<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Thu, 16 Apr 2026 22:58:13 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/@fqdd7l32brrw/rss" rel="self" type="application/rss+xml"/><item><title><![CDATA[#425 Friends in Need, The Final Solution, and the war against the Mustache]]></title><description><![CDATA[Streamed live on Jan 22, 2019 by Owen Benjamin on YouTube. Regarding Eric Nimmer's false military service record. Eric Nimmer has claimed he served in the US Marine Corps, completed four tours of duty]]></description><link>http://direct.ecency.com/dtube/@fqdd7l32brrw/t8vekbm4</link><guid isPermaLink="true">http://direct.ecency.com/dtube/@fqdd7l32brrw/t8vekbm4</guid><category><![CDATA[dtube]]></category><dc:creator><![CDATA[fqdd7l32brrw]]></dc:creator><pubDate>Fri, 25 Jan 2019 19:44:00 GMT</pubDate><enclosure url="https://images.ecency.com/p/46aP2QbqUqBqwzwxM6L1P6uLNceBDDCM7uBpEgecG9fpWYSd2RhdvjdMLWLeT7USFUrMUtSgw8Xi7NuQRJ1nwe5cNw3F?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[FaceBook is Melting Down over WhatsApp and Election Interference | Encryption and Freedom of Speech]]></title><description><![CDATA[The FaceBook War Room Has No Control Over WhatsApp Although FaceBook has a "War Room" dedicated to prevent "election interference," another FaceBook property, WhatsApp, which many don't]]></description><link>http://direct.ecency.com/news/@fqdd7l32brrw/facebook-is-melting-down-over-whatsapp-and-election-interference-or-encryption-and-freedom-of-speech</link><guid isPermaLink="true">http://direct.ecency.com/news/@fqdd7l32brrw/facebook-is-melting-down-over-whatsapp-and-election-interference-or-encryption-and-freedom-of-speech</guid><category><![CDATA[news]]></category><dc:creator><![CDATA[fqdd7l32brrw]]></dc:creator><pubDate>Sat, 20 Oct 2018 19:01:48 GMT</pubDate><enclosure url="https://images.ecency.com/p/54TLbcUcnRm3sWQK3HKkuAMedF1JSX7yKgEqYjnyTKPwrcPu3wShqc7pEccvgvMGqpCQJfGRsFb91Dvj54gqzs1d6bi1dnZVSEGDKUwaqVCg8BoGZoK2bhNjiwV7N9C8ac9ahvCpn?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[D E E P H O U S E | Morning Mix]]></title><description><![CDATA[deep house live mixing My live stream is at DLive]]></description><link>http://direct.ecency.com/dlive/@fqdd7l32brrw/05011307-a2ee-11e8-b2c2-0242ac110003</link><guid isPermaLink="true">http://direct.ecency.com/dlive/@fqdd7l32brrw/05011307-a2ee-11e8-b2c2-0242ac110003</guid><category><![CDATA[dlive]]></category><dc:creator><![CDATA[fqdd7l32brrw]]></dc:creator><pubDate>Sat, 18 Aug 2018 13:53:00 GMT</pubDate><enclosure url="https://images.ecency.com/p/KWcVEiwEzuiCuSt3rCYguvZ98x2mj34d8tUDE2enkdu5DLJa1iuqp8fxgfyLLMUkowwHzPirNAuZT3ywLm?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Morning House]]></title><description><![CDATA[Deep House Mixing My live stream is at DLive]]></description><link>http://direct.ecency.com/dlive/@fqdd7l32brrw/a21bda9d-970e-11e8-8ece-0242ac110003</link><guid isPermaLink="true">http://direct.ecency.com/dlive/@fqdd7l32brrw/a21bda9d-970e-11e8-8ece-0242ac110003</guid><category><![CDATA[dlive]]></category><dc:creator><![CDATA[fqdd7l32brrw]]></dc:creator><pubDate>Fri, 03 Aug 2018 11:16:15 GMT</pubDate><enclosure url="https://images.ecency.com/p/KWcVEiwEzuiCuSt3rCYguvZ98x2mj34d9G3Zqd4txHgv84SZUcNeGNq1ccv2XLUWHJdsL29yz6HUeyuQVX?