Who was REALLY behind the Microsoft Backdoor [PART 2]

Поділитися
Вставка
  • Опубліковано 21 лис 2024

КОМЕНТАРІ • 181

  • @DanielBoctor
    @DanielBoctor  4 місяці тому +6

    To try everything Brilliant has to offer -free- for a full 30 days, visit 👉 brilliant.org/DanielBoctor/. You'll also get 20% off an annual premium subscription!
    PART ONE 👉 ua-cam.com/video/9KfY1hlibZ0/v-deo.html
    THANKS FOR WATCHING ❤
    JOIN THE DISCORD! 👉 discord.gg/WYqqp7DXbm
    👇 Let me know what type of content you would like to see next! 👇
    Thank you for all of the support, I love all of you

  • @VADemon
    @VADemon 4 місяці тому +318

    I didn't think it was possible to explain an exploitation so clear and concise in a video format. Props! Demystifying technology is the first step in education imho.

    • @DanielBoctor
      @DanielBoctor  4 місяці тому +15

      thanks for the support! means a lot ❤️

    • @everythingpony
      @everythingpony 4 місяці тому +1

      I'm still confused on why we are against them for finding and telling of an issues, malwarebytes and others do it?

    • @entx8491
      @entx8491 4 місяці тому

      Stop saying "we" to stop the confusion ​@@everythingpony

    • @Dong_Harvey
      @Dong_Harvey 4 місяці тому +2

      ​@@everythingponybecause the US state department needs some way to defend genocide

  • @nervegun5785
    @nervegun5785 4 місяці тому +99

    by the time it's revealed that SrvNet contains a pointer to a function, it's all over man...... it's always the freaking callback handler

    • @slovakthrowback3738
      @slovakthrowback3738 4 місяці тому +24

      It is crazy how much dramatic suspense can be bundled into some squares representing memory on a computer heh

  • @davidkanimation
    @davidkanimation 4 місяці тому +35

    I am highly impressed. I work in IT but more from a troubleshooting helpdesk standpoint, not as a programmer or cyber expert. I could only follow along conceptually, however I was pleasantly surprised I was able to follow this to the degree someone who lacks the education in the baseline elements involved could follow. That is not only highly appreciated, but a testament to your ability to craft a story of the information, and to perfectly time recap moments of a previous points to reiterate their importance to that step and help the information sink in. Even more beautiful was that you don't overwhelm the viewer with graphics which would actually go against the absorbing of the information, and the simpler animations effectively portray the concepts while letting us focus on the information it's portraying. I looked to subscribe at the end, and hadn't even realized I had already subscribed mid-video.

    • @alphabeta3528
      @alphabeta3528 4 місяці тому

      Good for you 😊

    • @douwemusic
      @douwemusic 14 днів тому

      ​@@alphabeta3528truly a reply to their comment

  • @Scarhandtunes
    @Scarhandtunes 4 місяці тому +54

    This is an absolutely unbelievable breakdown.

  • @PavelBader
    @PavelBader 4 місяці тому +101

    No way, I just watched the first part and here’s the second part, posted 20 minutes before 😮 Thanks for the video!

    • @DanielBoctor
      @DanielBoctor  4 місяці тому +7

      haha, perfect timing. thanks for watching 😊

    • @cynth0984
      @cynth0984 4 місяці тому

      I was hacked by ytb algorithms the same way to watch them both :)

    • @darioriccio5342
      @darioriccio5342 4 місяці тому

      Literally the same eheh😅

  • @brianjirvin
    @brianjirvin 4 місяці тому +84

    So at what point do we talk about Kaspersky?

    • @garr_inc
      @garr_inc 4 місяці тому +9

      That's the neat part! We don't.

  • @danielpriestley4367
    @danielpriestley4367 4 місяці тому +6

    You can tell someone has such a good understanding of something when they can explain it so well to someone with limited knowledge, and they walk away feeling like they completely understand how it works.
    I've got basic knowledge of the C language and understand computers use memory and execute code, I used SMB to watch a movie file from my computer on my TV once, that's about it. I've never written a Windows application. Yet I now undertake how wannacry worked.
    Thank you

  • @phoneywheeze
    @phoneywheeze 4 місяці тому +127

    crazy how Kaspersky got banned recently

    • @zestiny_
      @zestiny_ 4 місяці тому +7

      crazy how they stole the program and somehow the "hackers" got them not sure why he left that part out

    • @zemm9003
      @zemm9003 4 місяці тому +43

      ​@@zestiny_ that's not what happened (he addressed it in the first video). You seem to have problems understanding spoken English. Probably not your first language.

