I make videos about stuff.
Subscribe | 71K
Son of a Tech Interview
EIP 1559 Changes Ethereum
The Biggest Attack That Could Ruin Crypto Currencies (and how to prevent it)
The Death of Libressl (In Linux)
Did NVIDIA's Latest Drivers Kill Crypto?
How to Mine Monero (XMR) On Linux
Bitcoin is for Fools, Monero Rules!
NVIDIA Cuts GPU Crypto Mining Efficiency in Half
How to Trace Bitcoin Transactions (and avoid yours being traced)
Firefox 86 New Features
Universities Are Getting Destroyed By Ransomware
Attempting to Do Elon Musk's Taxes With SARS Browser.
Linux Kernel 5.11 is Here!!!
Apples M1 Macbooks Get Some New Malware
How "Stable Coins" Work
Search Google From the Command Line With Tuxi
Best Bitcoin Wallets and Why You Should Use Them.
Pop!_OS By System76 Review
Apple, Microsoft and Others Software Gets Hacked Through Dependency Hijacking
Did the FBI Hack into Signal?
The Value of Crypto Explained
How RSA Encryption Works
How Ethereum Works
How to Secure a VPS
The Signal Devs Need Our Help - Signal Proxy Setup
Gemini - An Even Better Internet Protocol
Web Too Bloated For You? Try Gopher!
How AES Encryption Works
Tails OS Review - The Ultimate Privacy Linux Distro
VIM too slow? Try Doing This!
Block Ads and Unwanted Sites Without a Browser Addon
Sudo is a Bloated Insecure Mess (install doas)
Vim vs NeoVim, What's the Difference? Which Should You Use?
How File Compression Works
How to Cook a Great Steak
What are Honeypots, and How to Avoid Them.
How Monero Works (And Why its a Better Currency Than BTC)
IPv6 Addresses Explained
Do This Before Putting Your Files in the Cloud
TOR V3 Onion DDOS fix (experimental patch)
Threema Messenger Basic Overview
Why Computers Screw up Floating Point Math
Temp Emails, When and How to Use Them
Massive DDOS Takes Out All TOR's V3 Onion Addresses
0 Size Files and How Metadata is Stored
The Final Solution for Browsing the Web
Get Fit For Free
Mitigating Signal Messenger
WhatsApp Gets Spookier, and Elon Musk Endorses Signal
Its Time for Linux to Start Conquering the Mobile Device World
How SSH Works
How TCP Connections Work
Why Don't We Run Out of IP Addresses
Anonymously Send Messages With Session
Ring Cameras, Pwnage and Explosions.
Consoom the Internet from the Command Line
Search Engine Review