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[#QAnon Twitter Networks | Data Decoding]]></title><description><![CDATA[Was bringing #QAnon to Twitter a good plan? Let's see what the Twitter API shows. My live stream is at DLive]]></description><link>http://direct.ecency.com/dlive/@fqdd7l32brrw/dfcf9efb-91ae-11e8-976f-0242ac110003</link><guid isPermaLink="true">http://direct.ecency.com/dlive/@fqdd7l32brrw/dfcf9efb-91ae-11e8-976f-0242ac110003</guid><category><![CDATA[dlive]]></category><dc:creator><![CDATA[fqdd7l32brrw]]></dc:creator><pubDate>Fri, 27 Jul 2018 15:08:12 GMT</pubDate><enclosure url="https://images.ecency.com/p/KWcVEiwEzuiCuSt3rCYguvZ98x2mj34d9HTPTnwwRkiU64hmYmf4bp3AWicMJqVNwqUDLF4PkSSqsPw5PP?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Operational Rules | The Rules Part 6 (Final)]]></title><description><![CDATA[The Rules for Secure Operations These are not mine, this is a compilation of knowledge over years of experience and study. Mistakes have been made and sometimes we learn the hard way. I am attempting to]]></description><link>http://direct.ecency.com/technology/@fqdd7l32brrw/operational-rules-or-the-rules-part-6-final</link><guid isPermaLink="true">http://direct.ecency.com/technology/@fqdd7l32brrw/operational-rules-or-the-rules-part-6-final</guid><category><![CDATA[technology]]></category><dc:creator><![CDATA[fqdd7l32brrw]]></dc:creator><pubDate>Thu, 26 Jul 2018 17:24:33 GMT</pubDate><enclosure url="https://images.ecency.com/p/cyxkEVqiiLy2ofdgrJNxeZC3WCHPBwR7MjUDzY4kBNr81Mm4TNoJLsbykXg22fjLcsW8TxeRj8ujWKJsi7a22Y81FZjwWP7RosGjXJyExxgyawja5tjWPV15HhnPzgg52aS?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Operational Rules | The Rules Part 5]]></title><description><![CDATA[The Rules for Secure Operations These are not mine, this is a compilation of knowledge over years of experience and study. Mistakes have been made and sometimes we learn the hard way. I am attempting to]]></description><link>http://direct.ecency.com/technology/@fqdd7l32brrw/operational-rules-or-the-rules-part-5</link><guid isPermaLink="true">http://direct.ecency.com/technology/@fqdd7l32brrw/operational-rules-or-the-rules-part-5</guid><category><![CDATA[technology]]></category><dc:creator><![CDATA[fqdd7l32brrw]]></dc:creator><pubDate>Fri, 20 Jul 2018 13:25:24 GMT</pubDate><enclosure url="https://images.ecency.com/p/cyxkEVqiiLy2ofdgrJNxeZC3WCHPBwR7MjUDzY4kBNr81Qu1pg37nw5kMgqRFvpspnqf2cRVkQyEw7DdzNGdsSvH8oAft97PyDH8x48xsSjwrGc28Tdd2uzP2XsNqcUTPPt?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Secure Browsing with Chrome]]></title><description><![CDATA[Demo of how setup Chrome for safe and secure browsing My live stream is at DLive]]></description><link>http://direct.ecency.com/dlive/@fqdd7l32brrw/b662ee1e-844e-11e8-9f67-0242ac110002</link><guid isPermaLink="true">http://direct.ecency.com/dlive/@fqdd7l32brrw/b662ee1e-844e-11e8-9f67-0242ac110002</guid><category><![CDATA[dlive]]></category><dc:creator><![CDATA[fqdd7l32brrw]]></dc:creator><pubDate>Tue, 10 Jul 2018 14:37:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/KWcVEiwEzuiCuSt3rCYguvZ98x2mj34d9GVWYgHcV5PTQBqx42QxcR4kA52sRGjXkYp5iMhrDiHjFEESaV?