YouTube Doesn't Know Your Password

แชร์
ฝัง
  • เผยแพร่เมื่อ 3 ส.ค. 2014
  • tomscott.com - @tomscott - A brief introduction to password hashing for the uninitiated -- and why you should never trust a site that emails your password back to you!

ความคิดเห็น • 1.4K

  • @smgibb
    @smgibb 9 ปีที่แล้ว +737

    I almost had a heart attack when I started working where I do now and discovered all of our user's passwords were in plaintext. I brought up objections to it, and was told it wasn't worth changing because we don't hold onto any data that really matters (basically an email address). Had to point out that the passwords the user uses are probably the same password for accounts elsewhere; so if I could see their passwords and email addresses, then I could probably log into their email and just go from there. They still didn't think it was really an issue. After arguing and out of desperation I had them pick a random user from the database, and I used the clearly visible information to log into that user's email.
    Suddenly hashing the passwords became a priority.

    • @grilledwaffle
      @grilledwaffle ปีที่แล้ว +102

      Thanks for protecting the consumers

    • @itismethatguy
      @itismethatguy ปีที่แล้ว +26

      That one guy...

    • @Lampe2020
      @Lampe2020 ปีที่แล้ว +61

      @@itismethatguy
      ...probably almost had a heart attack when his email provider showed him another device he didn't know had logged in to his email account.

    • @Xnoob545
      @Xnoob545 ปีที่แล้ว +1

      Hashing isn't even enough these days

    • @Lampe2020
      @Lampe2020 ปีที่แล้ว +24

      @@Xnoob545
      It's at least a good starting point.
      I know, some hashing algorithms can relatively easily be reversed these days but there are always new hashing algorithms that are more time-consuming to crack.

  • @shrigula9457
    @shrigula9457 8 ปีที่แล้ว +8814

    I don't know my password either! Wow I am so much like Youbtube.

    • @Freakschwimmer
      @Freakschwimmer 8 ปีที่แล้ว +74

      +MLG Cthulhu
      you just open your favorite browser and it works? :D

    • @shrigula9457
      @shrigula9457 8 ปีที่แล้ว +25

      Freakschwimmer yeah.

    • @tomuhawk96
      @tomuhawk96 8 ปีที่แล้ว +38

      +MLG Cthulhu mines randomly generated, i just keep an encrypted file so i know what to enter where.

    • @joelbeedle9461
      @joelbeedle9461 8 ปีที่แล้ว +7

      +Tomuhawk clever

    • @crunch1757
      @crunch1757 7 ปีที่แล้ว +5

      👏

  • @TheEternalVanguard
    @TheEternalVanguard 8 ปีที่แล้ว +2958

    That's okay, I can't remember mine, either

    • @npc_tom
      @npc_tom 7 ปีที่แล้ว +3

      How did you get to your TH-cam account, then?

    • @Luca-iq4ev
      @Luca-iq4ev 7 ปีที่แล้ว +20

      It's stored in his Browser +pixar121

    • @AQDuck
      @AQDuck 7 ปีที่แล้ว +37

      I just download one of those ad infested password managers from softonic,works like a charm!
      Obviously I'm joking...

    • @popcornceiling3287
      @popcornceiling3287 6 ปีที่แล้ว +5

      That means *noone* knows!

    • @popcornceiling3287
      @popcornceiling3287 6 ปีที่แล้ว +5

      It's the perfect way to hide your password.

  • @Chocomint_Queen
    @Chocomint_Queen 9 ปีที่แล้ว +5423

    Kind of disappointed you didn't end on "if you find a website that DOES email you your password, run, because proper security is... a thing they might not know."

    • @EmptyNullified
      @EmptyNullified 5 ปีที่แล้ว +68

      Even hashed, hashing with md5 is still not secure tho

    • @markmayonnaise1163
      @markmayonnaise1163 5 ปีที่แล้ว +32

      Slightly grammatically incorrect, but I'm with you

    • @maoitsme0
      @maoitsme0 5 ปีที่แล้ว +7

      @@markmayonnaise1163 better?

    • @prodigy2k7
      @prodigy2k7 5 ปีที่แล้ว +4

      Md5 is garbage.

    • @plusonerabbit
      @plusonerabbit 4 ปีที่แล้ว +28

      @@maoitsme0 I realize this video and comment are old, but I just wanna say that people don't use MD5 because it's too fast and is prone to collisions, which is really bad for passwords. Use something like bcrypt instead.

  • @bhunterwillis
    @bhunterwillis 9 ปีที่แล้ว +2095

    "If they do [send it back], run. They have no idea what they're doing."
    *Cough* ADOBE *Cough*

    • @Kram1032
      @Kram1032 9 ปีที่แล้ว +227

      Adobe sent back password hints, not passwords.
      It's not quite as bad as sending back passwords but given that password hints are typically easy to solve, it's still rather bad.

    • @JER0EN
      @JER0EN 9 ปีที่แล้ว +82

      Does Adobe send passwords? I thought that their database got hacked and the hackers looked up the passwords up on a rainbow table.
      Adobe's fault for not salting the passwords.

    • @bhunterwillis
      @bhunterwillis 9 ปีที่แล้ว +71

      They used to a few years ago, but once they were hacked, changed it. Massive leak of data because they didn't store passwords correctly.

