<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Thu, 09 Apr 2026 17:41:23 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/@rokkex/rss" rel="self" type="application/rss+xml"/><item><title><![CDATA[Binance Hack: Cryptocurrency Forks Explained]]></title><description><![CDATA[What will you choose: accept lost funds or betray your ideals? Binance Hack 2019 Today the crypto world was shaken with dramatic news — Binance hot wallet was hacked losing ~$41 mln.  According]]></description><link>http://direct.ecency.com/hack/@rokkex/binance-hack-cryptocurrency-forks-explained</link><guid isPermaLink="true">http://direct.ecency.com/hack/@rokkex/binance-hack-cryptocurrency-forks-explained</guid><category><![CDATA[hack]]></category><dc:creator><![CDATA[rokkex]]></dc:creator><pubDate>Tue, 04 Jun 2019 07:23:57 GMT</pubDate><enclosure url="https://images.ecency.com/p/8th8uW8KLF3eHoH9cVXk2SSr6eVkAARdFgoTu5NcF2rAG1riGGvmVTPWDMMEMZopQq2yFTFfWnEtcoHSUuQ94dHxNCyejjDiaq3ePoKxfgS9xZcWSmhJZ8LdAscnx6C1d973XVvzMARW6VboWzG5odwKND9bSkCGRQPMHFpVWWhr7hTD6bw9j5KPgi?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Meet ROKKEX Team: Chief Information Security Officer (CISO) Evaldas Usas]]></title><description><![CDATA[Evaldas Usas is a hacker at heart. His passion for breaking hardware and software systems led him to become a valuable professional in the cybersecurity industry. Beginning his career in the government]]></description><link>http://direct.ecency.com/rokkex/@rokkex/meet-rokkex-team-chief-information-security-officer-ciso-evaldas-usas</link><guid isPermaLink="true">http://direct.ecency.com/rokkex/@rokkex/meet-rokkex-team-chief-information-security-officer-ciso-evaldas-usas</guid><category><![CDATA[rokkex]]></category><dc:creator><![CDATA[rokkex]]></dc:creator><pubDate>Fri, 24 May 2019 14:27:15 GMT</pubDate><enclosure url="https://images.ecency.com/p/3zpz8WQe4SNGWd7TzozjPgq3rggennavDx3XPY35pEAVnq2ZcBjjEwDUvEByUQ4LXVJ16Sk3GWS4UZdbJ2Nq7k9H5XrFbDTtnxcpbL9ffNz4nMb9fNYTMv7FYGYvhxU8MgDg9r2z4qL4n4xVH7av?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[8 Ways to be Tricked when Buying Cryptocurrency on P2P Platforms]]></title><description><![CDATA[How can you start HODLing crypto? Well, you may be repairing an old PC found on a dump and find out that there are private keys to 70 BTC or you discover a hard drive with 7500 BTC on it. If these attempts]]></description><link>http://direct.ecency.com/rokkex/@rokkex/8-ways-to-be-tricked-when-buying-cryptocurrency-on-p2p-platforms</link><guid isPermaLink="true">http://direct.ecency.com/rokkex/@rokkex/8-ways-to-be-tricked-when-buying-cryptocurrency-on-p2p-platforms</guid><category><![CDATA[rokkex]]></category><dc:creator><![CDATA[rokkex]]></dc:creator><pubDate>Tue, 21 May 2019 11:49:21 GMT</pubDate><enclosure url="https://images.ecency.com/p/2VZXybTSZJq1AreaDn1D7Jp7ZEvgLC9TvJctofX1ChMgSZxdVs36TNtMH5wDHfoJiD4zG78So89GkaLsbqanWFkK4SNhZhFaANks3Ha9Whtra6nuRWHiSjzE66t1wQ2QKwRmqjTfF6Re7CTcVg8yEgr31G2?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[ROKKEX Demo Version is Live]]></title><description><![CDATA[To make a long story short: ROKKEX CRYPTO EXCHANGE IS LIVE WITH A DEMO VERSION! Check it here You can create a crypto exchange demo account to play with virtual assets opening sell & buy orders]]></description><link>http://direct.ecency.com/cybersecurity/@rokkex/rokkex-demo-version-is-live</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@rokkex/rokkex-demo-version-is-live</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[rokkex]]></dc:creator><pubDate>Wed, 15 May 2019 06:57:39 GMT</pubDate><enclosure url="https://images.ecency.com/p/3zpz8WQe4SNGWd7TzozjPgq3rggennavDx3XPY35pEAVnpyzyhMBqNo9JALLNFepYE9h6yKJme8QSnw5Psy1cZzXrXgHRA8bdxaEBzaGT7WuVBaVGo2x1qk5pLAH4FWmk9vbNKJcfA27juFMAtSi?