<?xml version="1.0" encoding="utf-8" standalone="yes"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml"><url><loc>https://vshuraeff.blog/docs/raspberry/</loc><lastmod>2024-09-30T19:20:55+03:00</lastmod></url><url><loc>https://vshuraeff.blog/learn/python/data-structures/lists/</loc><lastmod>2024-09-29T19:57:40+03:00</lastmod></url><url><loc>https://vshuraeff.blog/learn/python/</loc><lastmod>2024-09-29T17:00:56+03:00</lastmod></url><url><loc>https://vshuraeff.blog/crypto/stablecoins/usdc/</loc><lastmod>2024-09-22T10:00:00+03:00</lastmod></url><url><loc>https://vshuraeff.blog/crypto/defi/what-is-defi/</loc><lastmod>2024-09-16T10:00:00+03:00</lastmod></url><url><loc>https://vshuraeff.blog/crypto/</loc><lastmod>2024-09-14T10:00:00+03:00</lastmod></url><url><loc>https://vshuraeff.blog/learn/python/introduction/</loc></url><url><loc>https://vshuraeff.blog/learn/python-for-hackers/</loc><lastmod>2024-10-04T19:43:06+03:00</lastmod></url><url><loc>https://vshuraeff.blog/docs/ide/</loc><lastmod>2024-10-03T14:33:03+03:00</lastmod></url><url><loc>https://vshuraeff.blog/learn/python/data-structures/dict/</loc><lastmod>2024-09-29T19:59:03+03:00</lastmod></url><url><loc>https://vshuraeff.blog/crypto/stablecoins/usdt/</loc><lastmod>2024-09-23T10:00:00+03:00</lastmod></url><url><loc>https://vshuraeff.blog/learn/python/basics/</loc></url><url><loc>https://vshuraeff.blog/crypto/defi/how-defi-works/</loc><lastmod>2025-08-15T00:00:00+00:00</lastmod></url><url><loc>https://vshuraeff.blog/docs/asdf/</loc><lastmod>2024-09-30T19:13:04+03:00</lastmod></url><url><loc>https://vshuraeff.blog/learn/python/data-structures/sets/</loc><lastmod>2024-09-29T19:58:52+03:00</lastmod></url><url><loc>https://vshuraeff.blog/crypto/stablecoins/dai/</loc><lastmod>2024-09-24T10:00:00+03:00</lastmod></url><url><loc>https://vshuraeff.blog/crypto/defi/why-defi-matters/</loc><lastmod>2024-09-18T10:00:00+03:00</lastmod></url><url><loc>https://vshuraeff.blog/learn/python/strings/</loc></url><url><loc>https://vshuraeff.blog/docs/homebrew/</loc><lastmod>2024-10-05T13:29:23+03:00</lastmod></url><url><loc>https://vshuraeff.blog/learn/python/data-structures/tuples/</loc><lastmod>2024-09-29T19:52:22+03:00</lastmod></url><url><loc>https://vshuraeff.blog/crypto/stablecoins/usdp/</loc><lastmod>2024-09-25T10:00:00+03:00</lastmod></url><url><loc>https://vshuraeff.blog/crypto/defi/yield-farming/</loc><lastmod>2024-09-19T10:00:00+03:00</lastmod></url><url><loc>https://vshuraeff.blog/learn/python/conditionals/</loc></url><url><loc>https://vshuraeff.blog/crypto/stablecoins/tusd/</loc><lastmod>2024-09-26T10:00:00+03:00</lastmod></url><url><loc>https://vshuraeff.blog/crypto/defi/risks-and-security/</loc><lastmod>2024-09-20T10:00:00+03:00</lastmod></url><url><loc>https://vshuraeff.blog/learn/python/loops/</loc></url><url><loc>https://vshuraeff.blog/learn/python/functions/</loc><lastmod>2024-09-29T19:53:17+03:00</lastmod></url><url><loc>https://vshuraeff.blog/crypto/stablecoins/frax/</loc><lastmod>2024-09-27T10:00:00+03:00</lastmod></url><url><loc>https://vshuraeff.blog/learn/python/data-structures/</loc><lastmod>2024-10-05T11:22:29+03:00</lastmod></url><url><loc>https://vshuraeff.blog/crypto/stablecoins/busd/</loc><lastmod>2024-09-28T10:00:00+03:00</lastmod></url><url><loc>https://vshuraeff.blog/crypto/stablecoins/gusd/</loc><lastmod>2024-09-29T10:00:00+03:00</lastmod></url><url><loc>https://vshuraeff.blog/crypto/stablecoins/</loc><lastmod>2024-09-21T10:00:00+03:00</lastmod></url><url><loc>https://vshuraeff.blog/learn/python/list-comprehensions/</loc><lastmod>2024-09-30T13:14:11+03:00</lastmod></url><url><loc>https://vshuraeff.blog/learn/python/error-handling/</loc><