Who was REALLY behind the Microsoft Backdoor [PART 2]

Поделиться
HTML-код
  • Опубликовано: 21 ноя 2024

Комментарии • 181

  • @DanielBoctor
    @DanielBoctor  4 месяца назад +6

    To try everything Brilliant has to offer -free- for a full 30 days, visit 👉 brilliant.org/DanielBoctor/. You'll also get 20% off an annual premium subscription!
    PART ONE 👉 ruclips.net/video/9KfY1hlibZ0/видео.html
    THANKS FOR WATCHING ❤
    JOIN THE DISCORD! 👉 discord.gg/WYqqp7DXbm
    👇 Let me know what type of content you would like to see next! 👇
    Thank you for all of the support, I love all of you

  • @VADemon
    @VADemon 4 месяца назад +318

    I didn't think it was possible to explain an exploitation so clear and concise in a video format. Props! Demystifying technology is the first step in education imho.

    • @DanielBoctor
      @DanielBoctor  4 месяца назад +15

      thanks for the support! means a lot ❤️

    • @everythingpony
      @everythingpony 4 месяца назад +1

      I'm still confused on why we are against them for finding and telling of an issues, malwarebytes and others do it?

    • @entx8491
      @entx8491 4 месяца назад

      Stop saying "we" to stop the confusion ​@@everythingpony

    • @Dong_Harvey
      @Dong_Harvey 4 месяца назад +2

      ​@@everythingponybecause the US state department needs some way to defend genocide

  • @nervegun5785
    @nervegun5785 4 месяца назад +99

    by the time it's revealed that SrvNet contains a pointer to a function, it's all over man...... it's always the freaking callback handler

    • @slovakthrowback3738
      @slovakthrowback3738 4 месяца назад +24

      It is crazy how much dramatic suspense can be bundled into some squares representing memory on a computer heh

  • @davidkanimation
    @davidkanimation 4 месяца назад +35

    I am highly impressed. I work in IT but more from a troubleshooting helpdesk standpoint, not as a programmer or cyber expert. I could only follow along conceptually, however I was pleasantly surprised I was able to follow this to the degree someone who lacks the education in the baseline elements involved could follow. That is not only highly appreciated, but a testament to your ability to craft a story of the information, and to perfectly time recap moments of a previous points to reiterate their importance to that step and help the information sink in. Even more beautiful was that you don't overwhelm the viewer with graphics which would actually go against the absorbing of the information, and the simpler animations effectively portray the concepts while letting us focus on the information it's portraying. I looked to subscribe at the end, and hadn't even realized I had already subscribed mid-video.

    • @alphabeta3528
      @alphabeta3528 4 месяца назад

      Good for you 😊

    • @douwemusic
      @douwemusic 13 дней назад

      ​@@alphabeta3528truly a reply to their comment

  • @Scarhandtunes
    @Scarhandtunes 4 месяца назад +54

    This is an absolutely unbelievable breakdown.

  • @PavelBader
    @PavelBader 4 месяца назад +101

    No way, I just watched the first part and here’s the second part, posted 20 minutes before 😮 Thanks for the video!

    • @DanielBoctor
      @DanielBoctor  4 месяца назад +7

      haha, perfect timing. thanks for watching 😊

    • @cynth0984
      @cynth0984 4 месяца назад

      I was hacked by ytb algorithms the same way to watch them both :)

    • @darioriccio5342
      @darioriccio5342 4 месяца назад

      Literally the same eheh😅

  • @brianjirvin
    @brianjirvin 4 месяца назад +84

    So at what point do we talk about Kaspersky?

    • @garr_inc
      @garr_inc 4 месяца назад +9

      That's the neat part! We don't.

  • @danielpriestley4367
    @danielpriestley4367 4 месяца назад +6

    You can tell someone has such a good understanding of something when they can explain it so well to someone with limited knowledge, and they walk away feeling like they completely understand how it works.
    I've got basic knowledge of the C language and understand computers use memory and execute code, I used SMB to watch a movie file from my computer on my TV once, that's about it. I've never written a Windows application. Yet I now undertake how wannacry worked.
    Thank you

  • @phoneywheeze
    @phoneywheeze 4 месяца назад +127

    crazy how Kaspersky got banned recently

    • @zestiny_
      @zestiny_ 4 месяца назад +7

      crazy how they stole the program and somehow the "hackers" got them not sure why he left that part out

    • @zemm9003
      @zemm9003 4 месяца назад +43

      ​@@zestiny_ that's not what happened (he addressed it in the first video). You seem to have problems understanding spoken English. Probably not your first language.

