yego.me
💡 Stop wasting time. Read Youtube instead of watch. Download Chrome Extension

Hashing - (Password Security)


2m read
·Nov 3, 2024

Maads 101 here today. This is a video on password security.

Now, a few subscribers have been commenting in personal messaging us and saying that they want us to get their parents' passwords or their friends' passwords. So, let me just explain something about getting passwords.

For most services, your password is "hashed." And on the Mac, I know it is hashed. What hashed means is that when you type your password and set your password for the first time, it takes your password and, in some services, it uses your username and hashes them. So, it does a unique math algorithm to your password and supposedly your username, and makes a random number out of that.

Now, that math algorithm it ran your password through cannot be undone. So now you have this random number that is the hash of your username and password put together. Then, when you log in, it takes your password and your username again. When you've typed your password to log in, it hashes them. If they equal this hash, then they log you in; but if the hash does not equal the original saved hash, then it doesn't log you in.

So, passwords are not stored in plain text; they are hashed in this one-way algorithm. If you want to find a password, you'd be root forcing it. You'd be making programs to go through and guess every single password and hash the password, then check it. Unfortunately, that would be too time-consuming and just not good in general.

But, let me just demonstrate this. I'm going to take my password and my username, click encrypt, and here's the encryption code for my password. I'm going to copy this; so right now, this is the hash of my username and password: F Etc Q la la la.

So now, if I log in, say I type a random password, clicking encrypt—it’s not going to equal that original hash. It's going to equal something different. So that's why hashing is very secure. It’s what all the advanced systems do.

I know for some of you, if you click "forget password," and then type the answer to your security question, they might email you your password. If that's the case, then they don't hash your password, and your passwords with that are in plain text. But I say you don't have to worry about that too much on the Mac because your password is, in fact, hashed on your Mac.

So, thank you for watching Maads 101. Subscribe and give back!

More Articles

View All
Why Don't We Shoot Nuclear Waste Into Space?
Here in the Kotart Labs, we test very important ideas to see what happens when you blow things up or play with black holes. Many of you suggested that we look into an idea that sounds reasonable: shooting nuclear waste into space. It’s one of those concep…
Winner Winner Raccoon Dinner! | Dirty Rotten Survival
It’s Dick’s game of choice: a good old-fashioned roadkill barbecue. Smells pretty good! These guys want modern conveniences. I’m gonna give them their food in a birch bark serving tray, Allah the hillbilly hibachi! For this roadkill cook-off, the guys wil…
Translations: graph to algebraic rule | Transformational geometry | Grade 8 (TX) | Khan Academy
We are told Lucas translated triangle ABC to create triangle A’B’C’. So we went from this blue one, or blue-green one, to this burgundy one, or this red one. Write a rule that describes this transformation. So pause this video and try to figure this out o…
Solving exponent equation using exponent properties
So I have an interesting equation here. It says ( V^{-65} ) times the fifth root of ( V ) is equal to ( V^{K} ) for ( V ) being greater than or equal to zero. What I want to do is try to figure out what ( K ) needs to be. So what is ( K ) going to be equa…
Sal teaches Grover about the electoral college | US government and civics | Khan Academy
[Music] But for me, both for cute and adorable Grover, I am pro ABC’s and 4 one 2 threes! Plus, I promise I have no skeletons in my closet. I do not even have one in my body. Hey Grover, what are you doing? Oh hello there, Sal Khan! I am just running fo…
Death & Dynasties
Rulers are often related, with power passing from member to member, forming a dynasty. This occurs not just with royalty or dictators, but also with representatives in a democracy. Families frequently pass power or compete with other families for a turn a…