<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Francis</title>
    <description>The latest articles on DEV Community by Francis (@sirfrancis553544).</description>
    <link>https://dev.to/sirfrancis553544</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F533016%2F2c3b622c-e8f7-4fbd-afdd-538798343d17.jpeg</url>
      <title>DEV Community: Francis</title>
      <link>https://dev.to/sirfrancis553544</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/sirfrancis553544"/>
    <language>en</language>
    <item>
      <title>Cold wallets vs. hot wallets</title>
      <dc:creator>Francis</dc:creator>
      <pubDate>Wed, 09 Mar 2022 09:49:30 +0000</pubDate>
      <link>https://dev.to/sirfrancis553544/cold-wallets-vs-hot-wallets-4d86</link>
      <guid>https://dev.to/sirfrancis553544/cold-wallets-vs-hot-wallets-4d86</guid>
      <description>&lt;p&gt;Understanding cryptocurrencies forces individuals to learn about financial instruments that previously might have been unreachable. Traditional banking systems have been responsible for holding finances for decades, and only in times of political uncertainty do people rush to retrieve this cash. The onus of securing these assets in crypto is on to the individual. Users are required to understand the instruments that make this possible. &lt;/p&gt;

&lt;p&gt;The adage "not your keys, not your coins" is at the center of this discussion. Meaning crypto-assets purchased on exchanges are not necessarily yours but owned by the third-party intermediary, as they have control of the wallet's private key. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Wallets&lt;/strong&gt;&lt;br&gt;
Cryptocurrencies are stored in digital wallets that facilitate the usage and management of various digital assets, not unlike a bank account. Turning every crypto holder into a bank makes security essential. &lt;/p&gt;

&lt;p&gt;The key features of a crypto wallet are its private and public keys. The public key is similar to an email address in that it is used to receive money or other assets transferred to a user's wallet. It is also known as an address. This address is shared publicly, but owners need to understand that anyone with their public keys can also track their entire transaction history on the blockchain. Users that are not comfortable with anyone tracking their financial activities need to have a good juggling act between multiple wallets to try and obfuscate their identity. &lt;/p&gt;

&lt;p&gt;The private key is like a password and should never be shared with anyone. Common crypto scams involve tricking newbies into giving over their private keys or playing on individuals' greedy nature by offering them access to a wallet with X amount of funds. Not financial advice, but nothing is for free, don't be greedy. &lt;/p&gt;

&lt;p&gt;A lengthy string of random, algorithmically produced characters represents each key.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--unWV2Kkv--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/0o8z0hg52qi4dsaopbs5.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--unWV2Kkv--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/0o8z0hg52qi4dsaopbs5.png" alt="Image description" width="880" height="76"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Seed phrases play a vital part in any crypto wallet; recovery of a lost wallet is impossible without them. Seed phrases are a group of 12 to 24 random words that the wallet provides after creating it. Seed phrases should be kept in a safe location where no one can access them and should not be shared. If a wallet's owner ever loses access to their wallet, they can use the seed phrase to generate public and private keys again. &lt;/p&gt;

&lt;p&gt;The exchange controls the private keys of cryptocurrencies bought on them. Users can keep their cryptocurrencies in their wallets if they so choose. There are two types of off-exchange wallets: hot wallets and cold wallets.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Hot Wallets&lt;/strong&gt;&lt;br&gt;
Hot wallets' defining characteristic is their connection to the internet. For most users, it's the first kind of wallet they will own. Generally, the wallet is in the crypto exchanges' mobile or desktop application. Having a connection to the internet is essential in crypto as it aids in trading, purchasing, and a variety of other activities. The internet connection is what exposes wallets to a security risk. There will always be malicious actors testing the limits of every protocol or wallet to find a breaking point, to extract funds. Understanding how to mitigate this is important. That's why it's not a good idea to keep all of one's money in a hot wallet.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Cold Wallets&lt;/strong&gt;&lt;br&gt;
Cold wallets have no internet connection, and a byproduct of this is that they are a bit cumbersome to use. They are only connected to the internet when users need to transfer in or out of the wallet. Two types of cold wallets are hardware wallets and paper wallets. &lt;/p&gt;

