Hey Hussein, This is off topic query : For developing API(any lang) which one do you prefer (Function or Class based approach) and why? and which stack you love to develop API(with scalability)? Thanks in advance🙏
Totally off topic but youtube just pushed the quality update and made this video unwatchable... I've set it to 1080p but it looks like 720p with an insane amount of motion blur. 😫 Love the knowledge tho 😉
And then there is the alternative to become your own ISP and only use layer 2 (transport) to your BGP router. I do these up for clients that want a more private, and jurisdiction preferential secure network over fiber to the colo hotel where we interconnect outbound.
To be fair -- VPNs are very useful when trying to access resources inside a private LAN -- something like a road-warrior setup. I know this scenario wasn't exactly covered but its a really good use case.
But if you're not scared of using VPN because they can only see your destination, it means you are already using HTTPS. Then, there's no scare of MITM either, attacker can't bypass RSA certificate stuff.
Nice content, this time I had a hard time trying to understand the whole thing withouth visual aids XD. Would be great if you can reupload a new video explaining with the proper diagrams. Thanks
You have got all the topics that i want to know more...like http, http2, tls, vpn, tcp , proxy. And what not.. Feel blessed to find your channel I feel its my responsibility to tell you what commendable work you are doing 👍👍👍👍. All the very best
It seems I love playing exceptions to rule game. :-) TL;DR the real question with a VPN for privacy/security: you are trading the trust of your ISP with the trust for your VPN provider 0:33 "beautifully simple" Laughs in Microsoft L2TP and PPTP ;-) 7:18 and the other reason: not every medium has MAC-addresses. Like 4G, 5G, etc. mobile data or satellite links. 13:84 this is actually a dangerous thing to say, a lot of VPNs don't encrypt all traffic, just a subset. Like 1 or more subnets. 15:08 well, Tor tries to hide by using TLS on port TCP/443 (HTTPS) and connecting to different endpoints that's a good method to make it less clear what you are doing. 15:19 most of them are very recognizable. 16:36 and if you pay by credit card, they also know who you are. 18:36 unlesss someone enabled the webinterrface or whatever on the WAN side of the router/firewall doing the NAT of course. 25:36 the traffic in a VPN or on a regular Internet connection doesn't only show the IP-address information, but also DNS-requests and TLS SNI hostnames. So no need to know IP X is the IP for Google, the DNS and HTTPS connection already scream it's Google. Well you know of course, it's not just home users, it's pretty much invented for business users. Lots of people also use VPNs for working from home. Or in the case of doing business with a customer: when they are delivering software to a customer internal network. And in those use-cases your machine is doing the routing (deciding: should the traffic go over the VPN or not). Which shows the routing function is a very widespread function which pretty much any Internet connecteed machine can do. No extra software needed, just a bit of configuration. Or when connecting multiple locations of the same company, maybe the most common/original reason for a VPN.
I don't get why vpn have become so popular for security concerns. You're just giving your data to your vpn instead but there's still someone out there with you data
On top of that many VPN's use end points outside the country thereby crossing internation boundries. This subjects them to agencies that normally cannot monitor US citizens locally. Once you leave the country it's fair game for them. So, if you are looking for privacy from government agencies (not illegal activities, just privacy), that's not the way to go.
Thanks Hussein But one thing I don't understand about how a VPN works Is how your browser allows you this to happen. when you said man in the middle attack I thought in my had but that can't happen because we are using HTTPS and the site we visit will have a certificate. how does IPsec make it so that the browser allows you to go through the VPN but still have a valid certificate?
Ig as per the certificate stuff you should be able to get a certificate in your shady sites as well and if instead of returning google home page if you returned response from your shady server it should still show as https. But i am not sure if domain name remains the same. It's kinda like how ISP sometime sends a popup in some random request if your plan is about to expire or something of that sort. As per the second point, i think since the request you are sending isn't altered at all by any means, the only thing you are doing are adding one more layer of meta info in packets from you to your vpn server but post that that layer gets removed and it's same data that vpn forwards. It just works like simple proxy with some decryption logic and rouing ig. I think in this case it's just like your router, which takes your packets and send it to your ISP. VPN server works in the same way ig with additional effort of decryption. Just throwing random thoughts though with only assumptions
Do y’all recommend a vpn over a proxy for wanting to do “local” SoMe activity in areas where VPN or Proxy located to not get banned but SoMe). I’ve heard that residential proxies are the best for avoiding banning. Hearing that if sites like FB see a VPN they will ban Acct/profile. Hogwash? I’m wanting to connect to distinct local SoMe profiles for interaction, etc. What do you recommend to remove session fingerprints from browsers or does that matter with VPNs (I’m ignorant) but know this is needed with proxies. Thx!
