Back to Browse

How Browsers Verify Websites (TLS Certificates Explained) | System Design for Nerds #7

29 views
May 15, 2026
13:05

How does your browser know that a website is actually legitimate? In this video, we continue our deep dive into *TLS (Transport Layer Security)* and finally answer one of the most important questions in internet security: 👉 How can a client verify that it’s talking to the *real server*? To solve this problem, we explore: * *Digital Signatures* * *Public & Private Keys* * *Certificates* * *Certificate Authorities (CAs)* * *Chain of Trust* What you’ll learn: * What asymmetric cryptography actually means * How digital signatures work * Why signatures are signed with a private key and verified with a public key * What a TLS certificate contains * Why certificates need trusted Certificate Authorities * How browsers verify certificate chains * Why root CAs are trusted by your operating system We’ll also connect these ideas back to: * TLS handshakes * Diffie-Hellman key exchange * HTTPS security By the end of this video, you’ll finally understand: 👉 how browsers trust websites over an insecure internet. This is part of the **System Design for Nerds** playlist 👇 [🔗 https://youtube.com/playlist?list=PL7YJlr96rCmM2TH-5dWV-fXSxY_fOUbag&si=kQRGvWvIV-jdf8iQ] 👍 Like the video if it helped 💬 Drop your questions or confusions in the comments 🔔 Subscribe for more deep dives into systems, networking, and backend engineering Next video: TLS 1.2 vs TLS 1.3 handshake explained 🔐 #qualcomm #systemdesign #tls

Download

0 formats

No download links available.

How Browsers Verify Websites (TLS Certificates Explained) | System Design for Nerds #7 | NatokHD