first time I went beyond simply exposing myself to jargon and understood the logic. That's 2 and a half pages of notes, including a drawing of my own. Tops best spent time this week, even though earlier I launched my first ever website with its own API. Thank you
One thing I don't understand -- if the certificates are themselves publicly accessible, what's stopping me from presenting the Facebook certificate unmodified as my own and impersonating Facebook? The client would decrypt the signature and find that the decrypted server public key indeed matches Facebook's public key, implying that I am Facebook.
Was looking for a relevant tutorial this thought me everything I was looking for and didn't over complicate anything what through me off a bit was saying intended instead of indented 🤣
at 41min (styling of the operation button when clicked), the CSS styling is NOT AT ALL how it should be done. There is Svelte's class directive that is super useful and meant to do that.
This is one of the best videos I have come across this 2024...simple and detailed explanation...Do you have hands on videos on renewing certificate? "Not secure"
It's good but it's not the best on RU-vid. There are plenty of videos that all can be the BEST. You just understand this video because you lacked knowledge or understanding of words used in other videos.
1:37:01 that is amazing use case to find related items. Love this tutorial. Im using Supabase and it has all the schemas wired up so you can transform your SQL tables and get JSON like response
This is absolutely an amazing video. There is one small thing that may be missed by viewers and that is why we are using asymetric encryption to encrypt a symetric key. Why not just use asymetric encryption the whole time? Why do we need to validate a symetric key? The reason is because asymetric encryption/decryption is a computationally expensive operation compared to symetric encryption/decryption. The majority of the data transfer happens with symetric encryption with a key which both the client and sever agree upon, all this crazy asymetric infrastructure is there in order to verify the symetric key was not tampered with. Thanks for this video!
Have someone figure out with some another function/method how make the filter for the average?Its absolutely hilerious, thats it should use so crazy function, but normal function from my side didnt work. Burning head :D
Just a quick question... If I'm creating a SPA could I use Component to create the building blocks (links, buttons, and cards) of a Single page as opposed to a Collection. I realize that Collections have other added advantages a more complex eCommerce site where you need to filter, but what would be the benefit in a very simple small project like a Single Page application where there is no filtering.
All good, but what id the attacker replaces the CA certificate of his own instead of the original while sending to client? His own public key, registered with CA and everything validates fine right? Whats this case?
Hi all, I just want to clarify a doubt regarding the chain of trust. In the last example where Baltimore is the root, Cloudflare is the intermediate and hello fresh is the server, the client will finally have 3 sets of public key (1 from root, 1 from intermediate and 1 from server) which it will then use to decrypt the corresponding encrypted public keys attached to each certificate?
Wonderful!, by far this is the best pinia tutorial (course) that I've ever watched. Easy to understand and cover all the basic to get started with pinia. Love it!
The best video of explaining about the redux with react. The example of this tutorial is amazing, i am so appreciate of your work. it inspiring ✨, Big thanks to you.