    • @TheColonThree
      @TheColonThree 4 месяца назад +23

      ​@@zemm9003Or maybe it is their first language but the person just lacks basic comprehension. There's a lot more people like that than you think. 😂

    • @lmnk
      @lmnk 4 месяца назад +2

      That's pretty much why it was banned I feel.

    • @zestiny_
      @zestiny_ 4 месяца назад +1

      @@zemm9003 nope. he omitted that part kid

  • @Draco_Alpha
    @Draco_Alpha 4 месяца назад +13

    this is really a clever attack... i'm impressed with it, that's for sure. thanks for producing this!

  • @wokky02
    @wokky02 4 месяца назад +38

    Isn't it interesting how the feds indicted those who used it, but no one sued the creators (enn ess ay) for losses due to them creating the code for the exploit then allowing themselves to get hacked (irony) and the exploit leaked...

    • @ridottech1902
      @ridottech1902 4 месяца назад +20

      if anyone sued them, then your laptop will miraculously have Capture Point(read the initials) all over it.

    • @kuroenekodemon
      @kuroenekodemon 4 месяца назад

      Also just to add onto this there’s a clause in the US Constitution that makes it impossible to sue to US Government and get monetary damages. So if I’m seeing this right the real reason Kaspersky got banned was because they found out about this disgusting worm…

    • @melodynice7938
      @melodynice7938 4 месяца назад +1

      Quod licet lovi, non licet bovi. 😮

    • @cinderwolf32
      @cinderwolf32 4 месяца назад +3

      I think they should be held accountable for their own security failure, but not for creating the exploit. Otherwise, every security researcher would also be a criminal. But security researchers are not criminals, and the work done to discover modes of exploitation along with proofs of concept are needed to harden security in the first place. Unless you can prove it was being used by them, they hadn't done anything wrong yet (although I personally 100% believe they either did, or intended to)

    • @jonathanherrera9956
      @jonathanherrera9956 4 месяца назад +5

      @@cinderwolf32 I disagree, you are right that the point of finding exploits is to harden the system. But the NSA didn't inform about the exploit until after it leaked, which means they were helding it (and maybe using it) as a weapon.

  • @marsovac
    @marsovac 4 месяца назад +49

    Classic.
    USA: "It was North Korea".
    USA: "It was Russia".
    Russia hacks the NSA: "It was the USA".

    • @-kingofsaiyannappa-9057
      @-kingofsaiyannappa-9057 4 месяца назад +3

      *China has left the chat*

    • @HansJuergen-ps8bt
      @HansJuergen-ps8bt 4 месяца назад +11

      If history tells you something: "It was the USA." is a phrase that comes up waaaaay too often for most Americans liking probably. But if you are betting man and the USA is in the game of possible culprits, odds are the best way to multiply your investment is to bet on the good ol' USA.

    • @amiablereaper
      @amiablereaper 25 дней назад +2

      ​@@HansJuergen-ps8bt tbqh it was literally the usa this time. The NSA found critical vulnerabilities in windows and neglected to inform Microsoft until someone else stole it. We don't know when the nsa discovered these vulnerabilities, but Microsoft could have had years of additional time to fix these exploits if the nsa didn't get too attached to their new toys.

  • @randomstuff_21
    @randomstuff_21 4 месяца назад +12

    How do people in charge, with all the worlds resources, get absolutely embarrassed like this?

    • @gzoechi
      @gzoechi 4 месяца назад

      Our tax money allows them to hire the smartest, but they are still just people.

    • @audacityhour3104
      @audacityhour3104 4 месяца назад +3

      Seduction

    • @randomstuff_21
      @randomstuff_21 4 месяца назад

      @@audacityhour3104 🤣

    • @Ungood-jl5ep
      @Ungood-jl5ep 4 месяца назад +6

      The people in charge are inept. "the powers that be" get way too much credit for everything, it's an affect of the constant info ops.

    • @gzoechi
      @gzoechi 4 месяца назад +3

      @@Ungood-jl5ep They might not be inept, but they have much different goals than what they say or what we wish they had.