    • @maagiapall
      @maagiapall 9 ปีที่แล้ว +31

      I was also surprised to see that the forum for the LWJGL (a Java game library) sends you your password. Now it's a fairly small forum that's probably using some forum generator service, but still - I'd expect a bunch of programmers to know not to do this stuff :D

    • @notanimposter
      @notanimposter 9 ปีที่แล้ว +3

      ***** Seconded! Though I'm not a member of that community (I have used LWJGL in the past, though), I'm sure all the programmers there would be glad to know of and to try to patch any security flaws.

  • @HeroOfHyla
    @HeroOfHyla 8 ปีที่แล้ว +791

    "If you ever find a company that does email you your password when you say you've forgotten it, well, run"
    I'd love to, but they control the entire college textbook market and I have to use their services to turn in my homework.

    • @OrigamiMarie
      @OrigamiMarie 7 ปีที่แล้ว +143

      The best you can do then is make very extra sure that you do the thing you ought to anyway: use a different password with them than you use for anybody else. That way if (when) somebody lifts their password & email database, that somebody can't get access to your other online accounts by just trying out your email & password combo with lots of sites.

    • @cigmorfil4101
      @cigmorfil4101 4 ปีที่แล้ว +59

      And don't leave sensitive information (eg Credit Card) on that site.

    • @eatingcereal5646
      @eatingcereal5646 3 ปีที่แล้ว +22

      Dang it CollegeBoard!

    • @Xnoob545
      @Xnoob545 2 ปีที่แล้ว +4

      Just ask them how that is possible if they are storing passwords securely with a salted hash

    • @Anonymous-df8it
      @Anonymous-df8it 2 ปีที่แล้ว

      Just print out your homework and give that to them lmao.

  • @TheIspira
    @TheIspira 8 ปีที่แล้ว +593

    I made an account with a hosting service at one point, I had an issue logging into my account and they emailed me my password. This video is what saved me from putting my personal and payment information into that website.

    • @PuffyCraftOfficial
      @PuffyCraftOfficial 8 ปีที่แล้ว +41

      +Ispira Was it 000webhost? They recently had a huge data breach due to them not hashing passwords securely.

    • @ArtyIF
      @ArtyIF 4 ปีที่แล้ว +2

      i once forgot a password on ucoz and they literally just opened a window with my password in it

    • @larsiparsii
      @larsiparsii 4 ปีที่แล้ว +3

      I know this is an old comment, but it was most likely 000webhost.

    • @jmejuniper
      @jmejuniper 3 ปีที่แล้ว

      @Artyom Fomin |:| Without any email confirmation? Anyone can literally just say forgot password and get access to your account?

    • @genericusername4206
      @genericusername4206 3 ปีที่แล้ว +5

      @@jmejuniper no, because if u do forgot password, they email it to the person with the email connected to them

  • @ludantothereddalmatian9349
    @ludantothereddalmatian9349 3 ปีที่แล้ว +764

    "neither does Facebook"
    oh, the good old times before we found out FB stored passwords in plain text

    • @ezshroom
      @ezshroom 3 ปีที่แล้ว +101

      *major vulnerability in debugging logs made for when they were creating the site*
      Facebook: eh, forget about it

    • @spv420
      @spv420 2 ปีที่แล้ว +9

      @@ezshroom ha, log vulns

    • @legendgames128
      @legendgames128 2 ปีที่แล้ว +7

      I wouldn't be surprised if TH-cam stored passwords the same way Facebook does.

    • @Heha323
      @Heha323 2 ปีที่แล้ว +52

      @@legendgames128 considering google hasnt had any major database leaks they def care a lot more

    • @legendgames128
      @legendgames128 2 ปีที่แล้ว +3

      @@Heha323 Oh I wasn't talking about that, but good point.

  • @thierryvt
    @thierryvt 7 ปีที่แล้ว +188

    aah yes, the good old days of receiving your password as an email when you'd forgotten it. Also, salting (for those interested) is the act of adding random bits of rubbish data to the hash. Any potential hacker won't know what part of your password hash is "real" and what is part of the "salt", making it effectively impossible to reverse.

    • @user-zb8tq5pr4x
      @user-zb8tq5pr4x 3 ปีที่แล้ว +28

      salting also prevents same passwords hashing into the same thing

    • @willb4643
      @willb4643 3 ปีที่แล้ว +3

      Tom finishes the video with I've made video about password hashing over on computer something but doesn't link in description... this is the comment I was looking for, thanks! Don't need to find the video now.

    • @fisch37
      @fisch37 2 ปีที่แล้ว +7

      There's also peppering, which is similar to salting, but your byte sequence is universal for every user and importantly is stored in code. That means a hacker, who got their hands on the database, won't be able to brute force the hash as they are missing part of it

    • @legendgames128
      @legendgames128 2 ปีที่แล้ว +4

      Fisch37 salt and pepper. Is there another security measure named after food or the like?

    • @fisch37
      @fisch37 2 ปีที่แล้ว +5

      @@legendgames128 Sadly, I'm not aware of any. However, if anyone manages to serve a cyber security meal, I'd like to know

  • @munjee2
    @munjee2 4 ปีที่แล้ว +105

    "Facebook doesn't know your password either"
    That aged well

  • @littlemikey46
    @littlemikey46 8 ปีที่แล้ว +303

    So I was once signed up for a bank service that emailed me my password in plain text in a confirmation email.
    Needless to say I didn't stay with them for long.

