Amrithshagaramrithshagar.hashnode.dev·Nov 28, 2023We all are whores in the internet's POVThe internet never cared about us. We are the ones solely dependent on it, surrendering the morsels of our lives to its algorithms, entrusting our secrets to its dark network, and unwittingly becoming the protagonists in a narrative we didn't quite s...Discuss·10 likesBeginner Developers
Bablu Kumarhacback17.hashnode.dev·Mar 5, 2023CapCut Users Beware: Cybercriminals Using Malicious Software Distribution TacticsNot too long ago, a friend of mine who works in the cybersecurity field decided to make videos to educate the public on the importance of cyber awareness. To do this, he needed a reliable video editing tool that could help him create engaging content...Discuss·106 readsOSINT
MetaversityOneforDeveloper DAO Blog | Web3 Tutorialsblog.developerdao.com·Jul 13, 2022Security in Crypto, Hardware Wallets and Pseudonymity - Part 4This article is a primer on all things security regarding holding, transacting, and safeguarding cryptocurrencies and NFTs. I didn't mean it to be a complete compendium, but it gives you all the necessary information to start. I divided this primer i...Discuss·155 readsSecurity in CryptoCryptocurrency