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Operational Rules | The Rules Part 4]]></title><description><![CDATA[The Rules for Secure Operations These are not mine, this is a compilation of knowledge over years of experience and study. Mistakes have been made and sometimes we learn the hard way. I am attempting to]]></description><link>http://direct.ecency.com/technology/@fqdd7l32brrw/operational-rules-or-the-rules-part-4</link><guid isPermaLink="true">http://direct.ecency.com/technology/@fqdd7l32brrw/operational-rules-or-the-rules-part-4</guid><category><![CDATA[technology]]></category><dc:creator><![CDATA[fqdd7l32brrw]]></dc:creator><pubDate>Mon, 09 Jul 2018 21:15:33 GMT</pubDate><enclosure url="https://images.ecency.com/p/cyxkEVqiiLy2ofdgrJNxeZC3WCHPBwR7MjUDzY4kBNr81Lgr6zRjPhs53CSP6f1JCUUEoqT3QaFXd4H3SuLWnksS1ynaZMGyQ24q8XhhT8Xm2jLxfLpEHbp7rS8ntLgMYZU?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Operational Rules | The Rules Part 3]]></title><description><![CDATA[The Rules for Secure Operations These are not mine, this is a compilation of knowledge over years of experience and study. Mistakes have been made and sometimes we learn the hard way. I am attempting to]]></description><link>http://direct.ecency.com/technology/@fqdd7l32brrw/operational-rules-or-the-rules-part-3</link><guid isPermaLink="true">http://direct.ecency.com/technology/@fqdd7l32brrw/operational-rules-or-the-rules-part-3</guid><category><![CDATA[technology]]></category><dc:creator><![CDATA[fqdd7l32brrw]]></dc:creator><pubDate>Fri, 06 Jul 2018 11:04:33 GMT</pubDate><enclosure url="https://images.ecency.com/p/cyxkEVqiiLy2ofdgrJNxeZC3WCHPBwR7MjUDzY4kBNr81RfBHfcY4211V7JX5wJLrcctHYFKZ2G1145FP5kSFMXn2DFsCzg98PuJx8GHWEbkyrS8qSTSdEMouPFMAoQG654?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Operational Rules | The Rules Part 2]]></title><description><![CDATA[The Rules for Secure Operations These are not mine, this is a compilation of knowledge over years of experience and study. Mistakes have been made and sometimes we learn the hard way. I am attempting to]]></description><link>http://direct.ecency.com/technology/@fqdd7l32brrw/operational-rules-or-the-rules-part-2</link><guid isPermaLink="true">http://direct.ecency.com/technology/@fqdd7l32brrw/operational-rules-or-the-rules-part-2</guid><category><![CDATA[technology]]></category><dc:creator><![CDATA[fqdd7l32brrw]]></dc:creator><pubDate>Wed, 27 Jun 2018 23:47:36 GMT</pubDate><enclosure url="https://images.ecency.com/p/cyxkEVqiiLy2ofdgrJNxeZC3WCHPBwR7MjUDzY4kBNr81MijLqPKn2JaMFy95UiRHZa6HnvK99PfoWzs9aTfF1gE3W4w54zoceuPCfBLd8tzu64K3UfdTjad8oKMuRmfPLr?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Operational Rules | The Rules Part 1]]></title><description><![CDATA[The Rules for Secure Operations These are not mine, this is a compilation of knowledge over years of experience and study. Mistakes have been made and sometimes we learn the hard way. I am attempting to]]></description><link>http://direct.ecency.com/security/@fqdd7l32brrw/operational-rules-or-the-rules-part-1</link><guid isPermaLink="true">http://direct.ecency.com/security/@fqdd7l32brrw/operational-rules-or-the-rules-part-1</guid><category><![CDATA[security]]></category><dc:creator><![CDATA[fqdd7l32brrw]]></dc:creator><pubDate>Sun, 24 Jun 2018 23:03:21 GMT</pubDate><enclosure url="https://images.ecency.com/p/cyxkEVqiiLy2ofdgrJNxeZC3WCHPBwR7MjUDzY4kBNr81Ly3ZfaY1dmmxX6EyiNRzMFN2jnexrWsHjt3NPY8a8aEyVdHGupbc1imrTfcaax95ZENbpPhLFk41fGpRTmD6rS?