    • @josheen
      @josheen 8 ปีที่แล้ว +9

      That's not the same, you could enter a password saved as a session variable - $pass. Then when they email you, "Thanks for being with us, your password is $pass", and then once the scripts have been ran and you close the browser window, ending the session, the variable is forgotten.

    • @littlemikey46
      @littlemikey46 8 ปีที่แล้ว +43

      This wasn't a session thing, this was some time later I hit a forgotten password request and it sent me the password in full.

    • @lucaspeltie
      @lucaspeltie 8 ปีที่แล้ว

      Uhm it's still in his email right?

    • @josheen
      @josheen 8 ปีที่แล้ว +1

      Not when requesting a new password. Tom just didn't specify the exception that I explained.

    • @theamici
      @theamici 7 ปีที่แล้ว +7

      Your bank uses passwords?
      In my country banks have several security features aimed at making direct attacks impossible. One of them is avoiding passwords, and instead using sms-messages and special programs on the phone.

  • @oliverlane9716
    @oliverlane9716 9 ปีที่แล้ว +543

    Ughh the British government websites email your passwords... awkward haha

    • @andrerenault
      @andrerenault 4 ปีที่แล้ว +105

      Government websites are ludicrously far behind.

    • @alanr6953
      @alanr6953 4 ปีที่แล้ว +74

      Imagine trusting the government

    • @mrHello420__
      @mrHello420__ 4 ปีที่แล้ว +4

      Same here in Italy 😅

    • @ZaHandle
      @ZaHandle 4 ปีที่แล้ว +35

      Here in thailand it’s the safest system ever can’t even be hacked why? it doesn’t exist

    • @user-ql9cc9hg4e
      @user-ql9cc9hg4e 4 ปีที่แล้ว +1

      @@ZaHandle ur mom

  • @lilia3944
    @lilia3944 3 ปีที่แล้ว +31

    We visited a security company with a cryptography course I did in the summer holidays.
    My favorite stories from there were a) the director of a company with "password" as a password and b) a company that managed to mess their hashing algorithm up in a way that hashes of passwords would be counted as the password
    (they realized their mistake after someone got into that database and deleted all of their data - they didn't even have back ups of most of that)

  • @RecursiveTriforce
    @RecursiveTriforce 5 ปีที่แล้ว +434

    0:02 Facebook was found to have passwords stored in plain text...

  • @ShamelessHorse
    @ShamelessHorse 9 ปีที่แล้ว +441

    The Hashing Process:
    Take a coherent sentence → Smoke some hash → Your coherent sentence has been converted into indecipherable, illogical ramblings on the meaning of life and conspiracy theories.
    WARNING: After hashing, you may feel an increased need to accept cookies.

    • @revolver265
      @revolver265 4 ปีที่แล้ว +15

      I guess I'm always high - nobody can understand my incoherent rambling.

  • @gitcat6671
    @gitcat6671 5 ปีที่แล้ว +49

    5 years later:
    *facebook logged passwords*
    *surprised pikachu face*

  • @jajai6377
    @jajai6377 4 ปีที่แล้ว +207

    It's actually illegal to store passwords in plain text in many countries, namely France.

    • @lonestarr1490
      @lonestarr1490 4 ปีที่แล้ว +25

      France is not many countries, but _one_ country. Instead of "namely" the use of "for instance" would have been more adequate.

    • @obiwac
      @obiwac 4 ปีที่แล้ว +41

      @@lonestarr1490 you're wrong. In this case, "namely" and "for instance" are interchangeable.

    • @obiwac
      @obiwac 4 ปีที่แล้ว +9

      @@kourii who said "namely" couldn't be used to refer to a single element in a group?

    • @sw_9_9_9
      @sw_9_9_9 3 ปีที่แล้ว +9

      @@obiwac Umm nope, you're wrong. "Namely" and "for instance" are never interchangeable.
      "More adequate" is also incorrect. 😕

    • @asmallyoutube
      @asmallyoutube 2 ปีที่แล้ว +2

      @@sw_9_9_9 niggardly then?

  • @shepd3
    @shepd3 7 ปีที่แล้ว +37

    Thank you for the simple explanation. I often tell others about this, but if they're not techies, their eyes glaze over at an over-complicated explanation. This one was short and sweet.

  • @SolidSt8Dj
    @SolidSt8Dj 4 ปีที่แล้ว +59

    I mean, I'm coming from 5 years in the future, and Facebook has has dozens of scandals where their user's passwords were just saved as plain text.

  • @UnitedRecording
    @UnitedRecording 7 ปีที่แล้ว +1176

    your accent makes you smarter than you already are

    • @bazzie85
      @bazzie85 7 ปีที่แล้ว +107

      remove "al" from already... and replace the "d" with "ll".... muahahaha

    • @HansYN_
      @HansYN_ 7 ปีที่แล้ว +13

      +Basel Kader really

    • @Corvid
      @Corvid 7 ปีที่แล้ว +46

      True! Why is this guy not on TV? I've seen presenters who sound like they've been picked off the street!

    • @bazzie85
      @bazzie85 7 ปีที่แล้ว +35

      Corvid don't talk about Jimmy Fallon like that!

    • @generikadeyo
      @generikadeyo 7 ปีที่แล้ว +43

      He's already very smart, the accent just helps him to sound cool.

  • @MishMash95
    @MishMash95 4 ปีที่แล้ว +17

    When I was signing up for University accommodation, I was blown away that the system emailed me my password in plain text just as a reminder a few days before moving in!

