Комментарии:
This guy's voice is perfect for teaching. So relaxing and calming :)
Ответитьlove the knowledge you have shared, it was extremely useful and it had a bit of humor in it to make the watcher feel engaged
Ответитьlegend
ОтветитьThanks a lot for this video!
ОтветитьYour video was amazing. I understood it all but got a little confused at the end where the client has to then verify the CA's signature on the servers public certificate and then eventually makes its way back to the root certificate. I'm not sure I need to know either but still understanding the rest was important i.e. going from RSA to then signed certificates.
ОтветитьThank you Hussein for the great explanation. Finallyyyy I got the concept
ОтветитьxD u made my day man, thanks 🤣
Ответитьtoo long and horibly explained
ОтветитьNice explanation but i didn't how server verify itself to CA since server is sending public key to CA and Karen might be inbetween server and CA and Karen might send her public key instead of servers public key ? Digital signature by sending private key of server will verify that its a legitimate server....
Ответитьyou really hate Karen, lol
Ответитьtoo many fluffs.
ОтветитьThank you
ОтветитьNot terrible but I had to bail after the 1 trillionth ‘right??’
ОтветитьAs you mentioned in the video the public key of a server encrypted by CA's private .So the client who already have root certificate which include CA's public key can decrypt the certificate send by the server . Is it possible that publick key can decrypt the data which was encrypted by private key ?
ОтветитьMan, you are genius!! I’ve spent almost an hour checking other videos about ssl but couldn’t understand it completely. But the way you explain it, it’s super clear now. Thanks a lot
ОтветитьWhy don't they just send a PDF instead of making me go through all 7 levels of HELL ?
Ответитьgreat job but please leave KAREN out of this 😆🤣
Ответитьstop saying right
ОтветитьThis is awesome, thank you. The visuals were helpful
ОтветитьThank you! Just what I was looking for :)
ОтветитьYour free content is also great like your paid one
ОтветитьThis explanation was exactly I was looking for. Thank you!
ОтветитьThis is a great video. Understood everything!!
ОтветитьAm I the only one who find it is very confusing?😅😅😅
ОтветитьThank you Hussein, I am an IT student and this video helped me so much !
Ответить😂 Keep going explaining things this way
ОтветитьThanks!
ОтветитьI understood public key cryptography, but was looking for how these certificates are exchanged. This explanation was spot on, thank you so much.
ОтветитьHi Hussein, i am confuse since i am new at this and i already made my server secure with ssh with putty and what i don't understand is does making a certificate replace replace my ssh keys with the certificates keys from certbot? I have a hard time setting up my vps with 3 domains under a single wildcard certificate!
Ответитьyou should make nft with those beautifull drawings of yours. Thanks a lot for the explaination
ОтветитьThe way this video was made is exemplatory for indian work culture. Quick and ugly sketches, no structure, wasted time by having to switch between colors all the time. It would not have been that much more work to just add some nice graphics and edit arrows between them, but he just had to go with the absolute jankiest option.
ОтветитьIt’s Eve, not Karen. But since Eve is acting like a Karen then Karen is acceptable.
And I just acted like a Karen, I realize.
ok, I understand ...... they make very complicated communication between public computers and servers ...just to make a money ...from nothing.
ОтветитьMe on tinder- "Take my public key beautiful. Take it."
ОтветитьYou usually publish very good content but this lesson is very messy :) Too much "playing" with the chalkboard...not so easy to follow this lesson.
ОтветитьToo much distraction of toggle on and off. Otherwise great explaination.
ОтветитьToo many steps for me
Ответитьthis looks a lot like the blockchain
ОтветитьThank you for your video. I have some questions:
- Does the server send the certificate for every session?
- Does the server asks the CA for a certificate for every session? Or does this happen only once?
- Can't Karen get her certificate signed by a CA using the public key of the server? Because she has access to it since it is just send over?
- Do I have a root certificate on my PC for every website? And does it expire? I've never had to renew one? How does this work?
Tq bro I love the way u explain the things it is so interesting..
ОтветитьHey Hussein... can you come up with a video on the details of the certificate itself... for example whats an Authority Key identifier, SCT List etc ... guaranteed atleast 5-10 views from my end and a like
Ответитьif the certificate is my Apple ID thats considered private right ?
ОтветитьThis has just made me more confused...
ОтветитьWish @ 193K subs flow diagrams were drawn a little better. Also other vids from Hussein are better (less cocky).
ОтветитьThanks alot for the content youre puttting out man. Really appreciate it captain
.
totally awesome !!!!
ОтветитьI've just watched this video ten times just to enjoy the stuff. Really cool way of teaching.
ОтветитьExcellent Concept..
Ответить