<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Thu, 16 Apr 2026 14:31:26 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/@chaintuts/rss" rel="self" type="application/rss+xml"/><item><title><![CDATA[New Crypto Security Audiobook - Digital Sovereignty: Protecting Your Crypto Assets Against Common Threats]]></title><description><![CDATA[Listen up for practical security knowledge! Take Digital Sovereignty: Protecting Your Crypto Assets Against Common Threats with you wherever you go. The audiobook is now available on Audible. A few months]]></description><link>http://direct.ecency.com/hive-185702/@chaintuts/new-crypto-security-audiobook-digital-sovereignty-protecting-your-crypto-assets-against-common-threats</link><guid isPermaLink="true">http://direct.ecency.com/hive-185702/@chaintuts/new-crypto-security-audiobook-digital-sovereignty-protecting-your-crypto-assets-against-common-threats</guid><category><![CDATA[hive-185702]]></category><dc:creator><![CDATA[chaintuts]]></dc:creator><pubDate>Sun, 01 Feb 2026 03:18:57 GMT</pubDate></item><item><title><![CDATA[Cracking Missing Crypto Seed Words - Is It Possible?]]></title><description><![CDATA[Can you recover missing crypto seed words? How many words can be missing before recovery becomes impractical — or impossible? Find out with my latest free and open license tutorial! 📺 📖]]></description><link>http://direct.ecency.com/hive-126009/@chaintuts/cracking-missing-crypto-seed-words-is-it-possible</link><guid isPermaLink="true">http://direct.ecency.com/hive-126009/@chaintuts/cracking-missing-crypto-seed-words-is-it-possible</guid><category><![CDATA[hive-126009]]></category><dc:creator><![CDATA[chaintuts]]></dc:creator><pubDate>Wed, 06 Aug 2025 14:47:24 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45e94K57r2qAqCAq3Hxc4QeyvEx2XW74qvuNn?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Foot Off The Gas — Crypto Seed Phrase Gas Fee Scams]]></title><description><![CDATA[A tempting target — and a clever scam! Learn about crypto seed phrase gas fee scams with my latest free and open #tutorial! Gain insight on how attackers try to steal your coins while promising token rewards.]]></description><link>http://direct.ecency.com/hive-185702/@chaintuts/foot-off-the-gas-crypto-seed-phrase-gas-fee-scams</link><guid isPermaLink="true">http://direct.ecency.com/hive-185702/@chaintuts/foot-off-the-gas-crypto-seed-phrase-gas-fee-scams</guid><category><![CDATA[hive-185702]]></category><dc:creator><![CDATA[chaintuts]]></dc:creator><pubDate>Mon, 02 Jun 2025 00:27:15 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45eBAZW1kDidqTSy5jVTTwz8Z7Yno9m4wrabg?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Fiendish Photos – Stealing Crypto Seed Phrases with OCR]]></title><description><![CDATA[Stealing crypto seeds from...pictures? Learn about OCR malware with this free and open #tutorial! We cover OCR, regex, a fun educational demo, and the real SparkCat malware along with prevention strategies.]]></description><link>http://direct.ecency.com/hive-169321/@chaintuts/fiendish-photos-stealing-crypto-seed-phrases-with-ocr</link><guid isPermaLink="true">http://direct.ecency.com/hive-169321/@chaintuts/fiendish-photos-stealing-crypto-seed-phrases-with-ocr</guid><category><![CDATA[hive-169321]]></category><dc:creator><![CDATA[chaintuts]]></dc:creator><pubDate>Sun, 04 May 2025 16:58:06 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45eFYH5ocfTdUVePq3BwCuHd4HQLyN2d1M1Tc?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[I Wrote an In-Depth Book on Securing Your Bitcoin — "Digital Sovereignty: Protecting Your Crypto Assets Against Common Threats"]]></title><description><![CDATA[Hey Hive community, I'm Josh McIntyre also known as chaintuts. I've been creating free and open-license educational content about cryptocurrency security for the last 6 years. I cover cryptography, security,]]></description><link>http://direct.ecency.com/hive-163521/@chaintuts/i-wrote-an-in-depth-book-on-securing-your-bitcoin-digital-sovereignty-protecting-your-crypto-assets-against-common-threats</link><guid isPermaLink="true">http://direct.ecency.com/hive-163521/@chaintuts/i-wrote-an-in-depth-book-on-securing-your-bitcoin-digital-sovereignty-protecting-your-crypto-assets-against-common-threats</guid><category><![CDATA[hive-163521]]></category><dc:creator><![CDATA[chaintuts]]></dc:creator><pubDate>Wed, 23 Apr 2025 18:55:24 GMT</pubDate><enclosure url="https://images.ecency.com/p/6VvuHGsoU2QCK6yq1XKF2z9F8sayRpwConx4qLBWs1ZF6jpy1ndP6kesEcuxxG4n9Y6QdeVWRQ4ecAphuqG6yterGzDLtMAAhjiPqwWddb3sKPteGgYut5uR9P86hk?