<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Tue, 14 Apr 2026 13:11:32 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/@cryptoracle/rss" rel="self" type="application/rss+xml"/><item><title><![CDATA[The reason why I am powering down...]]></title><description><![CDATA[After only 35 days, I decided to power down my account... The reason why I made this choice is simple. I just restarted school and I don't have much time to make good posts anymore... Also, my post aren't]]></description><link>http://direct.ecency.com/introduceyourself/@cryptoracle/the-reason-why-i-am-powering-down</link><guid isPermaLink="true">http://direct.ecency.com/introduceyourself/@cryptoracle/the-reason-why-i-am-powering-down</guid><category><![CDATA[introduceyourself]]></category><dc:creator><![CDATA[cryptoracle]]></dc:creator><pubDate>Tue, 05 Sep 2017 01:05:54 GMT</pubDate><enclosure url="https://images.ecency.com/p/2bP4pJr4wVimqCWjYimXJe2cnCgnL4fvsfEiWSDyD98?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Surveillance State Pt 12]]></title><description><![CDATA[Hacking, Espionage, and Surveillance The subject of this lecture is the surveillance of American citizens by a foreign government through cyber means. In this lecture, you’ll learn about three aspects]]></description><link>http://direct.ecency.com/anarchy/@cryptoracle/surveillance-state-pt-12</link><guid isPermaLink="true">http://direct.ecency.com/anarchy/@cryptoracle/surveillance-state-pt-12</guid><category><![CDATA[anarchy]]></category><dc:creator><![CDATA[cryptoracle]]></dc:creator><pubDate>Fri, 01 Sep 2017 01:24:48 GMT</pubDate><enclosure url="https://images.ecency.com/p/MvwLKy3SfvJwXFKCRMDAFrt961Xgeo6iosPLn2pGE?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Surveillance State Pt 11]]></title><description><![CDATA[Biometrics: Eyes, Fingers, Everything. In a post-9/11 world, we want to link the biographic information we have available to us about risks associated with an individual to a verifiable biometric]]></description><link>http://direct.ecency.com/crypto/@cryptoracle/surveillance-state-pt-11</link><guid isPermaLink="true">http://direct.ecency.com/crypto/@cryptoracle/surveillance-state-pt-11</guid><category><![CDATA[crypto]]></category><dc:creator><![CDATA[cryptoracle]]></dc:creator><pubDate>Wed, 30 Aug 2017 20:00:15 GMT</pubDate><enclosure url="https://images.ecency.com/p/MvwLKy3SfvJwXFKCRMDAFrt961Xgeo6iosPLn2pGE?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Cybersecurity Pt 5]]></title><description><![CDATA[The Problem of Identity on the Network Type the query “WHOIS” into a search engine, and you will see at least a half dozen links offering services that will, in theory, help you identify the people behind]]></description><link>http://direct.ecency.com/technology/@cryptoracle/cybersecurity-pt-5</link><guid isPermaLink="true">http://direct.ecency.com/technology/@cryptoracle/cybersecurity-pt-5</guid><category><![CDATA[technology]]></category><dc:creator><![CDATA[cryptoracle]]></dc:creator><pubDate>Wed, 30 Aug 2017 01:30:51 GMT</pubDate><enclosure url="https://images.ecency.com/p/MvwLKy3SfvJwXFKCRMDAFrt961TC2hyGacjDLMVxr?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Modern Electronics Pt 2]]></title><description><![CDATA[Circuits and Symbols In this article, we’ll look at electronic circuits, that is, interconnections of electronic components. As you recall, in the last article, we looked at a particular electronic component,]]></description><link>http://direct.ecency.com/technology/@cryptoracle/modern-electronics-pt-2</link><guid isPermaLink="true">http://direct.ecency.com/technology/@cryptoracle/modern-electronics-pt-2</guid><category><![CDATA[technology]]></category><dc:creator><![CDATA[cryptoracle]]></dc:creator><pubDate>Mon, 28 Aug 2017 22:38:27 GMT</pubDate><enclosure url="https://images.ecency.com/p/MvwLKy3SfvJwXFKCRMDAFrt961GYkw2RTUaYfYTiW?