steemitboard (66)in #blockchain • 5 years agoRE: What happend with the decentralized dream in 2017?Congratulations @disofdis! You received a personal award! Birthday! - You are on the Steem blockchain for 3…cryptohazard (63)in #blockchain • 7 years agoRE: What happend with the decentralized dream in 2017?The dream is not lost. I am here for much more than the money and the meme.danielmbutler (44)in #howto • 7 years agoRE: Fun with powershell. Show the current coin price with a single command.gotta love powershell , one of the most important tools that i use every day.mikondrashov (25)in #howto • 7 years agoRE: Fun with powershell. Show the current coin price with a single command.Pretty useful, thank you. I might use this codesteemitboard (66)in #hacking • 7 years agoRE: Dual Core - 0x0A Hack Commandments song on youtubeCongratulations @disofdis! You have completed some achievement on Steemit and have been rewarded with new badge(s) :…tkronsbein (52)in #privacy • 7 years agoRE: Biometric data as backdoor? Some thinking.That is a super good article. I wrote a paper about identity management a few weeks back and I will publish the…maxtill94 (0)(1)in #cryptocurrency • 7 years agoRE: History of cryptocoins, Gamble. - My story - Episode #10 - CasinoCoinNEVERDIE ICO is LIVE. The first block chain based Virtual Reality gaming crypto! NEVERDIE coin will allow monetizing…sysinit (37)in #security • 7 years agoRE: Great TED talk about hacking as the internet's immune systemRIP Barnaby Jack you are missedmatrixdweller (-16)(1)in #security • 7 years agoRE: Great TED talk about hacking as the internet's immune systemdodecahydra (47)in #privacy • 8 years agoRE: Windows DRM can be used to detect the real IP of Tor users.As long as you never open any files while actively connected to the internet, your ip should not have any way of being…j3dy (60)in #privacy • 8 years agoRE: There you. Privacy really is just a word. Feds spied on connected cars for 15 yearswell what would you expect any venue that could be exploited will, the sad part is that they are "securing" their own…j3dy (60)in #privacy • 8 years agoRE: Windows DRM can be used to detect the real IP of Tor users.yeah should work , still I did watch some defcon conferences , kind of fun , but serious. I'm a bit skeptical of the…cryptohazard (63)in #privacy • 8 years agoRE: Windows DRM can be used to detect the real IP of Tor users.Who knows, next time they will say your usb key or pc leaked your hardware configuration. loool. But seriously it is…cryptohazard (63)in #privacy • 8 years agoRE: Windows DRM can be used to detect the real IP of Tor users.oh boy!!! I feel like at some you will need to use a new computer everytime you want to use tor!steevc (73)in #privacy • 8 years agoRE: Windows DRM can be used to detect the real IP of Tor users.If you want to stay really anonymous you have to be very careful. I've not used Tor, but I hear it's not 100%…coldmonkey (64)in #privacy • 8 years agoRE: Windows DRM can be used to detect the real IP of Tor users.Thanks for posting such an interesting article. Good, information and thought worthy.steved (63)in #bug • 8 years agoRE: Crash Anyone's iPhone Or iPad With A Simple Emoji Text MessageGood post...damn bugsnoisy (67)in #documentary • 8 years agoRE: The dot com bubble explained. Lessons to learn?As they said: withing 2 years, 5 trillion dollars in market value of technology companies was erased. Whole…okkiedot (62)in #security • 8 years agoRE: Trump's cybersecurity advisor seems to have some security issues.Serious topic. But I just have to ask what is with his mouth? Did he forget to put the lower fake teeth in his mouth that morning? *shudderprufarchy (68)in #docu • 8 years agoRE: The start of Firefox and end of NetscapeI remember using Netscape navigator!