lastmod>2024-09-30T13:19:17+03:00</lastmod></url><url><loc>https://vshuraeff.blog/learn/python/files/</loc><lastmod>2024-09-30T13:22:29+03:00</lastmod></url><url><loc>https://vshuraeff.blog/learn/python/oop/</loc><lastmod>2024-10-05T01:07:49+03:00</lastmod></url><url><loc>https://vshuraeff.blog/learn/python/oop/inheritance/</loc><lastmod>2024-09-30T13:30:59+03:00</lastmod></url><url><loc>https://vshuraeff.blog/learn/python/oop/polymorphism-and-encapsulation/</loc><lastmod>2024-09-30T13:38:01+03:00</lastmod></url><url><loc>https://vshuraeff.blog/learn/python/dates-and-time/</loc><lastmod>2024-09-30T13:49:20+03:00</lastmod></url><url><loc>https://vshuraeff.blog/learn/python/modules-and-packages/</loc><lastmod>2024-09-30T13:55:09+03:00</lastmod></url><url><loc>https://vshuraeff.blog/learn/python/regex/</loc><lastmod>2024-09-30T14:05:49+03:00</lastmod></url><url><loc>https://vshuraeff.blog/learn/python/numpy/</loc><lastmod>2024-09-30T14:23:05+03:00</lastmod></url><url><loc>https://vshuraeff.blog/crypto/defi/</loc><lastmod>2024-09-15T10:00:00+03:00</lastmod></url><url><loc>https://vshuraeff.blog/learn/python/pandas/</loc><lastmod>2024-09-30T14:29:25+03:00</lastmod></url><url><loc>https://vshuraeff.blog/learn/python/apis-and-web-scraping/</loc><lastmod>2024-09-30T15:50:32+03:00</lastmod></url><url><loc>https://vshuraeff.blog/learn/python/json-xml/</loc><lastmod>2024-09-30T15:59:02+03:00</lastmod></url><url><loc>https://vshuraeff.blog/learn/python/databases/</loc><lastmod>2024-10-05T00:53:01+03:00</lastmod></url><url><loc>https://vshuraeff.blog/learn/python/databases/sqlite/</loc><lastmod>2024-09-30T16:06:39+03:00</lastmod></url><url><loc>https://vshuraeff.blog/learn/python/testing-debugging/</loc><lastmod>2024-09-30T16:11:54+03:00</lastmod></url><url><loc>https://vshuraeff.blog/learn/python/functional-programming/</loc><lastmod>2024-09-30T16:19:31+03:00</lastmod></url><url><loc>https://vshuraeff.blog/learn/python/decorators-generators/</loc><lastmod>2024-09-30T16:23:13+03:00</lastmod></url><url><loc>https://vshuraeff.blog/learn/python/multithreading-multiprocessing/</loc><lastmod>2024-09-30T16:30:14+03:00</lastmod></url><url><loc>https://vshuraeff.blog/learn/python/advanced-topics/</loc><lastmod>2024-09-30T16:34:49+03:00</lastmod></url><url><loc>https://vshuraeff.blog/learn/python/build-deploy-project/</loc><lastmod>2024-09-30T16:37:24+03:00</lastmod></url><url><loc>https://vshuraeff.blog/tags/amm/</loc><lastmod>2025-08-15T00:00:00+00:00</lastmod></url><url><loc>https://vshuraeff.blog/tags/blockchain/</loc><lastmod>2025-08-15T00:00:00+00:00</lastmod></url><url><loc>https://vshuraeff.blog/categories/</loc><lastmod>2025-08-15T00:00:00+00:00</lastmod></url><url><loc>https://vshuraeff.blog/categories/cryptocurrency/</loc><lastmod>2025-08-15T00:00:00+00:00</lastmod></url><url><loc>https://vshuraeff.blog/categories/defi/</loc><lastmod>2025-08-15T00:00:00+00:00</lastmod></url><url><loc>https://vshuraeff.blog/tags/defi/</loc><lastmod>2025-08-15T00:00:00+00:00</lastmod></url><url><loc>https://vshuraeff.blog/tags/liquidity/</loc><lastmod>2025-08-15T00:00:00+00:00</lastmod></url><url><loc>https://vshuraeff.blog/tags/smart-contracts/</loc><lastmod>2025-08-15T00:00:00+00:00</lastmod></url><url><loc>https://vshuraeff.blog/tags/</loc><lastmod>2025-08-15T00:00:00+00:00</lastmod></url><url><loc>https://vshuraeff.blog/tags/technical/</loc><lastmod>2025-08-15T00:00:00+00:00</lastmod></url><url><loc>https://vshuraeff.blog/docs/raspberry/where-to-buy-raspberry-pi/</loc><lastmod>2024-10-19T21:32:31+03:00</lastmod></url><url><loc>https://vshuraeff.blog/blog/</loc><lastmod>2024-10-15T03:37:36+03:00</lastmod></url><url><loc>https://vshuraeff.blog/blog/home-fortress-home-network-security-importance/</loc><lastmod>2024-10-15T03:37:36+03:00</lastmod></url><url><loc>https://vshuraeff.blog/categories/index/</loc><lastmod>2024-10-15T03:37:36+03:00</lastmod></url><url><loc>https://vshuraeff.blog/tags/index/</loc><lastmod>2024-10-15T03:37:36+03:00</lastmod></url><url><loc>https://vshuraeff.blog/blog/ethic-of-open-source-software/</loc><lastmod>2024-10-15T03:28:07+03:00</lastmod></url><url><loc>https://vshuraeff.blog/blog/open-hardware/</loc><lastmod>2024-10-15T03:17:27+03:00</lastmod></url><url><loc>https://vshuraeff.blog/blog/hurricanes-in-usa/</loc><lastmod>2024-10-14T02:26:40+03:00</lastmod></url><url><loc>https://vshuraeff.blog/blog/xmr-rise-of-morero/</loc><lastmod>2024-10-14T01:08:38+03:00</lastmod></url><url><loc>https://vshuraeff.blog/blog/blockchain-usecases-beyond-crypto/</loc><lastmod>2024-10-13T01:23:19+03:00</lastmod></url><url><loc>https://vshuraeff.blog/blog/crypto-regulation-worldwide/</loc><lastmod>2024-10-12T01:45:02+03:00</lastmod></url><url><loc>https://vshuraeff.blog/blog/crypto-wallet-security-guide/</loc><lastmod>2024-10-11T02:00:56+03:00</lastmod></url><url><loc>https://vshuraeff.blog/blog/crypto-taxation-essentials/</loc><lastmod>2024-10-11T01:25:34+03:00</lastmod></url><url><loc>https://vshuraeff.blog/blog/defi-security-hacks/</loc><lastmod>2024-10-10T01:19:03+03:00</lastmod></url><url><loc>https://vshuraeff.blog/blog/bitcoin-2024-trends/</loc><lastmod>2024-10-09T01:16:10+03:00</lastmod></url><url><loc>https://vshuraeff.blog/blog/meme-tokens-phenomenon/</loc><lastmod>2024-10-08T12:26:48+03:00</lastmod></url><url><loc>https://vshuraeff.blog/tags/AI/</loc><lastmod>2024-10-08T02:32:03+03:00</lastmod></url><url><loc>https://vshuraeff.blog/blog/ai-generated-contend-detection-and-possible-avoid-mitigation-solution/</loc><lastmod>2024-10-08T02:32:03+03:00</lastmod></url><url><loc>https://vshuraeff.blog/tags/Content-Detection/</loc><lastmod>2024-10-08T02:32:03+03:00</lastmod></url><url><loc>https://vshuraeff.blog/tags/Deep-Learning/</loc><lastmod>2024-10-08T02:32:03+03:00</lastmod></url><url><loc>https://vshuraeff.blog/tags/NLP/</loc><lastmod>2024-10-08T02:32:03+03:00</lastmod></url><url><loc>https://vshuraeff.blog/blog/ai-powered-cybersecurity-staying-ahead-of-evolving-threats/</loc><lastmod>2024-10-07T16:10:05+03:00</lastmod></url><url><loc>https://vshuraeff.blog/blog/altcoin-hidden-gems/</loc><lastmod>2024-10-06T01:21:39+03:00</lastmod></url><url><loc>https://vshuraeff.blog/learn/python-for-hackers/cryptography-and-authentication/</loc><lastmod>2024-10-06T00:31:28+03:00</lastmod></url><url><loc>https://vshuraeff.blog/learn/python-for-hackers/social-engineering-and-miscellaneous/</loc><lastmod>2024-10-06T00:31:28+03:00</lastmod></url><url><loc>https://vshuraeff.blog/learn/python-for-hackers/system-exploitation/</loc><lastmod>2024-10-06T00:31:27+03:00</lastmod></url><url><loc>https://vshuraeff.blog/learn/python-for-hackers/web-application-exploitation/</loc><lastmod>2024-10-06T00:31:27+03:00</lastmod></url><url><loc>https://vshuraeff.blog/learn/python-for-hackers/network-exploitation/</loc><lastmod>2024-10-06T00:31:26+03:00</lastmod></url><url><loc>https://vshuraeff.blog/blog/big-data-analytics-actionable-insight/</loc><lastmod>2024-10-05T15:56:15+03:00</lastmod></url><url><loc>https://vshuraeff.blog/learn/python-for-hackers/network-exploitation/python-for-arp-spoofing-attacks/</loc><lastmod>2024-10-05T14:48:48+03:00</lastmod></url><url><loc>https://vshuraeff.blog/learn/python-for-hackers/web-application-exploitation/bypassing-input-validation-with-python/</loc><lastmod>2024-10-05T14:48:47+03:00</lastmod></url><url><loc>https