DNS SEC uses public key cryptography (asymmetric), when a user requests for a website the DNS sends the digital signature along with the DNS record that user's computer verifies at it's end using the public key, and if the authenticity is proven, only then it redirects to the website.
Authenticity is proved by cryptographic technique called digital signature, which is signed using the private key and verified using the public key, if it is verified then it proves that the records are indeed signed by the private key (public key is mathematically derived using the private key, vice-versa however is not possible) The initial private public key generation is done by methods like Elliptic curve cryptography or RSA. No, the keys are not hardcoded into the user's system. DNS resolvers handle the retrieval and management of these keys. the resolvers obtain the necessary public keys during their startup process or through periodic updates from trusted sources, such as root DNS servers.
Actually, it's the other way around, it translates Human readable into IPs, If not DNS, one would havr to memorize the IPs of the website they wanna visit instead of just their domain names.
Ah yes, a moderate amount of tomfoolery
DNS SEC and HTTPS exists to avoid this kind of attack.
Well http is very much still common
Do more cybersecurity terminology
Ok, noted.
ruclips.net/user/shortssuZ83uLcWCk?si=-7AySXs0y_W_dvdK
Thank you keep doing good work
Super
evil twin
So if the ip address was sized by fbi that’s what it would show ?
They could get the network information related to the IP, even location, other information like account details, websites visited.....
how does DNS SEC work with regards to asymmetric encryption?
DNS SEC uses public key cryptography (asymmetric), when a user requests for a website the DNS sends the digital signature along with the DNS record that user's computer verifies at it's end using the public key, and if the authenticity is proven, only then it redirects to the website.
@@Byte_Quest how does it prove the authenticity of the DNS server? Are the keys hardcoded in the consumer's device?
Authenticity is proved by cryptographic technique called digital signature, which is signed using the private key and verified using the public key, if it is verified then it proves that the records are indeed signed by the private key (public key is mathematically derived using the private key, vice-versa however is not possible)
The initial private public key generation is done by methods like Elliptic curve cryptography or RSA.
No, the keys are not hardcoded into the user's system.
DNS resolvers handle the retrieval and management of these keys. the resolvers obtain the necessary public keys during their startup process or through periodic updates from trusted sources, such as root DNS servers.
Learning ip addresses was not my strong point. Might have to go back to the basics and learn more about it
Hell yeah dns
That is a spoofing attack not a ddos attack
And that's exactly the title of the video ✅
Ooops i looked at the link to the other video and thought that's the title
Yeah AT&T spoof you all day unless you SSH tunnel your DNS
Good work my man🫡
so only users that use that DNS are affected
it is a fundamental part of the internet infrastructure, everyone uses it.
no it's not. It just translates an IP address into something a human might be able to remember. It's not really required
Actually, it's the other way around, it translates Human readable into IPs,
If not DNS, one would havr to memorize the IPs of the website they wanna visit instead of just their domain names.
@@Byte_Quest just like onion websites
Why are you using AI voice? It's awful. Use your own voice if you want to be successful
Ok, noted.
U sure?
I don't have a problem with the AI voice