  • @josephjackson1956
    @josephjackson1956 4 ปีที่แล้ว +74

    I hate when I have to reset my password because I forgot it, but then I go to reset it and it says that I cannot use an old password.

    • @joefifield3285
      @joefifield3285 3 ปีที่แล้ว +15

      I've experienced that before, and the worst part is I had already tried logging in with my old password and it was incorrect

    • @matthewparker9276
      @matthewparker9276 3 ปีที่แล้ว +7

      I reset my password once and it told me I couldn't change my password to my current password.

    • @bir6140
      @bir6140 3 ปีที่แล้ว +8

      They actually log your old passwords hash.
      This is not that bad.

  • @AlexanderHarris
    @AlexanderHarris 9 ปีที่แล้ว +231

    Oh shit I think I've gotten my password via email before. This is retroactively terrifying. : O

    • @NotAMinifig
      @NotAMinifig 8 ปีที่แล้ว +46

      +Alex Harris Sending passwords via email is terrifying in 2 ways:
      1) what the video is about (they have to store it)
      2) e-mail goes unencrypted over the public internet, and therefore is interceptable by almost anybody, way easier than cracking the database of the server.
      (sorry for the reply to an old post, wanted to terrify you some more)

    • @zavvie809
      @zavvie809 8 ปีที่แล้ว +2

      +Simon Peeters Emails are usually encrypted, but yeah, still not as secure as a hash.

    • @NotAMinifig
      @NotAMinifig 8 ปีที่แล้ว +15

      tadej petric uhm, no, emails are usually unencrypted, your communication between your client and your mailserver might be encrypted, but the communication between mailservers on the net happens unencrypted.
      So if I were to send an e-mail from my work e-mail to my gmail, it would go encrypted from my laptop to my employers server, then unencrypted to the google servers, and then encrypted back to me.

    • @zavvie809
      @zavvie809 8 ปีที่แล้ว +2

      Simon Peeters Oh yeah, I was thinking sending to the same domain and all. I've heard that stuff like that is different, but never found anything concrete (and I was only thinking sending to the same mail provider, which, AFAIK doesn't really leave the mail servers unencrypted. Forgot completely about that thing). I'm not going to argue on that since you're probably right.
      If you find any further read on that, please send me a link. I couldn't find anything relevant, but I've had troubles finding a good search term so you might have more luck here.
      Edit: either way, most man in the middle attacks don't happen when traffic is being routed between major web servers (but rather between you and the ISP unless there's some DNS spoofing involved or something like that) so at least that's something.

    • @possessedllama
      @possessedllama 8 ปีที่แล้ว +1

      +tadej petric The problem isn't the e-mail being unencrypted. The fact that they can e-mail you your password is a sign that they aren't storing it securely in the database. Take Adobe, for example. They were encrypting passwords but not hashing them. There was a direct relationship between the password length and the encrypted password length and there was no salt so everyone with the same password had the same encrypted password. It was easy then for hackers to even use things like the collective password hints to guess / crack the passwords. This is why it's scary. The security of the e-mail doesn't even come into it.

  • @Metal_Fingers.
    @Metal_Fingers. 8 ปีที่แล้ว +74

    This guy is a gem.

  • @mattwinward3168
    @mattwinward3168 4 ปีที่แล้ว +24

    “TH-cam doesn’t know your password...
    ...but Facebook does”

  • @santinieve1
    @santinieve1 6 ปีที่แล้ว +19

    Awesome but how about this:
    Facebook sometimes shows a message when you type in your password but you where off by a character:
    “Your password is wrong but close, please try again” or somethig like that

    • @ZaHandle
      @ZaHandle 4 ปีที่แล้ว

      clear cookies?

    • @corvus2735
      @corvus2735 3 ปีที่แล้ว +4

      Well this is actually not that much of a problem (but still not something I am comfortable with), because facebook takes your input, if it doesn't work replace some characters you typically type in wrong (think of "I" instaad of "L") and try that again. If one of those matches, you get the message "it is close"

    • @Icosalord
      @Icosalord 3 ปีที่แล้ว +1

      henlo fellow dasher

  • @handsoffmycactus2958
    @handsoffmycactus2958 5 ปีที่แล้ว +101

    My password story usually goes like this:
    Me trying to log in to a website or app
    App: please re enter your password
    Me: enters password
    App: password incorrect please re enter password
    Me: enters password (it's DEFINITELY this password)
    App: password incorrect. Account locked. Please create new password
    Me: enters password I have been attempting to use the whole time
    App: password cannot be the same password used previously
    Me: ARGHHH

    • @ellenorbjornsdottir1166
      @ellenorbjornsdottir1166 4 ปีที่แล้ว +6

      Me: deletes app

    • @codinghub3759
      @codinghub3759 3 ปีที่แล้ว +3

      This happens with me everytime

    • @DerekSteen
      @DerekSteen 2 ปีที่แล้ว

      Come join us in the 21st Century. We have password managers. :)

  • @XzTS-Roostro
    @XzTS-Roostro 6 ปีที่แล้ว +11

    "Thank you, 'forgot password option', for literally being my password."
    -Jimmy Fallon
    Thank You Notes, Late Night with Jimmy Fallon

  • @iuhtrfdsacvdsgdf
    @iuhtrfdsacvdsgdf 9 ปีที่แล้ว +50

    i live in tiny holland.
    no building here before 2000 was allowed to be higher then "de dom" which is a church from 1487 (or further back even) and is 151 meters high.
    now i see the building on the background and i really realize just how puny and tiny our buildings are

    • @JacobShepley
      @JacobShepley 9 ปีที่แล้ว +1

      tallest building in my city (Adelaide) is 130-140m tall
      our skyline is really boring

    • @74opt66
      @74opt66 6 ปีที่แล้ว +2

      I live in NYC. I don’t really care about our skyline.