    • @TheColonThree
      @TheColonThree 4 місяці тому +23

      ​@@zemm9003Or maybe it is their first language but the person just lacks basic comprehension. There's a lot more people like that than you think. 😂

    • @lmnk
      @lmnk 4 місяці тому +2

      That's pretty much why it was banned I feel.

    • @zestiny_
      @zestiny_ 4 місяці тому +1

      @@zemm9003 nope. he omitted that part kid

  • @Draco_Alpha
    @Draco_Alpha 4 місяці тому +13

    this is really a clever attack... i'm impressed with it, that's for sure. thanks for producing this!

  • @wokky02
    @wokky02 4 місяці тому +38

    Isn't it interesting how the feds indicted those who used it, but no one sued the creators (enn ess ay) for losses due to them creating the code for the exploit then allowing themselves to get hacked (irony) and the exploit leaked...

    • @ridottech1902
      @ridottech1902 4 місяці тому +20

      if anyone sued them, then your laptop will miraculously have Capture Point(read the initials) all over it.

    • @kuroenekodemon
      @kuroenekodemon 4 місяці тому

      Also just to add onto this there’s a clause in the US Constitution that makes it impossible to sue to US Government and get monetary damages. So if I’m seeing this right the real reason Kaspersky got banned was because they found out about this disgusting worm…

    • @melodynice7938
      @melodynice7938 4 місяці тому +1

      Quod licet lovi, non licet bovi. 😮

    • @cinderwolf32
      @cinderwolf32 4 місяці тому +3

      I think they should be held accountable for their own security failure, but not for creating the exploit. Otherwise, every security researcher would also be a criminal. But security researchers are not criminals, and the work done to discover modes of exploitation along with proofs of concept are needed to harden security in the first place. Unless you can prove it was being used by them, they hadn't done anything wrong yet (although I personally 100% believe they either did, or intended to)

    • @jonathanherrera9956
      @jonathanherrera9956 4 місяці тому +5

      @@cinderwolf32 I disagree, you are right that the point of finding exploits is to harden the system. But the NSA didn't inform about the exploit until after it leaked, which means they were helding it (and maybe using it) as a weapon.

  • @marsovac
    @marsovac 4 місяці тому +49

    Classic.
    USA: "It was North Korea".
    USA: "It was Russia".
    Russia hacks the NSA: "It was the USA".

    • @-kingofsaiyannappa-9057
      @-kingofsaiyannappa-9057 4 місяці тому +3

      *China has left the chat*

    • @HansJuergen-ps8bt
      @HansJuergen-ps8bt 4 місяці тому +11

      If history tells you something: "It was the USA." is a phrase that comes up waaaaay too often for most Americans liking probably. But if you are betting man and the USA is in the game of possible culprits, odds are the best way to multiply your investment is to bet on the good ol' USA.

    • @amiablereaper
      @amiablereaper 25 днів тому +2

      ​@@HansJuergen-ps8bt tbqh it was literally the usa this time. The NSA found critical vulnerabilities in windows and neglected to inform Microsoft until someone else stole it. We don't know when the nsa discovered these vulnerabilities, but Microsoft could have had years of additional time to fix these exploits if the nsa didn't get too attached to their new toys.

  • @randomstuff_21
    @randomstuff_21 4 місяці тому +12

    How do people in charge, with all the worlds resources, get absolutely embarrassed like this?

    • @gzoechi
      @gzoechi 4 місяці тому

      Our tax money allows them to hire the smartest, but they are still just people.

    • @audacityhour3104
      @audacityhour3104 4 місяці тому +3

      Seduction

    • @randomstuff_21
      @randomstuff_21 4 місяці тому

      @@audacityhour3104 🤣

    • @Ungood-jl5ep
      @Ungood-jl5ep 4 місяці тому +6

      The people in charge are inept. "the powers that be" get way too much credit for everything, it's an affect of the constant info ops.

    • @gzoechi
      @gzoechi 4 місяці тому +3

      @@Ungood-jl5ep They might not be inept, but they have much different goals than what they say or what we wish they had.