://vshuraeff.blog/learn/python-for-hackers/network-exploitation/python-for-dns-spoofing-attacks/</loc><lastmod>2024-10-05T14:48:47+03:00</lastmod></url><url><loc>https://vshuraeff.blog/learn/python-for-hackers/system-exploitation/exploiting-buffer-overflows-in-c-with-python/</loc><lastmod>2024-10-05T14:48:46+03:00</lastmod></url><url><loc>https://vshuraeff.blog/learn/python-for-hackers/system-exploitation/python-based-usb-exploitation/</loc><lastmod>2024-10-05T14:48:46+03:00</lastmod></url><url><loc>https://vshuraeff.blog/learn/python-for-hackers/social-engineering-and-miscellaneous/automating-cloud-exploits-with-python/</loc><lastmod>2024-10-05T14:48:45+03:00</lastmod></url><url><loc>https://vshuraeff.blog/learn/python-for-hackers/system-exploitation/python-exploits-for-iot-weaknesses/</loc><lastmod>2024-10-05T14:48:45+03:00</lastmod></url><url><loc>https://vshuraeff.blog/learn/python-for-hackers/system-exploitation/python-for-data-exfiltration/</loc><lastmod>2024-10-05T14:48:44+03:00</lastmod></url><url><loc>https://vshuraeff.blog/learn/python-for-hackers/web-application-exploitation/session-hijacking-with-python/</loc><lastmod>2024-10-05T14:48:44+03:00</lastmod></url><url><loc>https://vshuraeff.blog/learn/python-for-hackers/cryptography-and-authentication/password-spraying-attacks-in-python/</loc><lastmod>2024-10-05T14:48:43+03:00</lastmod></url><url><loc>https://vshuraeff.blog/learn/python-for-hackers/network-exploitation/creating-a-rogue-access-point/</loc><lastmod>2024-10-05T14:48:43+03:00</lastmod></url><url><loc>https://vshuraeff.blog/learn/python-for-hackers/web-application-exploitation/breaking-weak-jwt-tokens-with-python/</loc><lastmod>2024-10-05T14:48:42+03:00</lastmod></url><url><loc>https://vshuraeff.blog/learn/python-for-hackers/cryptography-and-authentication/bypassing-two-factor-authentication/</loc><lastmod>2024-10-05T14:48:42+03:00</lastmod></url><url><loc>https://vshuraeff.blog/learn/python-for-hackers/system-exploitation/python-script-for-buffer-overflow-exploits/</loc><lastmod>2024-10-05T14:48:41+03:00</lastmod></url><url><loc>https://vshuraeff.blog/learn/python-for-hackers/system-exploitation/custom-python-rat-for-iot-devices/</loc><lastmod>2024-10-05T14:48:41+03:00</lastmod></url><url><loc>https://vshuraeff.blog/learn/python-for-hackers/system-exploitation/python-based-cryptojacking-scripts/</loc><lastmod>2024-10-05T14:48:40+03:00</lastmod></url><url><loc>https://vshuraeff.blog/learn/python-for-hackers/network-exploitation/abusing-websocket-protocols-with-python/</loc><lastmod>2024-10-05T14:48:40+03:00</lastmod></url><url><loc>https://vshuraeff.blog/learn/python-for-hackers/system-exploitation/detecting-and-exploiting-python-backdoors/</loc><lastmod>2024-10-05T14:48:39+03:00</lastmod></url><url><loc>https://vshuraeff.blog/learn/python-for-hackers/system-exploitation/python-for-dll-injection-attacks/</loc><lastmod>2024-10-05T14:48:39+03:00</lastmod></url><url><loc>https://vshuraeff.blog/learn/python-for-hackers/system-exploitation/memory-forensics-with-python/</loc><lastmod>2024-10-05T14:48:38+03:00</lastmod></url><url><loc>https://vshuraeff.blog/learn/python-for-hackers/system-exploitation/creating-polymorphic-python-malware/</loc><lastmod>2024-10-05T14:48:38+03:00</lastmod></url><url><loc>https://vshuraeff.blog/learn/python-for-hackers/social-engineering-and-miscellaneous/evading-honeypots-with-python-scripts/</loc><lastmod>2024-10-05T14:48:37+03:00</lastmod></url><url><loc>https://vshuraeff.blog/learn/python-for-hackers/network-exploitation/python-and-rfid-exploitation/</loc><lastmod>2024-10-05T14:48:37+03:00</lastmod></url><url><loc>https://vshuraeff.blog/learn/python-for-hackers/cryptography-and-authentication/breaking-hash-functions-with-python/</loc><lastmod>2024-10-05T14:48:36+03:00</lastmod></url><url><loc>https://vshuraeff.blog/learn/python-for-hackers/network-exploitation/scripting-wi-fi-attacks-in-python/</loc><lastmod>2024-10-05T14:48:36+03:00</lastmod></url><url><loc>https://vshuraeff.blog/learn/python-for-hackers/system-exploitation/bypassing-anti-virus-detection/</loc><lastmod>2024-10-05T14:48:35+03:00</lastmod></url><url><loc>https://vshuraeff.blog/learn/python-for-hackers/system-exploitation/command-and-control-with-python/</loc><lastmod>2024-10-05T14:48:35+03:00</lastmod></url><url><loc>https://vshuraeff.blog/learn/python-for-hackers/web-application-exploitation/defeating-captcha-with-python/</loc><lastmod>2024-10-05T14:48:34+03:00</lastmod></url><url><loc>https://vshuraeff.blog/learn/python-for-hackers/network-exploitation/automated-port-scanning-with-python/</loc><lastmod>2024-10-05T14:48:34+03:00</lastmod></url><url><loc>https://vshuraeff.blog/learn/python-for-hackers/web-application-exploitation/custom-python-fuzzers-for-vulnerabilities/</loc><lastmod>2024-10-05T14:48:33+03:00</lastmod></url><url><loc>https://vshuraeff.blog/learn/python-for-hackers/network-exploitation/python-for-man-in-the-middle-attacks/</loc><lastmod>2024-10-05T14:48:33+03:00</lastmod></url><url><loc>https://vshuraeff.blog/learn/python-for-hackers/system-exploitation/creating-python-based-malware/</loc><lastmod>2024-10-05T14:48:32+03:00</lastmod></url><url><loc>https://vshuraeff.blog/learn/python-for-hackers/system-exploitation/reverse-engineering-python-bytecode/</loc><lastmod>2024-10-05T14:48:32+03:00</lastmod></url><url><loc>https://vshuraeff.blog/learn/python-for-hackers/cryptography-and-authentication/bypassing-authentication-mechanisms/</loc><lastmod>2024-10-05T14:48:31+03:00</lastmod></url><url><loc>https://vshuraeff.blog/learn/python-for-hackers/web-application-exploitation/automating-sql-injection-exploits/</loc><lastmod>2024-10-05T14:48:31+03:00</lastmod></url><url><loc>https://vshuraeff.blog/learn/python-for-hackers/cryptography-and-authentication/steganography-hiding-data-in-images/</loc><lastmod>2024-10-05T14:48:30+03:00</lastmod></url><url><loc>https://vshuraeff.blog/learn/python-for-hackers/cryptography-and-authentication/exploiting-weak-encryption-with-python/</loc><lastmod>2024-10-05T14:48:30+03:00</lastmod></url><url><loc>https://vshuraeff.blog/learn/python-for-hackers/system-exploitation/building-python-based-rat/</loc><lastmod>2024-10-05T14:48:29+03:00</lastmod></url><url><loc>https://vshuraeff.blog/learn/python-for-hackers/cryptography-and-authentication/encrypting-and-decrypting-messages/</loc><lastmod>2024-10-05T14:48:28+03:00</lastmod></url><url><loc>https://vshuraeff.blog/learn/python-for-hackers/social-engineering-and-miscellaneous/writing-network-worms-in-python/</loc><lastmod>2024-10-05T14:48:28+03:00</lastmod></url><url><loc>https://vshuraeff.blog/learn/python-for-hackers/web-application-exploitation/web-scraping-for-sensitive-data/</loc><lastmod>2024-10-05T14:48:28+03:00</lastmod></url><url><loc>https://vshuraeff.blog/learn/python-for-hackers/cryptography-and-authentication/crafting-a-brute-force-password-cracker/</loc><lastmod>2024-10-05T14:48:27+03:00</lastmod></url><url><loc>https://vshuraeff.blog/learn/python-for-hackers/social-engineering-and-miscellaneous/automating-social-engineering-attacks/</loc><lastmod>2024-10-05T14:48:27+03:00</lastmod></url><url><loc>https://vshuraeff.blog/learn/python-for-hackers/system-exploitation/creating-a-custom-shell-in-python/</loc><lastmod>2024-10-05T14:48:26+03:00</lastmod></url><url><loc>https://vshuraeff.blog/learn/