    • @maoitsme0
      @maoitsme0 5 ปีที่แล้ว +8

      I don't get it... What does it have to do with password encryption?

    • @marcbrons4746
      @marcbrons4746 4 ปีที่แล้ว +1

      Mao177 everything

    • @martinmulder8613
      @martinmulder8613 3 ปีที่แล้ว +3

      Assuming you are talking about De Dom in Utrecht... then something is wrong here. It was built between 1254 and 1517 (in fases). It is 112.32 m high. There are other buildings in The Netherlands higher than 112.32m:
      - Delftse poort, 151m high, finished in 1991
      - Rembrandttoren, 150m high, finished in 1994.
      So... what are you talking about? :/

  • @BertGrink
    @BertGrink 8 ปีที่แล้ว +9

    WOW! This was really enlightening. Thanks, Tom, for this small but crucual bit of information. P.S. I really like your videos. You explain everything in such an easy to understand way.

  • @eslachance
    @eslachance 9 ปีที่แล้ว +3

    I'd really like to see more of these in a web series or something. Very basic information, dumbed down for non-technical users. I used to work for an ISP so this kind of information would have been awesome to have. "Why can't you just tell me my password for the Internet?" - "Well, because we have a system admin that actually knows about security. Let me change your password and then I'll send you an informational video, darling." God that would have been SO useful.

  • @TillTheLightTakesUs
    @TillTheLightTakesUs 8 ปีที่แล้ว

    Your last few sentences were the most impacting ones, I think I learned quite a lot from this video, thanks Mr. Scott.

  • @APlexchanel
    @APlexchanel 4 ปีที่แล้ว +3

    That feeling, when yours ISP sends you password for yours account

  • @deidara_8598
    @deidara_8598 3 ปีที่แล้ว +5

    Important distinction between hashes and prime factors: with hashes there's information loss, which is why it's so hard to crack, because one essentially has to guess what information was lost. With prime factors we genuenly don't have the maths to make an efficient algorithm on classical computers to factorize numbers, there's no information loss, humans are just too stupid.

  • @chohawk1
    @chohawk1 5 ปีที่แล้ว

    I sincerely love all your videos! You just have this wonderful, and soothing tone that sounds very BBC (if you get what I mean!)
    Not only that, but the topics you cover end up grasping my attention for hours at end! Please keep it up! :3

  • @deadlymelody27
    @deadlymelody27 3 ปีที่แล้ว

    This is probably the best explanation i have ever had for password encryption ever. I have had people try and explain it before but this way is so simple to understand

    • @GummieI
      @GummieI 3 ปีที่แล้ว +2

      well it is technically not an encryption, and using actual encryption for password storage would be a BAD BAD idea, since encryption can be reversed, however yes it is a good explanation of the basics of secure password storage/password hashing

  • @kamoroso94
    @kamoroso94 8 ปีที่แล้ว +6

    Damn Tom, back at it again with the red shirt!

  • @legotrucks1
    @legotrucks1 6 ปีที่แล้ว +3

    i miss the days i would see a lot of recommendations from youtube about tom scott doing a video about something computer related

  • @slpk
    @slpk 9 ปีที่แล้ว

    Oh man, I've been trying to teach people this for ages, and you made it so simple. Thank you!

  • @KjeldSchmidt
    @KjeldSchmidt 9 ปีที่แล้ว +1

    Cool video (though I've seen the computerphile ones before and they quite helped me half a year ago when I got serious about back end dev!).
    The preview looks AWESOME. Looking forward to it!

  • @Kellestial
    @Kellestial 3 ปีที่แล้ว +7

    Fun fact: If you use Showbie in schools, not only does Showbie just store your password, teachers in the classes your in can see it if they press a reveal password button on your name... run

  • @Leona_tf
    @Leona_tf 5 ปีที่แล้ว +3

    I still remember when I create an account for a website, and they emailed me my username AND password to say "Welcome to ..."
    I never thought much about it because back then, I don't know ANYTHING about password, encryption, hashing, and I even use the same password for all of my accounts. But now, good god did they store my password in plain text

  • @ErikHansenDrums
    @ErikHansenDrums 3 ปีที่แล้ว

    Interesting video, this is quickly becoming my favourite channel

  • @joshgirndt4896
    @joshgirndt4896 3 ปีที่แล้ว +1

    I have actually been working on an encryption program myself, just for fun. It's using kinda the concept of prime numbers, but it also has to work in tandem with a unique 8 digit key, which is a secondary piece of information provided for the user. The algorithm changes based on what key you give it, so the database comparison only works if you have both parts.

  • @RichardB1983
    @RichardB1983 9 ปีที่แล้ว +4

    I've recently been sent my username & password (together) in an e-mail from a web service. Other people have raised this as a potential security flaw, but the site owners appear to be in denial, saying that the security complies with all of the Government's recommendations (it's a service backed by an arm of UK Govt). I doubt it does.