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[New Crypto Asset Security Book - "Digital Sovereignty: Protecting Your Crypto Assets Against Common Threats"]]></title><description><![CDATA["Knowledge builds confidence, and confident users can stand up to the threats that face them." Friends, I'm tremendously excited to share that my new book: "Digital Sovereignty: Protecting]]></description><link>http://direct.ecency.com/hive-185702/@chaintuts/new-crypto-asset-security-book-digital-sovereignty-protecting-your-crypto-assets-against-common-threats</link><guid isPermaLink="true">http://direct.ecency.com/hive-185702/@chaintuts/new-crypto-asset-security-book-digital-sovereignty-protecting-your-crypto-assets-against-common-threats</guid><category><![CDATA[hive-185702]]></category><dc:creator><![CDATA[chaintuts]]></dc:creator><pubDate>Tue, 08 Apr 2025 01:44:09 GMT</pubDate><enclosure url="https://images.ecency.com/p/21PRtjKRXPQygJ5a3PGGYDUDAUQfmdSVQys4xPJntwXcRW6DpDiETqCsT4AW9yWDEXYgsjDRXbAvrHCQrCSuZHmyeCpgKVYrfCRDqQoZqpqymaUCyyNYoxvAnXkxWKVZGgDDfVh2DmfmYZNvdwX7vNa?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Bad Bits and Bitcoin – Common Types of Crypto Malware]]></title><description><![CDATA[Learn about common types of #cryptocurrency #malware threats with this free and CC-licensed #tutorial. This dives into address-swapping, seed-stealing, cryptojacking, and ransomware threats and mitigation]]></description><link>http://direct.ecency.com/hive-126009/@chaintuts/bad-bits-and-bitcoin-common-types-of-crypto-malware</link><guid isPermaLink="true">http://direct.ecency.com/hive-126009/@chaintuts/bad-bits-and-bitcoin-common-types-of-crypto-malware</guid><category><![CDATA[hive-126009]]></category><dc:creator><![CDATA[chaintuts]]></dc:creator><pubDate>Sat, 08 Feb 2025 23:55:06 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45e9WCq98NnJNxXJsvExitqN3UJgxABN2YXAW?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Insidious Inputs - Three Types of Common Software Vulnerabilities (Video Version)]]></title><description><![CDATA[Software #vulnerabilities are a big part of security. Learn about path traversal, cross-site scripting, and buffer overflows with this free and open-licensed #tutorial, including example code demos!]]></description><link>http://direct.ecency.com/hive-169321/@chaintuts/insidious-inputs-three-types-of-common-software-vulnerabilities-video-version</link><guid isPermaLink="true">http://direct.ecency.com/hive-169321/@chaintuts/insidious-inputs-three-types-of-common-software-vulnerabilities-video-version</guid><category><![CDATA[hive-169321]]></category><dc:creator><![CDATA[chaintuts]]></dc:creator><pubDate>Sun, 12 Jan 2025 20:57:21 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45eALcGoZeRfUtJNK6KJn53TBKhqf3Y5HzWvi?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Insidious Inputs - Three Common Types of Software Vulnerabilities]]></title><description><![CDATA[Curious about how attackers exploit vulnerable software, and how those vulnerabilities work? My latest free and open licensed #tutorial dives into three common software #vulnerabilities - the #coding process,]]></description><link>http://direct.ecency.com/hive-169321/@chaintuts/insidious-inputs-three-common-types-of-software-vulnerabilities</link><guid isPermaLink="true">http://direct.ecency.com/hive-169321/@chaintuts/insidious-inputs-three-common-types-of-software-vulnerabilities</guid><category><![CDATA[hive-169321]]></category><dc:creator><![CDATA[chaintuts]]></dc:creator><pubDate>Tue, 07 Jan 2025 13:42:03 GMT</pubDate></item><item><title><![CDATA[Fun Crypto-Crypto Facts - The Cryptography of Cryptocurrencies]]></title><description><![CDATA[Learn about 5 fun #cryptocurrency #cryptography facts with my latest free and open #tutorial. This dives into the applied crypto used in #bitcoin with some interesting facts. Also, this is the 100th video]]></description><link>http://direct.ecency.com/hive-126009/@chaintuts/fun-crypto-crypto-facts-the-cryptography-of-cryptocurrencies</link><guid isPermaLink="true">http://direct.ecency.com/hive-126009/@chaintuts/fun-crypto-crypto-facts-the-cryptography-of-cryptocurrencies</guid><category><![CDATA[hive-126009]]></category><dc:creator><![CDATA[chaintuts]]></dc:creator><pubDate>Sun, 24 Nov 2024 17:42:21 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45e9tGXtYd1xUBRHFXVevJJ2fdghENotsNzzr?