  • @JamieBainbridge
    @JamieBainbridge 4 месяца назад +4

    If I had RCE on every Windows box I would launch Space Cadet pinball so people can have fun

  • @ZakHooiTM
    @ZakHooiTM 4 месяца назад +4

    Small tip, have the NT5x source at hand while watching this video. It will give a picture how the functions are written, including warnings that the os2fealist conversion function doesn't check stuff much itself, it's duty of the caller to do that

  • @glitchy_weasel
    @glitchy_weasel 4 месяца назад +1

    This video is as beautifully crafted as EternalBlue 😁
    Really, fantastically done! I find that this two part series was the perfect balance between technical knowledge but not overly difficult to understand. Would love more exploits breakdowns like these!

  • @BobertV702
    @BobertV702 4 месяца назад +20

    Thanks for the second part. Really informative and interesting to get the inner workings of the 3rd bug and how the payload gets executed :)

  • @xavi_6767
    @xavi_6767 4 месяца назад +23

    Damn. My brain hurt.
    I am too dumb for these stuff not gonna lie.

    • @Corteum
      @Corteum 4 месяца назад +7

      Well, you just keep telling yourself that story and see where it goes... lol

    • @kevinscales
      @kevinscales 4 месяца назад

      You are not dumb, you just haven't learnt all you need to know yet. Keep hurting your brain until you understand what you want to understand and don't put yourself down for not understanding without effort because this is exactly what you have to do to improve.

    • @ridottech1902
      @ridottech1902 4 месяца назад +7

      I said the same thing. I said that I'm too dumb for OS dev. Well now it's my job

    • @nothingnothing1799
      @nothingnothing1799 4 месяца назад +3

      If this interests you there are multiple websites and resources to learn, its starts out simple so most anyone can learn something, and if you so happen to have the right kind of mind you should be able to learn all of this you just gotta put in the time

    • @Dullahan_1
      @Dullahan_1 4 месяца назад

      @@nothingnothing1799 where

  • @dsf190
    @dsf190 4 месяца назад +5

    This is such a cool video, thank you for the in-depth breakdown. I am completely blown away by the complexity of this backdoor

  • @admcstabby
    @admcstabby 4 месяца назад +3

    Daniel: "We now have all the ingredients needed to understand how everything comes together"
    Me, a Network Engineer: "Ah yes. so hackers have to byte the bug who bit into memory and created a word hole in my page"

  • @nickbeaumont2601
    @nickbeaumont2601 4 месяца назад

    the way these exploits are crafted is genuinely impressive. like how many lines of code do you need to comb through to find a faulty IF statement?

  • @chickeningay
    @chickeningay 4 месяца назад +9

    I love your videos man, always makes me sit down, get a snack and lock in.

    • @DanielBoctor
      @DanielBoctor  4 месяца назад +4

      haha, do I really make that type of content now? I'm honoured. love to hear it 😊

  • @lucretius1111
    @lucretius1111 4 месяца назад +2

    Just came across this channel and I love the content! Incredibly fascinating and very well explained.

  • @strax8915
    @strax8915 4 месяца назад +2

    Amazing video that somehow manages to simplify such a complex exploit so that even a beginner (like myself) could understand it!
    I did, however, get a little bit lost in the end and have a question regarding the final parts of the exploit. How does it send the payload and then control where it ends up? Does it get sent via the (overflown) ntfealist?

  • @Luca-gb1og
    @Luca-gb1og 14 дней назад

    Im so happy that I found you! You make such interesting and good videos! Keep them coming

  • @RonKan69
    @RonKan69 4 месяца назад +17

    Great video! been looking for an explanation of the exploit for a long time now and youtube's algorithm suggested the perfect video

    • @DanielBoctor
      @DanielBoctor  4 месяца назад +3

      love to hear it!

    • @zestiny_
      @zestiny_ 4 месяца назад +3

      @@DanielBoctor Why did you exclude that kaspersky stole the program from the nsa worker and somehow "hackers" go ahold of the program. You omitted that important information in part 2. I can only assume you purposefully did that considering how much research you did for this video

    • @MadeAlurik
      @MadeAlurik 4 месяца назад

      @@zestiny_you should more upset that the governments around the world are exploiting hardware, and software, and not notifying the corporations of it, keeping us less secure with our information.
      Who gives a fuck how we found out.

    • @fattymcboomboom9254
      @fattymcboomboom9254 4 месяца назад

      f isnotreal

  • @madarauchiha4298
    @madarauchiha4298 4 месяца назад +2

    I like how you break this down

  • @persevere1052
    @persevere1052 4 месяца назад +2

    Pleeease keep putting out more such bangers!