&lt;p&gt;Hardware wallets have a distinct look since most look like a USB stick. Hardware wallets technically do not hold cryptocurrency; it is always on the blockchain. The wallets' purpose is to store private keys of said cryptocurrency, removing blockchain's access until it is needed again to activate new transactions. When users need to reaccess these funds, they can connect the wallet to its dedicated software, reinitiate network control of their asset, and transfer it wherever required. &lt;/p&gt;

&lt;p&gt;Paper wallets are exactly how they sound, a piece of paper with public and private keys printed on it. Some could have a QR code as well. Technically it is the most secure wallet someone could own, but early crypto adopters can attest to its frailty. Paper can be misplaced, stolen, susceptible to water or fire damage. The ink could run over time, ruining the readability of its contents. &lt;/p&gt;

&lt;p&gt;When creating a paper wallet, the keys are removed from the blockchain network, and coins are unreachable without them. To reaccess these funds, users need to scan the private key QR code into their hot wallets. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Closing&lt;/strong&gt; &lt;br&gt;
Most new crypto users have only used hot wallets because of their convenience and the exchange's security reassurances. We should never forget if you don't have complete control of your private keys, you are not in control of your finances. Crypto was created to remove third-party intermediaries between individuals and their money. Being your bank and being responsible for your funds is a frightening endeavor, but it can be enlightening if you want to attain any amount of financial literacy and independence.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Stay Connected!!&lt;/strong&gt; &lt;br&gt;
Follow Francis on | &lt;a href="https://twitter.com/Francis10576778"&gt;Twitter&lt;/a&gt;| &lt;a href="https://danielfrancis.netlify.app/"&gt;Portfolio&lt;/a&gt;| &lt;a href="https://opensea.io/collection/carrotperson"&gt;OpenSea&lt;/a&gt;|&lt;/p&gt;

</description>
      <category>hotwallet</category>
      <category>coldwallet</category>
      <category>privatekeys</category>
      <category>publickeys</category>
    </item>
    <item>
      <title>Layer 1 vs. Layer 2</title>
      <dc:creator>Francis</dc:creator>
      <pubDate>Mon, 28 Feb 2022 05:12:41 +0000</pubDate>
      <link>https://dev.to/sirfrancis553544/layer-1-vs-layer-2-4h8n</link>
      <guid>https://dev.to/sirfrancis553544/layer-1-vs-layer-2-4h8n</guid>
      <description>&lt;p&gt;&lt;strong&gt;Why is blockchain scalability important?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The application of blockchain technology in finance is invaluable, but it does have inherent drawbacks known as the Blockchain Trilemma. It establishes a balance between security, decentralization, and scalability of the network. Blockchain security prioritizes the protection of the network from bad actors and attacks, while decentralization deals with how the network capabilities are divided across multiple computers globally. Decentralization ensures that the service cannot be destroyed because there is no head. A blockchain network is more like a hydra.&lt;/p&gt;

&lt;p&gt;Security and decentralization are essential pillars in any blockchain network. The necessity of adding scalability to this network is challenging. Scalability focuses on the network's ability to handle high-frequency transactions and change. Without it, the blockchain network has no chance of replacing the traditional financial system. Compared to Visa, Bitcoin processes 4–7 transactions per second, while Visa does 1,700. &lt;/p&gt;

