Thanks, m'dude! I can get lost in long guides, but this video makes things really clear, and hashing feels pretty easy now! I also love the clear practical demos!
I am currently building a student project, responsible for member management,register and login logout. I made fake users table, at first only plain text and then I were suggested to use bcrypt. I generate bcrypts and store them back into the database, but I have to inpkut the bcrypt to login, I cannot use plain text to login. That’s very weired!
I'm curious, without knowing exactly how the hashing algo does its thing, couldn't I just make up my own algo where a = 5236, b = 5267, c = 4523, so on and so forth, assigning each allowable character a value, then taking those values and do several other things with the result to make the process consistently repeatable so I can compare the result of my "hashing algo" with the original password, instead of using a publicly available tool like bcrypt? What would be the downside to this?
Is this bcrypt still secure these days and standard in storing passwords? I saw you showed some docs saying use bcrypt as second only against argon2id something
usernames aren't generally sensitive information, we display them publicly, so encryption isn't necessary and just takes more time. If you encrypt a username, you always need to decrypt it to use it. If you store it in a database, it makes looking up some data by a username way more difficult. Also, keep in mind, that bcrypt is hashing, not encrypting. If you hash a username, you'll never be able to get that username back, so never do that.
@@SamMeechWard thank you and that makes sense. And also thank you for uploading content regarding AWS S3 and other services, you don’t understand how helpful they are. Is there any other way of contacting you?
I'm amazed how fast you spin up these little express applications to illustrate your point
Thought I already had a good understanding of this theme, however this review uncovers aspects I wasn't aware of. Thanks Sam.
Very good video. Simple, to the point without a bunch of clutter, very easy to understand. Thank you.
I love the little co-pilot interactions lol
Actually had to code my own auth system for a very light app, and I wanted a quick way to store passwords safely, ur video really helped me.
Thanks, m'dude! I can get lost in long guides, but this video makes things really clear, and hashing feels pretty easy now! I also love the clear practical demos!
Awesome simplified version of what I really needed to know. Keep up the great work!
You're a wonderful teacher. Appreciate the video.
Your're an excellent teacher.
watching from Pakistan this video was really helpful. And got to learn many things
Thank you so much! Super helpful beginner friendly guide.
Thank you, that was such a great short introduction, albeit knowledgeful.
Really good introduction to bcrypt.
this video made me understand res and req holy cow
Much appreciated! Your video helped me alot. Great teaching method 👍
I'm not using JS but this was an excellent tutorial. I'm most curious about the postman add on for vs code.
Nice video , easy understand ! Thank you !
Great Video, great teaching style
thanks everything was so celar to understand
Thanks for the helpful video !! helped a lot !!
I am your biggest fan Christ Martin from Coldplay! omg
u explained it very well, do you have courses ?
I cant use await on my bcrypt.compare function, itd already inside an async function, can i get some help
Very clear and smart
Excellent video.
This was awesome! Thank you!
You're so welcome!
I am currently building a student project, responsible for member management,register and login logout. I made fake users table, at first only plain text and then I were suggested to use bcrypt. I generate bcrypts and store them back into the database, but I have to inpkut the bcrypt to login, I cannot use plain text to login. That’s very weired!
is it safe to send the password in the request as plain text? couldn't an unsecured wifi network easily intercept the call and steal the password?
not if you're running a https network
Argon2 is the new recommended hashing algorithm. It's more secure than bcrypt.
definetly liked this video 👏
which one is better between bcrypt and argon2 ?
awesome video. thanks dude!
Great video, thanks!!!
Great video, thanks! ;)
All doughs cleared()
What software / app is that? Visual studio code?
Outrageous - VLDL Benjamin
To use an await function with no async function es bien !!
I'm curious, without knowing exactly how the hashing algo does its thing, couldn't I just make up my own algo where a = 5236, b = 5267, c = 4523, so on and so forth, assigning each allowable character a value, then taking those values and do several other things with the result to make the process consistently repeatable so I can compare the result of my "hashing algo" with the original password, instead of using a publicly available tool like bcrypt? What would be the downside to this?
You're confusing hashing with encrypting
@@matissjansons8789 I never thought of it that way.
Is this bcrypt still secure these days and standard in storing passwords?
I saw you showed some docs saying use bcrypt as second only against argon2id something
Should you not hash the password before you post it?
which tool using in vs code to pull request ?
how can you push on const user?. dont u have to use let user
Awesome video
good job. Please how can i do this in php mysql
thank you !!
@ 1:26 you are awaiting in a top level script / module without using an async IIFE... I thought that is not possible ?
It’s fine if you’re using es modules
Thanks ! Yes, I noticed this didn't work when using require() @@SamMeechWard
It should b > npm i bcryptjs
Btw is it bad to encrypt username as well? is it bad practice/even more complex?
usernames aren't generally sensitive information, we display them publicly, so encryption isn't necessary and just takes more time. If you encrypt a username, you always need to decrypt it to use it. If you store it in a database, it makes looking up some data by a username way more difficult.
Also, keep in mind, that bcrypt is hashing, not encrypting. If you hash a username, you'll never be able to get that username back, so never do that.
@@SamMeechWard thank you and that makes sense. And also thank you for uploading content regarding AWS S3 and other services, you don’t understand how helpful they are. Is there any other way of contacting you?
@@asaphhere Thank you. You can join my discord server if you like discord.gg/XQJ5bmjKHk
not working for me
I only like hash if it’s got potato in it. 🥔
Just don’t forget to add salt ;)
Good
what the hell is going on ?? how can you use await without async???/
He's handsome i can't focus sos 🥲