python-for-hackers/web-application-exploitation/exploiting-apis-with-python/</loc><lastmod>2024-10-05T14:48:26+03:00</lastmod></url><url><loc>https://vshuraeff.blog/learn/python-for-hackers/system-exploitation/building-a-keylogger/</loc><lastmod>2024-10-05T14:48:25+03:00</lastmod></url><url><loc>https://vshuraeff.blog/learn/python-for-hackers/network-exploitation/writing-custom-packet-sniffers/</loc><lastmod>2024-10-05T14:48:25+03:00</lastmod></url><url><loc>https://vshuraeff.blog/learn/python-for-hackers/network-exploitation/bypassing-firewalls-with-http-tunneling/</loc><lastmod>2024-10-05T14:48:24+03:00</lastmod></url><url><loc>https://vshuraeff.blog/learn/python/databases/mysql/</loc><lastmod>2024-10-05T00:58:45+03:00</lastmod></url><url><loc>https://vshuraeff.blog/learn/python/databases/postgres/</loc><lastmod>2024-10-05T00:58:40+03:00</lastmod></url><url><loc>https://vshuraeff.blog/learn/python/databases/mongodb/</loc><lastmod>2024-10-05T00:58:34+03:00</lastmod></url><url><loc>https://vshuraeff.blog/contact/</loc><lastmod>2024-10-04T17:26:44+03:00</lastmod></url><url><loc>https://vshuraeff.blog/terms/</loc><lastmod>2024-10-04T17:16:18+03:00</lastmod></url><url><loc>https://vshuraeff.blog/about/</loc><lastmod>2024-10-04T17:04:09+03:00</lastmod></url><url><loc>https://vshuraeff.blog/blog/green-it-sustainable-practices-in-data-centers-and-cloud-computing/</loc><lastmod>2024-10-04T16:12:11+03:00</lastmod></url><url><loc>https://vshuraeff.blog/docs/raspberry/monetize/honeygain/</loc><lastmod>2024-10-04T13:20:20+03:00</lastmod></url><url><loc>https://vshuraeff.blog/docs/raspberry/monetize/earnapp/</loc><lastmod>2024-10-03T22:17:28+03:00</lastmod></url><url><loc>https://vshuraeff.blog/docs/raspberry/monetize/packetstream/</loc><lastmod>2024-10-03T22:17:13+03:00</lastmod></url><url><loc>https://vshuraeff.blog/docs/raspberry/monetize/iproyal-pawns/</loc><lastmod>2024-10-03T22:17:03+03:00</lastmod></url><url><loc>https://vshuraeff.blog/docs/raspberry/monetize/mysterium/</loc><lastmod>2024-10-03T20:40:55+03:00</lastmod></url><url><loc>https://vshuraeff.blog/docs/raspberry/monetize/</loc><lastmod>2024-10-03T20:36:25+03:00</lastmod></url><url><loc>https://vshuraeff.blog/blog/blockchain-beyond-cryptocurrency-enterprise-applications-and-use-cases/</loc><lastmod>2024-10-03T16:00:56+03:00</lastmod></url><url><loc>https://vshuraeff.blog/blog/5g-edge-computing-revolutionizing-real-time-data-processing/</loc><lastmod>2024-10-03T15:57:36+03:00</lastmod></url><url><loc>https://vshuraeff.blog/docs/raspberry/raspberry-basics/</loc><lastmod>2024-10-03T14:29:51+03:00</lastmod></url><url><loc>https://vshuraeff.blog/blog/cybersecurity-as-a-business-critical-function/</loc><lastmod>2024-10-02T12:19:50+03:00</lastmod></url><url><loc>https://vshuraeff.blog/donate/</loc><lastmod>2024-10-01T22:00:06+03:00</lastmod></url><url><loc>https://vshuraeff.blog/privacy/</loc><lastmod>2024-10-01T15:44:27+03:00</lastmod></url><url><loc>https://vshuraeff.blog/blog/internet-of-things-what-you-need-to-know-about-iot/</loc><lastmod>2024-10-01T12:41:11+03:00</lastmod></url><url><loc>https://vshuraeff.blog/blog/the-rise-of-monero/</loc><lastmod>2024-10-01T12:00:44+03:00</lastmod></url><url><loc>https://vshuraeff.blog/blog/the-ethic-of-ai-why-it-professionals-need-to-consider-the-social-impact/</loc><lastmod>2024-10-01T01:43:37+03:00</lastmod></url><url><loc>https://vshuraeff.blog/blog/the-future-of-remote-work/</loc><lastmod>2024-10-01T01:30:19+03:00</lastmod></url><url><loc>https://vshuraeff.blog/blog/10-emerging-rechnologies-that-will-disrupt-the-it-Industry-in-the-next-5-years/</loc><lastmod>2024-09-30T23:16:56+03:00</lastmod></url><url><loc>https