<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Dayana Mick</title>
    <description>The latest articles on DEV Community by Dayana Mick (@ayda_ma04a645d96526b).</description>
    <link>https://dev.to/ayda_ma04a645d96526b</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F2668208%2F43b9e6eb-4ac2-458a-9419-4c8485be15e0.png</url>
      <title>DEV Community: Dayana Mick</title>
      <link>https://dev.to/ayda_ma04a645d96526b</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/ayda_ma04a645d96526b"/>
    <language>en</language>
    <item>
      <title>A Medium-Rare Brain Understanding the Essential Tools of Modern Cryptography Part 1</title>
      <dc:creator>Dayana Mick</dc:creator>
      <pubDate>Tue, 07 Oct 2025 17:08:21 +0000</pubDate>
      <link>https://dev.to/ayda_ma04a645d96526b/a-medium-rare-brain-understanding-the-essential-tools-of-modern-cryptography-part-1-2nc8</link>
      <guid>https://dev.to/ayda_ma04a645d96526b/a-medium-rare-brain-understanding-the-essential-tools-of-modern-cryptography-part-1-2nc8</guid>
      <description>&lt;p&gt;I started watching the second session of the Bootcamp with &lt;a href="https://x.com/0xMilica" rel="noopener noreferrer"&gt;0xMilica&lt;/a&gt;, and as she predicted, my mind got partially fried — not completely, but &lt;strong&gt;medium-rare&lt;/strong&gt; — so I had to portion the recording into two parts to be able to follow along.  &lt;/p&gt;

&lt;p&gt;Let me attempt to take you on this journey of 0s and 1s, algorithms, problems, eavesdroppers, and brains frying and melting concurrently.  &lt;/p&gt;




&lt;h3&gt;
  
  
  1. Bitwise Operations
&lt;/h3&gt;

&lt;p&gt;We saw the truth tables for &lt;strong&gt;AND&lt;/strong&gt;, &lt;strong&gt;OR&lt;/strong&gt;, and &lt;strong&gt;XOR&lt;/strong&gt; (which, for me, sounded like a wizard's name 🧙‍♂️).  &lt;/p&gt;

&lt;p&gt;A &lt;em&gt;truth table&lt;/em&gt; is a simple chart that shows how a logical operation behaves for every possible input — listing all possible combinations.&lt;/p&gt;

&lt;p&gt;Let me share them with you:  &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Truth Table for AND&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffal18vm5hk5i3qc1s1a5.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffal18vm5hk5i3qc1s1a5.png" alt=" " width="401" height="473"&gt;&lt;/a&gt;&lt;br&gt;&lt;br&gt;
True only if both bits are 1.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Truth Table for OR&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsq5uibk9n7wflkcj83j8.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsq5uibk9n7wflkcj83j8.png" alt=" " width="436" height="514"&gt;&lt;/a&gt;&lt;br&gt;&lt;br&gt;
True if at least one bit is 1.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Truth Table for XOR&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqza0kl4pitfmhstp0q26.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqza0kl4pitfmhstp0q26.png" alt=" " width="525" height="575"&gt;&lt;/a&gt;&lt;br&gt;&lt;br&gt;
True if the bits are different. It is reversible and used in simple encryption.&lt;/p&gt;

&lt;p&gt;XOR is self-reversible: if you XOR a message with a key to encrypt it, and then XOR the result with the same key again, you get the original message back.&lt;/p&gt;

&lt;p&gt;I understood the part about bitwise operations and truth tables, but after revising my notes, I was confused about their relation to cryptography — although it’s clear that they are some sort of “code,” and that you could encrypt something by turning bits on and off, similar to Morse code.  &lt;/p&gt;

&lt;p&gt;If we encrypt a message bit by bit, we can create a cipher. Let’s say we want to encrypt the message &lt;code&gt;1010&lt;/code&gt; using XOR:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2q6o2p47c5c61j09558q.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2q6o2p47c5c61j09558q.png" alt=" " width="766" height="443"&gt;&lt;/a&gt;  &lt;/p&gt;

&lt;p&gt;Encrypted message: &lt;code&gt;1100&lt;/code&gt;  &lt;/p&gt;

