- 9
- 8 397
0x15aac
United Kingdom
เข้าร่วมเมื่อ 29 ต.ค. 2024
New Videos Fridays 6PM UTC. Computing, cryptography, security, privacy, FOSS, and digital self-sovereignty.
Linux-Native Encryption (LUKS, and OpenSSL)
The fourth practical lesson in 0x15aac's computing course. In this lesson, we learn how to use LUKS and OpenSSL to encrypt files and drives on Linux.
Pubkey Fingerprint:
346EA44D139BDAB242588FFCDAE413EC00015AAC
Pubkey:
pastebin.com/MKLMBxku
On the off chance anybody would like to support the creation of this series:
bc1qvkjc0mvrjvj8qn0486zrt556e8edmjx9ee9zsf
\-----BEGIN PGP MESSAGE-----
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RlqP
\-----END PGP MESSAGE-----
(You need to remove the \s; TH-cam video descriptions are a bad medium; 'echo "[PASTE & REMOVE ESCAPES]" | gpg --decrypt')
Pubkey Fingerprint:
346EA44D139BDAB242588FFCDAE413EC00015AAC
Pubkey:
pastebin.com/MKLMBxku
On the off chance anybody would like to support the creation of this series:
bc1qvkjc0mvrjvj8qn0486zrt556e8edmjx9ee9zsf
\-----BEGIN PGP MESSAGE-----
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RlqP
\-----END PGP MESSAGE-----
(You need to remove the \s; TH-cam video descriptions are a bad medium; 'echo "[PASTE & REMOVE ESCAPES]" | gpg --decrypt')
มุมมอง: 198
วีดีโอ
Encryption is easy. (Cross-Platform File & Drive Encryption with Veracrypt)
มุมมอง 248วันที่ผ่านมา
The third practical lesson in 0x15aac's computing course. In this lesson, we learn how to use Veracrypt to encrypt files and drives (including the system drive on Windows) on Linux, Windows and MacOS. Veracrypt Public Key: www.idrix.fr/VeraCrypt/VeraCrypt_PGP_public_key.asc Veracrypt Signing Key Fingerprint (at the time of upload): 5069A233D55A0EEB174A5FC3821ACD02680D16DE Pubkey Fingerprint: 34...
Signing and Verifying Messages (How to use GPG)
มุมมอง 13321 วันที่ผ่านมา
The second practical lesson in 0x15aac's computing course. In this lesson, we learn how to use GPG to sign and verify messages and files in different ways, as well as how to create our own asymmetric keypair, and import other peoples' public keys. Pubkey Fingerprint: 346EA44D139BDAB242588FFCDAE413EC00015AAC Pubkey: pastebin.com/MKLMBxku On the off chance anybody would like to support the creati...
Don't fear the terminal (How to use basic terminal operators)
มุมมอง 1.4Kหลายเดือนก่อน
The first practical lesson in 0x15aac's computing course. In this lesson, we learn about the terminal; what it is, how to use it, and why it's really not that complicated (it just launches programs). Pubkey Fingerprint: 346EA44D139BDAB242588FFCDAE413EC00015AAC On the off chance anybody would like to support the creation of this series: bc1qvkjc0mvrjvj8qn0486zrt556e8edmjx9ee9zsf \ BEGIN PGP MESS...
Compression in under 5 minutes (The secret sauce of the modern internet)
มุมมอง 2.8Kหลายเดือนก่อน
Lesson 5, module 1 in 0x15aac's computing course. In this lesson, we learn about compression, why it's absolutely fundamental to the modern internet, and explore a few simple, demonstrative compression strategies. Pubkey Fingerprint: 346EA44D139BDAB242588FFCDAE413EC00015AAC On the off chance anybody would like to support the creation of this series: bc1qvkjc0mvrjvj8qn0486zrt556e8edmjx9ee9zsf \ ...
Hashing in under 5 minutes (Passwords, and Bitcoin's Proof of Work)
มุมมอง 238หลายเดือนก่อน
Lesson 4, module 1 in 0x15aac's computing course. In this lesson, we learn about hashing, encryption's lesser-understood, but equally important brother. We cover what a hash function does, and common ways it's used, from safe password (derivative) storage, to Bitcoin's proof of work. As far as Bitcoin goes: It's not a get-rich-quick scheme. If that's your goal, don't get involved. If you're cur...
Encryption in under 5 minutes (Symmetric, Asymmetric, and Signatures)
มุมมอง 684หลายเดือนก่อน
Lesson 3, module 1 in 0x15aac's computing course. In this lesson, we learn about encryption; how we can use the numeric nature of data to transform it in complicated ways, including symmetric encryption, asymmetric encryption, and using cryptographic signatures. Pubkey Fingerprint: 346EA44D139BDAB242588FFCDAE413EC00015AAC On the off chance anybody would like to support the creation of this seri...
