BlogHide Resteemsplasticdoop (25)in eth • 3 years ago1. CRYPTOCURRENCY (ETHEREUM V2 STAKING POOLS)CRYPTOCURRENCY (ETHEREUM V2 STAKING POOLS) For my first proposal I would recommend investing into the ever growing cryptocurrency market. As the market grows and becomes functional in everyday use…plasticdoop (25)in dustingattacks • 3 years agodeanonymizing attacks – Dusting Attacksdeanonymizing attacks – Dusting Attacks. Privacy and security are getting more and more valuable every day, not only for the ones that have something to hide but for all of us. And those are…plasticdoop (25)in os • 3 years ago..plasticdoop (25)in sha256 • 4 years agoSHA256 - The world’s most popular algorithm.SHA256 - The world’s most popular algorithm. What is the SHA256? The SHA256 algorithm is a one-way deterministic hash function that outputs 256 bits. And what the fuck is that? Let me break it…plasticdoop (25)in gil • 4 years agoeverything you need to know about DEX's, METERIA and GILlets start with the basics: In any transaction a third party entity would normally oversee the security and transfer of assets (e.g. banks) these are centralised exchanges. decentralized…plasticdoop (25)in defi • 4 years agoWhat is DeFi?What is DeFi? Everything you need to know All your questions about decentralized finance (DeFi), answered Stock trading Decentralized Finance or “DeFi” (deef-eye) is a novel financial system…plasticdoop (25)in nft • 4 years agoWhat are NFT's? Well Let Me Explain...WHAT IS AN NFT? WHAT DOES NFT STAND FOR? Non-fungible token. “Non-fungible” more or less means that it’s unique and can’t be replaced with something else. For example, a bitcoin is fungible —…plasticdoop (25)in opsec • 4 years agoWhat is OPSEC?So What Is OPSEC Anyway? Operations security (OPSEC) is a process that identifies critical information to determine if friendly actions can be observed by enemy intelligence, determines if…plasticdoop (25)in pha • 4 years agoPHALA NETWORK (PHA)I have started to build up my portfolio with crypto investments within the polkadot ecosystem. I have stumbled apon PHA. I want to start a discussion about this gem and see if other people have…plasticdoop (25)in parachain • 4 years agoParachainsParachains One parachain A parachain is an application-specific data structure that is globally coherent and validatable by the validators of the Polkadot Relay Chain. Most commonly a…plasticdoop (25)in hacking • 4 years agoGetting started in Cyber Security in 2021- The Complete GuideThis article will be our starting point, I will create tutorial series revolving around this topic and link them in this article in the future, so be sure to bookmark this article and check back…plasticdoop (25)in hacking • 4 years agoSolutions To ISP BarriorsSolutions (12) There are many genuine reasons for which you might want to visit blocked websites at your school or office. Given below are the ways you can use to regain access to the blocked…plasticdoop (25)in cyber • 4 years agoIntroduction To Everything PasswordsWe use passwords every day to authenticate ourselves on user accounts when we shop, bank or use social media online. Passwords are great for software companies due to the fact they're cheap and…plasticdoop (25)in doop • 4 years agosteemCreated with Sketch.cyber kill chain ( cyber security )Cyber Kill Chain: The Cyber Kill Chain is a term originally coined by Lockheed Martin It has since been widely adopted across the cyber industry to describe the steps an attacker may take when…