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Rokkex CEO: Unblock the Barrier between Crypto and Traditional Finance]]></title><description><![CDATA[From a young age, Lukas Krikštaponis had an interest in repairing computers and hacking which led him to a career in technology. Having over 6 years working in IT he has hands-on experience in government,]]></description><link>http://direct.ecency.com/cryptocurrency/@rokkex/rokkex-ceo-unblock-the-barrier-between-crypto-and-traditional-finance</link><guid isPermaLink="true">http://direct.ecency.com/cryptocurrency/@rokkex/rokkex-ceo-unblock-the-barrier-between-crypto-and-traditional-finance</guid><category><![CDATA[cryptocurrency]]></category><dc:creator><![CDATA[rokkex]]></dc:creator><pubDate>Fri, 10 May 2019 09:33:30 GMT</pubDate><enclosure url="https://images.ecency.com/p/gPCasciUWmEwHnsXKML7xF4NE4zxEVyvENsPKp9LmDaFv5hCRMp1UozAG5SUcoqfBaxV5doANZwZ7LG31BDnkvHh26jCvM4MGykLqWWFipXVBwsdwWyfzZ848EaJsV6eGh6mrThR5pWTGWuwVg?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[4 Built-In Encryption Software You Must Know to Protect Data in Case of a Device Loss]]></title><description><![CDATA[The devices of modern people know everything about them. Any doubts? Even our spouses probably cannot recall all the passwords and other account information, but your devices are capable of it, especially]]></description><link>http://direct.ecency.com/security/@rokkex/4-built-in-encryption-software-you-must-know-to-protect-data-in-case-of-a-device-loss</link><guid isPermaLink="true">http://direct.ecency.com/security/@rokkex/4-built-in-encryption-software-you-must-know-to-protect-data-in-case-of-a-device-loss</guid><category><![CDATA[security]]></category><dc:creator><![CDATA[rokkex]]></dc:creator><pubDate>Wed, 24 Apr 2019 14:00:39 GMT</pubDate><enclosure url="https://images.ecency.com/p/7258xSVeJbKkzXhyseBP4PYz11eBDT8sW2oR1a4vfVFS6HYpnpFaLsvJxAti3h2kzCRc6rQTo7SdnXHKb1CspJjXeLdrjZSnpyDjb9pZVpXS2pj8kXogzteQJdCNzsH1uwyRqNYqAXPyY?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Stop Being Cybersecurity’s Weak Link: Self-Cybersecurity Tips]]></title><description><![CDATA[It may sound harsh, but that’s the truth. You, as a human person, remain the weak link when it comes to cybersecurity. It doesn’t really matter what gargantuan cybersecurity measures are taken — one flaw]]></description><link>http://direct.ecency.com/rokkex/@rokkex/stop-being-cybersecurity-s-weak-link-self-cybersecurity-tips</link><guid isPermaLink="true">http://direct.ecency.com/rokkex/@rokkex/stop-being-cybersecurity-s-weak-link-self-cybersecurity-tips</guid><category><![CDATA[rokkex]]></category><dc:creator><![CDATA[rokkex]]></dc:creator><pubDate>Wed, 10 Apr 2019 14:29:36 GMT</pubDate><enclosure url="https://images.ecency.com/p/7258xSVeJbKkzXhyseBP4PYz11eBDT8sW2oR1a4vfVFS6HamTZGSWjcd3RJzHw8s3ph2dSVmxCk4pKsFC8yLEaWBeR2Hg3pVVyXv5DPUBWzxacwAdKUEAPCFhsPXfeapTxFvAzeUurLAi?