Encodings in under 5 minutes (How numbers become videos)
มุมมอง 2.5Kหลายเดือนก่อน
Lesson 2, module 1 in 0x15aac's computing course. In this lesson, we learn about encodings; how we go from binary numbers, to text, images, audio, and video. We create a demonstrative image encoding, and a video encoding on top of it. Pubkey Fingerprint: 346EA44D139BDAB242588FFCDAE413EC00015AAC On the off chance anybody would like to support the creation of this series: bc1qvkjc0mvrjvj8qn0486zr...
Binary in under 5 minutes (How computers see data)
มุมมอง 194หลายเดือนก่อน
Lesson 1, module 1 in 0x15aac's computing course. In this lesson, we learn about binary, what it really is, and how to read it. We learn general rules which can be applied to any number system; binary, decimal, hexadecimal, and others. Pubkey Fingerprint: 346EA44D139BDAB242588FFCDAE413EC00015AAC On the off chance anybody would like to support the creation of this series: bc1qvkjc0mvrjvj8qn0486z...
Great video!
Linux users may find Zulucrypt is a useful alternative, especially since it is included in mainstream distributions.
Top video
nice
A note on OS integrity via encryption: your operating system is loaded by a small(er) program known as a 'bootloader'. This, and possibly some core files like the Linux kernel, depending on your exact setup, is unencrypted. You can, however, use an external bootloader; a finalized CD-R for an immutable option, or a flash drive carried on your person at all times, can be used to prevent people tampering with your bootloader. This will be explored in later videos, along with the remaining attack vectors; firmware (which loads and provides some basic functionality your bootloader, which hands off to the OS), and hardware itself.
what is your desktop environment? it looks really good
Sway & Waybar (plus bemenu, but most of my commonly used programs are in the terminal or directly bound to a key combo), at some point I'll do a full setup & config video
I have been using linux for 2 years, yet I am getting to know new things
A note: the average required hashes per block for Bitcoin's proof of work is often talked about in terms of 'difficulty'. 'Difficulty' is just an inversion of the target, eg: '2^256 - target', though usually some normalizing function is applied to yield an easier number to understand, like 'log2(rawDifficulty)'. The protocol thinks in terms of targets, but 'difficulty' is slightly easier for human brains to understand becase the required average hashes increases as difficulty increases (aka target decreasing). In my view, however, talking about the target is better-as the target decreases, the odds of a given hash meeting it decrease. One hash is a complete attempt, and so this maps better to reality than the continuous process talking about 'difficulty' seems to imply to people.
Best basic commands review I've saw so far. Thx a lot <3
No problem! If you run into anything you don't understand, can always come back and pester me too. 😉
Really helpful, amazing video!
Cheers, glad you think so! 🙂
Wowwwwww that's a really interesting topic :! Thx for this one !
One thing I didn't mention, but you saw during the video, was that you can use TAB to auto complete (where there are multiple options, TAB again will list them), and the UP arrow key can be used to cycle through previously executed commands. Here's a cheat sheet of the covered commands & operators: - disown JOBID: keep the job running after the terminal closes. - a & b: run a and b at the same time. - nano FILE: TUI text editor - clear: clear the terminal buffer - exit: close the terminal instance - echo: print arguments to the terminal - cd: change the working directory - ls: list files in the working directory - cp a b: copy a to b - mv a b: move a to b - rm a b c: remove a, b and c (-r for directories) - cat FILE: print the contents of the file - less: display the contents of the file in a scrolling view - man PROGRAM: show the program's manual - a && b: run a, and if it succeeds, run b (a || b to unconditionally run b) - a | b: pass the output of a to b - grep SUBSTRING: print lines from the input (eg from a pipe) which contain the specified substring - a > FILE: write the output of a to a file (a >> FILE concatenates to the file) - a < FILE: write the contents of a file to a's input - chmod a+x FILE: make the file executable Note that some of these are not available in PowerShell.
fire
General Kenobi
found a gem. subscribed.
If only we had infinite compute power so we wouldn't even need to store data. Just regenerate it from scratch through bruteforcing every permutation till you reach satasfactory result.