  • @RGSTR
    @RGSTR 9 дней назад

    Thank you, that is very nicely explained! I have been curious how that attack had worked.

  • @juliusreycalderon1998
    @juliusreycalderon1998 4 месяца назад +2

    Few cases where YT algo is really helpful. New sub here! 🥰

  • @Hazik_YouTube
    @Hazik_YouTube 4 месяца назад +8

    Video name" Who was really behind the largest computer worm"
    Proceeds to provide detailed technical explaination how it works only a bunch of niche experts can grasp

    • @gophop
      @gophop 4 месяца назад

      Any beginner Windows developer can understand this.

  • @robyee3325
    @robyee3325 4 месяца назад +2

    Great presentation!

  • @spacewolfjr
    @spacewolfjr 3 месяца назад

    When adjusting the MDLs in the SRVNET struct, how do they know/predict where the HAL's heap is going to be?

  • @jsilverhand1988
    @jsilverhand1988 4 месяца назад +2

    Keep it up, man! Love your channel :)

  • @zan1971
    @zan1971 4 месяца назад +2

    So what does Kaspersky have to do with this? And I heard something about "if you are using an os before windows 8" in the video. Who even still uses that?

    • @elpiibemaravilla
      @elpiibemaravilla 4 месяца назад +2

      several endpoints, servers, ATMs, you name it. There are tons and tons of equipments that hasn´t been updated over the years and they are vulnerable to this. I would dare to bet that more than 50% of the companies out there still have legacy OS in their inventory

  • @Luggruff
    @Luggruff 4 месяца назад +2

    So, is there a third part coming where you mention how Kaspersky is relevant? Or did you just completely forget the title of the first video? By the way, maybe make the title of the videos xyz - part 1/2 etc so it is clear that they belong together.....

  • @SB-qm5wg
    @SB-qm5wg 4 месяца назад +1

    Excellent deep dive 👏

  • @sakoasklaksd
    @sakoasklaksd 4 месяца назад +2

    I didnt understand anything, can someone tell me why Kaspersky got banned ?
    Did kaspersky found out that USA and Microsoft having backdoors to everyone ?

  • @acedelgado1770
    @acedelgado1770 4 месяца назад +1

    I really enjoyed this, thanks for the video!

  • @jasonswearingin1009
    @jasonswearingin1009 4 месяца назад +13

    Not surprised over several years now all YT channels that "test" security software really hate Kaspersky Avast and AVG. When in 23 years of personal experience these were and still are the best consumer grade security software companies on the planet! Low system resource impact (NO BUILT IN ROOTKITS) and actual people on the customer service end! Plus Windows Defender is a pile of donkey shit!

  • @mikediscipleofJesusChrist
    @mikediscipleofJesusChrist 3 месяца назад

    This WAS SO CLEAR!!!

  • @Foukez
    @Foukez 4 месяца назад +5

    Wait for copilot

    • @Vizaru
      @Vizaru 4 месяца назад +4

      recall will undoubtedly be responsible for a major security/data breech

  • @stonedoubt
    @stonedoubt 4 месяца назад +1

    Nobody wants their back door to leak

    • @HyrimBot
      @HyrimBot 4 месяца назад

      we don't eat there anymore.

  • @stevengill1736
    @stevengill1736 4 месяца назад +1

    Hey NSA, thanks a lot! Adds insult to injury, doesn't it?

  • @cariyaputta
    @cariyaputta 4 месяца назад +27

    CIA, NSA, and Israel.

    • @gregandark8571
      @gregandark8571 4 месяца назад +1

      Israel = FBI,CIA,KGB,FSB etc,etc,etc ...

  • @danailminchev4685
    @danailminchev4685 4 месяца назад

    Fantastic work. Thanks.

  • @damionyates4946
    @damionyates4946 4 месяца назад

    Why on earth did it still contain ancient OS2 compatibility?

  • @sangeetguha51
    @sangeetguha51 4 месяца назад +1

    great video as always :)

  • @clytle374
    @clytle374 4 месяца назад +5

    Not a hacker, security expert, or even a decent programmer. But are we assuming the NSA found all these vulnerabilities without the source code?

    • @Vizaru
      @Vizaru 4 месяца назад +5

      they 100% had the source code for Windows. now how they got it, I don't know. probably decompiled it themselves.