&lt;p&gt;Now, if we XOR the ciphertext again with the same key:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0pcyaqofhi6as1ac76hf.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0pcyaqofhi6as1ac76hf.png" alt=" " width="702" height="485"&gt;&lt;/a&gt;  &lt;/p&gt;

&lt;p&gt;We get back &lt;code&gt;1010&lt;/code&gt;, the original message.  &lt;/p&gt;

&lt;p&gt;This is at the heart of &lt;strong&gt;symmetric encryption&lt;/strong&gt;, and XOR is one primitive — a building block of encryption.&lt;/p&gt;




&lt;h3&gt;
  
  
  2. Hash Functions
&lt;/h3&gt;

&lt;p&gt;After exploring bitwise logic, we then moved on to hash functions.  &lt;/p&gt;

&lt;p&gt;Hash functions take an input of any length and produce an output of a fixed length. This output is called a &lt;em&gt;digest&lt;/em&gt;.  &lt;/p&gt;

&lt;p&gt;As a software developer, I find hash functions fascinating because I see their fingerprints everywhere:  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;In &lt;strong&gt;Docker&lt;/strong&gt;, each image has a hash that uniquely identifies its contents.
&lt;/li&gt;
&lt;li&gt;In &lt;strong&gt;JWTs&lt;/strong&gt;, a hash ensures integrity and trust.
&lt;/li&gt;
&lt;li&gt;In &lt;strong&gt;Git&lt;/strong&gt;, each commit hash represents a precise snapshot of the code.
&lt;/li&gt;
&lt;li&gt;In &lt;strong&gt;CSS&lt;/strong&gt; or build artifacts, hashes in filenames help with cache busting by reflecting the file’s exact content.
&lt;/li&gt;
&lt;li&gt;And of course, &lt;strong&gt;passwords&lt;/strong&gt; should always be stored as hashes.
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Hashes are &lt;strong&gt;deterministic&lt;/strong&gt;: the same input always produces the same output.&lt;br&gt;&lt;br&gt;
They are also &lt;strong&gt;irreversible&lt;/strong&gt;: you shouldn’t be able to recover the input from the output.&lt;br&gt;&lt;br&gt;
Finally, they should be &lt;strong&gt;collision-resistant&lt;/strong&gt;, meaning two different inputs should not generate the same output.  &lt;/p&gt;

&lt;p&gt;In hashing, we also see the &lt;strong&gt;Avalanche Effect&lt;/strong&gt; — a tiny change in the input has a massive effect on the output.  &lt;/p&gt;

&lt;p&gt;That’s where the &lt;strong&gt;Birthday Attack&lt;/strong&gt; comes in!&lt;br&gt;&lt;br&gt;
It’s about finding two inputs that produce the same hash. Because of the &lt;strong&gt;birthday paradox&lt;/strong&gt;, collisions are easier to find than intuition suggests.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Example:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
You only need 23 people in a room for a 50% chance that two share a birthday.&lt;br&gt;&lt;br&gt;
In hashing, this means you don’t need to test all combinations to find a collision. However, with stronger algorithms, as I understand, they are less probable. &lt;/p&gt;




&lt;p&gt;This was the first part of the lecture — and one I really enjoyed! I’ll try to summarize the second part later this week.  &lt;/p&gt;

</description>
      <category>cryptography</category>
      <category>zk</category>
      <category>programming</category>
      <category>web3</category>
    </item>
    <item>
      <title>Cracking Codes (and Scheduling Conflicts): My Intro to Cryptography with the ZK Bootcamp</title>
      <dc:creator>Dayana Mick</dc:creator>
      <pubDate>Fri, 03 Oct 2025 13:49:13 +0000</pubDate>
      <link>https://dev.to/ayda_ma04a645d96526b/cracking-codes-and-scheduling-conflicts-my-intro-to-cryptography-with-the-zk-bootcamp-52m0</link>
      <guid>https://dev.to/ayda_ma04a645d96526b/cracking-codes-and-scheduling-conflicts-my-intro-to-cryptography-with-the-zk-bootcamp-52m0</guid>
      <description>&lt;p&gt;As part of &lt;a href="https://dev3pack.xyz/" rel="noopener noreferrer"&gt;dev3pack&lt;/a&gt;, I yearned for the moment when I could participate in the ZK and Privacy Bootcamp. This topic caught my attention when, as a &lt;a href="https://www.shefi.org/" rel="noopener noreferrer"&gt;Shefier&lt;/a&gt;, I learned about Midnight in the past cohort (14). &lt;a href="https://midnight.network/" rel="noopener noreferrer"&gt;Midnight&lt;/a&gt; is a side chain of the &lt;a href="https://cardano.org/" rel="noopener noreferrer"&gt;Cardano&lt;/a&gt; ecosystem, designed specifically for data protection and privacy. Midnight uses zero-knowledge proofs to strike a balance between the transparency needed in public blockchains and the handling of sensitive data, for example, personal identity. It is built so that developers can create dapps with selective disclosure. &lt;/p&gt;