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Password Privkey Pummeling Power – The Math and Words of Dictionary Cracking (Multi Code Companion)]]></title><description><![CDATA[Learn about cracking passwords and private keys with my latest free and open license #tutorial. We discuss the math of brute-force, and why dictionary attacks are necessary - all with fun #code examples!]]></description><link>http://direct.ecency.com/hive-169321/@chaintuts/password-privkey-pummeling-power-the-math-and-words-of-dictionary-cracking-multi-code-companion</link><guid isPermaLink="true">http://direct.ecency.com/hive-169321/@chaintuts/password-privkey-pummeling-power-the-math-and-words-of-dictionary-cracking-multi-code-companion</guid><category><![CDATA[hive-169321]]></category><dc:creator><![CDATA[chaintuts]]></dc:creator><pubDate>Sun, 28 Jul 2024 16:32:42 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45eBVMcrXBktZZVgLL3DmfrNumSGbH5spjHZg?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Visualizing Proof-of-Stake Algorithms with Microcontrollers (StakeSim Code Companion)]]></title><description><![CDATA[Learn how Proof-of-Stake consensus works for blockchains like #ethereum with this fun toy algorithm and microcontrollers. This videos dives into POS internals with a simple 8-bit demo written in CircuitPython.]]></description><link>http://direct.ecency.com/hive-126009/@chaintuts/visualizing-proof-of-stake-algorithms-with-microcontrollers-stakesim-code-companion</link><guid isPermaLink="true">http://direct.ecency.com/hive-126009/@chaintuts/visualizing-proof-of-stake-algorithms-with-microcontrollers-stakesim-code-companion</guid><category><![CDATA[hive-126009]]></category><dc:creator><![CDATA[chaintuts]]></dc:creator><pubDate>Tue, 02 Jul 2024 23:01:06 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45ePxenPanNW1mLmRcJCzWUUXuVLAA1gY4sqx?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Crypto Compromise - Data Breaches and Security Scenarios]]></title><description><![CDATA[Learn about how data breaches can affect #cryptocurrency users with my latest free and open license #tutorial. This security tutorial helps you understand data breaches that put your crypto at risk. #learning]]></description><link>http://direct.ecency.com/hive-185702/@chaintuts/crypto-compromise-data-breaches-and-security-scenarios</link><guid isPermaLink="true">http://direct.ecency.com/hive-185702/@chaintuts/crypto-compromise-data-breaches-and-security-scenarios</guid><category><![CDATA[hive-185702]]></category><dc:creator><![CDATA[chaintuts]]></dc:creator><pubDate>Thu, 27 Jun 2024 01:26:21 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45eFXGo5AWvTtkghYbMCTj7L2H6GLx7evD8AJ?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Developing a DIY Bitcoin Offline Address Generator - uBitAddr2 Code Companion]]></title><description><![CDATA[Don't miss my latest #tutorial on a fun code project - developing a revamped DIY #bitcoin offline address generator for Adafruit M4 microcontrollers using pure CircuitPython. Coding and crypto are fun!]]></description><link>http://direct.ecency.com/hive-163521/@chaintuts/developing-a-diy-bitcoin-offline-address-generator-ubitaddr2-code-companion</link><guid isPermaLink="true">http://direct.ecency.com/hive-163521/@chaintuts/developing-a-diy-bitcoin-offline-address-generator-ubitaddr2-code-companion</guid><category><![CDATA[hive-163521]]></category><dc:creator><![CDATA[chaintuts]]></dc:creator><pubDate>Tue, 11 Jun 2024 00:13:12 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45eNq1XdGojMDDkNLhmUwWBUXwaM8cNBHXAo8?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Becoming a Phish Fighter - Training to Spot Phishing Scams]]></title><description><![CDATA[Does this corny, MMA themed thumbnail have your attention? Good! I have a great new tutorial for you on fighting...phishing scams that is! I've got real world examples and great self-defense tactics to]]></description><link>http://direct.ecency.com/hive-126009/@chaintuts/becoming-a-phish-fighter-training-to-spot-phishing-scams</link><guid isPermaLink="true">http://direct.ecency.com/hive-126009/@chaintuts/becoming-a-phish-fighter-training-to-spot-phishing-scams</guid><category><![CDATA[hive-126009]]></category><dc:creator><![CDATA[chaintuts]]></dc:creator><pubDate>Thu, 06 Jun 2024 12:48:48 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45e4HGwgj7J8KmXJnXw2xNCq4PUUgbYqWkyre?