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Test Stream]]></title><description><![CDATA[Testing dlive in various modes My live stream is at DLive]]></description><link>http://direct.ecency.com/dlive/@fqdd7l32brrw/e1b8850e-61cd-11e8-95fb-0242ac110002</link><guid isPermaLink="true">http://direct.ecency.com/dlive/@fqdd7l32brrw/e1b8850e-61cd-11e8-95fb-0242ac110002</guid><category><![CDATA[dlive]]></category><dc:creator><![CDATA[fqdd7l32brrw]]></dc:creator><pubDate>Sun, 27 May 2018 16:49:12 GMT</pubDate><enclosure url="https://images.ecency.com/p/23KQwnti57stsyd46TG181DVhYAGQR15TgB1UFyiLKf7143G35Bk8KZEHA7ur6GKZdPXvbaxHEx2BrmVzuaxQMXcDgZu4z4?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Basics of OPESEC | Keep your mouth shut.]]></title><description><![CDATA[The Basics of Operations Security (OPSEC) If you’re happy with your security, so are the bad guys. Operations security (OPSEC) is evaluating the flow of information from the perspective of security. In]]></description><link>http://direct.ecency.com/technology/@fqdd7l32brrw/basics-of-opesec-or-keep-your-mouth-shut</link><guid isPermaLink="true">http://direct.ecency.com/technology/@fqdd7l32brrw/basics-of-opesec-or-keep-your-mouth-shut</guid><category><![CDATA[technology]]></category><dc:creator><![CDATA[fqdd7l32brrw]]></dc:creator><pubDate>Sun, 20 May 2018 21:16:42 GMT</pubDate></item><item><title><![CDATA[Stay Anonymous Using Tor | Correlation DNS and Encryption]]></title><description><![CDATA[Staying Anonymous Using Tor 4 examples of people who have used Tor for illegal activities and how they were caught. Multiple de-anonymization attacks are shown at the end of the video. You can read more]]></description><link>http://direct.ecency.com/technology/@fqdd7l32brrw/stay-anonymous-using-tor-or-correlation-dns-and-encryption</link><guid isPermaLink="true">http://direct.ecency.com/technology/@fqdd7l32brrw/stay-anonymous-using-tor-or-correlation-dns-and-encryption</guid><category><![CDATA[technology]]></category><dc:creator><![CDATA[fqdd7l32brrw]]></dc:creator><pubDate>Sun, 13 May 2018 15:09:27 GMT</pubDate><enclosure url="https://images.ecency.com/p/axopD2eJJx4aTbgP3zRkDZXbH6BDjKUTbvTfJiAWP8ciNUAjGJY6iyPzdbvn?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[BakerAnon QAnon Leak Full Text | QAnon Baker Leaks to Lift The Veil]]></title><description><![CDATA[BakerAnon Leak Email: Full Text This is the full text of the unverified email sent to @lifttheveil411 which he redacted from his post. An archive of that post can be seen here: Hi, I’m writing you to set]]></description><link>http://direct.ecency.com/qanon/@fqdd7l32brrw/bakeranon-qanon-leak-full-text-or-qanon-baker-leaks-to-lift-the-veil</link><guid isPermaLink="true">http://direct.ecency.com/qanon/@fqdd7l32brrw/bakeranon-qanon-leak-full-text-or-qanon-baker-leaks-to-lift-the-veil</guid><category><![CDATA[qanon]]></category><dc:creator><![CDATA[fqdd7l32brrw]]></dc:creator><pubDate>Sat, 12 May 2018 12:50:42 