&lt;p&gt;Currently, most DeFi projects are suffering from extremely high transaction fees. Due to the increase in traffic on the network, more users on the network congest it, and transactions are processed by paying fees (gas) to the miners. The current solution to congestion has been to place transactions that pay more in fees at the front of the line for processing. This procedure has single-handedly created the high transaction fee race currently. These high fees have been a barrier to entry for most individuals interested in crypto. Without a solution, the ones with the most coins will be the ones shaping the industry. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Layer 1 vs. Layer 2&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Layer 1 would be the blockchain Ethereum is built on, while Polygon ($MATIC) refers to a layer 2 solution that relies on the overlaying network established by Ethereum. As a result of blockchain's current inherent congestion issues, layer 2 solutions have emerged to solve these problems. It cannot be completely perfect as layer 2 solutions give up something to achieve higher network speeds. To handle these issues, we examine the layer 1 and layer 2 solutions. By no means is this an extensive breakdown of possible solutions. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Layer 1 and Layer 2 simplified&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Imagine the fastest snail that could exist. You want the snail to go faster, but the snail cannot. So you place a treadmill on top of the snail and then a turtle on top of the treadmill; now you have a fast turtle on top of a slow snail. That's layer 1 and layer 2 in a “snail shell.”&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--z0Vkb86y--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/y45gdv0y8p5tkkmnjqs4.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--z0Vkb86y--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/y45gdv0y8p5tkkmnjqs4.png" alt="Image description" width="552" height="526"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Scaling of Layer 1&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Layer 1 scale focuses on increasing the number of transactions on the blockchain network. The Ethereum Foundation is proposing sharding, which is the splitting of a database to distribute its capacity. Ethereum (2.0) plans to implement this concept by breaking their distributed ledger, which is technically a database, into smaller pieces, or smaller chains, to improve transaction speed. This ensures their network stays decentralized and improves performance and security.&lt;/p&gt;

&lt;p&gt;Another scaling solution is consensus protocol changes. Both Bitcoin and Ethereum use proof-of-work (PoW) to process transactions, which is very costly and slow. Proof-of-Stake (PoS), on the other hand, is faster and has a lower carbon footprint than PoW. Ethereum can process 15-20 transactions per second. This has resulted in high fees and slow process times, but once PoS can be implemented, it can increase speed and reduce fees tremendously. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Layer 2&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Layer 2 has two popular solutions for scaling: rollups and state channels. Rollups utilize outside computational capabilities to process transactions, instead of having the network perform the calculations. Utilizing outside computational abilities eases the load off of Layer 1, which increases the transaction speed. With this method, only necessary information is added to the blockchain, making it inherit Layer 1 security while being scalable, and still maintaining decentralization. &lt;/p&gt;

&lt;p&gt;State on the chain, a deposit is locked, known as the state, then a channel opens up off-chain for users to transact quickly. Once it is complete, the final last interaction is recorded on-chain, and the initial deposit, or state, is unlocked. Just like the rollups, part of the process is abstracted to increase speed, while utilizing the final security of layer 1.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Closing&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Every DeFi project is racing to achieve improved transaction speeds without sacrificing security and the decentralized nature of this ecosystem. Layer 2 solutions might be adopted and expanded on by most emerging projects today. Although Ethereum is also attempting to solve this problem, high fees make it impossible for DeFi to be accessible to everyone. Soon enough, this will be a problem of yesterday, but today we can explore projects attempting to implement these solutions. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Stay Connected!!&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Follow Francis on | &lt;a href="https://twitter.com/Francis10576778"&gt;Twitter&lt;/a&gt;| &lt;a href="https://danielfrancis.netlify.app/"&gt;Portfolio&lt;/a&gt;| &lt;a href="https://opensea.io/collection/carrotperson"&gt;OpenSea&lt;/a&gt;|&lt;/p&gt;

</description>
      <category>layer1</category>
      <category>layer2</category>
      <category>sharding</category>
      <category>bitcoin</category>
    </item>
    <item>
      <title>Let's Buy a Pizza: I Have Crypto</title>
      <dc:creator>Francis</dc:creator>
      <pubDate>Sat, 26 Feb 2022 07:28:45 +0000</pubDate>
      <link>https://dev.to/sirfrancis553544/lets-buy-a-pizza-i-have-crypto-413g</link>
      <guid>https://dev.to/sirfrancis553544/lets-buy-a-pizza-i-have-crypto-413g</guid>
      <description>&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--WRRKwyGP--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/27tuamicxz6v1o60r363.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--WRRKwyGP--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/27tuamicxz6v1o60r363.png" alt="Image description" width="880" height="495"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;For the uninitiated not all cryptocurrencies are Bitcoin or Ethereum. Ethereum was created to solve perceived problems in Bitcoin; with any technology there will be advancements. Devs and the mining community are always working to solve Bitcoins various problems: one being energy consumption when processing a transaction and the other being swiftness of the network.&lt;/p&gt;

