"a$$word" LITERALLY SAVED PayPal | Prime Reacts

Поделиться
HTML-код
  • Опубликовано: 21 ноя 2024

Комментарии • 320

  • @dromedda6810
    @dromedda6810 Год назад +203

    The guy that wrote this deserves a fucken award for that article, the storytelling, the twists, the characters, a$$word, everything was top tier

  • @gownerjones
    @gownerjones 9 месяцев назад +42

    Nobody in the world would ever expect password inputs to be SECRETLY truncated. This is insane. Who programmed that?

  • @eyondev
    @eyondev Год назад +679

    So, literally "It works on my machine"

  • @demolazer
    @demolazer Год назад +709

    Great article, what a writer that dude is. Even better having it read to me as a bedtime story.

    • @rotteegher39
      @rotteegher39 Год назад +17

      Especially when you are Ukrainian.
      Literally me who stumbled upon this video before goin to sleep

    • @NithinJune
      @NithinJune Год назад +6

      fr

    • @trothwell
      @trothwell 11 месяцев назад +4

      Also came across it going to sleep 😴

    • @ianbelletti6241
      @ianbelletti6241 9 месяцев назад

      More like a woman on crack telling a story. Too many irrelevant details and sidebars. Just get to the point of the story. I don't need to know your mother's father's brother's wife's maiden name for you to tell me this story.

  • @timothycallahan7956
    @timothycallahan7956 10 месяцев назад +57

    There needs be a website dedicated to “bringing production down” stories.
    They hit you in the feels. SO HARD.

  • @kyay10
    @kyay10 Год назад +547

    Ik the math looks very complicated, but basically it uses the cool fact that a polymomial of degree N is uniquely defined by N+1 points. In other words, if you give me N + 1 points on an N polynomial, I can reconstruct the whole polynomial and evaluate it for *any* value I want. For instance, a line is uniquely defined by 2 points. Similary, there's only 1 unique quadratic that goes through any 3 points you choose. So what the secret sharing thing does is it gives all 8 people their own unique points on a quadratic function (degree 2 polynomial), and basically any 3 of them can then completely recreate the function and find the key (which is, by construction, f(0))
    Edit: the original explanation in the article is good in the sense that it tells you exactly *how* to generate such a shared secret, but it doesn't explain well as to *why* it works

    • @homelessrobot
      @homelessrobot Год назад +20

      very cool

    • @davidjohnston4240
      @davidjohnston4240 Год назад +21

      Yes. Pretty much exactly that. I've held a key share before (for a now decommissioned CA). In the form of a card (holding the actual key share) and a personal password for the card. Keep in mind the polynomials are extension fields of GF(2) so that the whole thing can be represented with bits because it's on a computer and bits are kind of handy.

    • @hakooplayplay3212
      @hakooplayplay3212 Год назад +6

      Oh...cool, now I see

    • @stoneHeHenge
      @stoneHeHenge Год назад +5

      This is a much better explanation

    • @pauld9690
      @pauld9690 Год назад +2

      Wait wouldn't cubic need 4 points?

  • @AdrianBawn
    @AdrianBawn Год назад +66

    To answer the question at 14:55 "what would happen if 6 out of your 8 people were on the same plane"
    When you implement systems like this, you make sure that never happens.
    If you need to send more than 5 people from that group to the same place, at the same time, you send them via different airlines, trains, cars, whatever, spaced far enough apart that the chances of a crash involving all of them is essentially zero. If you are implementing a system THIS secure, chances are you have the budget to deal with this kind of invonvenience.

    • @NickSteffen
      @NickSteffen 10 месяцев назад +9

      Yea, even outside of this most corporations have general limitations on the number of people who were allowed to ride on one plane. One company I worked at, it was 6 VPs and 25 normal staff.

    • @lennykogginsofficial
      @lennykogginsofficial 3 месяца назад +1

      They shouldn't even physically be in the same office, they should be on different continents

  • @batatanna
    @batatanna Год назад +310

    3am at a darkened cubicle is never how you want to start a story ngl

    • @robmorgan1214
      @robmorgan1214 Год назад +20

      Unless... it's instructions on how to escape the backrooms!