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Surveillance State Pt 10]]></title><description><![CDATA[Drones, Drones Everywhere. Manufacturers call them unmanned aerial vehicles (UAVs)—or, more grandly, unmanned aircraft systems (UASs)—but the rest of the world calls them drones. As drone applications]]></description><link>http://direct.ecency.com/technology/@cryptoracle/surveillance-state-pt-10</link><guid isPermaLink="true">http://direct.ecency.com/technology/@cryptoracle/surveillance-state-pt-10</guid><category><![CDATA[technology]]></category><dc:creator><![CDATA[cryptoracle]]></dc:creator><pubDate>Mon, 28 Aug 2017 14:34:45 GMT</pubDate><enclosure url="https://images.ecency.com/p/MvwLKy3SfvJwXFKCRMDAFrt961Xgeo6iosPLn2pGE?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Surveillance State Pt 9]]></title><description><![CDATA[Under Observation: The Panopticon Effect. British philosopher Jeremy Bentham proposed erecting a hotel, or a jail, in circular form—with a watchman at the center and the resident guests on the periphery.]]></description><link>http://direct.ecency.com/technology/@cryptoracle/surveillance-state-pt-9</link><guid isPermaLink="true">http://direct.ecency.com/technology/@cryptoracle/surveillance-state-pt-9</guid><category><![CDATA[technology]]></category><dc:creator><![CDATA[cryptoracle]]></dc:creator><pubDate>Mon, 28 Aug 2017 00:49:57 GMT</pubDate><enclosure url="https://images.ecency.com/p/MvwLKy3SfvJwXFKCRMDAFrt961Xgeo6iosPLn2pGE?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[MAYWEATHER WON!]]></title><description><![CDATA[for those who didn't see the fight, mayweather won. by T.K.O. In my opinion, Mcgregor did well but lacked the endurance that a boxing match requires. Mayweather knew this fact and waited till his opponent]]></description><link>http://direct.ecency.com/mayweather/@cryptoracle/mayweather-won</link><guid isPermaLink="true">http://direct.ecency.com/mayweather/@cryptoracle/mayweather-won</guid><category><![CDATA[mayweather]]></category><dc:creator><![CDATA[cryptoracle]]></dc:creator><pubDate>Sun, 27 Aug 2017 04:56:48 GMT</pubDate><enclosure url="https://images.ecency.com/p/MvwLKy3SfvJwXFKCRMDAFrt961WAWah21bV1GpY8n?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Modern Electronics Pt 1]]></title><description><![CDATA[Electricity and Electronics The most obvious reason for learning about modern electronics is that electronic devices are ubiquitous in our world. Consider some of the things you use that are electronic:]]></description><link>http://direct.ecency.com/technology/@cryptoracle/modern-electronics-pt-1</link><guid isPermaLink="true">http://direct.ecency.com/technology/@cryptoracle/modern-electronics-pt-1</guid><category><![CDATA[technology]]></category><dc:creator><![CDATA[cryptoracle]]></dc:creator><pubDate>Sun, 27 Aug 2017 01:00:54 GMT</pubDate><enclosure url="https://images.ecency.com/p/MvwLKy3SfvJwXFKCRMDAFrt961GYkw2RTUaYfYTiW?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Surveillance State Pt 8]]></title><description><![CDATA[Some Problems with Privacy Our current privacy rules are simply not up to the task of anticipating and accommodating every demand for interpretation and application presented to them in the privacy debate.]]></description><link>http://direct.ecency.com/anarchy/@cryptoracle/surveillance-state-pt-8</link><guid isPermaLink="true">http://direct.ecency.com/anarchy/@cryptoracle/surveillance-state-pt-8</guid><category><![CDATA[anarchy]]></category><dc:creator><![CDATA[cryptoracle]]></dc:creator><pubDate>Fri, 25 Aug 2017 21:18:57 GMT</pubDate><enclosure url="https://images.ecency.com/p/MvwLKy3SfvJwXFKCRMDAFrt961Xgeo6iosPLn2pGE?