    • @cigmorfil4101
      @cigmorfil4101 4 ปีที่แล้ว

      Perhaps you should tell them to send the I'd and password on a postcard or the back of a sealed envelope through the post and see if they (and the government) think that is ok and not a security risk.
      (Plaintext emails are akin to postcards- anyone (with sufficient privileges) on the servers through which they pass (plus packet snoopers) can read them.

  • @Jahnu8
    @Jahnu8 9 ปีที่แล้ว +3

    I'm never going on that roller costar AGAIN!

  • @AdzSONLINE
    @AdzSONLINE 8 ปีที่แล้ว +2

    Thanks for the multiply by 11 tip, didn't think about that

  • @TheBaz234
    @TheBaz234 9 ปีที่แล้ว

    Thanks for bringing me here Dan!

  • @JoelReid
    @JoelReid 8 ปีที่แล้ว +31

    Many sites will send you a temporary password that you have to change immediantly. So they can know your password... until you log in.

    • @NDBoost
      @NDBoost 8 ปีที่แล้ว +6

      +Joel Reid they could, usually though they know the hash of that password stored in the database and email off the plain/text on submit. After that its the plain/text password is tossed, when you type the new temporary password in, a hash comparison is done like always and then they ask you to change it again.
      This is also typically known as a reset token, its the same basic concept which allows you to be validated and authenticated to change your password. Usually for password resets you wont notice the token though, usually its embedded in the URL something like ?token=12301i24kjbh124ljhsdpfiuh28
      I handle this by assigning a random token to a user's row in the db, and setting a flag like resetPassword = true. they click the link, software checks the token and checks if resetPassword=true, if it does then it asks for a new password. Temporary passwords work the same way theres just a manual intervention of the user having to type in the temp password.

    • @SolidRoot
      @SolidRoot 8 ปีที่แล้ว +3

      +Joel Reid That's true, but that temporary password is salted in the same manner as the video said, so they really only know it from the email logs (ie. it's not stored in the database).

    • @theramendutchman
      @theramendutchman 3 ปีที่แล้ว +1

      @@SolidRoot Which means, they have your password during that time

  • @exterminator9676
    @exterminator9676 7 ปีที่แล้ว +5

    6:37
    How Tom Scott Can Find Your Password Instantly
    Tom Scott
    375K views

  • @shawniscoolerthanyou
    @shawniscoolerthanyou 3 ปีที่แล้ว +1

    I worked at a SaaS place that had passwords stored in plain text in the users table. It was a platform the company had acquired and was phasing out, but it was still a bit of shock. We had to convert some customers sooner than others since they were in a state that required more stringent security practices from vendors.

  • @gingermann19
    @gingermann19 9 ปีที่แล้ว

    This was very entertaining! You just earned yourself a subscriber. :D

  • @hannibal8566
    @hannibal8566 9 ปีที่แล้ว +3

    I died on a rollercoaster and know I'm here. Wow.

  • @liamtahaney713
    @liamtahaney713 4 ปีที่แล้ว +3

    "things you [tube] might not know"

  • @94djcab
    @94djcab 3 ปีที่แล้ว +1

    I've been a software engineer for years and definitely know how hashing data works. still watched through it and enjoyed it, and IDK why youtube recommended me this.

  • @Lawls
    @Lawls 9 ปีที่แล้ว

    Just hit subscribe because your videos are awesome and turns out I'm you 200,000th subscriber ^.^

  • @Zi7ar21
    @Zi7ar21 5 ปีที่แล้ว +6

    Me: Do you know if I typed my password correctly?
    TH-cam: *Well yes, but actually no.*

  • @Mankorra_Gomorrah
    @Mankorra_Gomorrah 7 ปีที่แล้ว +130

    Funny you should mention yahoo....

    • @IanMustafa
      @IanMustafa 7 ปีที่แล้ว +16

      it's an old video mate. nobody knows back then
      besides, if the users uses weak password like 12345678 or qwertyuiop (or any dictionary words), the password could be "easily" uessed using combination of Brute Force and Dictionary Attack

    • @slackingsource
      @slackingsource 7 ปีที่แล้ว

      Ian Mustafa They knew, they just chose not to say anything for a while.

    • @dakat5131
      @dakat5131 6 ปีที่แล้ว

      didn't Yahoo! use a hash system that had been broken for ages by then,and never upgraded to a secure one?

  • @matijaradeljak
    @matijaradeljak 6 ปีที่แล้ว +1

    Tom thank you so much for this particular video, especially the ending as I'm sending it right now to a client of mine who is asking me why am I telling them to change their hosting provider after they recovered a password in a plain text email :))

  • @matevzkramar
    @matevzkramar 8 ปีที่แล้ว +1

    Very educational video! In fact, all your videos are.

  • @wandereppink
    @wandereppink 9 ปีที่แล้ว +5

    i just brought here by a guy who turns people into red mist using a rollercoaster

  • @SargentoPeppermint
    @SargentoPeppermint 9 ปีที่แล้ว +36

    Twitter is the best TH-cam subbox

    • @Alumx
      @Alumx 9 ปีที่แล้ว +1

      Develop

    • @katiejanzen347
      @katiejanzen347 9 ปีที่แล้ว +1

      Nah man, gmail!

    • @Tordek
      @Tordek 9 ปีที่แล้ว +7

      RSS, if you're smart.

