How End-to-End encryption Works?

31,790
0
Published 2020-04-14
In this video I explain End to End encryption within the context of WhatsApp. I explain how encryption and TLS works then the problem of having a centerlized server decrypting the traffic, I then talk about how end to end encryption (e2e) can help mitgate that and finally I explain the problems with e2e encryption


* Classic Encryption Example 1:00
* End to end encryption 3:25
* Problem with E2E 7:30 Web Trust? Fingerprints/CA (QR whatspp)

🏭 Software Architecture Videos
   • Software Architecture  

💾 Database Engineering Videos
   • Database Engineering  

🛰 Network Engineering Videos
   • Network Engineering  

🏰 Load Balancing and Proxies Videos
   • Proxies  

🐘 Postgres Videos
   • PostgresSQL  

🚢Docker
   • Docker  

🧮 Programming Pattern Videos
   • Programming Patterns  

🛡 Web Security Videos
   • Web Security  

🦠 HTTP Videos
   • HTTP  

🐍 Python Videos
   • Python by Example  

🔆 Javascript Videos
   • Javascript by Example  

👾Discord Server discord.gg/CsFbFce

Support me on PayPal
bit.ly/33ENps4

Become a Patreon
www.patreon.com/join/hnasr

Stay Awes

All Comments (21)
  • @inquisitive8086
    Great video Hussein. If I may explain this for your audience with some math - ·       Bob generates a private key number X ·       Alice generates a private key number Y ·       There are publicly known numbers A and N provided by the server. ·       Bob does A raised to X and sends the number to Alice ·       Alice does A raised to Y and sends the number to Bob ·       They both raise what the other sent with their own secret key i.e. Bob now has A raised to YX and Alice now has A raised to XY which is the same number. They also mod it with N to get a manageable number between 0 and N. They now have the same secret key without knowing each other's private keys and without the server knowing the final key. The server only knows A and N. The trick is to make X, Y and N sufficiently large to make reverse engineering near impossible.
  • @Epistemer
    man you're the most backend youtuber in the entirety of YouTube, love your content 👍❤❤👍
  • @EitanShteinberg
    Even without graphics and illustrations - this was an excellent and clear explanation !
  • You're the best! From daily doubts I have to more deep studying I do I can find some video here on your channel explaining topics with honesty and a great background. Thanks from Rio de Janeiro, Hussein!
  • @tambolaking5383
    You look good in groomed beard and I agree that you are the rarest of backend youtuber.
  • @saket916
    The explanation couldn't have been any better... Great job🤝
  • @Gabs__00
    Great contente. The best backend channel 🖤
  • @UliTroyo
    Such a great explanation. Thanks, Hussein!
  • And I really thought WhatsApp works with Asymmetric all the time. Each user has their own private/public key pair. But you made it clear now that it works similarly to TLS 1.3 Diffie Hellman. 👌
  • @babaarab265
    You are awesome Hussein! please upload more. Thank you for this video.
  • @Nick-bq1ez
    Excellent explanation, no need for fancy visuals if it makes sense!
  • @HK-sw3vi
    fantastic, so basically double encryption
  • @sircitrus
    Great video. Thank you! Btw for persistence do we store that encrypted thingy in the DB directly?
  • That last CA you talked about was DigiNotar....darket diaries made a video about that.