Thanks for this video. Something you said was that SHA-256 is very fast, so it is bad for password storing because people could just generate new fingerprints very easily. But if it is already irreversible, and data is scrambled deterministically, why does this matter? Maybe I am understanding this wrong.
You explained in this video how SHA-256 is used and what it is used for, not how it works and how it is generated.
Check the link in the description for a nasty under the hood explanation
@@bootdotdev Thanks!
@@bootdotdev9:11
Your doctor may
Pretty good basic explanation. Thank you!
Glad it was helpful!
This is really cool! Thanks so much for the explanation.
how install SHA256 on computer?
Wow this is a simple explanation good teacher,. even if am new into programing i understood every single kudoos bro!!!!!
Great content! Thx for the explanation
But how can ash256 to return as txt
Bro i just want to ask if there is a way to see generated digit numbers in a seeds
bruh the full explanation is explanation of math beside the function. why tf y'all doing theese videos about "use cases" but not about real MATH
Good eplination some where I see.. Sha256 text can be dycrypt. Is it possible
Thanks for this video. Something you said was that SHA-256 is very fast, so it is bad for password storing because people could just generate new fingerprints very easily. But if it is already irreversible, and data is scrambled deterministically, why does this matter? Maybe I am understanding this wrong.
It is irreversible, but an attacker can still try to, say hash a giant list of possible passwords and check the results against the known hash
So how does it work? Title doesnt match video unfortunately
Nicely explained, thx
You're welcome :)
thank you jerma
Hello!Can u do a video for ripemd160?
Maybe... but probably not haha
@@bootdotdev ok dev.
Perfect for voter SHA256 for authentication utilizing accuracy for registrations in political campaigns. Send votes verified through blocks.
thanks
Thank you
thanks a lot
You're welcome :)