7:27 Then you get - "IPv6 looks like a Mac address...." Almost but no... A RFC 4291 spec, unique routable address to cater for IPv4 address exhaustion, that s IPv6 :-)
i was wondering the same thing and was expecting him to cover lol. They just do request proxy but still loads that hit those server are immense. I wonder what are the ways free vpn uses to fund their cost
It's all about packet throughput, the size of the data pipe, bytes per second. Very little power is need to read a packet header and pass it on to the next node.
Wrong. VPN works like a man in the middle attack. They force user to install and trust an SSL certificate which is used for encrypting user to VPN traffic. Then the VPN decrypts and re encrypts the traffic's with the destination public key. The server encrypts back https traffic with VPNs public key, which VPN intercept and decrypt and re encrypt with trusted user certificate. VPN can technically see everything not just the meta.
Hey Hussein. Why don't you do some series of great technical book recommendations?
I Always love when you go through very basics first. Thanks.
Stumbled upon your post. Really appreciate your straightforward conversation with your viewers. Hella cool! Thanks!
Before we continue the funeral, I'd like to mention our sponsor Nord VPN
Hey Hussein,
This is off topic query : For developing API(any lang) which one do you prefer (Function or Class based approach) and why? and which stack you love to develop API(with scalability)?
Thanks in advance🙏
Totally off topic but youtube just pushed the quality update and made this video unwatchable...
I've set it to 1080p but it looks like 720p with an insane amount of motion blur. 😫 Love the knowledge tho 😉
Create a video about Timezones, UTC and other related stuffs.
❤️ All your videos👍
And then there is the alternative to become your own ISP and only use layer 2 (transport) to your BGP router. I do these up for clients that want a more private, and jurisdiction preferential secure network over fiber to the colo hotel where we interconnect outbound.
by far the best technical/IT youtube!
This is definitely what I was looking for in these days
To be fair -- VPNs are very useful when trying to access resources inside a private LAN -- something like a road-warrior setup. I know this scenario wasn't exactly covered but its a really good use case.
Great content as always but I felt the sound output was low for this video. Even after setting max volume, it was not as loud as usual.
But if you're not scared of using VPN because they can only see your destination, it means you are already using HTTPS. Then, there's no scare of MITM either, attacker can't bypass RSA certificate stuff.
Nice content, this time I had a hard time trying to understand the whole thing withouth visual aids XD. Would be great if you can reupload a new video explaining with the proper diagrams. Thanks
Thanks Hussein for all these videos and overseas mentoring for millions of software engineers ❤️❤️🙏🙏
You have got all the topics that i want to know more...like http, http2, tls, vpn, tcp , proxy. And what not..
Feel blessed to find your channel
I feel its my responsibility to tell you what commendable work you are doing 👍👍👍👍.
All the very best
It seems I love playing exceptions to rule game. :-)
TL;DR the real question with a VPN for privacy/security: you are trading the trust of your ISP with the trust for your VPN provider
0:33 "beautifully simple"
Laughs in Microsoft L2TP and PPTP ;-)
7:18 and the other reason: not every medium has MAC-addresses. Like 4G, 5G, etc. mobile data or satellite links.
13:84 this is actually a dangerous thing to say, a lot of VPNs don't encrypt all traffic, just a subset. Like 1 or more subnets.
15:08 well, Tor tries to hide by using TLS on port TCP/443 (HTTPS) and connecting to different endpoints that's a good method to make it less clear what you are doing.
15:19 most of them are very recognizable.
16:36 and if you pay by credit card, they also know who you are.
18:36 unlesss someone enabled the webinterrface or whatever on the WAN side of the router/firewall doing the NAT of course.
25:36 the traffic in a VPN or on a regular Internet connection doesn't only show the IP-address information, but also DNS-requests and TLS SNI hostnames. So no need to know IP X is the IP for Google, the DNS and HTTPS connection already scream it's Google.
Well you know of course, it's not just home users, it's pretty much invented for business users.
Lots of people also use VPNs for working from home. Or in the case of doing business with a customer: when they are delivering software to a customer internal network. And in those use-cases your machine is doing the routing (deciding: should the traffic go over the VPN or not). Which shows the routing function is a very widespread function which pretty much any Internet connecteed machine can do. No extra software needed, just a bit of configuration.
Or when connecting multiple locations of the same company, maybe the most common/original reason for a VPN.