  • @skarlock5257
    @skarlock5257 8 месяцев назад +21

    As soon as I saw the word "Solaris" in the article, I immediately began to suspect I would blame Solaris. I wasn't disappointed! 10/10 would read again.

  • @complexity5545
    @complexity5545 Год назад +177

    This should be acted out as a skit and distributed amongst all computer science undergrad classes. Really entertaining. My bank did something similar. Unknown truncating is a problem. You can't read all of the manual.

  • @robinator18ps3
    @robinator18ps3 Год назад +129

    Probably one of the best articles you've reacted to! Well written and a damn good story!

  • @sharpfang
    @sharpfang 9 месяцев назад +16

    Silently trim the password to 8 characters. What an amazing security feature!

    • @hs3369
      @hs3369 Месяц назад

      You'd be surprised that this problem also happened with Sony. But that's a story I'm never going to say again.

  • @SashaInTheCloud
    @SashaInTheCloud Год назад +32

    You have to use more than just people in a multikey encryption setup like this. You use things like a backup set of keys in separate lock boxes at banks in different countries, with two keys per lock box, and then another backup setup with copies of books at everyone's nana's houses, there's always a way around the plane crash problem!

  • @MMLauritsen
    @MMLauritsen Год назад +18

    Shamir secret sharing is unironically the coolest thing ever. I highly recommend reading the original paper 'How to share a secret', it's only 4 pages long!

  • @bimsherwood7006
    @bimsherwood7006 Год назад +33

    This is why 'availability' is one of the pillars of security, along with confidentiality and authenticity.

  • @unowenwasholo
    @unowenwasholo Год назад +70

    If there was ever a story that highlighted the importance of debugging skills. (Well, at least until the post-script, lol. Also the importance of always having a rollback plan whenever possible.)
    Being able to take a single working case and derive further understanding about the problem from the diff of that and the non-working has been so much of my programming career. “Why did _this_ work?” is often just as important as “Why isn’t that working?”

    • @cericat
      @cericat 9 месяцев назад +3

      Also test on all platforms you're intending to use in your deployment environment. It's precisely why I'll probably never launch anything with an Apple version, don't have nor want the hardware under my roof.

  • @volbla
    @volbla Год назад +32

    So if paypal is using just a single password again, we can go back to beating it out of someone?

  • @TechBuddy_
    @TechBuddy_ Год назад +102

    In 7 years since the creation of my account on RUclips this is the second video I ever liked. The article, the delivery and the emotion was just perfect ❤

  • @oderchannel426
    @oderchannel426 Год назад +73

    Oh man I agree with this so much, I totally watched this 27 minute video in 16 minutes and I understood all of it. I loved it when "a$$word" literally saved paypal!

  • @Lambda.Function
    @Lambda.Function 11 месяцев назад +13

    I've learned through several horrible mistake stories like this that it's better to be a little insecure and make redundant backups until things are working than otherwise. It's saved me a few times when I've accidentally RIPd things and had a sigh of relief that I had backups.

    • @Catterjeeo
      @Catterjeeo 10 месяцев назад +3

      Well, a paper copy of a key hidden in a safe is not the least insecure

    • @chri-k
      @chri-k 4 месяца назад +3

      i mean, that is exactly what he did, he just forgot he did it

    • @maxwellrobertson4831
      @maxwellrobertson4831 3 месяца назад

      ​@@chri-kIronically may have been more secure that way (idk if I'm using the words right) since then only one person knew the file existed and where it was, but they didn't know what was in the file. So no one trying to find said backup would have any luck since the person who knows what it is didn't remember it existed or where it was. (Hope I explained my thinking in a comprehensible way)

    • @chri-k
      @chri-k 3 месяца назад

      @@maxwellrobertson4831 They accidentally made 2fa. The person who knows what the file in the file does not know what's in it and the one who knows what's in it it does not what it is.

  • @Yupppi
    @Yupppi 11 месяцев назад +5

    What a breath-taking story. Like the best adventure stories for kids, the dude had been smarter than himself at every turn possible, both in making sure it was safe and that he could not fuck it up. A bit of like reading one of those Artemis Fowl stories where the kid just has planned every possibility before and rehearsed the alternate paths.