&lt;p&gt;Thus, we can buy a pizza pronto.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Verifying&lt;/strong&gt; &lt;/p&gt;

&lt;p&gt;Verifying a transaction is critical to cryptocurrencies: this is what allows us to get our pizza. Transactions can be verified by Proof of stake (PoS) or Proof of work (PoW). &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;PoS&lt;/strong&gt; works by participants putting their cryptocurrencies up for collateral with the express intent to approve transactions e.g., Tezos, Polygon.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;PoW&lt;/strong&gt; consumes “some” energy to do some fancy calculations in a race to be first while we wait X minutes to get our pizza, e.g., Bitcoin, Ethereum, Litecoin.&lt;/p&gt;

&lt;p&gt;The nature of cryptocurrencies is that they are decentralized, so if your government offers cryptocurrencies, it's no longer decentralized, right? We can get a pizza if a centralized authority is responsible for verifying transactions but is this the crypto dream? &lt;/p&gt;

&lt;p&gt;Cryptocurrencies were made to be decentralized so determining how to verify my pizza purchase can be kind of difficult. A problem that everyone, that includes Bitcoin, is trying to solve, without burning down half the amazon rainforest.&lt;/p&gt;

&lt;p&gt;PoW and PoS both are trying to add a new block of transactions into the ledger, but do their ends justify the means? I mean I still get a pizza either way, right? &lt;/p&gt;

&lt;p&gt;When the Bitcoin network was small PoW made sense, but it’s not an environmentally scalable solution as the amount of energy it takes could make us a lifetime supply of pizza. Some people think that's a problem. Alternatively, PoS is faster and consumes less energy. It uses 99% less energy than PoW.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;PoW&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;In a PoW network every computer is trying to be the first to calculate the solution to a formula allowing them to add their transactions to the blockchain. For their efforts they get rewarded with a new Bitcoin.&lt;/p&gt;

&lt;p&gt;This deters bad actors because they would need a lot of energy and money to validate a bad transaction. To secure this network a few polar bears need to move to Hawaii; we all make sacrifices. Since PoW is a race to be the fastest it’s a bit more decentralized than PoS.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;PoS&lt;/strong&gt; &lt;/p&gt;

&lt;p&gt;The foundation of PoS is staking, they use validators which means the more crypto they put the more influence they have over the network. Validators stake a certain amount of crypto behind a block they want added to the chain.&lt;/p&gt;

&lt;p&gt;Validators can stake their crypto allowing them voting rights to prove legitimate transactions. For their efforts they get back newly created crypto for making the network faster. Having validators approve a transaction is faster than expensive gas guzzling computers doing the proof of work. &lt;/p&gt;

&lt;p&gt;There is a problem here, if a validator with the most money gets chosen how is this decentralized?&lt;/p&gt;

&lt;p&gt;PoS thought of a solution, validators that misbehave do face consequences. Validators have an economic incentive to do the right thing and if they don’t, they get slashed. Which means when you are bad, they take some of your crypto away, if someone adds to your block their crypto also gets cut too. Doesn’t pay to be bad.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Conclusion&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Bitcoin miners set out to resolve its environmental crisis by moving more than 50% of its energy to renewable energy in response to the environmental concerns critics highlighted. &lt;/p&gt;

&lt;p&gt;I can get my pizza with both methods but one network answers to the fastest computers at the cost of consuming way more energy than we can justify, while the other adds blocks to the ledger by putting your money where your mouth is. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Stay Connected!!&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Follow Francis on | &lt;a href="https://twitter.com/Francis10576778"&gt;Twitter&lt;/a&gt;| &lt;a href="https://danielfrancis.netlify.app/"&gt;Portfolio&lt;/a&gt;| &lt;a href="https://opensea.io/collection/carrotperson"&gt;OpenSea&lt;/a&gt;|&lt;/p&gt;