&lt;p&gt;Although the concept of zero-knowledge proofs is not new, this blew my mind, since it was new to me. If you need to prove you are over 18, instead of disclosing all the data in your identity card, the receiving party only gets to know that you are 18: Not your address, not your picture, not your eye color. &lt;/p&gt;

&lt;p&gt;However, being a mom, I knew making it to this bootcamp would be difficult: The hours collided with pick up times, or sports activities. Also, many, many people seem to share this interest, and it was quickly filled, so I asked for the recordings.&lt;/p&gt;

&lt;p&gt;Yesterday, in the quiet of the night, very elusive to Midnight ;), I got to play the recording. I thought the material would dive directly into ZK Proofs, but it was introductory. It was the introduction to Cryptography given by &lt;a href="https://x.com/0xMilica" rel="noopener noreferrer"&gt;0xMilica&lt;/a&gt;. Even though I couldn't attend the session live, it was very engaging. She was very passionate about Maths and Cryptography, and her enthusiasm was contagious. &lt;/p&gt;

&lt;p&gt;She explained the Cesar Cipher, the Substitution Cipher, and the Vigenère Cipher. The prerequisite was to write the alphabet and number each letter: A -&amp;gt;1, B -&amp;gt; 2, and so on. The Cesar Cipher is about shifting each letter the same number of positions to encrypt the text. So, for example, if you shift by 3 each letter, and want to encrypt the word "HELLO", you would get "Khoor"; if you shift it by 7, it would be "Olssv". &lt;/p&gt;

&lt;p&gt;Substitutions are basically when each letter is mapped to another one, so say H-&amp;gt; M, E-&amp;gt; O, L-&amp;gt; S, O -&amp;gt; P. Then HELLO would be encrypted as "MOSSP". This is stronger than the Cesar Cipher, but breakable with frequency analysis. &lt;/p&gt;

&lt;p&gt;After that, the topic was the Vigenère Cipher, which I must say I didn't know of, and challenged my mind. It has a key, or word, around which you get different shifts for each letter. For example, if you have the message "hello" and your key is "cat", you're going to repeat the key to match the message's length. So you would have "catca". Then, you will turn the letters into numbers, so matching in the alphabet, as was the prerequisite. So hello would be 8,5,12,12,15. and "catca" would be 3,1,20,3,1. The next step is to add them together, per letter, and if the number is greater than 26, to wrap it (By subtracting 26 until it is smaller than 26). &lt;/p&gt;

&lt;p&gt;In this case: &lt;/p&gt;

&lt;p&gt;8 + 3 = 11 (k), 5 + 1 = 6 (f), 12 + 20 = 32 Wrap: 32 - 26 = 6 (f), 12 + 3 = 15 (o), 15 + 1 = 16 (p) -&amp;gt; "kffop"&lt;/p&gt;

&lt;p&gt;To decrypt, we subtract instead of adding. &lt;/p&gt;

&lt;p&gt;This method, the Vigenère Cipher, was considered unbreakable for centuries, until it was finally cracked in the 1800. I found this so interesting that I researched it and will write the next post about it (Spoiler Alert: It can be slightly related to Ada Lovelace ;)).&lt;/p&gt;

&lt;p&gt;Watching this episode made my head hurt a little (given I was already suffering from sinusitis), but when I grasped it, it made me happy that it clicked. I am looking forward to finding time to watch the next episode and write the next blog post with an aside from the two characters that cracked this code. &lt;/p&gt;