  • @maxlife459
    @maxlife459 Год назад +61

    Solaris messed up big time back then: WTF were they doing truncating passwords!

    • @benb8075
      @benb8075 Год назад +66

      Would have been fine if the program told you the pw was cut short. Silently accepting a system modified pw is pretty bad form, regardless of how cool, neat, or useful solaris devs thought it was.

    • @TheArrowedKnee
      @TheArrowedKnee Год назад

      @@benb8075 Regardless it just sounds completely insane

    • @Yorgarazgreece
      @Yorgarazgreece Год назад

      @@benb8075 that's still not good. there should be hard validation

    • @taragnor
      @taragnor Год назад

      @@benb8075 Well it's a C function that returns a char *, it has no way of notifying the user that it was truncated. It can basically either return a null pointer or it can return some string and that's it. Like most classic C style programming it puts all the responsibility on the person calling the function to be aware how it works.

    • @ゾカリクゾ
      @ゾカリクゾ Год назад

      @@benb8075 EXACTLY. A single f-ing printf and that's it

  • @Turalcar
    @Turalcar Год назад +49

    0:10 Adi Shamir is obvously S in RSA.The others are Ronald Rivest and Leonard Adleman.

  • @superitgel1
    @superitgel1 Год назад +74

    I want to see a movie of this. Great plot 😄

    • @vaisakh_km
      @vaisakh_km Год назад +9

      😂 i am going quit programming and start learning animation just to make this a over dramatic animated movie

    • @homelessrobot
      @homelessrobot Год назад +23

      coming soon to a theater near you "PayPalia: Secret of the Lost a$$word"

    • @alexhiatt3374
      @alexhiatt3374 Год назад +2

      would watch.

    • @vborovikov
      @vborovikov Год назад +2

      there is a guy who narrates stories like this. I bet he's going to make a video out of it. channel name is Kevin Fang

    • @AnirbanDas5000
      @AnirbanDas5000 Год назад +1

      I want Christopher Nolan to direct this. Like Oppenheimer.

  • @razt3757
    @razt3757 Год назад +12

    This demands a movie, I would actually watch it.
    Great writing!

  • @exception05
    @exception05 9 месяцев назад +2

    It's probably about method of Solaris stores pass phrases. One of the features of DES is that it uses keys of a fixed length - 56 bits, which corresponds to 7 characters (if you count 8 bits per character, taking into account that the 8th bit was often used for parity). As a result, even if the user enters a longer password, DES only processes the first 7 characters.
    In the context of storing passwords, this means that if a system uses DES to encrypt passwords, it will only honor the first 7-8 characters of the password, greatly reducing its security.
    SHA-1 and MD5 are hashing algorithms and do not have such a limit on the length of the input data. They generate a hash of a fixed length regardless of the length of the input message. This makes them more suitable for securely storing passwords as they do not limit password length and provide a higher level of security.

    • @Delfigamer1
      @Delfigamer1 9 месяцев назад +2

      PSA: do not use SHA-1 and MD5 for security. They are considered too weak for modern computers. Use SHA-2 with the hash size of no less than 256 bit.
      PSA 2: do not use a hash function on the password directly. Don't even use it with a salt. There are algorithms designed directly for the purpose of storing and using passwords securely, called "Key Derivation Functions". The one you should use by default in 2024 is PBKDF2 with a 6-to-7-digit "number of iterations".
      PSA 3: also, in general, "don't roll your own crypto", but also be aware of the X-Y Problem. E.g. when you build a site and want to let people register accounts in there - don't google "hash functions", don't even google "password storage" - google "user authentication" instead (or "how to verify the person is actually who they claim to be" in normal people's language). The result will be that, for an online service, it's better to not deal with passwords at all, and instead rely on OAuth-ing accounts from other services, like Google, Twitter, Github, etc. Then they can do all the security that's considered appropriate at the time (passwords, 2FA, retina scans, whatever else we will have to deal with in the 2070-s cyberpunk dystopia), and your site will just have most of this security just trickled down by delegation.

    • @exception05
      @exception05 9 месяцев назад +2

      @@Delfigamer1 Good advices, although my original comment was about the PayPal case that happened when MD5 and SHA-1 were pretty new.

  • @roberthentosh5635
    @roberthentosh5635 4 месяца назад +1

    All you have to do is type slower and press the keys harder. 90% of the time, it works all the time.

  • @MeriaDuck
    @MeriaDuck Год назад +20

    Halfway in and commenting something you are probably going to say. This seems like a procedure you need to rehearse regularly.
    I once worked somewhere where the database had a master and slave setup and the slave taking over master role was tested every month.

  • @ccgm_harpy
    @ccgm_harpy 9 месяцев назад +1

    Who would have thought, a bad password saving a company.

  • @cheaterman49
    @cheaterman49 Год назад +7

    8:39 I mean it _is_ an accent aigu, and I'm honestly impressed you managed to put a name on it :-)

  • @core36
    @core36 Год назад +5

    Murpys law is a thing. Always expect your little project to not work the first time you try it on the actual system it’s going to run on. Hey maybe don’t let a script overwrite critical files before you are absolutely certain that everything else works? The printed masterkey in the letter was a good call tho. Guy knew what he was doing, just got a little confused.

  • @holmybeer
    @holmybeer Год назад +20

    "Language interpolation" f**ing killed me

    • @MNbenMN
      @MNbenMN 9 месяцев назад +2

      Here it had me thinking ZZTop and that shack outside "language"

  • @Ataraxia_Atom
    @Ataraxia_Atom Год назад +6

    This legitimately made me LOL, dude a$$word must have been such the meme at PayPal

  • @arsenymun2028
    @arsenymun2028 Год назад +5

    I love Stencil Law Men. My favourite Sci-fi

  • @randomnobody660
    @randomnobody660 Год назад +12

    just want to quickly point out Adi Shamir is in fact the S of RSA

  • @mollistuff
    @mollistuff 8 месяцев назад +1

    On the edge of my seat here. A real crypto-campfire tale

  • @wizardscrollstudio
    @wizardscrollstudio Год назад +2

    That story brought a tear to my eye. All I remember is something something and a bad word.

  • @Gomace
    @Gomace 7 месяцев назад +2

    Rule #1 of coding:
    It doesn't work on the first try.
    Even if you check the syntax, double check the syntax, double check what it's supposed to do, and even used it before, there's always some number that is in the wrong place, one semicolon that's missing, one letter that's incorrect, a spelling mistake in a variable name, or it does the complete opposite.

  • @kzalesak4
    @kzalesak4 9 месяцев назад

    To solve the people on a plane issue, we are actually implementing this in an organisation i work for, where you split the keys into physical copies, that are tamper-proofed, and then you hand them out to people to keep in a safe place of their keeping

  • @davidyoder5890
    @davidyoder5890 Год назад +3

    This has been the best article so far. What a ride!

  • @htx80nerd
    @htx80nerd 8 месяцев назад +1

    Story about Paypal being wildly incompetent. This checks out.

  • @robmorgan1214
    @robmorgan1214 Год назад +3

    Man, that was a whiteknuckle sphincter puckering read. I felt it in muh feelz.

  • @monster2slayer
    @monster2slayer 7 месяцев назад

    companies i've worked for have explicit and enforced rules that make sure key people can not fly on the same plane

  • @ccgm_harpy
    @ccgm_harpy 9 месяцев назад +1

    I once locked myself out of a remote windows server machine. I changed the password using cmd and didn't realize that my password used an escape character. When I tried to log back in my password didn't work. After a lot of confusion, removing the escape character solved the problem.

    • @TheFlutterQueen
      @TheFlutterQueen 6 месяцев назад

      does escape character refer to a character that escapes other characters or a character that needs to be escaped?

  • @jimdiroffii
    @jimdiroffii Год назад

    I once deployed a new package to a single node to test it. That update went to every single node instantly, slamming the entire network, and grinding operations to a halt. Luckily, the update was successful, and everything came back on its own. Some mistakes you will never make twice.

