponents for decryption. Thermorectal cryptanalysis is very effective, fast, eco-friendly (because it uses really energy efficient hardware, 50 watt decription device is powerful than enough for most situations) and required relatively low qualification for operators.
@mlgpro6194
@mlgpro6194 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
What are u talking about? Xd
@PeterPan-ev7dr
@PeterPan-ev7dr 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
Haha thermorectal, all your secrets belong to us πŸ˜‚
@pushock
@pushock 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
Thanks a lot, this is very useful! Please keep going! :)
@speksuperhero
@speksuperhero 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
I'm here not for the information but for nice editing πŸ”₯πŸ”₯
@sebbes333
@sebbes333 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
2:13 -ish. Is "a hash of a hash" more secure than just a simple single "hash"? secret --> hash_1 --> hash_2 is hash_2 more secure than hash_1 ?
@lawrencedoliveiro9104
@lawrencedoliveiro9104 Π Ρ–ΠΊ Ρ‚ΠΎΠΌΡƒ
Yes. For example, I saw a PHP password algorithm using MD5, which sounds bad. But it iterates the hash 8000 times, which is good. Not suitable for cryptographic message hashes, but good for password hashes.
@toniferic-tech8733
@toniferic-tech8733 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
Itβ€˜s easier to understand the concept of public key, when it is represented with a padlock symbol, rather than a key. The private key then unlocks the closed padlock.
@blessinghirwa
@blessinghirwa 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
wait, where do you get just background voice in your videos? Your Gifs and background voices are amazing πŸ™Œ
@danbesu
@danbesu 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
Hi! This is. so cool! How would it be if you guys made a playlist called "Every dev should know"??
@_timestamp
@_timestamp 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
Laravel in 100 seconds
@CarolPLopez-qh9qj
@CarolPLopez-qh9qj 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
I'm actually tired of worrying about stocks...it's driving me nuts these days,I think crypto investment is far better than stock..
@wyattwilliam1066
@wyattwilliam1066 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
Stocks are good but crypto is more profitable
@evelynhannah3147
@evelynhannah3147 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
I'm new to forex trade and I have been making huge losses but recently see a lot of people earning from it.can someone please tell me what I'm doing wrong
@avaelijah5393
@avaelijah5393 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
@@evelynhannah3147 All you need now is a professional broker else you gonna continue blowing of your account
@jeremysanchez5545
@jeremysanchez5545 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
Mr Dennis services is working for me at the moment and am making good profits from forex and crypto trading.
@user-mc6lh9sf7i
@user-mc6lh9sf7i 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
@@jeremysanchez5545 Same here, it’s four months now I started investing with him and it's been good experience
@prasannakapilsamayamantri6405
@prasannakapilsamayamantri6405 Π Ρ–ΠΊ Ρ‚ΠΎΠΌΡƒ
very helpful to undersand basic crypto concets in short time.
@sodiumsalt
@sodiumsalt 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
This couldn't have come to me at a better time. Thanks!
@threesidecreaters2572
@threesidecreaters2572 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
A video on making a portfolio website pls. 😭
@TheKrister2
@TheKrister2 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
Maybe search first next time? ukposts.info/have/v-deo/iWdyg6yOp3-HqYk.html
@anupamdahal7029
@anupamdahal7029 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
More Rust, OS tuitorial with Rust
@VivekYadav-ds8oz
@VivekYadav-ds8oz 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
I would not rush him with Rust videos, considering that the last one was a catastrophic blunder of misinformation. For Node/JS, no-one comes close to his content.
@VivekYadav-ds8oz
@VivekYadav-ds8oz 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
I think you might not be aware of Phil Opp's OS tutorial in Rust. It's a series of articles.
@abrarshahid3930
@abrarshahid3930 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
We want more of such challenges!
@tallyschwenkmusic
@tallyschwenkmusic Π Ρ–ΠΊ Ρ‚ΠΎΠΌΡƒ
Was already loving this video and then the spaceballs reference popped up and brought me true joy πŸ˜ŠπŸ˜‚
@kimchang4260
@kimchang4260 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
*When it comes to the world of investing,most people don't know where to start.fortunately,great investors of the past and present can provide us with guidance*
@goochoi4928
@goochoi4928 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
I'm so happy ☺️ my life is totally changed. I've been earning $10,250 returns from my $4,000 Investment every 13 days
@lucasoliver2378
@lucasoliver2378 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
Same here, I made $12,400 profits on investing since I started trading with Mr Grey Smith his trading strategies are too notch am winning consistently trading with Mr Grey Smith . He really the best broker I've made a lot of profit investing with him.
@christophercox6452
@christophercox6452 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
I heard a lot of investing with Mr Grey Smith and how good he is, please how safe are the profit?
@melashnikistna2151
@melashnikistna2151 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
@@christophercox6452 I trade with him, The profit are secured and over a 100% return on investment directly sent to your wallet.
@feliciaputri123
@feliciaputri123 2 Ρ€ΠΎΠΊΠΈ Ρ‚ΠΎΠΌΡƒ
After watching so many UKposts tutorial videos about trading I was still making losses untill Mr Grey Smith started managing my investment now, I make $6,800 weekly. God bless Mr Grey Smith . His been a blessing to my family.
Reacting to Controversial Opinions of Software Engineers
9:18
Fireship
ΠŸΠ΅Ρ€Π΅Π³Π»ΡΠ΄Ρ–Π² 1,9 ΠΌΠ»Π½
how to never write bug
7:20
Fireship
ΠŸΠ΅Ρ€Π΅Π³Π»ΡΠ΄Ρ–Π² 812 тис.