    • @SargentoPeppermint
      @SargentoPeppermint 9 ปีที่แล้ว +1

      Tordek Twitter is easier and you get pretty much the same result and you can even interact with the uploader
      10/10 would tweet again

    • @SargentoPeppermint
      @SargentoPeppermint 9 ปีที่แล้ว +2

      xato909 Simple. TH-cam's subbox is shit, therefore anything would be better, due to it's ease of use, the ability to get "instantly" the message that a new video is out, even before it's public (sharing the link to an unlisted video) and being able to interact with the uploader, Twitter gets my "8/8 m8" award for the best TH-cam subbox of the year.
      Developed enough for ya?

  • @DemoBytom
    @DemoBytom 9 ปีที่แล้ว +1

    The only, small bit of info, I think was lacking - was that the hashes made from passwords are (or rather should be) unique. So that ,not only reversing operation to get a password from hash is nearly impossible, but getting the same hash from 2 different passwords as well. Otherwise - nice, clean and easy to follow for anyone :)

  • @Triadii
    @Triadii 4 ปีที่แล้ว

    Well explained as usual, Tom!

  • @TheRicoboy22
    @TheRicoboy22 5 ปีที่แล้ว +8

    Its 2019 and I know a website I use regularly that stores my password in plain text. Its stupid this is still an issue in 2019.

  • @Physics27
    @Physics27 3 ปีที่แล้ว +12

    Hi Scott great video love this type of content. I think something you missed explaining to the regular user, is that if someone steals that hash of your password it’s no good because when they put it through the same algorithm it won’t give a useful answer. A lot of people will not understand this without being told.

  • @TheLeeroy2525
    @TheLeeroy2525 6 ปีที่แล้ว

    Love your videos mate.

  • @alcesmir
    @alcesmir 9 ปีที่แล้ว

    I totally forgot I was on TYMNK and was awaiting the Computerphile ending. Damn you ***** and your omnipresence abilities...

  • @benaustin1003
    @benaustin1003 9 ปีที่แล้ว +20

    Isn't it funny how dans comment sections are in other videos?

    • @Quinton238
      @Quinton238 9 ปีที่แล้ว +1

      It would be nice if he would unblock them, seeing as the youtube comment section is truthfully much nicer than it used to be.

  • @CBNPints
    @CBNPints 9 ปีที่แล้ว +7

    I'm here from a man who likes building murderous roller coasters.

  • @Flopsaurus
    @Flopsaurus 9 ปีที่แล้ว

    Very informative video. Thanks!

  • @dizzydude007
    @dizzydude007 9 ปีที่แล้ว

    I love these computer related videos!!

  • @MrSauceman09
    @MrSauceman09 9 ปีที่แล้ว +14

    my password is red mist

  • @HITHEREWINSTON
    @HITHEREWINSTON 2 ปีที่แล้ว +3

    I was very disturbed when Virgin Media sent me my password in plain text, IN THE MAIL. It boggles me how one of the UK's biggest ISPs is so lax on security.

  • @synexiasaturnds727yearsago7
    @synexiasaturnds727yearsago7 4 ปีที่แล้ว

    You did the shortcut that I thought no one used!

  • @Nick-lg4qj
    @Nick-lg4qj 4 ปีที่แล้ว

    You just answered my programming assignment.

  • @zenoist2
    @zenoist2 8 ปีที่แล้ว +9

    I don't know my password either.

  • @thesteamycreamofdualjabbar6486
    @thesteamycreamofdualjabbar6486 9 ปีที่แล้ว +9

    I'm a monster *unce* *unce unce* *unce*

    • @MDthe1st
      @MDthe1st 9 ปีที่แล้ว +2

      i see what you did there :)

  • @shahman1
    @shahman1 8 ปีที่แล้ว

    This was very USEFUL! :)

  • @kevingruenofficial
    @kevingruenofficial 4 ปีที่แล้ว

    Informative video, thank you!

  • @TricksterRad
    @TricksterRad 8 ปีที่แล้ว +2

    It's necessary to point out though, that if a company sends you a password, it usualy is a new randomly generated one.

    • @El-Burrito
      @El-Burrito 8 ปีที่แล้ว +1

      +Jan Novák They shouldn't even be doing that, most e-mail is not secure. Passwords should always be generated by sending you to a web page on the site with time sensitive authorisation and allow you to type in your own password.

    • @TricksterRad
      @TricksterRad 8 ปีที่แล้ว +3

      El Burrito That's why you're supposed to change the password as soon as you log in. Plus, I don't think it matters, if your email is compromised, whether you get a link to change the password, or send a newly created password.

  • @INeedAttentionEXE
    @INeedAttentionEXE 8 ปีที่แล้ว +4

    2:20
    Or quantum computers, or Molecular computers

    • @noahhounshel104
      @noahhounshel104 8 ปีที่แล้ว

      +TheCrafting Criminals Never heard of a molecular computer. Quantum could theoretically break what we use currently but there are still ways around it.

    • @INeedAttentionEXE
      @INeedAttentionEXE 8 ปีที่แล้ว

      your totally right since atoms can be in multiple states at once, but if you even look at them wrong they freak out

    • @noahhounshel104
      @noahhounshel104 8 ปีที่แล้ว +1

      TheCrafting Criminals Its not atoms.