  • @JamieBainbridge
    @JamieBainbridge 4 місяці тому +4

    If I had RCE on every Windows box I would launch Space Cadet pinball so people can have fun

  • @ZakHooiTM
    @ZakHooiTM 4 місяці тому +4

    Small tip, have the NT5x source at hand while watching this video. It will give a picture how the functions are written, including warnings that the os2fealist conversion function doesn't check stuff much itself, it's duty of the caller to do that

  • @glitchy_weasel
    @glitchy_weasel 4 місяці тому +1

    This video is as beautifully crafted as EternalBlue 😁
    Really, fantastically done! I find that this two part series was the perfect balance between technical knowledge but not overly difficult to understand. Would love more exploits breakdowns like these!

  • @BobertV702
    @BobertV702 4 місяці тому +20

    Thanks for the second part. Really informative and interesting to get the inner workings of the 3rd bug and how the payload gets executed :)

  • @xavi_6767
    @xavi_6767 4 місяці тому +23

    Damn. My brain hurt.
    I am too dumb for these stuff not gonna lie.

    • @Corteum
      @Corteum 4 місяці тому +7

      Well, you just keep telling yourself that story and see where it goes... lol

    • @kevinscales
      @kevinscales 4 місяці тому

      You are not dumb, you just haven't learnt all you need to know yet. Keep hurting your brain until you understand what you want to understand and don't put yourself down for not understanding without effort because this is exactly what you have to do to improve.

    • @ridottech1902
      @ridottech1902 4 місяці тому +7

      I said the same thing. I said that I'm too dumb for OS dev. Well now it's my job

    • @nothingnothing1799
      @nothingnothing1799 4 місяці тому +3

      If this interests you there are multiple websites and resources to learn, its starts out simple so most anyone can learn something, and if you so happen to have the right kind of mind you should be able to learn all of this you just gotta put in the time

    • @Dullahan_1
      @Dullahan_1 4 місяці тому

      @@nothingnothing1799 where

  • @dsf190
    @dsf190 4 місяці тому +5

    This is such a cool video, thank you for the in-depth breakdown. I am completely blown away by the complexity of this backdoor

  • @admcstabby
    @admcstabby 4 місяці тому +3

    Daniel: "We now have all the ingredients needed to understand how everything comes together"
    Me, a Network Engineer: "Ah yes. so hackers have to byte the bug who bit into memory and created a word hole in my page"

  • @nickbeaumont2601
    @nickbeaumont2601 4 місяці тому

    the way these exploits are crafted is genuinely impressive. like how many lines of code do you need to comb through to find a faulty IF statement?

  • @chickeningay
    @chickeningay 4 місяці тому +9

    I love your videos man, always makes me sit down, get a snack and lock in.

    • @DanielBoctor
      @DanielBoctor  4 місяці тому +4

      haha, do I really make that type of content now? I'm honoured. love to hear it 😊

  • @lucretius1111
    @lucretius1111 4 місяці тому +2

    Just came across this channel and I love the content! Incredibly fascinating and very well explained.

  • @Luca-gb1og
    @Luca-gb1og 15 днів тому

    Im so happy that I found you! You make such interesting and good videos! Keep them coming

  • @strax8915
    @strax8915 4 місяці тому +2

    Amazing video that somehow manages to simplify such a complex exploit so that even a beginner (like myself) could understand it!
    I did, however, get a little bit lost in the end and have a question regarding the final parts of the exploit. How does it send the payload and then control where it ends up? Does it get sent via the (overflown) ntfealist?

  • @RonKan69
    @RonKan69 4 місяці тому +17

    Great video! been looking for an explanation of the exploit for a long time now and youtube's algorithm suggested the perfect video

    • @DanielBoctor
      @DanielBoctor  4 місяці тому +3

      love to hear it!

    • @zestiny_
      @zestiny_ 4 місяці тому +3

      @@DanielBoctor Why did you exclude that kaspersky stole the program from the nsa worker and somehow "hackers" go ahold of the program. You omitted that important information in part 2. I can only assume you purposefully did that considering how much research you did for this video

    • @MadeAlurik
      @MadeAlurik 4 місяці тому

      @@zestiny_you should more upset that the governments around the world are exploiting hardware, and software, and not notifying the corporations of it, keeping us less secure with our information.
      Who gives a fuck how we found out.

    • @fattymcboomboom9254
      @fattymcboomboom9254 4 місяці тому

      f isnotreal

  • @madarauchiha4298
    @madarauchiha4298 4 місяці тому +2

    I like how you break this down

  • @persevere1052
    @persevere1052 4 місяці тому +2

    Pleeease keep putting out more such bangers!

