Love this man. Classical introvert, didn't look into the camera even once within the first 5 minutes. Also, good insights into a topic most full-stack developers probably don't think about too much! Thank you!
At 4:56 the description of private/public key seems wrong. You share the public key to others for encrypting and decrypt it at your end with your private key and vice versa.
"decrypt" is the wrong word here. He meant to say that people can use the public key to "verify" that the record is indeed signed by the corresponding private key.
When you share your public key, others can use it to encrypt messages that only you can decrypt with your private key. Conversely, you can encrypt messages with your private key, and others can decrypt them using your public key. This ensures confidentiality and verifies your identity. When you encrypt a message with your private key, it can be decrypted by anyone with your public key. This doesn’t keep the message secret but proves that it was indeed sent by you, as only your private key could have encrypted it. This process is called a digital signature and ensures authenticity and integrity of the message.
after further investigation, I'm now realizing that the video is mirrored. Meaning, he is writing normally (with his right hand) then after the fact they flip the video so we can see what he is writing (looks like he is writing backward with his left hand) . Cool trick!
Love this man. Classical introvert, didn't look into the camera even once within the first 5 minutes. Also, good insights into a topic most full-stack developers probably don't think about too much! Thank you!
Terry is a fantastic instructor...
I want to see more videos by him
Terry is an invaluable DNS resource with many years of experience! Great video!
Terry, you have great tutoring skills. Thank you for this video
Thanks for watching!
Awesome explanation, please do one for SPF and DKIM as well
Great explanation, concise and to the point
A great video and explanation. Appreciated
Are RRSig really signed by public keys ? According to CloudFlare docs, the private key is used to sign records.
Great video and explanation.
Thank you IBM. What wire together, fire together.
At 4:56 the description of private/public key seems wrong. You share the public key to others for encrypting and decrypt it at your end with your private key and vice versa.
"decrypt" is the wrong word here. He meant to say that people can use the public key to "verify" that the record is indeed signed by the corresponding private key.
When you share your public key, others can use it to encrypt messages that only you can decrypt with your private key. Conversely, you can encrypt messages with your private key, and others can decrypt them using your public key. This ensures confidentiality and verifies your identity.
When you encrypt a message with your private key, it can be decrypted by anyone with your public key. This doesn’t keep the message secret but proves that it was indeed sent by you, as only your private key could have encrypted it. This process is called a digital signature and ensures authenticity and integrity of the message.
Great discussion here. Thanks to you all
Thank you
good video thank you
Adds a ton of latency to my home server.
King
Wow. his backward writing skills are underappreciated.
after further investigation, I'm now realizing that the video is mirrored. Meaning, he is writing normally (with his right hand) then after the fact they flip the video so we can see what he is writing (looks like he is writing backward with his left hand) . Cool trick!