That would definitely be one solution 😅
Hope my bank database has this feature so I can generate infinite amount 😂
hello youtube
I have ALWAYS wondered this. So good for it to appear in my recommendations. Instant watch
how well does this scale to large random encrypted data? meaning that theres no feasible bit patterns due to randomness, or are there other compression methods for encrypted data or data with "entropy"
@@KassiopeiaYT great question! (Pseudo)random data is by its nature not very compressible. Given a specific piece of 'random' data, different compression methods *may* yield nontrivial compression ratios, but it's coincidental when this is the case. One example is the Bitcoin blockchain; hundreds of gigabytes of mostly signatures, public keys, and hashes, results in poor compression ratios. Mixed in are compressible bits, like arbitrary data stored in OP RETURN, but there's a good reason no compression mechanism is included in block storage despite chain growth being a serious concern. Specifically, with *encrypted* data, the advice is always to compress the data prior to encryption. But if you have large amounts of encrypted data for which you don't hold the keys, you're pretty much out of luck. In the case of, say, end to end encrypted messaging, the work of compression, where it's performed, is offloaded to clients. This can be limiting, as there's an inherent tradeoff between how much data you're compressing at once, allowing for more patterns to emerge, and how much data you're willing to send down and re-ingest, if you're a third party storing end to end encrypted data. There *are* some techniques with homomorphic encryption; schemes designed to allow certain mathematical operations on encrypted data, but they're fairly novel and I honestly can't speak to their viability in real world scenarios.
Another banger video. ✈✈
the emojis
Keep up the work!!
understood!
Thank you for the video. How did you make the PGP Message? When i try to sign a message in Kleopatra i get a: -----BEGIN PGP SIGNED MESSAGE----- instead, is your message in Base64?
echo "whatever the message is" | gpg --sign --armor TH-cam's descriptions collapse non '\cr\lf' whitespace, and multiple hyphens result in strikethrough styling, rendering some of the hyphens invisible. To make the messages copyable, I pasted the message, replaced the two newlines after the BEGIN PGP MESSAGE line, and the one newline before the END PGP MESSAGE line, then added a \ to the beginning of the BEGIN and END lines to prevent strikethrough. There must be a newline, and a blank line, after the BEGIN header, and a newline before the END footer. The other newlines aren't necessary. It's then possible to copy the message from a TH-cam description, paste into: echo "[PASTE HERE]" | gpg --decrypt but you need to remove the escaping \s.
@@0x15aac Thank you, this worked flawless. Its similar to a PEM Boundary when working with RSA or ecdsa keys or a tls certificate (with the boundary and the 4 dashes). \-----BEGIN PGP MESSAGE----- owGbwMvMwCX2fovXmdrtlkcYT0snMaSbuWuHZCTmZStU5pcqlKUWVSrkliZn8HJ1 lLIwiHExyIopsvSuTww/m9Ord3NBdixMMysTSCcDF6cATGT/fob//ufuLqvd3LCK y+p03VXXULkjR5nnKZockFqeeOHlWme1SoafjDOfPdaeHp9z9PTDk9NC+OPKxUXv dj9/8n1+Z079Ef59DAA= =x5me \-----END PGP MESSAGE-----
amazing content!
I discovered your channel yesterday, and I am absolutely in love with the format. The videos are all relatively short, yet information-packed and pretty easy to comprehend. My only suggestion for improvement would be to get rid off the background noise for an even better viewing experience. Keep up the amazing work!
Glad you're enjoying the videos! As far as the audio goes, I plan on building myself a little booth, but I'm in the process of rebuilding a partial ruin, so there's a few steps before I get there. 😅
always wondered about this, thanks for explaining!
Little endian is not faster than big endian, that was only true for a very specific case that intel faced with one line of chips. Instead of being inconsistent with their next chips they decided to just stick to little endian
There are actual advantages to little endian ordering. For example, downcasting an integer on a little endian machine is a noop; you don't even need to calculate an offset. Similarly, addition and subtraction, which work smallest byte to largest byte, are simpler when I[0] is the smallest byte. There are advantages to big endianness for certain tasks too. The difference is usually very small, so when choosing an endianness for a general purpose computer, you go with the endianness which has the minor advantage for the extremely common operations (eg: downcasting, addition). Virtually every modern, widely used computer is little endian; ARM and Risc-V allow for big-endianness, but it's rarely used.
keep up the great work 👍🏻👍🏻
I love your videos, can you please do smth about cryptographic mathematics like AES key generation and then follow up with aes encryption mathematics from calculated key?
I plan on covering entropy collection from real-world sources like coinflips and dice, with Von Neumann skew correction, very soon. Also HMAC and PBKDF2 (tomorrow's video is a high-level explainer of hashing, as a base to move on to these), which is commonly used for key stretching of passphrases for AES. I'm actually working on some bootable airgapped UEFI tools for this, among other things, so those topics are super important to me. As for the actual mathematics of AES, I *do* plan on covering them, but given it's quite an advanced and in-depth topic, it may be a little while before I get there; my goal is that topics I cover can be understood from the ground up by watching the right set of my videos for any prerequisite knowledge. Similarly I plan on getting to the maths of various hashing algorithms, maybe explore Linux's CSPRNG, etc, but they'll take a while to build up to.
