{"video_id":"K8ElcY4_ByA","title":"Could The Internet Send You The WRONG Thing?","channel":"Techquickie","show":"Techquickie","published_at":"2024-05-04T14:58:16Z","duration_s":308,"segments":[{"start_s":0.0,"end_s":4.34,"text":"The internet is amazing. You're streaming movies, downloading games, uploading files","speaker":null,"is_sponsor":0},{"start_s":4.34,"end_s":10.3,"text":"to the cloud, and somehow, all that data, mostly, gets from one place to another without","speaker":null,"is_sponsor":0},{"start_s":10.3,"end_s":15.42,"text":"getting corrupted. I mean, it's a miracle, isn't it? No, it's not. It's computer science.","speaker":null,"is_sponsor":0},{"start_s":15.42,"end_s":20.58,"text":"In particular, we owe this modern marvel to checksums, numbers that are used to verify","speaker":null,"is_sponsor":0},{"start_s":20.58,"end_s":27.1,"text":"that a file got sent or copied properly. But how does a simple number manage to perform","speaker":null,"is_sponsor":0},{"start_s":27.1,"end_s":32.16,"text":"this essential function? Well, it works thanks to cryptography. Even if the data that you're","speaker":null,"is_sponsor":0},{"start_s":32.16,"end_s":38.12,"text":"transmitting isn't encrypted, or even particularly sensitive, in applications that use checksums,","speaker":null,"is_sponsor":0},{"start_s":38.12,"end_s":43.98,"text":"the protocol will run the contents of the file through a cryptographic hash function, which","speaker":null,"is_sponsor":0},{"start_s":43.98,"end_s":50.46,"text":"is basically a complicated math function that produces a lengthy and unique string of characters.","speaker":null,"is_sponsor":0},{"start_s":50.46,"end_s":54.96,"text":"The reason this works well for generating checksums is that if you change even one","speaker":null,"is_sponsor":0},{"start_s":55.04,"end_s":61.2,"text":"byte of data, even in a very large file, that string of characters, or hash, will change","speaker":null,"is_sponsor":0},{"start_s":61.2,"end_s":67.2,"text":"completely. And this is actually the same way that passwords are stored securely on websites.","speaker":null,"is_sponsor":0},{"start_s":67.2,"end_s":71.64,"text":"Except, instead of storing the password in plain text, they're run through a hash function","speaker":null,"is_sponsor":0},{"start_s":71.64,"end_s":77.44,"text":"that is virtually impossible to reverse. That way, if a hacker breaks into the server,","speaker":null,"is_sponsor":0},{"start_s":77.44,"end_s":82.04,"text":"they only see a pretty much meaningless hash rather than your plain text password.","speaker":null,"is_sponsor":0},{"start_s":82.04,"end_s":86.84,"text":"So coming back to checksums, they play an important role in digital security as well.","speaker":null,"is_sponsor":0},{"start_s":86.84,"end_s":91.16,"text":"If you download a file from the internet, you make the assumption that the host is providing","speaker":null,"is_sponsor":0},{"start_s":91.16,"end_s":98.56,"text":"you a safe, non-malicious file. But bad actors can sometimes attempt to attack PCs by replacing","speaker":null,"is_sponsor":0},{"start_s":98.56,"end_s":103.16,"text":"files that are commonly downloaded. That's why many responsible websites will provide","speaker":null,"is_sponsor":0},{"start_s":103.16,"end_s":108.24,"text":"a checksum so that you can verify that the file you download is exactly what it's supposed","speaker":null,"is_sponsor":0},{"start_s":108.24,"end_s":113.44,"text":"to be. So, with this level of importance, you would think that checksums are ubiquitous","speaker":null,"is_sponsor":0},{"start_s":113.44,"end_s":119.36,"text":"in computing. But actually, that's not the case. In fact, in Windows, File Explorer","speaker":null,"is_sponsor":0},{"start_s":119.36,"end_s":124.76,"text":"doesn't use checksums by default when performing a file transfer. Even though generating a checksum","speaker":null,"is_sponsor":0},{"start_s":124.76,"end_s":129.68,"text":"would take a trivial amount of time for small files like Word documents, it can take a lot","speaker":null,"is_sponsor":0},{"start_s":129.68,"end_s":134.44,"text":"more time if you're trying to move around many gigabytes worth of data. However, there","speaker":null,"is_sponsor":0},{"start_s":134.44,"end_s":138.44,"text":"are ways to work around this. If you want to compare the checksum of a copied file to","speaker":null,"is_sponsor":0},{"start_s":138.44,"end_s":143.52,"text":"the original in Windows, all you have to do is fire up a command prompt and type in this","speaker":null,"is_sponsor":0},{"start_s":143.52,"end_s":147.68,"text":"command