GMT</pubDate></item><item><title><![CDATA[Pushing Limits]]></title><description><![CDATA[► Listen on DSound ► Listen from source (IPFS)]]></description><link>http://direct.ecency.com/dsound/@fqdd7l32brrw/pushing-limits</link><guid isPermaLink="true">http://direct.ecency.com/dsound/@fqdd7l32brrw/pushing-limits</guid><category><![CDATA[dsound]]></category><dc:creator><![CDATA[fqdd7l32brrw]]></dc:creator><pubDate>Sun, 28 Jan 2018 20:26:57 GMT</pubDate><enclosure url="https://images.ecency.com/p/3HaJVw3AYyXBD5Md5tUD9YKkzGo1eoR2RP1hYxRaFr2JTXKxSrHsbMYqdUjexEYm6Cr3GufTgsDiD9QRSeiQR8vyWJcsJLnFcmGrmYj?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Sunday Shout Outs | 2018 Jan 28]]></title><description><![CDATA[Sunday Shout Outs I have been editing a how to video on computer security, but I wanted to get a post up today to share some of the things that I love with my community on Steemit. Twitter Nonsense When]]></description><link>http://direct.ecency.com/community/@fqdd7l32brrw/sunday-shout-outs-or-2018-jan-28</link><guid isPermaLink="true">http://direct.ecency.com/community/@fqdd7l32brrw/sunday-shout-outs-or-2018-jan-28</guid><category><![CDATA[community]]></category><dc:creator><![CDATA[fqdd7l32brrw]]></dc:creator><pubDate>Sun, 28 Jan 2018 20:06:48 GMT</pubDate><enclosure url="https://images.ecency.com/p/6VvuHGsoU2QD2aHbJiivbVZV6nAA4BJrX2xi1YbtxJGeVVp38ejpn2MdkG3fuvPNiMfabhnAtRqQmQfHVhBycEcCqFkCx6syKxXDAegHH3nYTShGmLRaLaqTGmKHMG?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Loosing Her Mind]]></title><description><![CDATA[Drum and base/Jungle track made with loops and synth in Ableton Live. ► Listen on DSound ► Listen from source (IPFS)]]></description><link>http://direct.ecency.com/dsound/@fqdd7l32brrw/loosing-her-mind</link><guid isPermaLink="true">http://direct.ecency.com/dsound/@fqdd7l32brrw/loosing-her-mind</guid><category><![CDATA[dsound]]></category><dc:creator><![CDATA[fqdd7l32brrw]]></dc:creator><pubDate>Sat, 20 Jan 2018 14:37:09 GMT</pubDate><enclosure url="https://images.ecency.com/p/3HaJVw3AYyXB9dvtaVFb1c5wcqCGeZkEQYbAXFaEA2iHF1Cx99yBU1pnDykg2mkie51WUP69UKE4sduUb3zz2eVScpZXK6hZ8JRdD29?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Electronic Frontier Foundation | The leading nonprofit defending digital privacy, free speech, and innovation.]]></title><description><![CDATA[If You Use The Internet, You Should Care About The EFF The Electronic Frontier Foundation (EFF) is the ACLU of the Internet. Since the 90,s the EFF has championed new technologies, resisted government]]></description><link>http://direct.ecency.com/technology/@fqdd7l32brrw/electronic-frontier-foundation-or-the-leading-nonprofit-defending-digital-privacy-free-speech-and-innovation</link><guid isPermaLink="true">http://direct.ecency.com/technology/@fqdd7l32brrw/electronic-frontier-foundation-or-the-leading-nonprofit-defending-digital-privacy-free-speech-and-innovation</guid><category><![CDATA[technology]]></category><dc:creator><![CDATA[fqdd7l32brrw]]></dc:creator><pubDate>Mon, 15 Jan 2018 13:19:51 GMT</pubDate><enclosure url="https://images.ecency.com/p/axopD2eJJx4aTbgP3zRkDZXbH6BDjKUTbvTfK77Zs1FQmFbbCUPvPRbUgg9L?format=match&amp;mode=fit" length="0" type="false"/></item></channel></rss>