  • @RGSTR
    @RGSTR 9 днів тому

    Thank you, that is very nicely explained! I have been curious how that attack had worked.

  • @juliusreycalderon1998
    @juliusreycalderon1998 4 місяці тому +2

    Few cases where YT algo is really helpful. New sub here! 🥰

  • @Hazik_YouTube
    @Hazik_YouTube 4 місяці тому +8

    Video name" Who was really behind the largest computer worm"
    Proceeds to provide detailed technical explaination how it works only a bunch of niche experts can grasp

    • @gophop
      @gophop 4 місяці тому

      Any beginner Windows developer can understand this.

  • @robyee3325
    @robyee3325 4 місяці тому +2

    Great presentation!

  • @spacewolfjr
    @spacewolfjr 3 місяці тому

    When adjusting the MDLs in the SRVNET struct, how do they know/predict where the HAL's heap is going to be?

  • @jsilverhand1988
    @jsilverhand1988 4 місяці тому +2

    Keep it up, man! Love your channel :)

  • @zan1971
    @zan1971 4 місяці тому +2

    So what does Kaspersky have to do with this? And I heard something about "if you are using an os before windows 8" in the video. Who even still uses that?

    • @elpiibemaravilla
      @elpiibemaravilla 4 місяці тому +2

      several endpoints, servers, ATMs, you name it. There are tons and tons of equipments that hasn´t been updated over the years and they are vulnerable to this. I would dare to bet that more than 50% of the companies out there still have legacy OS in their inventory

  • @Luggruff
    @Luggruff 4 місяці тому +2

    So, is there a third part coming where you mention how Kaspersky is relevant? Or did you just completely forget the title of the first video? By the way, maybe make the title of the videos xyz - part 1/2 etc so it is clear that they belong together.....

  • @SB-qm5wg
    @SB-qm5wg 4 місяці тому +1

    Excellent deep dive 👏

  • @sakoasklaksd
    @sakoasklaksd 4 місяці тому +2

    I didnt understand anything, can someone tell me why Kaspersky got banned ?
    Did kaspersky found out that USA and Microsoft having backdoors to everyone ?

  • @acedelgado1770
    @acedelgado1770 4 місяці тому +1

    I really enjoyed this, thanks for the video!

  • @jasonswearingin1009
    @jasonswearingin1009 4 місяці тому +13

    Not surprised over several years now all YT channels that "test" security software really hate Kaspersky Avast and AVG. When in 23 years of personal experience these were and still are the best consumer grade security software companies on the planet! Low system resource impact (NO BUILT IN ROOTKITS) and actual people on the customer service end! Plus Windows Defender is a pile of donkey shit!

  • @mikediscipleofJesusChrist
    @mikediscipleofJesusChrist 3 місяці тому

    This WAS SO CLEAR!!!

  • @Foukez
    @Foukez 4 місяці тому +5

    Wait for copilot

    • @Vizaru
      @Vizaru 4 місяці тому +4

      recall will undoubtedly be responsible for a major security/data breech

  • @stonedoubt
    @stonedoubt 4 місяці тому +1

    Nobody wants their back door to leak

    • @HyrimBot
      @HyrimBot 4 місяці тому

      we don't eat there anymore.

  • @stevengill1736
    @stevengill1736 4 місяці тому +1

    Hey NSA, thanks a lot! Adds insult to injury, doesn't it?

  • @cariyaputta
    @cariyaputta 4 місяці тому +27

    CIA, NSA, and Israel.

    • @gregandark8571
      @gregandark8571 4 місяці тому +1

      Israel = FBI,CIA,KGB,FSB etc,etc,etc ...

  • @danailminchev4685
    @danailminchev4685 4 місяці тому

    Fantastic work. Thanks.

  • @damionyates4946
    @damionyates4946 4 місяці тому

    Why on earth did it still contain ancient OS2 compatibility?

  • @sangeetguha51
    @sangeetguha51 4 місяці тому +1

    great video as always :)

  • @clytle374
    @clytle374 4 місяці тому +5

    Not a hacker, security expert, or even a decent programmer. But are we assuming the NSA found all these vulnerabilities without the source code?

    • @Vizaru
      @Vizaru 4 місяці тому +5

      they 100% had the source code for Windows. now how they got it, I don't know. probably decompiled it themselves.

