How End-to-End encryption Works?

How End-to-End encryption Works?

Hussein Nasser

4 года назад

32,815 Просмотров

Ссылки и html тэги не поддерживаются


Комментарии:

Harish Aseri
Harish Aseri - 18.03.2023 23:58

Buddy your videos are really addictive.

Ответить
Vinicius Melo
Vinicius Melo - 18.02.2023 22:16

You're the best! From daily doubts I have to more deep studying I do I can find some video here on your channel explaining topics with honesty and a great background. Thanks from Rio de Janeiro, Hussein!

Ответить
Baba Arab
Baba Arab - 23.05.2022 22:54

You are awesome Hussein! please upload more. Thank you for this video.

Ответить
Mr Xero
Mr Xero - 16.05.2022 05:56

Nice visual explanation😂

Ответить
Deepak Goyal
Deepak Goyal - 14.05.2022 12:48

Calls for a open-source messenger!

Ответить
sircitrus
sircitrus - 09.05.2022 08:07

Great video. Thank you!
Btw for persistence do we store that encrypted thingy in the DB directly?

Ответить
HK
HK - 18.03.2022 00:16

fantastic, so basically double encryption

Ответить
shanavas sana vlogs
shanavas sana vlogs - 15.03.2022 18:32

WhatsApp video call good r bad answer me bro. End to end encryption

Ответить
Red View
Red View - 13.03.2022 07:38

The classical two generals problem

Ответить
Adarsh Gupta
Adarsh Gupta - 18.02.2022 13:10

Great video Hussein. I have a doubt.
I read that private key is stored locally. So, if you log out all your previous data is lost (even if it's stored on server, it will be encrypted and since you lost the private key, you lost those messages).
So, how does telegram works. Like I can log-out and log-in, use different devices and, I get all of my messages.
So, are they storing private key somewhere? Or how does it work?

Ответить
Nick
Nick - 01.10.2021 04:49

Excellent explanation, no need for fancy visuals if it makes sense!

Ответить
You cannot say pop and forget the smoke
You cannot say pop and forget the smoke - 11.07.2021 16:32

Hey Hussein, awesome video (as always). I just had a question about how whatsapp's E2EE works in group chats. Lets say you are in a group with 100 or 500 people and you send a message that would mean the message being encrypted 500 times by each persons respective public key which seems very in efficient. I want to know what happens there, and it makes a great video IMO.

Ответить
Ausaf Ahmad
Ausaf Ahmad - 16.06.2021 22:33

If public part of the keys are meant to be public, why use DH to exchange them ?

Ответить
pvc
pvc - 08.06.2021 14:49

nice ps2

Ответить
joshua ifara
joshua ifara - 16.02.2021 03:08

Great explanation

Ответить
siddharth s kumar
siddharth s kumar - 06.12.2020 07:43

Hey can u talk about searchable encryption

Ответить
faizansm8
faizansm8 - 08.10.2020 23:03

Nasser, I like your way of explanation bruh. BTW I found you a double. Search Syed Shafaat Ali, your lost brother, he's too an engineer, but he turned comedian and imitation performer. You both are prominent in your profession. Godspeed

Ответить
Sara Singh
Sara Singh - 13.09.2020 18:42

Great explanation. Thank you for your efflorts

Ответить
Gaurav Mahakud
Gaurav Mahakud - 27.07.2020 19:30

Pro tip, Use More than two hands to explain things..or just use a diagram.

Ответить
Uli Troyo
Uli Troyo - 10.07.2020 19:12

Such a great explanation. Thanks, Hussein!

Ответить
x xyz
x xyz - 04.07.2020 13:13

Can u pls explain signal double ratchat algo and how to implement it . That will be very helpful

Ответить
Think Unlimited
Think Unlimited - 14.06.2020 20:37

gone overhead :(
try with some images, diagrams etc

Ответить
Palaniappan RM
Palaniappan RM - 11.06.2020 21:06

And I really thought WhatsApp works with Asymmetric all the time. Each user has their own private/public key pair. But you made it clear now that it works similarly to TLS 1.3 Diffie Hellman. 👌

Ответить
abhiraj krishnan
abhiraj krishnan - 04.06.2020 19:38

That last CA you talked about was DigiNotar....darket diaries made a video about that.

Ответить
Inquisitive
Inquisitive - 14.05.2020 03:00

Great video Hussein. If I may explain this for your audience with some math -

·       Bob generates a private key number X
·       Alice generates a private key number Y
·       There are publicly known numbers A and N provided by the server.
·       Bob does A raised to X and sends the number to Alice
·       Alice does A raised to Y and sends the number to Bob
·       They both raise what the other sent with their own secret key i.e. Bob now has A raised to YX and Alice now has A raised to XY which is the same number. They also mod it with N to get a manageable number between 0 and N. They now have the same secret key without knowing each other's private keys and without the server knowing the final key. The server only knows A and N.

The trick is to make X, Y and N sufficiently large to make reverse engineering near impossible.

Ответить
musa bangash
musa bangash - 12.05.2020 23:10

Can you please make video about client-side encryption in javascript

Ответить
Eitan Shteinberg
Eitan Shteinberg - 09.05.2020 13:38

Even without graphics and illustrations - this was an excellent and clear explanation !

Ответить
Kapil Bagul
Kapil Bagul - 04.05.2020 03:39

Great one... which podcast do you listen ?

Ответить
Yurii Shchur
Yurii Shchur - 18.04.2020 10:36

Very nice

Ответить
matse matse
matse matse - 15.04.2020 14:56

i don't care if somebody reads my message, but i want to know how to hide it. It's just for fun :D

Ответить
matse matse
matse matse - 15.04.2020 14:50

like

Ответить
Islam Hamdy
Islam Hamdy - 15.04.2020 08:08

Many thanks

Ответить
Tambola King
Tambola King - 14.04.2020 21:08

Bro, give me an answer. Where do you study all this from

Ответить
Noah Williams
Noah Williams - 14.04.2020 21:00

E2EE, specifically, user-friendly and ephemeral E2EE, is necessary because you never know what is gonna become retroactively unacceptable. In this world of constant, pervasive mass surveillance, it seems that damn near every TCP packet you send goes in your permanent record. Even if you’re not doing anything substantively bad, a joke you made a decade ago about killing a politician you don’t like can get you hosed.

I convince all my friends to download Signal because at the end of the day, even if they don’t value their privacy, I value mine. If I’m confiding in a friend, I want to ensure I’m talking to them and just them, with no listeners or meddlers.

In that sense, end-to-end encryption is the ultimate form of authorization.

The authentication part, as you mentioned, is difficult. They at least offer a means of “out of band” verification, with QR codes for each participant you can scan in person to verify each others’ identity.

Ответить
Daniel Däschle
Daniel Däschle - 14.04.2020 19:33

aka Signal Encryption.

Ответить
Ali Almahdi
Ali Almahdi - 14.04.2020 17:50

Great talk Hussain, it's been really long since we had a chat. It would be interesting if you talk about certificate pinning.

Ответить
Saket
Saket - 14.04.2020 15:00

The explanation couldn't have been any better... Great job🤝

Ответить
Gabriel Tavares
Gabriel Tavares - 14.04.2020 14:43

Great contente. The best backend channel 🖤

Ответить