@@0x15aac You are cooking something great pal I can smell it. I wish you all good luck with all that.
0:01 Is that you Obi Wan?
this is really neat!! im glad i stumbled upon this channel, ive always had a kind of passive interest in these things and trying to understand them better feels nice. one small caveat though, i notice that you have it set so that video recommendations and the channel icon pop up in the last half a minute of the video or so. on its own thats fine of course but here the stuff does block out the info youre showing a little bit. would appreciate if that got sorted haha. aside from that though, looking forward to the next vid !!
Cheers for the feedback! For some reason the end cards were showing up much later on my phone than on my computer, so they seemed OK when I tested them, but in a couple videos they completely blocked the last thing shown for the entire time it was shown. I've tweaked them all so where they're covering something, it shows for a good amount of time before they appear.
swag
bit confused about the title, also I haven't watched further than 7 seconds, but isn't decoding going from numbers to videos and not the other way around?
Fair question! The answer is yes, but 'decoding' is just a verb, while 'encoding' is a verb and a noun. The process of writing video data to a file with a defined format to disk is 'encoding', and the process of reading said file, and interpreting it so it can be turned into pixels on a screen is 'decoding'. What you're missing is 'an encoding' is the ruleset which defines how to do both actions.
Hey man, wish you the best of luck. I also recently started my channel and finally the last video got picked up by the algorithm. Surely for you it’s gonna happen as well :)
@@ProgrammingWithJulius cheers! I'm enjoying your CS geoguesser video. 😅
@ it certainly was a lesson for me. Worked really hard on it for weeks (next to my full time job) and it got less than 1k views for the initial period. No more large projects until I have a bigger following 😂
Wow that's actually a really great video, love the way u're explaining things, that's clear and rapid ! I'm learning coding and it's been a while that i'm thinking about the thing of making a png file only by coding, could you please make videos about the specificities of each file type, that could be a great topic i think :!
Glad you found it helpful! I definitely plan on going more in depth on specific formats, including PNG, JPEG, and exploring h264, h265, etc for video. There are super interesting computer science and mathematical concepts to explore in doing so. I can't say exactly _when_ I'll get to that stuff though-there's a lot I want to cover.
Lot of potential. If I could make a suggestion though, try making the video more closely related to the topic, encoding has far less to do with binary than it does with general data formatting. Almost all types of data formatting is just encoding and for some people they need a more abstracted view of what encoding is to understand it. Maybe include additional demonstrations or examples such as, how utf-8 gets encoded to base64 when you're searching in the browser which then get encoded to binary before being sent as packets. It might help the binary portion make more sense if people can relate something they know down to the binary level rather than starting there.
'Encoding has less to do with binary than it does with general data formatting.' I totally agree, and that was the point I was trying to get across by using 'ruleset' as almost a synonym for encoding. There are 5 videos (currently planned) in this particular little 'Data' series, the last of which is compression, in which I explicitly call out that compression can be thought of as an additional encoding layer. The implication I'm *hoping* to put across is that 'wait, this is all just different expressions of the same concept'. Calling this particular video the 'encodings' video is perhaps a bit of a misnomer, because the only video in the 'module' which covers a topic which can't be thought of as a *sort* of encoding (even binary and number systems can fall under that umbrella IMO), is hashing which is covered tomorrow. Otherwise, it's all 'at a high level, how do computers interpret and work with data'. The main reason I wanted to start with binary is mentioned in that video; it's easy for anyone to conceptualize, one they understand what binary is, that binary is the natural number system for computers because a basic electronic switch is high or low, on or off, and from that we can build everything else.
Very excited for upcoming videos!
Next one will be out tomorrow! Pacing myself a with these shorter explainers as a lot of the practical 'here's how to actually do X, Y and Z' video ideas I have planned can't be condensed nearly so much. 😅
amazing video
Thank you, glad you liked it! 🙂
Damn how is your TH-cam channel so underrated? I thought it was gonna be some ai voice nonsense but wqs pleasantly surprised.
Haha, I'm happy I could surprise you. It's a new channel; everyone starts at zero. Apparently TH-cam has decided to bless this particular video with recommendations, so I can't complain.
Cool video
Glad you enjoyed it ☺️
I really like the minimalistic, no bs, direct but clear approach. I hope you keep going and im hopefully the algorithm will pick you up soon
Glad you like the style! More is definitely on the way.