Комментарии:
burda türk varmı
Ответитьomg thank you very much saved me bro ....I can understand much better now
Ответитьi am a noob and so i wonder, when emails use pgp or gpg as asymmetric encryption, why is sending data via email still unsecure in general?
ОтветитьGreat video! I couldn't wrap my brain around this concept and the video cleared things right up.
ОтветитьFails to explain how something can be encrypted with a key that can't be used for decryption.
Ответитьodin project
ОтветитьThis really helped me, Thanks!!!
Ответитьthanks
ОтветитьWoah thank you so much
Helps a lot for someone who usually doesn't understand a thing 💀🙏🏻
Lets change it into "Public Locks and Private Keys"
ОтветитьShort, sweet, and to the point. Thanks for this great info condensed in short amount of time.
ОтветитьThanks for the video!
ОтветитьBeautifully put, thank you.
Ответитьgreat explained!
ОтветитьThank you very much
ОтветитьSo basically, you use somebody's public key to encrypt messages that only they can decrypt with their private key.
Ответитьgreat work thanks for good exmplain. finally i understand how is it working
ОтветитьAm I the only one who doesn't get, how Alice's Encryption Program knows, what Bob's Private Key will look like?
ОтветитьExcellent explanation - greatly appreciated!
Ответитьwatched 2 times and uderstood succesfully
ОтветитьWell explained......
ОтветитьHow Do you Unencrypted it with your private key? I'm weird, do you keep your key
Ответитьamazing video
Ответитьthank you very much for such a good explanation
ОтветитьFantastic explanation
ОтветитьI think what you meant to say was that bitcoin uses cryptography for creating digital signatures, and digital fingerprint of blocks. The bitcoin network does not use encryption. Anyone can see the data written on the blockchain. Having said that, implementations of wallets tend to use encryption to secure keys. However, wallets are not directly a part of the bitcoin network!
ОтветитьThank you so much! This really answered all my remaining questions, just got taught it and asked things like, why would it be public when you can reverse the process and etc. That mailbox example really did it for me!
ОтветитьThanks for sharing
ОтветитьAnyone here from The Odin Project? Keep it up, we can do it! :)
Also thanks for the video, the concept seemed almost alien to me but you've explained it in such a clear way that anybody could understand it
I am confused about something. If the attacker only steals Alice's private key, how can the attacker decrypt messages sent by Alice? If Alice sends a message to Bob, then only Bob's private key can decrypt the message. Correct? So why is the video claiming that the attacker able to decrypt messages that Alice sends to Bob, without having Bob's private key? Alice will need Bob's public key to encrypt the message she sends to Bob, and only Bob can decrypt it.
Ответитьcrystal clear
ОтветитьWhen they swap keys, could a hacker not intercept them and decrypt the message?
Ответитьfuck, Alice and Bob are at it again.
Ответитьsweet and simple , just what i needed , thanks a ton
ОтветитьAwesome...
Ответитьthanks well explained
ОтветитьGreat 🤝
ОтветитьThanks Boss.
ОтветитьExcellent explanation on asymmetric encryption. I was uncertain on how could the encryption of locking/unlocking the data worked since the private key never crossed the wire. You introduced and delivered that difficult concept in an easy relatable manner. Thank you for that! Best video ever. I now feel more confident about asymmetric encryption.
Ответитьsimple and clear explanation ♥♥
ОтветитьAssumption that Private key can not be derived using public key goes wrong in Post quantum world. That is where whole RSA security collapses.
ОтветитьFinally, someone explains to me how it works. Thanks a lot!
ОтветитьHow does Alice knows how to encrypt the message that only Bob's private key can unlock? Surely Alice got to know Bob's private key somehow right?
Ответитьthank you !
Ответить