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Get Rid Of Your Digital Data Securely]]></title><description><![CDATA[You may not care about security breaches anymore (and we still don’t approve of it). However, how would you feel if a stranger took your phone, started to read messages and look at your photos? Not exactly]]></description><link>http://direct.ecency.com/rokkex/@rokkex/get-rid-of-your-digital-data-securely</link><guid isPermaLink="true">http://direct.ecency.com/rokkex/@rokkex/get-rid-of-your-digital-data-securely</guid><category><![CDATA[rokkex]]></category><dc:creator><![CDATA[rokkex]]></dc:creator><pubDate>Fri, 05 Apr 2019 07:52:21 GMT</pubDate><enclosure url="https://images.ecency.com/p/26uUsAjKTsXCBRzTxRJWxpz7qLMdK4Nq6Ha3QAmrmWNLCReTjt2nxZVCSTNWg1RnzeNtogFZ8qUnR71MgPbjvprALqwr2iTHAF51V9ikXebV6ULmLYU9rBwC63RZhHEnyXbCg9ocNtVh3HXJQtPYFKAJi2DihtyLDPKs58?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[How Not to be Tracked: 3 Browser Extensions You Need]]></title><description><![CDATA[Everything we do on the Internet remains on the Internet, but it is less promising than in the case of Vegas. Modern active Internet user just cannot afford to be careless, as the challenge of privacy]]></description><link>http://direct.ecency.com/cybersecurity/@rokkex/how-not-to-be-tracked-3-browser-extensions-you-need</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@rokkex/how-not-to-be-tracked-3-browser-extensions-you-need</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[rokkex]]></dc:creator><pubDate>Wed, 03 Apr 2019 14:27:00 GMT</pubDate><enclosure url="https://images.ecency.com/p/JvFFVmatwWHRfvmtd53nmEJ94xpKydwmbSC5H5svBACH7yE6k6az6mn6LtsBYGToVMNDt8NpfUhtYEiGQzkMynzLFxhJwJSabWR5AGmCcx4c1Lxcx3mvbSJiYyeg8uygeaQ6s6Uhre?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Where to Keep Crypto: Types of Crypto Wallets]]></title><description><![CDATA[Have you heard this story of how someone bought Ledger from an unauthorized reseller, placed $30k bucks in crypto there, and then it melts away? It turned out that the seller replaced the microchip in]]></description><link>http://direct.ecency.com/cryptocurrency/@rokkex/where-to-keep-crypto-types-of-crypto-wallets</link><guid isPermaLink="true">http://direct.ecency.com/cryptocurrency/@rokkex/where-to-keep-crypto-types-of-crypto-wallets</guid><category><![CDATA[cryptocurrency]]></category><dc:creator><![CDATA[rokkex]]></dc:creator><pubDate>Tue, 02 Apr 2019 08:17:42 GMT</pubDate><enclosure url="https://images.ecency.com/p/vM1pGHgNcyCXUWJECrZbvn1NMPj1oFGUo3gYfF3NNPRD9U2raYueCRoA6qS2PzBUS9SVsQNnH1JCxrCKY3fjtn57UHYjvbGzeH1nnozLotSJPaC1vTgCrj8oFBhH2e1mbkJKyUi?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[PoS, PoW, and 12 Other Blockchain Protocols You Didn’t Know About]]></title><description><![CDATA[What is consensus? If broadly defined, a consensus is an agreement that satisfies each of the parties involved. This is the key to democracy and decentralization in general, as well as distributed registry]]></description><link>http://direct.ecency.com/crypto/@rokkex/pos-pow-and-12-other-blockchain-protocols-you-didn-t-know-about</link><guid isPermaLink="true">http://direct.ecency.com/crypto/@rokkex/pos-pow-and-12-other-blockchain-protocols-you-didn-t-know-about</guid><category><![CDATA[crypto]]></category><dc:creator><![CDATA[rokkex]]></dc:creator><pubDate>Mon, 01 Apr 2019 09:26:12 GMT</pubDate><enclosure url="https://images.ecency.com/p/9vWp6aU4y8kwSZ9Gw15LFL3aMdhmgmBBFMpDJregpdP328M4RrLptA27RVGzSG3wfNvpniEQygvMPapmoXtQnBucYY81cqh7MRAXHuqiBNiFRhsAonDb63xucdR5BdNa6zD98TxG9BahpQFtS?format=match&amp;mode=fit" length="0" type="false"/></item></channel></rss>