  • @DmitriyKuzmenkov
    @DmitriyKuzmenkov Год назад +2

    This article gave me some serious Silicon Valley (TV Series) vibes. A password Big Head would use...

  • @spidaweb-u8f
    @spidaweb-u8f 11 месяцев назад

    Just tbc. What won me over the most in the video.... 'push-it' by Salt-N-Pepper scene setting. I can almost smell the room they were in from the 90's all the way back to present.

  • @danielschmider5069
    @danielschmider5069 Год назад +2

    Funny coincidence how "Solaris" is also a sci-fi novel by Stanisław Lem

    • @vray2904
      @vray2904 Год назад

      And Lem predicted a lot of stuff that happens right now in technology.

  • @abz4852
    @abz4852 9 месяцев назад

    This has to be the best article ever. Literally could be a movie scene.

  • @noredine
    @noredine Год назад +1

    That story reminded me of online recipes where the author always tells you their life story

  • @alexhiatt3374
    @alexhiatt3374 Год назад +7

    thank you for writing this great article prime

  • @taylrthegreat
    @taylrthegreat Год назад +1

    Literally beautiful example of sometimes short passwords are cool

  • @ragectl
    @ragectl Год назад

    I remember having to look at Solaris being able to have long passwords and longer usernames. Totally wild the system is built to restrict everything to a length of eight characters

  • @yarbarbar
    @yarbarbar Год назад +1

    Lagrange interpolation is the basis of Reed-Solomon codes, so would be fairly common knowledge to people in computing at the time.

  • @Burgo361
    @Burgo361 Год назад +1

    I really felt the stress of this situation this storytelling was amazing

  • @abhatem
    @abhatem Год назад +3

    What a roller coaster of an article 👏👏

  • @lashlarue7924
    @lashlarue7924 8 месяцев назад

    This is pure nightmare fuel, but Prime reacting to it with the happy ending (rawr) makes it all worthwhile.

  • @HardcoreGamers115
    @HardcoreGamers115 Год назад +4

    YOO why did I just realize Max fuckin' Levchin wrote that lol 10/10

  • @zbot2123
    @zbot2123 9 месяцев назад

    We call the designated survivor problem a "bus factor" how many engineers on the same bus crash would result in business losses.
    Low bus factors are pretty dangerous

  • @jeffreybritton3338
    @jeffreybritton3338 Год назад +2

    I loved this story and presentation. How did you not recognize SSS at the very end though. Shamir Secret Sharing.

  • @bobDotJS
    @bobDotJS Год назад +2

    Listening to this dramatic reading gave me nerd PTSD

  • @thehibbi
    @thehibbi Год назад +1

    Such a great article, and you reading it makes it even better!

  • @triplea657aaa
    @triplea657aaa Год назад +4

    This article is the kind of thing that made me get a Math degree.

  • @StrengthOfADragon13
    @StrengthOfADragon13 8 месяцев назад

    "What if 6 of your 8 are on a plane together" this is an eventuality that has to be considered, you can't have more than 5 of them in 1 place or unavailable at any given time

  • @fuzzy-02
    @fuzzy-02 Год назад +1

    Aaannnnnnd saved, under dad stories for future dad meetups.

  • @zperk13
    @zperk13 Год назад +2

    14:40 Bus factor? Nah! Plane factor!

  • @DUDA-__-
    @DUDA-__- 9 месяцев назад

    Oh it thought about Shamir secret sharing for a key to my PW Database. I like the concept.

  • @chinmaykabi
    @chinmaykabi Год назад +1

    me watching this at 3:41 AM

  • @emjizone
    @emjizone Год назад +2

    10:27 😂😂 "No Haskell needed" : does it mean "It's not even real Math." or rather "Not even Haskell can save you." ?

  • @cericat
    @cericat 9 месяцев назад

    7:58 Filk is a musical genre that mostly grew up in fandoms since the 50s, with much of the distribution in the 80s and 90s, so yeah a geek party is exactly where you'd expect to hear it. If you ever get around to reading Poul Anderson he actually wrote at least one piece of Filk as well according to his wife.
    16:10 Cymeks are from Brian Herbert's follow up Dune books, they were humans turned into thinking machines. We're talking about pre Dune history here, the Butlerian Jihad. Abslutely nothing to do with the Tleilaxu, gholas or face dancers. Your chat was messing with you.