://vshuraeff.blog/blog/multi-cloud-strategies-prtimising-performance-and-reducing-vendor-locks/</loc><lastmod>2024-09-30T15:54:33+03:00</lastmod></url><url><loc>https://vshuraeff.blog/docs/ide/vscode/</loc><lastmod>2024-09-30T11:35:41+03:00</lastmod></url><url><loc>https://vshuraeff.blog/docs/ide/pycharm-ce/</loc><lastmod>2024-09-30T11:31:32+03:00</lastmod></url><url><loc>https://vshuraeff.blog/learn/</loc><lastmod>2024-09-29T17:00:56+03:00</lastmod></url><url><loc>https://vshuraeff.blog/docs/</loc><lastmod>2024-09-29T14:47:16+03:00</lastmod></url><url><loc>https://vshuraeff.blog/</loc><lastmod>2024-09-29T14:47:00+03:00</lastmod></url><url><loc>https://vshuraeff.blog/tags/fdic-insured/</loc><lastmod>2024-09-29T10:00:00+03:00</lastmod></url><url><loc>https://vshuraeff.blog/tags/fiat-backed/</loc><lastmod>2024-09-29T10:00:00+03:00</lastmod></url><url><loc>https://vshuraeff.blog/tags/gemini/</loc><lastmod>2024-09-29T10:00:00+03:00</lastmod></url><url><loc>https://vshuraeff.blog/tags/gemini-dollar/</loc><lastmod>2024-09-29T10:00:00+03:00</lastmod></url><url><loc>https://vshuraeff.blog/tags/gusd/</loc><lastmod>2024-09-29T10:00:00+03:00</lastmod></url><url><loc>https://vshuraeff.blog/tags/stablecoin/</loc><lastmod>2024-09-29T10:00:00+03:00</lastmod></url><url><loc>https://vshuraeff.blog/categories/stablecoins/</loc><lastmod>2024-09-29T10:00:00+03:00</lastmod></url><url><loc>https://vshuraeff.blog/blog/nft-future-opportunities/</loc><lastmod>2024-09-29T01:28:26+03:00</lastmod></url><url><loc>https://vshuraeff.blog/blog/quantum-computing-preparing-for-the-next-computing-revolution/</loc><lastmod>2024-09-28T16:08:12+03:00</lastmod></url><url><loc>https://vshuraeff.blog/tags/binance/</loc><lastmod>2024-09-28T10:00:00+03:00</lastmod></url><url><loc>https://vshuraeff.blog/tags/binance-usd/</loc><lastmod>2024-09-28T10:00:00+03:00</lastmod></url><url><loc>https://vshuraeff.blog/tags/busd/</loc><lastmod>2024-09-28T10:00:00+03:00</lastmod></url><url><loc>https://vshuraeff.blog/tags/paxos/</loc><lastmod>2024-09-28T10:00:00+03:00</lastmod></url><url><loc>https://vshuraeff.blog/tags/regulated/</loc><lastmod>2024-09-28T10:00:00+03:00</lastmod></url><url><loc>https://vshuraeff.blog/blog/rise-of-low-code-no-code-platforms-democratizing-software-development/</loc><lastmod>2024-09-27T16:05:25+03:00</lastmod></url><url><loc>https://vshuraeff.blog/tags/algorithmic-stablecoin/</loc><lastmod>2024-09-27T10:00:00+03:00</lastmod></url><url><loc>https://vshuraeff.blog/tags/fractional/</loc><lastmod>2024-09-27T10:00:00+03:00</lastmod></url><url><loc>https://vshuraeff.blog/tags/frax/</loc><lastmod>2024-09-27T10:00:00+03:00</lastmod></url><url><loc>https://vshuraeff.blog/tags/frax-finance/</loc><lastmod>2024-09-27T10:00:00+03:00</lastmod></url><url><loc>https://vshuraeff.blog/tags/frax-shares/</loc><lastmod>2024-09-27T10:00:00+03:00</lastmod></url><url><loc>https://vshuraeff.blog/tags/fxs/</loc><lastmod>2024-09-27T10:00:00+03:00</lastmod></url><url><loc>https://vshuraeff.blog/blog/securing-internet-of-things-best-practices-for-iot-device-management/</loc><lastmod>2024-09-26T15:52:29+03:00</lastmod></url><url><loc>https://vshuraeff.blog/tags/daily-attestations/</loc><lastmod>2024-09-26T10:00:00+03:00</lastmod></url><url><loc>https://vshuraeff.blog/tags/trueusd/</loc><lastmod>2024-09-26T10:00:00+03:00</lastmod></url><url><loc>https://vshuraeff.blog/tags/trusted-token/</loc><lastmod>2024-09-26T10:00:00+03:00</lastmod></url><url><loc>https://vshuraeff.blog/tags/tusd/</loc><lastmod>2024-09-26T10:00:00+03:00</lastmod></url><url><loc>https://vshuraeff.blog/tags/verifiable/</loc><lastmod>2024-09-26T10:00:00+03:00</lastmod></url><url><loc>https://