@petrusneacsu9858

You explained in this video how SHA-256 is used and what it is used for, not how it works and how it is generated.

@pisekanha

Great explanation!!!

@sofiiski0komar

Pretty good basic explanation. Thank you!

@mvaracalli49

This is really cool! Thanks so much for the explanation.

@waujito

bruh the full explanation is explanation of math beside the function. why tf y'all doing theese videos about "use cases" but not about real MATH

@donaldkleven723

Excellent presentation

@sebasromero_

Great content! Thx for the explanation

@utkarshsrivastava

my man didnt beg for a like. just said ":do the thing"
+1ed instantly

@amogrows

This is great. Very well explained! The input and output from a hash generator had me stumped before I digested this information.

@juliuschilongu7508

Wow this is a simple explanation good teacher,. even if am new into programing i understood every single kudoos bro!!!!!

@gintarasliksa4960

So how does it work? Title doesnt match video unfortunately

@rishikeshjoshi770

Nicely explained, thx

@luukderuijter1332

thank you jerma

@youtuber25645

Thanks for this video. Something you said was that SHA-256 is very fast, so it is bad for password storing because people could just generate new fingerprints very easily. But if it is already irreversible, and data is scrambled deterministically, why does this matter? Maybe I am understanding this wrong.

@creed_4_life

Bro i just want to ask if there is a way to see generated digit numbers in a seeds

@attaramadhan3562

how install SHA256 on computer?

@MeDoFPV

thanks :eyes-pink-heart-shape:

@satish7028

Good eplination some where I see.. Sha256 text can be dycrypt. Is it possible

@MohamediNgoo

But how can ash256 to return as txt