yego.me
💡 Stop wasting time. Read Youtube instead of watch. Download Chrome Extension

Hashing - (Password Security)


2m read
·Nov 3, 2024

Maads 101 here today. This is a video on password security.

Now, a few subscribers have been commenting in personal messaging us and saying that they want us to get their parents' passwords or their friends' passwords. So, let me just explain something about getting passwords.

For most services, your password is "hashed." And on the Mac, I know it is hashed. What hashed means is that when you type your password and set your password for the first time, it takes your password and, in some services, it uses your username and hashes them. So, it does a unique math algorithm to your password and supposedly your username, and makes a random number out of that.

Now, that math algorithm it ran your password through cannot be undone. So now you have this random number that is the hash of your username and password put together. Then, when you log in, it takes your password and your username again. When you've typed your password to log in, it hashes them. If they equal this hash, then they log you in; but if the hash does not equal the original saved hash, then it doesn't log you in.

So, passwords are not stored in plain text; they are hashed in this one-way algorithm. If you want to find a password, you'd be root forcing it. You'd be making programs to go through and guess every single password and hash the password, then check it. Unfortunately, that would be too time-consuming and just not good in general.

But, let me just demonstrate this. I'm going to take my password and my username, click encrypt, and here's the encryption code for my password. I'm going to copy this; so right now, this is the hash of my username and password: F Etc Q la la la.

So now, if I log in, say I type a random password, clicking encrypt—it’s not going to equal that original hash. It's going to equal something different. So that's why hashing is very secure. It’s what all the advanced systems do.

I know for some of you, if you click "forget password," and then type the answer to your security question, they might email you your password. If that's the case, then they don't hash your password, and your passwords with that are in plain text. But I say you don't have to worry about that too much on the Mac because your password is, in fact, hashed on your Mac.

So, thank you for watching Maads 101. Subscribe and give back!

More Articles

View All
We Are All Related
Hey, Vsauce, Michael here, and you guys are my family. Scientifically speaking, geneticists tell us that every single person on earth is, at the least, 50th cousins with everybody else on earth. It kind of has to be that way. Think of it like this—you ha…
Paralysed Rats Made To Walk Again
We have all heard of mind over matter, but is it possible that the right motivation can actually help repair spinal damage? I have come to Lausanne, Switzerland, to find out about some innovative research being done to repair the spinal cords of rats usin…
Introduction to factoring higher degree monomials | Algebra 2 | Khan Academy
In this video, we’re going to dig a little bit deeper into our knowledge or our understanding of factoring. Now, factoring is something that we’ve been doing for many years now. You can go all the way back to when you’re thinking about how would I factor …
The Dark Web is Killing Thousands Every Year
In 2010, around 40,000 people died from drug overdoses in the United States. Quantifying the importance and meaning of individual human life in a single statistic is impossible, but that number might already seem high, especially if you knew one of those …
Evaluating composite functions: using tables | Mathematics III | High School Math | Khan Academy
[Voiceover] So we have some tables here that give us what the functions f and g are when you give it certain inputs. So, when you input negative four, f of negative four is 29. That’s going to be the output of that function. So we have that for both f and…
How to sell private jets!
Occasionally, we’ll buy an airplane and then mix it up and then resell it on. But the majority of the time, we’re acting as an exclusive agent to represent either a buyer or a seller. For most of my career, we would always represent the seller and try to…