    • @INeedAttentionEXE
      @INeedAttentionEXE 8 ปีที่แล้ว +1

      Noah Hounshel sry i meant photons or electrons

    • @dragon4c3_71
      @dragon4c3_71 8 ปีที่แล้ว +2

      +TheCrafting Criminals hence billions of dollars.

  • @ericfelds6291
    @ericfelds6291 ปีที่แล้ว

    I find this mildly comforting

  • @FountainMath
    @FountainMath 9 ปีที่แล้ว

    Numberphile would love this.
    Thanks for the video Tom.

  • @SmugLookingBarrel
    @SmugLookingBarrel 8 ปีที่แล้ว +11

    But doesn't that open the possibility that a different password will be accepted instead of your real one if it hashes to the same code? Let's say your hashing algorithm is "number % 10", then if my password is 244, I could type in 384 and it would work.

    • @potatosordfighter666
      @potatosordfighter666 8 ปีที่แล้ว +2

      +Najarala No

    • @potatosordfighter666
      @potatosordfighter666 8 ปีที่แล้ว +10

      Let's MASSIVELY simplify it. If you multiply 2 by 5 is it possible to get 10 by multiplying any other number by 5? No.

    • @JivanPal
      @JivanPal 8 ปีที่แล้ว +20

      +Najarala
      Some operations are many-to-one. That is, different inputs can result in the same output, which is your concern.
      However, the hashing/salting algorithms used for cryptography are always one-to-one operations, meaning that there is absolutely no way that two different inputs can result in the same output.

    • @potatosordfighter666
      @potatosordfighter666 8 ปีที่แล้ว +4

      So what I said, but in a more complex manner.

    • @JivanPal
      @JivanPal 8 ปีที่แล้ว +18

      *****
      You gave an example, whereas I gave an explanation.

  • @smellthel
    @smellthel 3 ปีที่แล้ว +3

    Don’t use abc as a password, kids

  • @JeffreyBodenstein
    @JeffreyBodenstein 9 ปีที่แล้ว

    awesome job explaining. I have many users at work that should watch this.

  • @EddyProca
    @EddyProca 9 ปีที่แล้ว

    Yay, finally another Tom video on Computerphile! Oh...

  • @krypto276
    @krypto276 9 ปีที่แล้ว +9

    I was sent here by a man who failed to kill Hitler with a 95 positive G explosive rollercoaster.

  • @intelX1000
    @intelX1000 7 ปีที่แล้ว +5

    That's wrong though. If you hash server side, you MUST, at least for a short time, store the password in plaintext on RAM. Also, most password hash algs aren't "hard" to do backwards, but absolutely mathematically impossible, simply due to overlap.

    • @oolivero45
      @oolivero45 7 ปีที่แล้ว +1

      Most websites don't hash server side though. Usually, the client hashes the password, then sends the hash to the server to be stored; preventing a plaintext copy of the password from being intercepted during transmission.

    • @JJJMMM1
      @JJJMMM1 7 ปีที่แล้ว +5

      Oliver: That is wrong and a really, really bad idea. If you create the hash+salt on the client side and send it to the server to be stored, it effectively becomes your password that you send and store as plaintext. Intercepting it would have the same effect as intercepting your original password. If the user database was leaked, anyone who saw the hash could log in to your account easily by modifying the login page code a bit or doing a manual HTTP query. You'd lose almost all the benefits of hashing.
      Hashing isn't a sound way of securing your traffic. You should encrypt traffic properly with TLS.
      Re-hashing the hashed password on the server side and storing that would prevent the plaintext problem, but it also adds the disadvantages that come with peppering. Suffice to say it's not good practice.
      There's a whole slew of other problems with client-side hashing. Updating encryption algorithms would be tricky. I won't even go into the problems specific to browsers.

  • @adifferentlynameduser7050
    @adifferentlynameduser7050 9 ปีที่แล้ว

    clever fella :) thank you for giving us a few quick tricks and some interesting facts ^_^ keep up the good work Tom :)
    (seriously thought you were the lead actor off of spooks for a moment there :P )
    have a good day today ^_^

  • @M1N1MANG30
    @M1N1MANG30 7 ปีที่แล้ว

    This got me 5 marks in a computing test, thanks!

  • @theramendutchman
    @theramendutchman 3 ปีที่แล้ว +3

    Or sites that set a limit like "password cannot be longer than 15 characters"
    There's no reason to do that unless you want to save space and avoid errors surrounding plain text... So hopefully not the passwords!

  • @mrloganz3033
    @mrloganz3033 3 ปีที่แล้ว +4

    “I’ll double your bitcoin you send 1000 I send 2000 back!” -Elon Musk, 2020

  • @theinstantnoodle9628
    @theinstantnoodle9628 9 ปีที่แล้ว

    Mind blown. Awesome video.

  • @BS-vx8dg
    @BS-vx8dg 2 ปีที่แล้ว

    I've never seen Tom inside an office before. He's always out in the wind in the videos I've seen.

  • @naffal1538
    @naffal1538 4 ปีที่แล้ว

    damn, coming back and seeing tom with a mullet, now that's something

  • @ezadviper
    @ezadviper 9 ปีที่แล้ว

    yay Tom Scott video !!

  • @ba3cool
    @ba3cool 9 ปีที่แล้ว +1

    Nice view. One Canada Square, Canary Wharf, neat-o!

  • @devorahberkowitz5536
    @devorahberkowitz5536 6 หลายเดือนก่อน

    so interesting and very clearly explained!