McDonald’s MCNUGGET PURSE?! #shorts
00:11
Lauren Godwin
ΠŸΠ΅Ρ€Π΅Π³Π»ΡΠ΄Ρ–Π² 24 ΠΌΠ»Π½
ЀОКУБ Π‘ ЧИПБАМИ (сСкрСт)
00:44
Masomka
ΠŸΠ΅Ρ€Π΅Π³Π»ΡΠ΄Ρ–Π² 3,8 ΠΌΠ»Π½
100+ JavaScript Concepts you Need to Know
12:24
Fireship
ΠŸΠ΅Ρ€Π΅Π³Π»ΡΠ΄Ρ–Π² 1,8 ΠΌΠ»Π½
I built the same app 10 times // Which JS Framework is best?
21:58
Fireship
ΠŸΠ΅Ρ€Π΅Π³Π»ΡΠ΄Ρ–Π² 2,4 ΠΌΠ»Π½
Why so many distros? The Weird History of Linux
8:23
Fireship
ΠŸΠ΅Ρ€Π΅Π³Π»ΡΠ΄Ρ–Π² 1,4 ΠΌΠ»Π½
How Quantum Computers Break The Internet... Starting Now
24:29
Veritasium
ΠŸΠ΅Ρ€Π΅Π³Π»ΡΠ΄Ρ–Π² 8 ΠΌΠ»Π½
I tried 10 code editors
10:28
Fireship
ΠŸΠ΅Ρ€Π΅Π³Π»ΡΠ΄Ρ–Π² 2,8 ΠΌΠ»Π½
CPU vs GPU vs TPU vs DPU vs QPU
8:25
Fireship
ΠŸΠ΅Ρ€Π΅Π³Π»ΡΠ΄Ρ–Π² 1,4 ΠΌΠ»Π½
10 Design Patterns Explained in 10 Minutes
11:04
Fireship
ΠŸΠ΅Ρ€Π΅Π³Π»ΡΠ΄Ρ–Π² 2,1 ΠΌΠ»Π½
God-Tier Developer Roadmap
16:42
Fireship
ΠŸΠ΅Ρ€Π΅Π³Π»ΡΠ΄Ρ–Π² 6 ΠΌΠ»Π½
10 weird algorithms
9:06
Fireship
ΠŸΠ΅Ρ€Π΅Π³Π»ΡΠ΄Ρ–Π² 1 ΠΌΠ»Π½
Why I Quit Copilot | Prime Reacts
35:56
ThePrimeTime
ΠŸΠ΅Ρ€Π΅Π³Π»ΡΠ΄Ρ–Π² 233 тис.
GitHub Copilot just got promoted to Captain
4:01
Fireship
ΠŸΠ΅Ρ€Π΅Π³Π»ΡΠ΄Ρ–Π² 441 тис.
I7 2600K тСст Π² ΠΈΠ³Ρ€Π°Ρ… ΠΈ сравнСниС с AMD Ryzen
17:53
Photo Changing Replace And Edit Backgrounds 65mn With These 10 Tips
0:53
Irfan AN Tech
ΠŸΠ΅Ρ€Π΅Π³Π»ΡΠ΄Ρ–Π² 260 тис.
ΠšΠ»Π°Π²ΠΈΠ°Ρ‚ΡƒΡ€Π° vs Π³Π΅ΠΉΠΌΠΏΠ°Π΄ vs Ρ€ΡƒΠ»ΡŒ
0:47
Balance
ΠŸΠ΅Ρ€Π΅Π³Π»ΡΠ΄Ρ–Π² 485 тис.
НС Π‘Π΅Ρ€ΠΈ INFINIX NOTE 40 ΠΈ NOTE 40 Pro, НС ΠŸΠΎΡΠΌΠΎΡ‚Ρ€Π΅Π² Π­Ρ‚ΠΎ Π’ΠΈΠ΄Π΅ΠΎ!
28:34
РасПаковка Π”Π²Π°ΠŸΠ°ΠΊΠΎΠ²ΠΊΠ°
ΠŸΠ΅Ρ€Π΅Π³Π»ΡΠ΄Ρ–Π² 69 тис.
''БСсплатныС ΡƒΠΌΠ½Ρ‹Π΅'' Π΄ΠΎΠΌΠΎΡ„ΠΎΠ½Ρ‹ для Π³Π»ΡƒΠΏΡ‹Ρ… людСй. Π—Π° Ρ‡Π΅ΠΉ счСт Π±Π°Π½ΠΊΠ΅Ρ‚?
12:48
Π’Π°Π΄ΠΈΠΌ Π¨Π΅Π³Π°Π»ΠΎΠ².ΠžΠΊΠΊΡƒΠ»ΡŒΡ‚Π½Ρ‹Π΅ ΠΈΠ³Ρ€Ρ‹ элиты
ΠŸΠ΅Ρ€Π΅Π³Π»ΡΠ΄Ρ–Π² 28 тис.
План Ρ…Π°ΠΊΠ΅Ρ€Π° 🀯 #shorts #Ρ„ΠΈΠ»ΡŒΠΌΡ‹
0:59
BruuHub
ΠŸΠ΅Ρ€Π΅Π³Π»ΡΠ΄Ρ–Π² 990 тис.