followed by the file path. Because checksums will be very different if the file","speaker":null,"is_sponsor":0},{"start_s":147.68,"end_s":152.22,"text":"contents don't match, you can usually just glance at them instead of tediously comparing","speaker":null,"is_sponsor":0},{"start_s":152.22,"end_s":156.64,"text":"them character by character. You can also get third-party tools that do generate and","speaker":null,"is_sponsor":0},{"start_s":156.64,"end_s":160.0,"text":"validate checksums when you copy files, and we're going to have one of those linked down","speaker":null,"is_sponsor":0},{"start_s":160.0,"end_s":165.28,"text":"below. Did you know that you can select Validate files in Steam if one of your games isn't","speaker":null,"is_sponsor":0},{"start_s":165.28,"end_s":170.22,"text":"running correctly? The service stores checksums of known good game files, so when you click","speaker":null,"is_sponsor":1},{"start_s":170.22,"end_s":174.76,"text":"this button, it compares them to the checksums of the files that are stored on your PC. If","speaker":null,"is_sponsor":1},{"start_s":174.76,"end_s":178.76,"text":"there's any discrepancy, the altered file can be quickly downloaded and replaced with","speaker":null,"is_sponsor":1},{"start_s":178.76,"end_s":183.24,"text":"the original rather than forcing you to reinstall the entire game like we had to do in the old","speaker":null,"is_sponsor":1},{"start_s":183.24,"end_s":188.12,"text":"days. And if you're a video editor, popular editing programs like Adobe Premiere support","speaker":null,"is_sponsor":1},{"start_s":188.12,"end_s":192.84,"text":"the use of checksums to verify large media files to ensure that they don't get corrupted","speaker":null,"is_sponsor":1},{"start_s":192.84,"end_s":197.24,"text":"when you're copying them. Microsoft's OneDrive cloud storage solution for Windows also makes","speaker":null,"is_sponsor":1},{"start_s":197.24,"end_s":201.72,"text":"use of checksums, in this case to make sure that your photos and documents were uploaded","speaker":null,"is_sponsor":0},{"start_s":201.72,"end_s":206.24,"text":"properly. And if you need to transfer lots of files at once, you can use checksums for","speaker":null,"is_sponsor":0},{"start_s":206.24,"end_s":211.84,"text":"zipped folders to quickly verify that all of your files are in good shape. In fact,","speaker":null,"is_sponsor":0},{"start_s":211.84,"end_s":217.8,"text":"TCPIP, the data transmission protocols that underpin the internet, use checksums on every","speaker":null,"is_sponsor":0},{"start_s":217.8,"end_s":222.92,"text":"packet of data to make sure that no bits were flipped in transit. If the checksum that","speaker":null,"is_sponsor":0},{"start_s":222.92,"end_s":227.72,"text":"was sent doesn't match the checksum generated by the receiver, that packet gets dropped","speaker":null,"is_sponsor":0},{"start_s":227.72,"end_s":232.4,"text":"and retransmitted. So basically, every bit of data that you get from the internet goes","speaker":null,"is_sponsor":0},{"start_s":232.4,"end_s":238.32,"text":"through this verification process. Which is cool, but keep in mind that this kind of checksum","speaker":null,"is_sponsor":0},{"start_s":238.32,"end_s":243.84,"text":"doesn't really improve your security. As, like I said, a file could contain malware","speaker":null,"is_sponsor":0},{"start_s":243.84,"end_s":249.16,"text":"from its origin, whether on purpose or due to a bad actor. So it's still very important","speaker":null,"is_sponsor":0},{"start_s":249.16,"end_s":254.0,"text":"that you take caution when dealing with files from unknown sources, as we learned ourselves","speaker":null,"is_sponsor":0},{"start_s":254.0,"end_s":259.92,"text":"the hard way recently. So go watch this video next to learn about how we recently got our","speaker":null,"is_sponsor":0},{"start_s":259.92,"end_s":265.64,"text":"channel hijacked, because it could happen to you too. Thanks for watching, like or dislike,","speaker":null,"is_sponsor":0},{"start_s":265.64,"end_s":270.92,"text":"check out our other videos, and leave a comment if you have a future TechWiki video suggestion.","speaker":null,"is_sponsor":0},{"start_s":270.92,"end_s":273.8,"text":"We don't call it that anymore. I'm rusty.","speaker":null,"is_sponsor":0}],"full_text":"The internet is amazing. You're streaming movies, downloading games, uploading files to the cloud, and somehow, all that data, mostly, gets from one place to another without getting corrupted. I mean, it's a miracle, isn't it? No, it's