yego.me
💡 Stop wasting time. Read Youtube instead of watch. Download Chrome Extension

Hashing - (Password Security)


2m read
·Nov 3, 2024

Maads 101 here today. This is a video on password security.

Now, a few subscribers have been commenting in personal messaging us and saying that they want us to get their parents' passwords or their friends' passwords. So, let me just explain something about getting passwords.

For most services, your password is "hashed." And on the Mac, I know it is hashed. What hashed means is that when you type your password and set your password for the first time, it takes your password and, in some services, it uses your username and hashes them. So, it does a unique math algorithm to your password and supposedly your username, and makes a random number out of that.

Now, that math algorithm it ran your password through cannot be undone. So now you have this random number that is the hash of your username and password put together. Then, when you log in, it takes your password and your username again. When you've typed your password to log in, it hashes them. If they equal this hash, then they log you in; but if the hash does not equal the original saved hash, then it doesn't log you in.

So, passwords are not stored in plain text; they are hashed in this one-way algorithm. If you want to find a password, you'd be root forcing it. You'd be making programs to go through and guess every single password and hash the password, then check it. Unfortunately, that would be too time-consuming and just not good in general.

But, let me just demonstrate this. I'm going to take my password and my username, click encrypt, and here's the encryption code for my password. I'm going to copy this; so right now, this is the hash of my username and password: F Etc Q la la la.

So now, if I log in, say I type a random password, clicking encrypt—it’s not going to equal that original hash. It's going to equal something different. So that's why hashing is very secure. It’s what all the advanced systems do.

I know for some of you, if you click "forget password," and then type the answer to your security question, they might email you your password. If that's the case, then they don't hash your password, and your passwords with that are in plain text. But I say you don't have to worry about that too much on the Mac because your password is, in fact, hashed on your Mac.

So, thank you for watching Maads 101. Subscribe and give back!

More Articles

View All
Why it's so hard to be happy
A long time ago, humanity rose to become the dominant species on planet Earth. And we were able to do this because of one specific trait. It certainly wasn’t our physical prowess, pretty much any animal the same size as us would absolutely destroy us in a…
Planning Our Route to Mars | MARS: How to Get to Mars
Before we get through the first half of this century, humans will be living and working on Mars. We can do it with the kinds of technology we either have today or know how to build today. Let’s think about how we go about this thing, okay? This journey to…
The Most Controversial Problem in Philosophy
Do not hit the like button! Or the dislike button, at least not yet. I want you to consider a problem that’s been one of the most controversial in math and philosophy over the past 20 years. There is no consensus answer. So I want you to listen to the pro…
Free live tutoring at schoolhouse.world
Hi everyone, Sal here from Khan Academy, and I just wanted to make an announcement of something that I think many of you will find useful. I have a little bit of a side project going on called schoolhouse.world. It isn’t an official Khan Academy project, …
Explaining the “Eureka Effect” | StarTalk
No one can imagine anybody else playing that role but you. So what were you doing? What’s your secret? Come on! I love the whole concept of scientists who deal with, uh, insoluble, uh, problems. I love the story of a noted scientist who was trying to fin…
Determining whether real world model is linear or exponential
The table represents the cost of buying a small piece of land in a remote village since the year 1990. Which kind of function best models this relationship? I’m using this as an example from the Khan Academy exercises, and we’re really trying to pick bet…