  • @manuelschneider224
    @manuelschneider224 Год назад +1

    Absolutely amazing article

  • @martin7462
    @martin7462 7 месяцев назад

    This article is an absolute fever dream

  • @fuzzy-02
    @fuzzy-02 Год назад

    This served me content of greater quality than a million novels

  • @lezzbmm
    @lezzbmm 7 месяцев назад +2

    this is fkn amazing lmfaoo

  • @max_ishere
    @max_ishere Год назад +3

    Dude got RTFM'd hard

  • @tutacat
    @tutacat 8 месяцев назад

    Filk music is a musical movement among fans of science fiction and fantasy fandom and closely related activities

  • @JGComments
    @JGComments 8 месяцев назад

    This guy made a real Schmess of things.

  • @pv2b
    @pv2b 5 месяцев назад

    Hey, that's cool, I have something in common with the protagonist of this story, in that my father also translated Stanislaw Lem (into Swedish).

  • @Erdnussflipshow
    @Erdnussflipshow Год назад +3

    Man, screw any other genre of books, I want a whole genre just for stories like these.

  • @yaghiyahbrenner8902
    @yaghiyahbrenner8902 Год назад

    wow incredible journey. dramatic story very well articulated.

  • @daw5268
    @daw5268 Год назад

    bruh your reading of this was phenomenal

  • @sneed1208
    @sneed1208 5 месяцев назад

    6:20 Solaris is a pretty famous book and film

  • @TankorSmash
    @TankorSmash Год назад +1

    This is a fantastic story. Loved the video

  • @semasemasemasema
    @semasemasemasema Год назад +1

    In 3am you either having the the of your life or stare at the selling trying to sleep

  • @tmerb
    @tmerb 9 месяцев назад

    this needs to be a movie

  • @akshat_tamrakar
    @akshat_tamrakar Год назад

    Damn, I didn't understand half of it yet I had sweat coming off my head thinking "now what".

  • @cornedbeefcurses1116
    @cornedbeefcurses1116 7 месяцев назад

    "Filk" is a sort of folk role play thing and/or fictional future space folk.

  • @PinakiGupta82Appu
    @PinakiGupta82Appu Год назад

    Rolling on the floor, still alive though. Enough recipe for a Netflix episode.

  • @spyroninja
    @spyroninja Год назад +5

    Tom wouldn't have made that mistake...

  • @sebastianp4023
    @sebastianp4023 Месяц назад

    The title of the Article could have been as well "How to lose 10 years of your life expectancy in one night".

  • @marble_wraith
    @marble_wraith Год назад +1

    a$$word... welp now we know what i'm changing my wireless SSID to 😏

  • @liquidsnake6879
    @liquidsnake6879 Год назад +7

    He had the master passphrase written down but earlier he said his push had overwritten it, so it was useless anyways lol

  • @glennmorrow2755
    @glennmorrow2755 10 месяцев назад

    That’s gotta be one of the best stories ever! 😂😊

  • @tylercornett2022
    @tylercornett2022 Год назад +2

    That was as entertaining as it was terrifying lol.

  • @skeleton_craftGaming
    @skeleton_craftGaming Год назад

    This is why you do fuzz testing on both platforms...

  • @GeorgeDicu-hs5yp
    @GeorgeDicu-hs5yp Год назад +1

    classic security trough obscurity..

  • @gosnooky
    @gosnooky Год назад

    "I'm not the a$$word"
    "Well, according to the state of New York, you ARE the a$$word"

  • @CaimAstraea
    @CaimAstraea Год назад

    They had an envelope backup why didn't they thought of bringing that out of the safe :shrug:

  • @NotSure416
    @NotSure416 Год назад

    I had something similar happen to me once. Apparently everyone was typing it wrong, and it took the 4th person typing it for it to work. FML.

  • @tobozon4161
    @tobozon4161 4 месяца назад

    This was so interesting, I had to stop coding and actually watch this video