    • @ahmedabdul-aziz1562
      @ahmedabdul-aziz1562 4 месяца назад +5

      I was thinking about this for the entirety of this video. How the hell do you know of this very specific exploit? They must have had the source code one way or another because this depends on deep analysis of the source code that even regular SASTs won't identify.

    • @gophop
      @gophop 4 месяца назад

      Hire former MS devs. Bribe them / threaten them. Or / and do the same to MS. The romanticism fades when you realize it's just thugs leveraging their monopoly on violence and someone else' tax money.

  • @petevenuti7355
    @petevenuti7355 4 месяца назад

    So because I had no need for older versions of SMB and remove them from my system after getting rid of Windows for workgroups 3.1 , and using novel protocols to communicate between os2 and NT instead of SMB is why I wasn't attacked?

  • @greenerell484
    @greenerell484 4 месяца назад

    good explanation

  • @nocredits8066
    @nocredits8066 4 месяца назад

    Commenting to help with the algorithm cuz yeeeah! the video is so clear to explain everything, from the edition, animations, and script

  • @code-inc
    @code-inc 4 месяца назад

    Highly detailed ❤ thanks 😘😘😘

  • @alexhannah8889
    @alexhannah8889 4 месяца назад

    Gotta hate Advanced Persistent Threats. I liked it more when hacker groups where small, isolated, and didn't have millions of dollars and an intelligence apparatus.

  • @zandermcnabb7779
    @zandermcnabb7779 4 месяца назад

    ….. I just custom-deployed a windows server with SMB enabled, thank god it’s sandboxed

  • @albertobueno7805
    @albertobueno7805 4 месяца назад

    amazing video!

  • @deancatiil4911
    @deancatiil4911 4 месяца назад +1

    can you do the Solarwinds hack

  • @TonyFarley-pv3nk
    @TonyFarley-pv3nk 4 месяца назад

    Then we have this closed-door session was not even my state or me to be allowed in this session of the reliant

  • @pedrogorilla483
    @pedrogorilla483 4 месяца назад

    My man got scared and changed the thumbnail

  • @wendysburgers4326
    @wendysburgers4326 4 месяца назад

    Can you prevent this by DISABLING Paging File (Pagfile Sys)?

    • @D0Samp
      @D0Samp 4 месяца назад +4

      No. This exploit used memory from the non-paged pool, i.e. kernel memory that is never swapped out to disk.

  • @charlesbenca5357
    @charlesbenca5357 4 месяца назад +2

    wow.

  • @kam1234554321
    @kam1234554321 4 месяца назад +21

    Haven't I just watch this video recently? It's 98% of the previous video...

    • @VADemon
      @VADemon 4 месяца назад +4

      I added the first two minutes as Recap to _Sponsorblock_ to skip.

    • @menno763
      @menno763 4 месяца назад +1

      Yeah it should have been one video.. Still great content tho!

    • @RowanHawkins
      @RowanHawkins 4 месяца назад +1

      There is a video size limit on YT for newer/smaller subscriber count videos. However checking after I've made this post this exceeds the subscriber count for that to be an issue.

    • @VADemon
      @VADemon 4 месяца назад +4

      @@RowanHawkins This limit (15min initially) could be removed by adding a phone number and this worked like that about 15 years ago.
      Assuming he's partaking in the ad revenue (AdSense) he has had limits disabled a very long time ago.

    • @hotlinefrenzy
      @hotlinefrenzy 4 месяца назад +1

      ​@@VADemon But you aren't Daniel?

  • @Collin0
    @Collin0 4 месяца назад

    great video

  • @taahaseois.8898
    @taahaseois.8898 4 месяца назад

    Is this a reupload? I swear I've seen this video already...

  • @TonyFarley-pv3nk
    @TonyFarley-pv3nk 4 месяца назад

    A lot of things made some plays some big areas after that Xbox got switched out started all this controlled removal around my area

  • @klaatubob
    @klaatubob 4 месяца назад

    The repeated references to OS/2, an OS that hasn't been used in decades, lost me. What am I missing?

    • @elecblush
      @elecblush 4 месяца назад +2

      Compatibility.
      The crux of the exploit is that it's in the oldest version of SMB. And that code had compatibility code to be able to communicate with OS/2 machines.
      This is also probably why the inventors of this exploit found it. They looked specifically for old code and protocols written at a time with a lot less knowledge about these types of attacks.