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Cybersecurity Pt 4]]></title><description><![CDATA[Of Viruses, Botnets, and Logic Bombs The first known virus to infect a personal computer was named Brain.A.It was developed by two Pakistani brothers and was initially detected in January 1986. The virus]]></description><link>http://direct.ecency.com/anarchy/@cryptoracle/cybersecurity-pt-4</link><guid isPermaLink="true">http://direct.ecency.com/anarchy/@cryptoracle/cybersecurity-pt-4</guid><category><![CDATA[anarchy]]></category><dc:creator><![CDATA[cryptoracle]]></dc:creator><pubDate>Thu, 24 Aug 2017 23:39:42 GMT</pubDate><enclosure url="https://images.ecency.com/p/MvwLKy3SfvJwXFKCRMDAFrt961TC2hyGacjDLMVxr?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Surveillance State Pt 7]]></title><description><![CDATA[Big Data’s Shadow Every click you take in cyberspace can be tracked, your cell phone broadcasts your geolocation, and all of your purchases and phone calls are cataloged somewhere. Taken together, this]]></description><link>http://direct.ecency.com/anarchy/@cryptoracle/surveillance-state-pt-7</link><guid isPermaLink="true">http://direct.ecency.com/anarchy/@cryptoracle/surveillance-state-pt-7</guid><category><![CDATA[anarchy]]></category><dc:creator><![CDATA[cryptoracle]]></dc:creator><pubDate>Wed, 23 Aug 2017 22:58:06 GMT</pubDate><enclosure url="https://images.ecency.com/p/MvwLKy3SfvJwXFKCRMDAFrt961Xgeo6iosPLn2pGE?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Cybersecurity Pt 3]]></title><description><![CDATA[The Five Gateways of Internet Vulnerability As we discussed in the last lecture, the logical structure of cyberspace is a web-like one that is both a virtue and a vice. It’s a virtue because it allows]]></description><link>http://direct.ecency.com/anarchy/@cryptoracle/cybersecurity-pt-3</link><guid isPermaLink="true">http://direct.ecency.com/anarchy/@cryptoracle/cybersecurity-pt-3</guid><category><![CDATA[anarchy]]></category><dc:creator><![CDATA[cryptoracle]]></dc:creator><pubDate>Wed, 23 Aug 2017 00:40:57 GMT</pubDate><enclosure url="https://images.ecency.com/p/MvwLKy3SfvJwXFKCRMDAFrt961TC2hyGacjDLMVxr?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Surveillance State Pt 6]]></title><description><![CDATA[The U.S. Spy Network in Action. The big intelligence organizations that you are probably familiar with— the CIA and the NSA—are only two of at least 17 standalone offices of what we call the Intelligence]]></description><link>http://direct.ecency.com/anarchy/@cryptoracle/surveillance-state-pt-6</link><guid isPermaLink="true">http://direct.ecency.com/anarchy/@cryptoracle/surveillance-state-pt-6</guid><category><![CDATA[anarchy]]></category><dc:creator><![CDATA[cryptoracle]]></dc:creator><pubDate>Tue, 22 Aug 2017 18:09:48 GMT</pubDate><enclosure url="https://images.ecency.com/p/MvwLKy3SfvJwXFKCRMDAFrt961Xgeo6iosPLn2pGE?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Cybersecurity Pt2]]></title><description><![CDATA[Every minute of every day, roughly 3 million Google searches are performed. In the same minute, 12 websites are hacked. The scope of the Internet is immense, and we can’t truly understand cyber]]></description><link>http://direct.ecency.com/anarchy/@cryptoracle/cybersecurity-pt2</link><guid isPermaLink="true">http://direct.ecency.com/anarchy/@cryptoracle/cybersecurity-pt2</guid><category><![CDATA[anarchy]]></category><dc:creator><![CDATA[cryptoracle]]></dc:creator><pubDate>Tue, 22 Aug 2017 00:16:57 GMT</pubDate><enclosure url="https://images.ecency.com/p/MvwLKy3SfvJwXFKCRMDAFrt961TC2hyGacjDLMVxr?