</description>
      <category>cryptography</category>
      <category>zk</category>
      <category>web3</category>
    </item>
    <item>
      <title>DAO in Web3: What is it?</title>
      <dc:creator>Dayana Mick</dc:creator>
      <pubDate>Sat, 19 Jul 2025 22:38:48 +0000</pubDate>
      <link>https://dev.to/ayda_ma04a645d96526b/dao-in-web3-what-is-it-4a2a</link>
      <guid>https://dev.to/ayda_ma04a645d96526b/dao-in-web3-what-is-it-4a2a</guid>
      <description>&lt;p&gt;The first time I heard about A DAO, I thought it had some relation to Daoism: a Chinese philosophical tradition and religion. I was trying to understand how this could relate to the blockchain. It turns out I was overcomplicating it, and of course falling into an acronym trap, in which each subculture or profession has some acronyms that are believed to be shared by the whole group, but they aren't. The same thing happened to me when I entered tech and people were talking about PoC, as in "Proof of Concept, and for me it was "People of Color" 🤪. &lt;/p&gt;

&lt;p&gt;So, in Web 3, What is a DAO? &lt;br&gt;
&lt;strong&gt;DAO&lt;/strong&gt; stands for &lt;strong&gt;Decentralized Autonomous Organization&lt;/strong&gt;: It is a mechanism to involve people in making decisions about the Blockchain. It allows people to vote for implementing a change or a measure, or against it. But how do you get the right to vote? In some countries, you can vote only if you're an official citizen of the country, and in others, you get to vote in some elections after living a certain number of years in the country. To be able to vote in the DAO, you need to possess what is called a &lt;strong&gt;governance token&lt;/strong&gt;, and some DAOs require people to stake it (lock it in to help secure the network, gaining rewards on it as an incentive). Some DAOS require you to lock your tokens, because they want to avoid vote-flipping, meaning moving their tokens from address to address to cast multiple votes. When participants don't have to stake their tokens, sometimes the way to enable their votes is to take a snapshot of the number of tokens they hold in a certain period of time.&lt;/p&gt;

&lt;p&gt;Voters, as I previously mentioned, can vote for the proposal, against it, or delegate their vote to someone else. To delegate your vote, you should trust the participant to whom you are delegating your vote. How do you check if you trust and align with the views of this participant? You check their community contributions and what they have said in their discussions.&lt;/p&gt;

&lt;p&gt;Sometimes the proposal is rejected because the quorum is not reached, meaning that there were not enough votes for the proposal to be accepted or rejected. &lt;/p&gt;

&lt;p&gt;To make this more illustrative, I will include here an image of the LISK DAO.     &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdhz3tjoy594odu07x47z.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdhz3tjoy594odu07x47z.png" alt=" " width="800" height="567"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Here we can see that the wallet I connected has no governance tokens; therefore, my account has no participatory rights. All proposals are currently inactive, and from the ones we can see on the list, four have been executed, and one did not reach the quorum to be executed. &lt;/p&gt;

&lt;p&gt;If we click that proposal, we can see the bubbles showing the major voters and that the quorum was not reached. We also get some information about the proposal: The date in which it was created and how the participants voted. Below, but not in the screenshot, we will find the abstract of the proposal, the motivation, and an action plan for execution. &lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhd48fg2sx4efntuctoh9.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhd48fg2sx4efntuctoh9.png" alt=" " width="800" height="625"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;To recap, a DAO is an organization within a community that enables participatory decision-making. It sounds very cool. However, some questions appear in front of this kind of organization, with no single point of management (decentralized) and which is independent (autonomous). Let's explore some of these: &lt;/p&gt;

&lt;p&gt;If the power of voting is granted by holding governance tokens, then the entity that holds more tokens, like a whale, will have a greater voting power, and this could embody a plutocracy. Plutocracy is a system in which the wealthiest exert an outsized influence and wield the greatest power in decision-making, often at the expense of the general population.  Because of this, there are some DAOs that do not grant voting power exclusively due to holding governance tokens. &lt;/p&gt;

&lt;p&gt;Community is something that is inseparable from a DAO. It helps to make decisions in a non-hierarchical way. However, when many proposals don't reach the quorum, what does this tell us about the community? Or how can this affect the community? Maybe if its just some proposals, and if we look at the timeline it is because people tend to be more disengaged during certain times of the year. However, if this happens regularly, the community might become more apathetic. It can also be that the proposal is not something that interests all token holders, or something they don't want to think about. &lt;/p&gt;