I wanted to set my custom VPN, just for learning, will do it someday.
loved all your videos sir, thanks a lot.
I don't get why vpn have become so popular for security concerns. You're just giving your data to your vpn instead but there's still someone out there with you data
On top of that most people that I've heard thinking about buying a vpn service don't even hesitate to download files from random websites
On top of that many VPN's use end points outside the country thereby crossing internation boundries. This subjects them to agencies that normally cannot monitor US citizens locally. Once you leave the country it's fair game for them. So, if you are looking for privacy from government agencies (not illegal activities, just privacy), that's not the way to go.
Top notch content as always. Never miss to watch a new upload from you.
Sir you could have used the Diagrams .
Now This VPN stuff is much more clear to me.
It's peautiful!
Did you get a cloudlifter preamp for the SM7B? Takes that mic to the next level
Always looking forward to your videos
If I am connected to https website through a VPN , is the TLS connection is established between the VPN and the website ?
Thanks Hussein But one thing I don't understand about how a VPN works Is how your browser allows you this to happen. when you said man in the middle attack I thought in my had but that can't happen because we are using HTTPS and the site we visit will have a certificate. how does IPsec make it so that the browser allows you to go through the VPN but still have a valid certificate?
Ig as per the certificate stuff you should be able to get a certificate in your shady sites as well and if instead of returning google home page if you returned response from your shady server it should still show as https. But i am not sure if domain name remains the same. It's kinda like how ISP sometime sends a popup in some random request if your plan is about to expire or something of that sort.
As per the second point, i think since the request you are sending isn't altered at all by any means, the only thing you are doing are adding one more layer of meta info in packets from you to your vpn server but post that that layer gets removed and it's same data that vpn forwards. It just works like simple proxy with some decryption logic and rouing ig.
I think in this case it's just like your router, which takes your packets and send it to your ISP. VPN server works in the same way ig with additional effort of decryption.
Just throwing random thoughts though with only assumptions
Very beautifully explained
Do y’all recommend a vpn over a proxy for wanting to do “local” SoMe activity in areas where VPN or Proxy located to not get banned but SoMe). I’ve heard that residential proxies are the best for avoiding banning. Hearing that if sites like FB see a VPN they will ban Acct/profile. Hogwash? I’m wanting to connect to distinct local SoMe profiles for interaction, etc. What do you recommend to remove session fingerprints from browsers or does that matter with VPNs (I’m ignorant) but know this is needed with proxies. Thx!
Can you make a tutorial implementing a VPN in nodejs?
Hussain, can you make a video on how IP address are assigned to each device on planet?
Good morning, Hussein :)
Yay I was waiting for it.
Hello Hussein Nasser. I want a free dataset for my project in GIS. Where can I get it, whether the population census or anything. Thank you
Super video! I applauded for $2.00 👏
To be honest I was expecting an outage video about teams today :)
thank you so much, that is highly appreciated and helpful information ❤️
7:27 Then you get - "IPv6 looks like a Mac address...." Almost but no... A RFC 4291 spec, unique routable address to cater for IPv4 address exhaustion, that s IPv6 :-)
Super video! I applauded for RON 10.00 👏
Another Gold Stuff! I have one doubt then how essentially does VPN server handles so much request ? And that too most of the VPNs being free.
i was wondering the same thing and was expecting him to cover lol. They just do request proxy but still loads that hit those server are immense. I wonder what are the ways free vpn uses to fund their cost
It's all about packet throughput, the size of the data pipe, bytes per second. Very little power is need to read a packet header and pass it on to the next node.
@@mrrogers4591 hmm, so in this case they just read/update packet header and forwards without doing any kind of parsing
Love you man best video about vpn by far ...
🙏🙏
Wrong. VPN works like a man in the middle attack. They force user to install and trust an SSL certificate which is used for encrypting user to VPN traffic. Then the VPN decrypts and re encrypts the traffic's with the destination public key. The server encrypts back https traffic with VPNs public key, which VPN intercept and decrypt and re encrypt with trusted user certificate. VPN can technically see everything not just the meta.
Hi Eng. HUSSEIN
I hope this msg finds you well. Please talk about MICROSEGMENTATION
Thanks! Btw with some images it would have been much clearer
thanks for your time , it would be a good video idea to make a vpn server with node
Would be much greater to show some infographics on top of your video instead of showing all by hands :)
great video
finally!
I gotta say I’ve tried sooo many vpns before finally landed on VPNProxyMaster, super fast and stable real nice you should try it!
Awesome video, very well explain, check out Simply5 CloudLAN, VPN built for teams. Lot of cool functionality for remote developers