Score
Title
625
How To Search ELI5: A Quick Reminder About Rule 7
1366
ELI5: Why do microscopic organisms (bacteria etc.) look like they're CGI under a microscope.
7
ELI5: Our body fight diseases by increasing the temperature, why betraying it by cooling ourselves down?
92
ELI5: Behaviorism and how it is used to teach/educate children
4
Eli5: Why do humans have different voices?
6
ELI5: if human skin cells reproduce and you essentially have different skin than you did 5 years ago, why do scars never disappear?
5
ELI5:How do bacteria photosynthesize if they don't have membrane bound organelles (chloroplasts)?
3
ELIF: What is the source of heat for the Earths core?
3
ELI5:What makes an MR layout car more likely to oversteer?
2
ELI5: What's the difference between a savings and checking account and is it important?
2
ELI5: What is the science behind ‘beer goggles’?
2
ELI5: Why is the Earth's core so hot? If the sun went out, would the core's remain hot without the sun's energy?
1
ELI5: What happens to our muscles when we 'pull' our neck?
2
ELI5:Numbers Stations
2
ELI5: why does sugar look like a rock and make rock candy if it comes from a plant?
6
ELI5:Why can't humans hold themselves perfectly still without twitching, hence the difficulty of the game "operation"?
4
ELI5: How were cartoons in the early 2000's animated?
5
ELI5: Why are the numbers on super market scales arranged counter clockwise?
2
ELI5: Why is Denuvo still a thing when people are constantly pirating games that use it?
5
ELI5 - What is code and how does it work?
3
ELI5: The difference between nerves and neurons.
11
ELI5:How do our bodies acclimate to hot/cold temperatures?
18
ELI5: Why do Third World Countries have problems with possessing water, when the earth is 79% of it and we have the technology to purify water?
3
ELI5: How do scientists accurately reconstruct the faces of archeologically recovered skulls?
0
ELI5: why does cigarette smoke give people lung cancer and kill them but weed smoke doesn't?
0
ELI5: Why can't you cheat the lottery by doing this?
1
ELI5: Why is GRILLED chicken healthy and fried chicken not?
0
ELI5: Why are members of the armed services credited with upholding American Freedom?
1
ELI5:what is DOM elements and how it works in a web page?
1
ELI5: The controversy and theory of Jordan Peterson.
1
ELI5: Why is medical cannabis not normally used, when morphine is freely accepted?
0
ELI5: Are the odds of a baby being a boy always 50/50?
0
ELI5: What happens if you run away from police in a car and get away?
1
ELI5: If we cannot technically touch anything because the particles we’re made of repel each other, what’s in the space between them?
2
ELI5: why is the speed of earth slowest when it is farthest away from the sun in the elliptical path and vice versa?
0
ELI5: Why hasn’t Quebec gone independent yet?
0
ELI5: how do they make crisps taste like actual flavours?
3
ELI5 why things get black as they combust?
1
ELI5: Aspect ratio and dimensions
2
ELI5: How does sandboxing (computer security) work?
2
ELI5: images(math)
7 xeddo The key difference is that something that has been encrypted can be decrypted and the exactly same original message can be restored. Encryption is used when you want to make something unreadable but also want to be able to restore the data from this unreadable state. When something is hashed, the created hash is often much smaller and has less information. That means information gets lost and the original message can never be found from the hash. Hashing is used, when you want to make something unreadable that should not be restored from the hash. (Like a password) That way a person/server can check if the hash of your password matches, without knowing your actual password.
2 Blrfl Encryption is the use of a [cipher](https://en.wikipedia.org/wiki/Cipher) to render a stream of data unreadable by anyone who doesn't know how to decipher it. Ciphers don't do anything other than scramble the plain text; the result is exactly the same size so the original can be reconstructed. A hash function is a way to produce a _digest_, or a very short summary of a stream of data. Reddit's [Auto TL;DR bot](https://www.reddit.com/user/autotldr) is a good example of something the produces a digest. If you put the same article into it twice, it will produce the same digest. If you put two different articles into it, even if they're about the same topic, it will, at least in theory, produce two different digests, which would tell you that the two articles aren't the same. (You can see this in the bot's posting history from today, where multiple articles about a comment made by President Trump are digested.) The article digest doesn't represent all of the content of what was digested, which means you can't reconstruct the original article from the digest. Hashes are [cryptographic digests](https://en.wikipedia.org/wiki/Cryptographic_hash_function) that represent a blob of data as a large number. Like article digests, they're not a full representation of the original content and can't be used to reconstitute it. What makes hashing valuable is the fact that a good algorithm will have a low enough collision rate that it would be exceedingly difficult to come up with content that will produce the same hash value. If I give you a password of "mumble" and use the SHA1 algorithm to hash it, you'll store the value b2e80024f443e922aea693ab4ed0027b2c51a2b6 in your password database. When I go to authenticate myself later, if I give you the same password, it will hash out to the same value. If I give you something different, like "bumble," its hash will be 4d7ee105be643583fc8cd836c7104748780b783d, which is very different and means what I gave you isn't the same. This makes hashes great for storing passwords, because even if they're exposed, it's not very practical to come up with a string that produces the same one.
8 0 xeddo The key difference is that something that has been encrypted can be decrypted and the exactly same original message can be restored. Encryption is used when you want to make something unreadable but also want to be able to restore the data from this unreadable state. When something is hashed, the created hash is often much smaller and has less information. That means information gets lost and the original message can never be found from the hash. Hashing is used, when you want to make something unreadable that should not be restored from the hash. (Like a password) That way a person/server can check if the hash of your password matches, without knowing your actual password.
2 0 Blrfl Encryption is the use of a [cipher](https://en.wikipedia.org/wiki/Cipher) to render a stream of data unreadable by anyone who doesn't know how to decipher it. Ciphers don't do anything other than scramble the plain text; the result is exactly the same size so the original can be reconstructed. A hash function is a way to produce a _digest_, or a very short summary of a stream of data. Reddit's [Auto TL;DR bot](https://www.reddit.com/user/autotldr) is a good example of something the produces a digest. If you put the same article into it twice, it will produce the same digest. If you put two different articles into it, even if they're about the same topic, it will, at least in theory, produce two different digests, which would tell you that the two articles aren't the same. (You can see this in the bot's posting history from today, where multiple articles about a comment made by President Trump are digested.) The article digest doesn't represent all of the content of what was digested, which means you can't reconstruct the original article from the digest. Hashes are [cryptographic digests](https://en.wikipedia.org/wiki/Cryptographic_hash_function) that represent a blob of data as a large number. Like article digests, they're not a full representation of the original content and can't be used to reconstitute it. What makes hashing valuable is the fact that a good algorithm will have a low enough collision rate that it would be exceedingly difficult to come up with content that will produce the same hash value. If I give you a password of "mumble" and use the SHA1 algorithm to hash it, you'll store the value b2e80024f443e922aea693ab4ed0027b2c51a2b6 in your password database. When I go to authenticate myself later, if I give you the same password, it will hash out to the same value. If I give you something different, like "bumble," its hash will be 4d7ee105be643583fc8cd836c7104748780b783d, which is very different and means what I gave you isn't the same. This makes hashes great for storing passwords, because even if they're exposed, it's not very practical to come up with a string that produces the same one.