&lt;p&gt;Almost every big protocol has a DAO and it is the mechanism by which they make changes to the protocol: Making proposals, getting feedback, and executing on the positively voted proposals. Apart from the plutocracy concern, a positive point from having voting power attached to holding tokens is that the people who are voting have "skin in the game" and therefore are interested in what will happen and in the changes that will or will not take place. &lt;/p&gt;

&lt;p&gt;Yet, a token holder does not necessarily equal an expert, so even if they think a change will be better or worse, maybe they are just deciding from a gut feeling. &lt;/p&gt;

&lt;p&gt;Another challenge for DAOs is that when there are too many cooks in the kitchen giving their feedback on proposals, it may mean that they may never get implemented. &lt;/p&gt;

&lt;p&gt;To recap:  DAOs are a way of self-organized communities to decide on changes. Community engagement is important to move forward. However, there are still questions around only prioritizing token holding as a filter for participation, due to plutocracy concerns, knowledge, and getting too much feedback from many people. Currently, DAOs are experimenting with these questions, and that is why there are different kinds of DAOs with different sets of rules. &lt;/p&gt;

</description>
      <category>web3</category>
      <category>blockchain</category>
      <category>dao</category>
    </item>
    <item>
      <title>First Hackathon: Lessons in Chaos, Code &amp; Communication</title>
      <dc:creator>Dayana Mick</dc:creator>
      <pubDate>Mon, 09 Jun 2025 16:50:53 +0000</pubDate>
      <link>https://dev.to/ayda_ma04a645d96526b/first-hackathon-lessons-in-chaos-code-communication-44d</link>
      <guid>https://dev.to/ayda_ma04a645d96526b/first-hackathon-lessons-in-chaos-code-communication-44d</guid>
      <description>&lt;p&gt;“SheFi propelled me to hackathons.” I read that on &lt;a href="https://www.shefi.org/" rel="noopener noreferrer"&gt;SheFi’s landing page&lt;/a&gt; and wished I were that person. Now I am. I entered the program in February with a little bit of skepticism. Many of the lectures blew my mind — we learned about L2s, rollups, zero-knowledge proofs, smart contracts, and decentralized AI models. Little by little, the questions I had in my head got some answers and I cleared many gaps: Now I had a lot of theoretical knowledge… but practical? I started taking some Cyphrin Updraft courses and got froggy! In March, before ending the Shefi cohort, I already had my spot confirmed for the upcoming &lt;a href="https://ethglobal.com/events/prague" rel="noopener noreferrer"&gt;ETH Global Hackathon in Prague&lt;/a&gt;,  and I was excited. I hadn’t finished my Cyphrin Updraft courses, but decided to head there anyway, also because it was a web2-friendly developer event and inspired by Shefi, I decided that I wouldn’t wait until I felt 100% ready, but that I would go. &lt;/p&gt;

&lt;h2&gt;
  
  
  The Team
&lt;/h2&gt;

&lt;p&gt;I met my team through a Discord group. A guy contacted me, thinking I was another guy, and I had to explain (chuckle), but after that hiccup,all was pretty clear. We brainstormed some ideas loosely, and finally, on Friday, May 29th, we met at the venue, which by the way, was beautiful. We started as 5, but lost someone, not in a tragic way, but due to alignment: After the first night, he decided to go solo. This was perfectly mature and ok. The rest of us were still a diverse bunch:&lt;/p&gt;

&lt;p&gt;Our team was diverse:&lt;br&gt;
– A former professional dancer pivoting into blockchain;&lt;br&gt;
– A computer science dropout turned security auditor;&lt;br&gt;
– A mobile dev student curious about blockchain;&lt;br&gt;
– And me: literature grad, Web2 engineer, now Web3 curious.&lt;/p&gt;




&lt;h2&gt;
  
  
  The Project: InspectiFi
&lt;/h2&gt;

&lt;p&gt;At 9 pm, we started hacking away on &lt;strong&gt;InspectiFi&lt;/strong&gt;, a conversational blockchain analytics assistant that allows users to ask natural language questions about blockchain data and returns easy-to-understand answers with accessible, easy-on-the-eye dashboards &lt;a href="https://github.com/AGMASO/EthPrague2025" rel="noopener noreferrer"&gt;GitHub Project InspectiFy&lt;/a&gt;. &lt;/p&gt;