    • @ahmedabdul-aziz1562
      @ahmedabdul-aziz1562 4 місяці тому +5

      I was thinking about this for the entirety of this video. How the hell do you know of this very specific exploit? They must have had the source code one way or another because this depends on deep analysis of the source code that even regular SASTs won't identify.

    • @gophop
      @gophop 4 місяці тому

      Hire former MS devs. Bribe them / threaten them. Or / and do the same to MS. The romanticism fades when you realize it's just thugs leveraging their monopoly on violence and someone else' tax money.

  • @greenerell484
    @greenerell484 4 місяці тому

    good explanation

  • @petevenuti7355
    @petevenuti7355 4 місяці тому

    So because I had no need for older versions of SMB and remove them from my system after getting rid of Windows for workgroups 3.1 , and using novel protocols to communicate between os2 and NT instead of SMB is why I wasn't attacked?

  • @nocredits8066
    @nocredits8066 4 місяці тому

    Commenting to help with the algorithm cuz yeeeah! the video is so clear to explain everything, from the edition, animations, and script

  • @code-inc
    @code-inc 4 місяці тому

    Highly detailed ❤ thanks 😘😘😘

  • @alexhannah8889
    @alexhannah8889 4 місяці тому

    Gotta hate Advanced Persistent Threats. I liked it more when hacker groups where small, isolated, and didn't have millions of dollars and an intelligence apparatus.

  • @zandermcnabb7779
    @zandermcnabb7779 4 місяці тому

    ….. I just custom-deployed a windows server with SMB enabled, thank god it’s sandboxed

  • @albertobueno7805
    @albertobueno7805 4 місяці тому

    amazing video!

  • @deancatiil4911
    @deancatiil4911 4 місяці тому +1

    can you do the Solarwinds hack

  • @TonyFarley-pv3nk
    @TonyFarley-pv3nk 4 місяці тому

    Then we have this closed-door session was not even my state or me to be allowed in this session of the reliant

  • @charlesbenca5357
    @charlesbenca5357 4 місяці тому +2

    wow.

  • @pedrogorilla483
    @pedrogorilla483 4 місяці тому

    My man got scared and changed the thumbnail

  • @wendysburgers4326
    @wendysburgers4326 4 місяці тому

    Can you prevent this by DISABLING Paging File (Pagfile Sys)?

    • @D0Samp
      @D0Samp 4 місяці тому +4

      No. This exploit used memory from the non-paged pool, i.e. kernel memory that is never swapped out to disk.

  • @kam1234554321
    @kam1234554321 4 місяці тому +21

    Haven't I just watch this video recently? It's 98% of the previous video...

    • @VADemon
      @VADemon 4 місяці тому +4

      I added the first two minutes as Recap to _Sponsorblock_ to skip.

    • @menno763
      @menno763 4 місяці тому +1

      Yeah it should have been one video.. Still great content tho!

    • @RowanHawkins
      @RowanHawkins 4 місяці тому +1

      There is a video size limit on YT for newer/smaller subscriber count videos. However checking after I've made this post this exceeds the subscriber count for that to be an issue.

    • @VADemon
      @VADemon 4 місяці тому +4

      @@RowanHawkins This limit (15min initially) could be removed by adding a phone number and this worked like that about 15 years ago.
      Assuming he's partaking in the ad revenue (AdSense) he has had limits disabled a very long time ago.

    • @hotlinefrenzy
      @hotlinefrenzy 4 місяці тому +1

      ​@@VADemon But you aren't Daniel?

  • @Collin0
    @Collin0 4 місяці тому

    great video

  • @taahaseois.8898
    @taahaseois.8898 4 місяці тому

    Is this a reupload? I swear I've seen this video already...

  • @TonyFarley-pv3nk
    @TonyFarley-pv3nk 4 місяці тому

    A lot of things made some plays some big areas after that Xbox got switched out started all this controlled removal around my area

  • @klaatubob
    @klaatubob 4 місяці тому

    The repeated references to OS/2, an OS that hasn't been used in decades, lost me. What am I missing?

    • @elecblush
      @elecblush 4 місяці тому +2

      Compatibility.
      The crux of the exploit is that it's in the oldest version of SMB. And that code had compatibility code to be able to communicate with OS/2 machines.
      This is also probably why the inventors of this exploit found it. They looked specifically for old code and protocols written at a time with a lot less knowledge about these types of attacks.

