How certificates actually work

แชร์
ฝัง
  • เผยแพร่เมื่อ 27 พ.ค. 2024
  • In this video, I explain how TLS/SSL certificates and HTTPS work along with why we need it.
    00:00 Intro
    01:00 Symmetric Key Encryption
    1:43 Asymmetric Key Encryption
    2:28 Creating Secure Connection
    4:54 What's a Certificate
    5:45 Digital Signatures
    6:53 How Certificates are created
    7:37 How Certificates work
    8:56 Chain of trust

ความคิดเห็น • 8

  • @anthonya880
    @anthonya880 3 หลายเดือนก่อน +1

    This video is awesome!!!

  • @BhishanPoudel-ze4xz
    @BhishanPoudel-ze4xz 2 หลายเดือนก่อน

    Excellent explanation

  • @judeocomil1547
    @judeocomil1547 2 หลายเดือนก่อน

    woooooow this is so so so good

  • @user-sq7si4jz5h
    @user-sq7si4jz5h 2 หลายเดือนก่อน

    merci a tout video ❤

  • @killer2600
    @killer2600 2 หลายเดือนก่อน

    We've been doing all that SSL certificate stuff for more than 2 decades so none of it explains why Google removed the padlock icon in Chrome. Also in a counter argument against your reasoning, Chrome still notifies users when a website doesn't use a certificate/SSL or if the certificate being used is invalid for some reason so they are still notifying users whether a site is secure or unsecure which leads to perceptions of safe and unsafe.
    What I heard about Google wanting to remove the padlock icon - I heard this news before the icon was removed - was that because virtually every site was using SSL/TLS that always seeing the padlock became meaningless and redundant so they removed it so that when people saw the icon elsewhere or in the future it would be meaningful instead of merely typical.

  • @nhatpham6943
    @nhatpham6943 หลายเดือนก่อน

    Hi, great explanation! I just have a question. Can a malicious site sent a certificate that exactly like Netflix? With the same Subject, Subject Public Key, Issuer Name & Signature? Because all those infos seem to be public?

    • @BetaToProd
      @BetaToProd  หลายเดือนก่อน

      Hi, they certainly could, but the malicious actors wouldn't know the private key. So when the secret is encrypted with the public key and sent over to the bad actor, they wouldn't have the private key (that only Netflix has) to be able to decrypt the ciphertext. Since they can't decrypt the message, the connection wouldn't succeed.
      Hope that helps!

    • @nhatpham6943
      @nhatpham6943 หลายเดือนก่อน

      @@BetaToProd Indeed, thank you