yego.me
💡 Stop wasting time. Read Youtube instead of watch. Download Chrome Extension

Hashing - (Password Security)


2m read
·Nov 3, 2024

Maads 101 here today. This is a video on password security.

Now, a few subscribers have been commenting in personal messaging us and saying that they want us to get their parents' passwords or their friends' passwords. So, let me just explain something about getting passwords.

For most services, your password is "hashed." And on the Mac, I know it is hashed. What hashed means is that when you type your password and set your password for the first time, it takes your password and, in some services, it uses your username and hashes them. So, it does a unique math algorithm to your password and supposedly your username, and makes a random number out of that.

Now, that math algorithm it ran your password through cannot be undone. So now you have this random number that is the hash of your username and password put together. Then, when you log in, it takes your password and your username again. When you've typed your password to log in, it hashes them. If they equal this hash, then they log you in; but if the hash does not equal the original saved hash, then it doesn't log you in.

So, passwords are not stored in plain text; they are hashed in this one-way algorithm. If you want to find a password, you'd be root forcing it. You'd be making programs to go through and guess every single password and hash the password, then check it. Unfortunately, that would be too time-consuming and just not good in general.

But, let me just demonstrate this. I'm going to take my password and my username, click encrypt, and here's the encryption code for my password. I'm going to copy this; so right now, this is the hash of my username and password: F Etc Q la la la.

So now, if I log in, say I type a random password, clicking encrypt—it’s not going to equal that original hash. It's going to equal something different. So that's why hashing is very secure. It’s what all the advanced systems do.

I know for some of you, if you click "forget password," and then type the answer to your security question, they might email you your password. If that's the case, then they don't hash your password, and your passwords with that are in plain text. But I say you don't have to worry about that too much on the Mac because your password is, in fact, hashed on your Mac.

So, thank you for watching Maads 101. Subscribe and give back!

More Articles

View All
The 5 Golden Rules of Real Estate Investing
What’s up, you guys? It’s Graham here. So I’ll just get right into it. These are the five real estate investing tips to live by and keep in mind. And this is coming from somebody who owns five investment properties already and someone who’s been in real e…
Graphing arithmetic sequences | Algebra I (TX TEKS) | Khan Academy
We are told that F of n is equal to F of n minus 1 plus 6. So, the value of this function for each term n is defined in terms of the value of the function for previous terms. We’re essentially adding six to the previous term for each whole number n, where…
Give to Khan Academy today!
Hi, I’m Sal Khan, founder of Khan Academy, and with your support I’m excited to say: Here’s just a few of the things that we’ve been able to accomplish together. We now cover a wide range of academic subjects including history, science, grammar, and much…
Lewis diagrams for molecules | Chemistry | Khan Academy
Let’s draw LS draw structures for certain molecules. It’s a lot of fun to do that. Okay, now the first thing we need to do to draw these structures is to identify the number of valence electrons. Okay, and we’ve talked about these valence electrons in ou…
THE AMERICAN DREAM 🇺🇸 IS NO LONGER ATTAINABLE?
So many young Americans feel that the American dream is unattainable. You’ve got to remember these young people, this cohort of individuals, men and women, never lived in a time of rising interest rates or inflation. Obviously, these are great cycles, but…
Worked example: Chain rule with table | Derivative rules | AP Calculus AB | Khan Academy
The following table lists the values of functions f and g and of their derivatives f prime and g prime for the x values negative 2 and 4. And so, you can see for x equals negative 2, x equals 4, they give us the values of f, g, f prime, and g prime. Let …