    • @klaatubob
      @klaatubob 4 місяці тому

      @@elecblush thanks for the explanation

  • @dallasbowman9532
    @dallasbowman9532 4 місяці тому

    I just finished Andy Greenberg's "Sandworm" last week - well timed, for sure, but man, what a video! Thanks for making this, this is kickas$!

  • @jacoblee5190
    @jacoblee5190 4 місяці тому

    Did you just change title?

  • @powerdust015lastname4
    @powerdust015lastname4 4 місяці тому +2

    4:40 skill issue, shouldve used rust

  • @RickySupriyadi
    @RickySupriyadi 4 місяці тому

    coincidentally? i rumor they already got an AI model able to decrypt cryptography.... gossips though but this gossips really aligned with the leaks, leak it to test this specialized AI capabilities in real life!

  • @TonyFarley-pv3nk
    @TonyFarley-pv3nk 4 місяці тому

    Do you think your boy scout patches teach this understanding correctly do you think they provided y'all with the full rotation to get this understood in case someone else comes out as a problem what do you think they just learned how to money everybody through it

  • @Litepaw
    @Litepaw 4 місяці тому

    Gets*

  • @mitkomanev9783
    @mitkomanev9783 4 місяці тому

    Spoiler alert... there's worst one (let's say one) for bluetooth! Just take a look at you services, than your devices (hidden ones too) and do the thinking yourself ;)

  • @TonyFarley-pv3nk
    @TonyFarley-pv3nk 4 місяці тому

    So here's another problem I y'all are asking for hackers and you all know the consequence

  • @leshommesdupilly
    @leshommesdupilly 4 місяці тому +4

    Moral of the story kids: just use pencil and paper next time

  • @TonyFarley-pv3nk
    @TonyFarley-pv3nk 4 місяці тому

    How's the worm in your head Mr Kennedy

  • @ce9916
    @ce9916 4 місяці тому

    Is HTML programming a good place to start to become a cyber security expert?

  • @nittani.
    @nittani. 4 місяці тому +1

    Haha

  • @boxicknowsbest9100
    @boxicknowsbest9100 4 місяці тому +4

    who knew grooming could be so fun! :D

    • @C-aFilms
      @C-aFilms 4 місяці тому +5

      r/cursedcomments

  • @TonyFarley-pv3nk
    @TonyFarley-pv3nk 4 місяці тому

    So one of my next questions is through some of this understanding of this worm what does concept of cancer or whatever it is going around and our big organizations trying to prevent the next big terrorist attack. Do you suspect we've already been hit with this attack

    • @TonyFarley-pv3nk
      @TonyFarley-pv3nk 4 місяці тому

      I always questioned back door conversations without the evidence being presented

  • @spiderfight1897
    @spiderfight1897 4 місяці тому

    Me my b

  • @TonyFarley-pv3nk
    @TonyFarley-pv3nk 4 місяці тому

    I'll be cracking up to I mean we had defense attorney Lloyd have to go in and get his head looked out we had Russian President Vladimir Putin have to go get his looked at then we had bad and son get himself in a little bit of trouble when traveling over on a laptop and y'all think y'all are going to force the change of the Constitution of America

    • @lmnk
      @lmnk 4 місяці тому +6

      ... are you high or sth ?

  • @jefferyholcombe5189
    @jefferyholcombe5189 4 місяці тому +1

    This is propaganda made to cover some criminals trax!

  • @justyce_yt
    @justyce_yt 3 місяці тому

    EternalBlue... guess which American political party is blue? Hmmmmmm (lmao)

  • @LinguisticMirage
    @LinguisticMirage 4 місяці тому +2

    bro you talk so SLOW

    • @hashtag9990
      @hashtag9990 4 місяці тому +14

      you know youtube supports adjusting playback speed?

    • @CoolTebza-eh7ig
      @CoolTebza-eh7ig 4 місяці тому

      Must remember UA-cam does pay this people unless they reach amount of viewers, so use what you have don't judge because already know it don't understand why you bother pointing it out hear 🙉

    • @uniqueprogressive9908
      @uniqueprogressive9908 4 місяці тому +5

      ok goldfish

    • @Amaroq64
      @Amaroq64 4 місяці тому +3

      Normally I would hate on someone for padding time to get more ad revenue, but this is extremely advanced computer science stuff. I'm a self taught programmer and I'm glad he explained it slowly.