</description>
      <category>proofofwork</category>
      <category>proofofstake</category>
      <category>pow</category>
      <category>btc</category>
    </item>
    <item>
      <title>Connecting Secure Socket Shell (ssh)🤫 to GitHub</title>
      <dc:creator>Francis</dc:creator>
      <pubDate>Thu, 10 Feb 2022 06:25:26 +0000</pubDate>
      <link>https://dev.to/sirfrancis553544/connecting-secure-socket-shell-ssh-to-github-3ohj</link>
      <guid>https://dev.to/sirfrancis553544/connecting-secure-socket-shell-ssh-to-github-3ohj</guid>
      <description>&lt;p&gt;&lt;strong&gt;SSH protocol&lt;/strong&gt; gives users/system administrators secure access over an unsecure network to a computer.  &lt;/p&gt;

&lt;p&gt;It is commonly used to secure remote access to resources, remote execution of command, delivery of software packages and updates and interactive and automated file transfers. None of this would be possible if it weren't for the back and forth between the SSH Client and the SSH Server. &lt;/p&gt;

&lt;p&gt;First the server sends its public key to the client, and the key is saved on the client. If I tell you that is where the magic happens then they establish a connection, would that be okay for you? Because it is for me. &lt;/p&gt;

&lt;p&gt;This does not have to be right, but I imagined it is the Force and the private key must be the midichlorians, you might not want to admit or know it is responsible for all the access and power you currently have, but it is there doing its work in the background. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;GitHub&lt;/strong&gt; is where developers go to count little green boxes//be antisocial and social…. or a code hosting platform for version control and collaboration possibly. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Why GitHub and SSH?&lt;/strong&gt; &lt;br&gt;
Tired of always entering a password authentication for pushing and pulling to remote repositories? SSH keys got you covered, minus or plus a passphrase if you choose to make one during the set up phase, I traded a password for a passphrase yay me. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 1&lt;/strong&gt;&lt;br&gt;
If you do not already have &lt;strong&gt;Git Bash&lt;/strong&gt; for windows, now is the time to download it. Plus &lt;strong&gt;GitHub&lt;/strong&gt;, I have a feeling you can not get this done without a GitHub account. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 2&lt;/strong&gt;&lt;br&gt;
Enter this in the command line&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;$ ssh-keygen -o
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;





&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Generating public/private rsa key pair.
Enter file in which to save the key (/c/Users/PCName/.ssh/id_rsa):
# Sets it to default location 
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;





&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Enter passphrase (empty for no passphrase): [Type passphrase]
Enter same passphrase again: [Type passphrase again]
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;





&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Your identification has been saved in /c/Users/PCName/.ssh/id_rsa
Your public key has been saved in /c/Users/PCName/.ssh/id_rsa.pub
The key fingerprint is:
SHA256:############################################### PCName@PCName-######
The key's randomart image is:
+---[RSA ####]----+
|         Someth  |
|          ings ar|
|         e just r|
|         ally coo|
|        l when y |
|         ou think|
|         about ho|
|         w it act|
|            ually|
+----[workss]-----+
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Do not tell anyone, but now you have a public and private key 🤫.&lt;br&gt;
Located in &lt;code&gt;/c/Users/PCName/.ssh/id_rsa&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 3&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;$ cat ~/.ssh/id_rsa.pub
**************** A key is generated here *************** 
#Copy it and go to github
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;Step 4&lt;/strong&gt;&lt;br&gt;
Github--&amp;gt; Settings--&amp;gt; SSH &amp;amp; GPR key &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0nfw2uqpr72owutxmsu8.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0nfw2uqpr72owutxmsu8.png" alt="1"&gt;&lt;/a&gt;&lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F94h9igyi7ogqoxwb44an.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F94h9igyi7ogqoxwb44an.png" alt="2"&gt;&lt;/a&gt;&lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7e738he8tgdeja02pzmo.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7e738he8tgdeja02pzmo.png" alt="3"&gt;&lt;/a&gt;&lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4mve6nsb1j47158y65jm.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4mve6nsb1j47158y65jm.png" alt="4"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;To use the ssh key just go to a git repository and select Code, Under Code select SSH and copy to clipboard. &lt;/p&gt;

&lt;p&gt;Back to Bash again.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;$ git clone [paste ssh link key from github]
Enter passphrase: [enter]
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Hope this helps you get work done faster. &lt;/p&gt;

</description>
      <category>github</category>
      <category>security</category>
      <category>100daysofcode</category>
    </item>
  </channel>
</rss>