vshuraeff.blog/tags/institutional/</loc><lastmod>2024-09-25T10:00:00+03:00</lastmod></url><url><loc>https://vshuraeff.blog/tags/pax-dollar/</loc><lastmod>2024-09-25T10:00:00+03:00</lastmod></url><url><loc>https://vshuraeff.blog/tags/usdp/</loc><lastmod>2024-09-25T10:00:00+03:00</lastmod></url><url><loc>https://vshuraeff.blog/blog/stablecoins-importance-in-crypto/</loc><lastmod>2024-09-25T01:54:44+03:00</lastmod></url><url><loc>https://vshuraeff.blog/tags/add/</loc><lastmod>2024-09-24T10:00:00+03:00</lastmod></url><url><loc>https://vshuraeff.blog/tags/cryptobacked/</loc><lastmod>2024-09-24T10:00:00+03:00</lastmod></url><url><loc>https://vshuraeff.blog/tags/dai/</loc><lastmod>2024-09-24T10:00:00+03:00</lastmod></url><url><loc>https://vshuraeff.blog/tags/liquidation/</loc><lastmod>2024-09-24T10:00:00+03:00</lastmod></url><url><loc>https://vshuraeff.blog/tags/makerdao/</loc><lastmod>2024-09-24T10:00:00+03:00</lastmod></url><url><loc>https://vshuraeff.blog/tags/over-collateralized/</loc><lastmod>2024-09-24T10:00:00+03:00</lastmod></url><url><loc>https://vshuraeff.blog/blog/staking-vs-mining/</loc><lastmod>2024-09-24T01:45:02+03:00</lastmod></url><url><loc>https://vshuraeff.blog/tags/tether/</loc><lastmod>2024-09-23T10:00:00+03:00</lastmod></url><url><loc>https://vshuraeff.blog/tags/trading/</loc><lastmod>2024-09-23T10:00:00+03:00</lastmod></url><url><loc>https://vshuraeff.blog/tags/usdt/</loc><lastmod>2024-09-23T10:00:00+03:00</lastmod></url><url><loc>https://vshuraeff.blog/tags/circle/</loc><lastmod>2024-09-22T10:00:00+03:00</lastmod></url><url><loc>https://vshuraeff.blog/tags/coinbase/</loc><lastmod>2024-09-22T10:00:00+03:00</lastmod></url><url><loc>https://vshuraeff.blog/tags/usdc/</loc><lastmod>2024-09-22T10:00:00+03:00</lastmod></url><url><loc>https://vshuraeff.blog/tags/crypto/</loc><lastmod>2024-09-21T10:00:00+03:00</lastmod></url><url><loc>https://vshuraeff.blog/tags/crypto-backed/</loc><lastmod>2024-09-21T10:00:00+03:00</lastmod></url><url><loc>https://vshuraeff.blog/tags/fiat-pegged/</loc><lastmod>2024-09-21T10:00:00+03:00</lastmod></url><url><loc>https://vshuraeff.blog/tags/stablecoins/</loc><lastmod>2024-09-21T10:00:00+03:00</lastmod></url><url><loc>https://vshuraeff.blog/tags/audits/</loc><lastmod>2024-09-20T10:00:00+03:00</lastmod></url><url><loc>https://vshuraeff.blog/tags/risks/</loc><lastmod>2024-09-20T10:00:00+03:00</lastmod></url><url><loc>https://vshuraeff.blog/tags/rug-pulls/</loc><lastmod>2024-09-20T10:00:00+03:00</lastmod></url><url><loc>https://vshuraeff.blog/tags/security/</loc><lastmod>2024-09-20T10:00:00+03:00</lastmod></url><url><loc>https://vshuraeff.blog/tags/apy/</loc><lastmod>2024-09-19T10:00:00+03:00</lastmod></url><url><loc>https://vshuraeff.blog/tags/degen-farming/</loc><lastmod>2024-09-19T10:00:00+03:00</lastmod></url><url><loc>https://vshuraeff.blog/tags/impermanent-loss/</loc><lastmod>2024-09-19T10:00:00+03:00</lastmod></url><url><loc>https://vshuraeff.blog/tags/liquidity-mining/</loc><lastmod>2024-09-19T10:00:00+03:00</lastmod></url><url><loc>https://vshuraeff.blog/tags/yield-farming/</loc><lastmod>2024-09-19T10:00:00+03:00</lastmod></url><url><loc>https://vshuraeff.blog/tags/benefits/</loc><lastmod>2024-09-18T10:00:00+03:00</lastmod></url><url><loc>https://vshuraeff.blog/tags/financial-inclusion/</loc><lastmod>2024-09-18T10:00:00+03:00</lastmod></url><url><loc>https://vshuraeff.blog/tags/innovation/</loc><lastmod>2024-09-18T10:00:00+03:00</lastmod></url><url><loc>https://vshuraeff.blog/tags/decentralized/</loc><lastmod>2024-09-16T10:00:00+03:00</lastmod></url><url><loc>https://vshuraeff.blog/tags/finance/</loc><lastmod>2024-09-16T10:00:00+03:00</lastmod></url></urlset>