&lt;p&gt;InspectiFi leverages MCP technology and integrates with the sponsors &lt;a href="https://1inch.io/" rel="noopener noreferrer"&gt;1inch&lt;/a&gt;, &lt;a href="https://www.blockscout.com/" rel="noopener noreferrer"&gt;Blockscout&lt;/a&gt;, and &lt;a href="https://www.vlayer.xyz/" rel="noopener noreferrer"&gt;Vlayer&lt;/a&gt; to provide real-time Blockchain data in an intuitive way. &lt;/p&gt;




&lt;h2&gt;
  
  
  The Fun
&lt;/h2&gt;

&lt;p&gt;I drank all the Cokes I hadn’t taken in more than 10 years (Thanks, ETH global,l for providing them). I think my team did too. We stayed late, got stressed, wrangled with the code, taught each other stuff, did some pair programming, debugging, fixing merge conflicts, resurrected code from the dead, because it was important, and in the end, won two pool prizes from the sponsors, 1Inch and Blockscout. I wasn’t counting on this, but it made the experience even better. Also, one week later, I’m still blown away by our team: I got to meet incredible people and am still over the moon about that!&lt;/p&gt;

&lt;p&gt;If you're heading to your first hackathon, expect chaos,  drink water (along with the cokes), and pair up with someone stronger where you're weaker. That’s how we survived.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fuzxsomk6vovbytz2lzy2.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fuzxsomk6vovbytz2lzy2.png" alt="Image description" width="800" height="398"&gt;&lt;/a&gt;&lt;/p&gt;




&lt;h2&gt;
  
  
  The Learnings
&lt;/h2&gt;

&lt;p&gt;Big teams = more communication overhead. Plan for it.&lt;/p&gt;

&lt;p&gt;Don’t assume shared Git knowledge. Align early.&lt;/p&gt;

&lt;p&gt;Set game rules. Spell out collaboration and review norms.&lt;/p&gt;

&lt;p&gt;Deploy often. Avoid one giant, sleep-deprived deploy.&lt;/p&gt;

&lt;p&gt;Decide what “done” means early (e.g., qualifying for finalists? Then prioritize deploys).&lt;/p&gt;

&lt;p&gt;Our Team was great, however, the bigger the team, the more communication overhead you are going to have. I wouldn’t change our team, but this is something I will have in mind for my next project. Even if you say “let’s use branches,” align on how. Show examples, decide how to handle conflicts, and expect different defaults. Drop assumptions and go for clear communication and setting clear game rules from the beginning. And lastly,  set rules about deployment: Do you have the goal of entering the finalist competition? Then Do smaller deploys and avoid fighting a huge monster where all issues have been conflated into one and no energy left to fight that monster. &lt;/p&gt;

&lt;p&gt;We left Prague with a lot of swag — and even more curiosity.&lt;br&gt;
Next time, I’m showing up with a bigger water bottle, better Git habits, and clear deployment rules. And probably still a Coke.&lt;/p&gt;

&lt;p&gt;Thanks, SheFi.&lt;/p&gt;

</description>
      <category>programming</category>
      <category>web3</category>
      <category>blockchain</category>
      <category>hackathon</category>
    </item>
    <item>
      <title>What I Learned During the SheFi Program — And Why I Recommend It</title>
      <dc:creator>Dayana Mick</dc:creator>
      <pubDate>Thu, 08 May 2025 20:09:25 +0000</pubDate>
      <link>https://dev.to/ayda_ma04a645d96526b/what-i-learned-during-the-shefi-program-and-why-i-recommend-it-3h7</link>
      <guid>https://dev.to/ayda_ma04a645d96526b/what-i-learned-during-the-shefi-program-and-why-i-recommend-it-3h7</guid>
      <description>&lt;h1&gt;
  
  
  What I Learned During the SheFi Program — And Why I Recommend It
&lt;/h1&gt;

&lt;p&gt;I started my journey into the world of crypto with a lot of doubts. I thought:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;em&gt;"If anything, I’d invest in ETH, not Bitcoin."&lt;/em&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;But even then, I was concerned about the &lt;strong&gt;environmental impact&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;Reading more, I discovered that Ethereum had transitioned to a more sustainable consensus mechanism — &lt;strong&gt;Proof of Stake (PoS)&lt;/strong&gt; — unlike Bitcoin's &lt;strong&gt;Proof of Work (PoW)&lt;/strong&gt;. That helped ease my conscience a bit.&lt;/p&gt;