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Your Secret Stash: Seed Phrases, Password Managers, and Secret Hygiene]]></title><description><![CDATA[Protect your secret stash! Learn about the security implications of storing your cryptocurrency seed phrase in a password manager, and things to consider when making a decision. #cryptocurrency #security]]></description><link>http://direct.ecency.com/hive-185702/@chaintuts/your-secret-stash-seed-phrases-password-managers-and-secret-hygiene</link><guid isPermaLink="true">http://direct.ecency.com/hive-185702/@chaintuts/your-secret-stash-seed-phrases-password-managers-and-secret-hygiene</guid><category><![CDATA[hive-185702]]></category><dc:creator><![CDATA[chaintuts]]></dc:creator><pubDate>Sun, 07 Apr 2024 17:55:45 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45eBuakjonfbiuqy8Zu35MwZcgcjh7NvSRAGE?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Password Cracking Power – How Passwords Are Stored and Cracked]]></title><description><![CDATA[Ever wonder how attackers crack #passwords from stolen databases? Learn about common password cracking techniques with this free and open licensed #tutorial! You'll learn about hashing, attacks, and password]]></description><link>http://direct.ecency.com/hive-163521/@chaintuts/password-cracking-power-how-passwords-are-stored-and-cracked</link><guid isPermaLink="true">http://direct.ecency.com/hive-163521/@chaintuts/password-cracking-power-how-passwords-are-stored-and-cracked</guid><category><![CDATA[hive-163521]]></category><dc:creator><![CDATA[chaintuts]]></dc:creator><pubDate>Tue, 26 Dec 2023 20:08:36 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45ePZHxdwauNneKR2ynsuBLigdX1YM2NoYgX8?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Seed Scanning Malware Educational Demo: Cryptocurrency Seed Security.]]></title><description><![CDATA[Seed scanning malware demo: why you should never store a cryptocurrency seed phrase in plain text! Learn about security and development with this fun, educational video. #cryptocurrency #security #coding]]></description><link>http://direct.ecency.com/hive-169321/@chaintuts/seed-scanning-malware-educational-demo-cryptocurrency-seed-security</link><guid isPermaLink="true">http://direct.ecency.com/hive-169321/@chaintuts/seed-scanning-malware-educational-demo-cryptocurrency-seed-security</guid><category><![CDATA[hive-169321]]></category><dc:creator><![CDATA[chaintuts]]></dc:creator><pubDate>Sun, 03 Dec 2023 21:33:45 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45eRAZTWGRXCExF6TJ6djQ1ZLdGVqF3gi8Ysp?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Why You Should Never Store Cryptocurrency Seed Phrases in Plain Text]]></title><description><![CDATA[My Python project SeedScanner demonstrates why you should never store a seed phrase in plain text (unencrypted). It's trivial to scan files and pull out seed phrases with some code. Obviously, do not use]]></description><link>http://direct.ecency.com/hive-163521/@chaintuts/why-you-should-never-store-cryptocurrency-seed-phrases-in-plain-text</link><guid isPermaLink="true">http://direct.ecency.com/hive-163521/@chaintuts/why-you-should-never-store-cryptocurrency-seed-phrases-in-plain-text</guid><category><![CDATA[hive-163521]]></category><dc:creator><![CDATA[chaintuts]]></dc:creator><pubDate>Wed, 29 Nov 2023 19:02:45 GMT</pubDate><enclosure url="https://images.ecency.com/p/6VvuHGsoU2QCK6yq1XKF2z9F8sayRpwConx4qLB6hMhcZfBB4sTgnjQ2W8ctR6f4rsPZAzvrp2GLs8cBrEKnmdFHWQzjXh1rpVhu1NuWitJ8Xnv3174DgQatV5Vjux?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[File Verification - Hashes and Signatures]]></title><description><![CDATA[Learn about software hash & signature verification (integrity & authentication) with this free and CC-licensed video. This dives into how software sharing can be secured. #cybersecurity #cryptography]]></description><link>http://direct.ecency.com/hive-169321/@chaintuts/file-verification-hashes-and-signatures</link><guid isPermaLink="true">http://direct.ecency.com/hive-169321/@chaintuts/file-verification-hashes-and-signatures</guid><category><![CDATA[hive-169321]]></category><dc:creator><![CDATA[chaintuts]]></dc:creator><pubDate>Sat, 20 May 2023 22:12:09 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45eH6pASGyK5YVp8rvhVS1k4XTyoTyTd36vvA?format=match&amp;mode=fit" length="0" type="false"/></item></channel></rss>