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Surveillance State Pt 5]]></title><description><![CDATA[Failing to Connect the Dots on 9/11. In October 1978, President Jimmy Carter signed into law Foreign Intelligence Surveillance Act legislation that established a new framework for American policy, mandating]]></description><link>http://direct.ecency.com/anarchy/@cryptoracle/surveillance-state-pt-5</link><guid isPermaLink="true">http://direct.ecency.com/anarchy/@cryptoracle/surveillance-state-pt-5</guid><category><![CDATA[anarchy]]></category><dc:creator><![CDATA[cryptoracle]]></dc:creator><pubDate>Sun, 20 Aug 2017 23:37:15 GMT</pubDate><enclosure url="https://images.ecency.com/p/MvwLKy3SfvJwXFKCRMDAFrt961Xgeo6iosPLn2pGE?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Wall street's biggest bear says bitcoin will hit $6000 by mid 2018]]></title><description><![CDATA[Thomas J. Lee, one of the most bearish stock strategists on Wall Street, is feeling a lot more optimistic about the prospects for bitcoin. The cryptocurrency could reach $6,000 by the middle of 2018, according]]></description><link>http://direct.ecency.com/btc/@cryptoracle/wall-street-s-biggest-bear-says-bitcoin-will-hit-usd6000-by-mid-2018</link><guid isPermaLink="true">http://direct.ecency.com/btc/@cryptoracle/wall-street-s-biggest-bear-says-bitcoin-will-hit-usd6000-by-mid-2018</guid><category><![CDATA[btc]]></category><dc:creator><![CDATA[cryptoracle]]></dc:creator><pubDate>Sat, 19 Aug 2017 13:23:54 GMT</pubDate><enclosure url="https://images.ecency.com/p/MvwLKy3SfvJwXFKCRMDAFrt961YtiDNAZxHVi71gJ?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Bitcoin Cash is going crazy! passed $700 mark yesterday and is now at more than $800 !]]></title><description><![CDATA[The price of the digital currency Bitcoin Cash sustained its upward trajectory and surpassed the $700 mark on Aug. 18. Heading into the weekend trading sessions, the cryptocurrency posted a more than twofold]]></description><link>http://direct.ecency.com/bitcoin/@cryptoracle/bitcoin-cash-is-going-crazy-passed-usd700-mark-yesterday-and-is-now-at-more-than-usd800</link><guid isPermaLink="true">http://direct.ecency.com/bitcoin/@cryptoracle/bitcoin-cash-is-going-crazy-passed-usd700-mark-yesterday-and-is-now-at-more-than-usd800</guid><category><![CDATA[bitcoin]]></category><dc:creator><![CDATA[cryptoracle]]></dc:creator><pubDate>Sat, 19 Aug 2017 12:50:21 GMT</pubDate><enclosure url="https://images.ecency.com/p/MvwLKy3SfvJwXFKCRMDAFrt961NEKbZN21uQmQZmx?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[ICO, explained and more info!]]></title><description><![CDATA[An ICO is a recently emerged concept of crowdfunding projects in the cryptocurrency and Blockchain industries. 1. What is an ICO? ICO stands for Initial Coin Offering. It’s an event, sometimes referred]]></description><link>http://direct.ecency.com/cryptocurrency/@cryptoracle/ico-explained</link><guid isPermaLink="true">http://direct.ecency.com/cryptocurrency/@cryptoracle/ico-explained</guid><category><![CDATA[cryptocurrency]]></category><dc:creator><![CDATA[cryptoracle]]></dc:creator><pubDate>Sat, 19 Aug 2017 03:15:06 GMT</pubDate><enclosure url="https://images.ecency.com/p/MvwLKy3SfvJwXFKCRMDAFrt961KHR6ABt8dAm9XTk?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[My dream of going to steemfest!]]></title><description><![CDATA[It's only been 17 days since I created my Steemit account but I am already eating, living and breathing Steemit. I really want to go to steemfest 2 and right now, my money is all tied up in steem power..]]></description><link>http://direct.ecency.com/steemfest/@cryptoracle/my-dream-of-going-to-steem-fest</link><guid isPermaLink="true">http://direct.ecency.com/steemfest/@cryptoracle/my-dream-of-going-to-steem-fest</guid><category><![CDATA[steemfest]]></category><dc:creator><![CDATA[cryptoracle]]></dc:creator><pubDate>Fri, 18 Aug 2017 21:48:15 GMT</pubDate><enclosure url="https://images.ecency.com/p/MvwLKy3SfvJwXFKCRMDAFrt961JkoBUXu683TVczJ?format=match&amp;mode=fit" length="0" type="false"/></item></channel></rss>