not. It's computer science. In particular, we owe this modern marvel to checksums, numbers that are used to verify that a file got sent or copied properly. But how does a simple number manage to perform this essential function? Well, it works thanks to cryptography. Even if the data that you're transmitting isn't encrypted, or even particularly sensitive, in applications that use checksums, the protocol will run the contents of the file through a cryptographic hash function, which is basically a complicated math function that produces a lengthy and unique string of characters. The reason this works well for generating checksums is that if you change even one byte of data, even in a very large file, that string of characters, or hash, will change completely. And this is actually the same way that passwords are stored securely on websites. Except, instead of storing the password in plain text, they're run through a hash function that is virtually impossible to reverse. That way, if a hacker breaks into the server, they only see a pretty much meaningless hash rather than your plain text password. So coming back to checksums, they play an important role in digital security as well. If you download a file from the internet, you make the assumption that the host is providing you a safe, non-malicious file. But bad actors can sometimes attempt to attack PCs by replacing files that are commonly downloaded. That's why many responsible websites will provide a checksum so that you can verify that the file you download is exactly what it's supposed to be. So, with this level of importance, you would think that checksums are ubiquitous in computing. But actually, that's not the case. In fact, in Windows, File Explorer doesn't use checksums by default when performing a file transfer. Even though generating a checksum would take a trivial amount of time for small files like Word documents, it can take a lot more time if you're trying to move around many gigabytes worth of data. However, there are ways to work around this. If you want to compare the checksum of a copied file to the original in Windows, all you have to do is fire up a command prompt and type in this command followed by the file path. Because checksums will be very different if the file contents don't match, you can usually just glance at them instead of tediously comparing them character by character. You can also get third-party tools that do generate and validate checksums when you copy files, and we're going to have one of those linked down below. Did you know that you can select Validate files in Steam if one of your games isn't running correctly? The service stores checksums of known good game files, so when you click this button, it compares them to the checksums of the files that are stored on your PC. If there's any discrepancy, the altered file can be quickly downloaded and replaced with the original rather than forcing you to reinstall the entire game like we had to do in the old days. And if you're a video editor, popular editing programs like Adobe Premiere support the use of checksums to verify large media files to ensure that they don't get corrupted when you're copying them. Microsoft's OneDrive cloud storage solution for Windows also makes use of checksums, in this case to make sure that your photos and documents were uploaded properly. And if you need to transfer lots of files at once, you can use checksums for zipped folders to quickly verify that all of your files are in good shape. In fact, TCPIP, the data transmission protocols that underpin the internet, use checksums on every packet of data to make sure that no bits were flipped in transit. If the checksum that was sent doesn't match the checksum generated by the receiver, that packet gets dropped and retransmitted. So basically, every bit of data that you get from the internet goes through this verification process. Which is cool, but keep in mind that this kind of checksum doesn't really improve your security. As, like I said, a file could contain malware from its origin, whether on purpose or due to a bad actor. So it's still very important that you take caution when dealing with files from unknown sources, as we learned ourselves the hard way recently. So go watch this video next to learn about how we recently got our channel hijacked, because it could happen to you too. Thanks for watching, like or dislike, check out our other videos, and leave a comment if you have a future TechWiki video suggestion. We don't call it that anymore. I'm rusty."}