&lt;p&gt;But that was just the first hurdle.&lt;/p&gt;




&lt;h2&gt;
  
  
  🛠️ Setting Up: Wallets and Exchanges
&lt;/h2&gt;

&lt;p&gt;I set up my wallet and opened an account on a crypto exchange. That part was fairly smooth — I'm a software engineer, so I know my way around tech.&lt;/p&gt;

&lt;p&gt;Still, I found myself uneasy about usability and safety. Crypto addresses are long, unreadable strings, and one wrong character could mean losing your funds forever. We’re all human — and humans make mistakes.&lt;/p&gt;




&lt;h2&gt;
  
  
  🤯 Trying to Make Sense of the Lingo
&lt;/h2&gt;

&lt;p&gt;The terminology was intimidating:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Second Layer solutions&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Why did I have to choose from so many &lt;strong&gt;networks&lt;/strong&gt; when transferring tokens
&lt;em&gt;(and the anxiety of losing money with the wrong one!)&lt;/em&gt;
&lt;/li&gt;
&lt;li&gt;What are &lt;strong&gt;NFTs, bridges, swapping&lt;/strong&gt;?
Why do they matter, and how do they work?&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;I kept reading, but I often felt unsure whether I was “getting it right.”&lt;/p&gt;




&lt;h2&gt;
  
  
  🎓 Enter SheFi: The 13th Cohort
&lt;/h2&gt;

&lt;p&gt;Then I got an invitation to join &lt;strong&gt;SheFi’s 13th Cohort&lt;/strong&gt; — and everything started to make sense.&lt;/p&gt;

&lt;p&gt;From the first lecture, things clicked. The program is built around &lt;strong&gt;learning by doing&lt;/strong&gt;, with &lt;strong&gt;quests&lt;/strong&gt; that reinforce every concept.&lt;/p&gt;




&lt;h2&gt;
  
  
  🔑 What I Learned
&lt;/h2&gt;

&lt;p&gt;Some of my biggest takeaways:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Web2 vs. Web3&lt;/strong&gt;
&lt;em&gt;(Spoiler: Web3 gives more ownership to users.)&lt;/em&gt;
&lt;/li&gt;
&lt;li&gt;The &lt;strong&gt;Blockchain Trilemma&lt;/strong&gt;: balancing
⚖️ &lt;em&gt;Scalability&lt;/em&gt;, 🛡️ &lt;em&gt;Security&lt;/em&gt;, and 🕸️ &lt;em&gt;Decentralization&lt;/em&gt;
&lt;/li&gt;
&lt;li&gt;How to &lt;strong&gt;mint NFTs&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;How &lt;strong&gt;Swapping&lt;/strong&gt;, &lt;strong&gt;Stablecoins&lt;/strong&gt;, and &lt;strong&gt;Bridging&lt;/strong&gt; work — and why they matter&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  💡 Why I Recommend It
&lt;/h2&gt;

&lt;p&gt;If you’re a woman, identify as one, or as a non-binary person, are curious about crypto, overwhelmed by the jargon, or just want a &lt;strong&gt;safe, inclusive space&lt;/strong&gt; to learn and grow —&lt;br&gt;&lt;br&gt;
&lt;strong&gt;SheFi is for you.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;You don’t need to be an expert. You just need to be open to learning.&lt;/p&gt;

&lt;h2&gt;
  
  
  🤓 How I will continue Learning and a Funny Story
&lt;/h2&gt;

&lt;p&gt;During the program, I saw that an ETH Hackathon was happening in Prague at the end of May and decided to enroll. I set up my profile, and a guy contacted me to be part of the team. The funny part: They thought I was also a guy 😂. But, yeah, the truth is that in tech there are more guys than women, so how would they know? Anyway, I had to explain that I was a woman. I am looking pretty much forward to this experience and I'll be writing about it here as well. &lt;/p&gt;

