Josh McIntyre16.57

@chaintuts
Plankton
dollarVote value: 0.00 USD

Software engineer, tech educator, active adventurer.

Pittsburgh, PA
Vote value: 0.00 USD
Active: last month
Software engineer, tech educator, active adventurer.
Pittsburgh, PA
chaintuts.com
Joined: Jul 20, 2020
#Expertise16.57
Active:  last month
Vote value: 0.00 USD
HIVE
HBD

WAIV token

Upvoting mana: 100%
Downvoting mana: 100%
WAIV vote: 0.00 USD

HIVE token

Upvoting mana: 100%
Downvoting mana: 100%
Resource credits: 100%
HIVE vote: 0.00 USD

New to Waivio?

chaintuts

16.57
Hive.Blog

Cracking Missing Crypto Seed Words - Is It Possible?

Can you recover missing crypto seed words? How many words can be missing before recovery becomes impractical — or impossible? Find out wi...

chaintuts

16.57
Hive.Blog

Foot Off The Gas — Crypto Seed Phrase Gas Fee Scams

A tempting target — and a clever scam! Learn about crypto seed phrase gas fee scams with my latest free and open #tutorial! Gain insight ...

chaintuts

16.57
Hive.Blog

Fiendish Photos – Stealing Crypto Seed Phrases with OCR

Stealing crypto seeds from...pictures? Learn about OCR malware with this free and open #tutorial! We cover OCR, regex, a fun educational ...

chaintuts

16.57
Hive.Blog

I Wrote an In-Depth Book on Securing Your Bitcoin — "Digital Sovereignty: Protecting Your Crypto Assets Against Common Threats"

Hey Hive community, I'm Josh McIntyre also known as chaintuts. I've been creating free and open-license educational content about crypto...

chaintuts

16.57
Hive.Blog

New Crypto Asset Security Book - "Digital Sovereignty: Protecting Your Crypto Assets Against Common Threats"

"Knowledge builds confidence, and confident users can stand up to the threats that face them." Friends, I'm tremendously excite...

chaintuts

16.57
Hive.Blog

Bad Bits and Bitcoin – Common Types of Crypto Malware

Learn about common types of #cryptocurrency #malware threats with this free and CC-licensed #tutorial. This dives into address-swapping, ...

chaintuts

16.57
Hive.Blog

Insidious Inputs - Three Types of Common Software Vulnerabilities (Video Version)

Software #vulnerabilities are a big part of security. Learn about path traversal, cross-site scripting, and buffer overflows with this fr...

chaintuts

16.57
Hive.Blog

Insidious Inputs - Three Common Types of Software Vulnerabilities

Curious about how attackers exploit vulnerable software, and how those vulnerabilities work? My latest free and open licensed #tutorial d...

chaintuts

16.57
Hive.Blog

Fun Crypto-Crypto Facts - The Cryptography of Cryptocurrencies

Learn about 5 fun #cryptocurrency #cryptography facts with my latest free and open #tutorial. This dives into the applied crypto used in ...

chaintuts

16.57
Hive.Blog

Password Privkey Pummeling Power – The Math and Words of Dictionary Cracking (Multi Code Companion)

Learn about cracking passwords and private keys with my latest free and open license #tutorial. We discuss the math of brute-force, and w...