    • @klaatubob
      @klaatubob 4 месяца назад

      @@elecblush thanks for the explanation

  • @dallasbowman9532
    @dallasbowman9532 4 месяца назад

    I just finished Andy Greenberg's "Sandworm" last week - well timed, for sure, but man, what a video! Thanks for making this, this is kickas$!

  • @jacoblee5190
    @jacoblee5190 4 месяца назад

    Did you just change title?

  • @powerdust015lastname4
    @powerdust015lastname4 4 месяца назад +2

    4:40 skill issue, shouldve used rust

  • @RickySupriyadi
    @RickySupriyadi 4 месяца назад

    coincidentally? i rumor they already got an AI model able to decrypt cryptography.... gossips though but this gossips really aligned with the leaks, leak it to test this specialized AI capabilities in real life!

  • @TonyFarley-pv3nk
    @TonyFarley-pv3nk 4 месяца назад

    Do you think your boy scout patches teach this understanding correctly do you think they provided y'all with the full rotation to get this understood in case someone else comes out as a problem what do you think they just learned how to money everybody through it

  • @Litepaw
    @Litepaw 4 месяца назад

    Gets*

  • @mitkomanev9783
    @mitkomanev9783 4 месяца назад

    Spoiler alert... there's worst one (let's say one) for bluetooth! Just take a look at you services, than your devices (hidden ones too) and do the thinking yourself ;)

  • @TonyFarley-pv3nk
    @TonyFarley-pv3nk 4 месяца назад

    So here's another problem I y'all are asking for hackers and you all know the consequence

  • @leshommesdupilly
    @leshommesdupilly 4 месяца назад +4

    Moral of the story kids: just use pencil and paper next time

  • @TonyFarley-pv3nk
    @TonyFarley-pv3nk 4 месяца назад

    How's the worm in your head Mr Kennedy

  • @ce9916
    @ce9916 4 месяца назад

    Is HTML programming a good place to start to become a cyber security expert?

  • @boxicknowsbest9100
    @boxicknowsbest9100 4 месяца назад +4

    who knew grooming could be so fun! :D

    • @C-aFilms
      @C-aFilms 4 месяца назад +5

      r/cursedcomments

  • @nittani.
    @nittani. 4 месяца назад +1

    Haha

  • @TonyFarley-pv3nk
    @TonyFarley-pv3nk 4 месяца назад

    So one of my next questions is through some of this understanding of this worm what does concept of cancer or whatever it is going around and our big organizations trying to prevent the next big terrorist attack. Do you suspect we've already been hit with this attack

    • @TonyFarley-pv3nk
      @TonyFarley-pv3nk 4 месяца назад

      I always questioned back door conversations without the evidence being presented

  • @spiderfight1897
    @spiderfight1897 4 месяца назад

    Me my b

  • @TonyFarley-pv3nk
    @TonyFarley-pv3nk 4 месяца назад

    I'll be cracking up to I mean we had defense attorney Lloyd have to go in and get his head looked out we had Russian President Vladimir Putin have to go get his looked at then we had bad and son get himself in a little bit of trouble when traveling over on a laptop and y'all think y'all are going to force the change of the Constitution of America

    • @lmnk
      @lmnk 4 месяца назад +6

      ... are you high or sth ?

  • @jefferyholcombe5189
    @jefferyholcombe5189 4 месяца назад +1

    This is propaganda made to cover some criminals trax!

  • @justyce_yt
    @justyce_yt 3 месяца назад

    EternalBlue... guess which American political party is blue? Hmmmmmm (lmao)

  • @LinguisticMirage
    @LinguisticMirage 4 месяца назад +2

    bro you talk so SLOW

    • @hashtag9990
      @hashtag9990 4 месяца назад +14

      you know youtube supports adjusting playback speed?

    • @CoolTebza-eh7ig
      @CoolTebza-eh7ig 4 месяца назад

      Must remember RUclips does pay this people unless they reach amount of viewers, so use what you have don't judge because already know it don't understand why you bother pointing it out hear 🙉

    • @uniqueprogressive9908
      @uniqueprogressive9908 4 месяца назад +5

      ok goldfish

    • @Amaroq64
      @Amaroq64 4 месяца назад +3

      Normally I would hate on someone for padding time to get more ad revenue, but this is extremely advanced computer science stuff. I'm a self taught programmer and I'm glad he explained it slowly.