</description>
      <category>web3</category>
      <category>blockchain</category>
      <category>crypto</category>
      <category>shefi</category>
    </item>
    <item>
      <title>Some thoughts on DevOps Culture (revisiting a novel from 2013)</title>
      <dc:creator>Dayana Mick</dc:creator>
      <pubDate>Thu, 08 May 2025 19:23:21 +0000</pubDate>
      <link>https://dev.to/ayda_ma04a645d96526b/some-thoughts-on-devops-culture-revisiting-a-novel-from-2013-fao</link>
      <guid>https://dev.to/ayda_ma04a645d96526b/some-thoughts-on-devops-culture-revisiting-a-novel-from-2013-fao</guid>
      <description>&lt;p&gt;I just finished &lt;em&gt;The Phoenix Project: A Novel about IT, DevOps, and Helping Your Business Win&lt;/em&gt; by Gene Kim, Kevin Behr, and George Spafford. What can I say?&lt;/p&gt;

&lt;p&gt;I listened to it as an audiobook, and it definitely deserves a second listen.&lt;/p&gt;

&lt;p&gt;As someone with a literature background who has worked in tech for several years, I was thrilled to come across a &lt;em&gt;novel&lt;/em&gt; about IT — yes, a novel. It’s not exactly a literary masterpiece, but it’s highly entertaining if you can relate to the problems it depicts (and I could — at many different levels). Some chapters had me completely hooked, and the characters were surprisingly relatable. I even laughed out loud a few times.&lt;/p&gt;

&lt;p&gt;Here are a few first thoughts — especially for anyone working in IT or collaborating closely with IT teams:&lt;/p&gt;

&lt;h2&gt;
  
  
  Still Relevant, 10+ Years Later
&lt;/h2&gt;

&lt;p&gt;Although the book was first published in 2013 (with an anniversary edition released recently), many of the issues it describes still feel painfully relevant. In the organizations I’ve worked with, some have embraced the “DevOps” mindset more than others, but &lt;em&gt;The Phoenix Project&lt;/em&gt; remains a great read for anyone in or around IT.&lt;/p&gt;

&lt;h2&gt;
  
  
  Let’s Talk About Brent
&lt;/h2&gt;

&lt;p&gt;I’ve met many “Brents” in my career.&lt;/p&gt;

&lt;p&gt;Some are knowledge hoarders. Others are what I’d call the “good Brents” — helpful, overextended experts who carry entire systems on their backs. In the book, Brent is a central character: the lead engineer who is &lt;em&gt;everywhere&lt;/em&gt;. He’s the go-to person for every urgent issue, the one non-IT people chase down in hallways, and the person everyone relies on... unofficially.&lt;/p&gt;

&lt;p&gt;At first, I saw him as a symbol of what’s broken in tech orgs — a bottleneck, a single point of failure, someone who enables dysfunction (often unknowingly). But toward the end, he redeems himself, and in the afterword, the authors even present him as a positive force. That surprised me. I’m still not sure I agree, and I want to reflect on this more during my second listen.&lt;/p&gt;

&lt;h2&gt;
  
  
  Human Stories in a Tech World
&lt;/h2&gt;

&lt;p&gt;I appreciated the effort to create human characters — to show them as parents, spouses, friends — and how their work lives impacted their home lives. The book shines when it highlights traits beyond just technical skill, surfacing the emotional and human cost of poor systems and leadership.&lt;/p&gt;

&lt;h2&gt;
  
  
  Why I’ll Listen Again
&lt;/h2&gt;

&lt;p&gt;This first listen already gave me a lot to reflect on. I think a second round will help me dig deeper into the problems and proposed solutions. Maybe I’ll even change my mind about Brent.&lt;/p&gt;

&lt;p&gt;In any case, it’s been refreshing to engage with DevOps culture through fiction. For those of us navigating this space, it's a reminder that IT is never just about systems — it’s about people.&lt;/p&gt;

&lt;h2&gt;
  
  
  Curious About
&lt;/h2&gt;

&lt;p&gt;I read a LinkedIn post in which the author, Gene Kim, tells the world he is co-writing the Book "Vibe Coding: Building Production-Grade Software With GenAI, Chat, Agents, and Beyond" which will be released this year.  I must confess that while I was reading &lt;em&gt;The Phoenix Project&lt;/em&gt;, I was thinking about how AI could change the landscape presented in the book. &lt;/p&gt;

</description>
      <category>devops</category>
      <category>culture</category>
      <category>leadership</category>
      <category>books</category>
    </item>
  </channel>
</rss>
