<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Rileyy’s Substack]]></title><description><![CDATA[My personal Substack]]></description><link>https://kvngrileyy.substack.com</link><image><url>https://substackcdn.com/image/fetch/$s_!mvo0!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47919aa8-00ef-4029-b641-0eb61a2e02c8_144x144.png</url><title>Rileyy’s Substack</title><link>https://kvngrileyy.substack.com</link></image><generator>Substack</generator><lastBuildDate>Sat, 09 May 2026 06:28:26 GMT</lastBuildDate><atom:link href="https://kvngrileyy.substack.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Rileyy]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[kvngrileyy@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[kvngrileyy@substack.com]]></itunes:email><itunes:name><![CDATA[Rileyy]]></itunes:name></itunes:owner><itunes:author><![CDATA[Rileyy]]></itunes:author><googleplay:owner><![CDATA[kvngrileyy@substack.com]]></googleplay:owner><googleplay:email><![CDATA[kvngrileyy@substack.com]]></googleplay:email><googleplay:author><![CDATA[Rileyy]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Data privacy with DApps]]></title><description><![CDATA[Why is Data privacy so important anyway?]]></description><link>https://kvngrileyy.substack.com/p/data-privacy-with-dapps</link><guid isPermaLink="false">https://kvngrileyy.substack.com/p/data-privacy-with-dapps</guid><dc:creator><![CDATA[Rileyy]]></dc:creator><pubDate>Wed, 03 Jul 2024 12:03:48 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/dde527e8-6a3c-4419-9747-d1f3204f59b8_736x736.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Many don't understand the significance of data privacy and how they could protect their data that being released daily by them, especially in<strong> DApps</strong>. It's also an easy thing to miss but reading this won't just let you know its importance but also the ways to take control of it.</p><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://kvngrileyy.substack.com/p/data-privacy-with-dapps?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thank you for reading Rileyy&#8217;s Substack. This post is public so feel free to share it with friends.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://kvngrileyy.substack.com/p/data-privacy-with-dapps?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://kvngrileyy.substack.com/p/data-privacy-with-dapps?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><p>Data privacy is a person's ability to determine who, where, when and to what extent personal information about them is shared. These information are names, location, contact information, and offline and online behavior.</p><p>This ability is driven across all spans of media and web, blockchain and DApps included, but even with transparency that users get while on DApps, they are still vulnerable to breaches that put their personal data at risk.</p><p>Examples of some notable breaches include:</p><ol><li><p>In 2019, a vulnerability in a well-known DApp called <strong>Etherscan</strong> resulted in a leak of user IP addresses.</p></li><li><p>In February 2023, a breach occurred in a widely used library called <strong>Ledger Connector Kit</strong>, allowing attackers access to inject malicious code into various DApps.</p></li></ol><p>Now, it's important to note that privacy breaches aren't restricted to just DApps; another example, in August 2023, over 2.5 million users records from the language learning app <strong>Duolingo</strong> were leaked on a hacking forum.</p><p>Heading back to DApps before getting all mixed up, we all know how the blockchain is meant to exhibit transparency tendencies, which are also backed or followed up with "privacy" but as seen today, its not all as it should be. Here are some problems that have been sourced out as well when it comes to data privacy:</p><ol><li><p>Transparency over privacy: there is the fact that blockchains are more transparent than private, where transactions are publicly monitored and can reveal sensitive information.</p></li><li><p>Smart contract vulnerability: smart contracts, if not designed properly, have the capacity to contain privacy leaks which hackers could then exploit and access sensitive user data.</p></li><li><p>DApps most times interact with off-chain data storage systems, which may have weaker privacy protections compared to the blockchain itself, making them vulnerable to attacks.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://kvngrileyy.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Rileyy&#8217;s Substack! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div></li></ol><p>There are proven solutions, many in fact, but not all are 100%, researching I've only found 2 that fits my little scope that I believe are the best I've found so far, which is;</p><ol><li><p>The use of <strong>ZKPs</strong>. ZKP stands for <strong>Zero-Knowledge Proof</strong> and it's a cryptographic technique that allows one party prove the truth of a fact/data without revealing the data itself. This is like asking someone to validate her/his knowledge of a password without stating the password itself. Significance? Ensuring knowledge without showing actual data to regulate activities of hidden third parties.</p></li><li><p><strong>Aleo Blockchain</strong>. This is a layer-1 blockchain platform designed for privacy-preserving applications. It utilizes the same ZKPs. This enables it to offer a secure and confidential environment for transactions and data storage on the blockchain.</p></li></ol><p>Data Privacy in DApps should never for an instance be overlooked because the breach of a single user's information can be catastrophic in the long run when it falls into the hands of the wrong people. Hopefully more DApps would take up the ZKPs innovation and create more protection to users personal data.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://kvngrileyy.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Rileyy&#8217;s Substack! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Acrium: data privacy at it's finest.]]></title><description><![CDATA[Imagine if Data Privacy and Solana Blockchain had a baby, that baby would be Arcium being the first parallelized confidential computing network out there.]]></description><link>https://kvngrileyy.substack.com/p/acrium-data-privacy-at-its-finest</link><guid isPermaLink="false">https://kvngrileyy.substack.com/p/acrium-data-privacy-at-its-finest</guid><dc:creator><![CDATA[Rileyy]]></dc:creator><pubDate>Sat, 29 Jun 2024 20:42:21 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!S3YM!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb57abdf-79ce-4af7-8926-4993fdedd33e_1280x720.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!S3YM!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb57abdf-79ce-4af7-8926-4993fdedd33e_1280x720.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!S3YM!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb57abdf-79ce-4af7-8926-4993fdedd33e_1280x720.jpeg 424w, https://substackcdn.com/image/fetch/$s_!S3YM!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb57abdf-79ce-4af7-8926-4993fdedd33e_1280x720.jpeg 848w, https://substackcdn.com/image/fetch/$s_!S3YM!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb57abdf-79ce-4af7-8926-4993fdedd33e_1280x720.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!S3YM!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb57abdf-79ce-4af7-8926-4993fdedd33e_1280x720.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!S3YM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb57abdf-79ce-4af7-8926-4993fdedd33e_1280x720.jpeg" width="1280" height="720" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/eb57abdf-79ce-4af7-8926-4993fdedd33e_1280x720.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:62810,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!S3YM!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb57abdf-79ce-4af7-8926-4993fdedd33e_1280x720.jpeg 424w, https://substackcdn.com/image/fetch/$s_!S3YM!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb57abdf-79ce-4af7-8926-4993fdedd33e_1280x720.jpeg 848w, https://substackcdn.com/image/fetch/$s_!S3YM!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb57abdf-79ce-4af7-8926-4993fdedd33e_1280x720.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!S3YM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb57abdf-79ce-4af7-8926-4993fdedd33e_1280x720.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Imagine if Data Privacy and Solana Blockchain had a baby, that baby would be Arcium being the first parallelized confidential computing network out there.</p><p>What does this all mean? I&#8217;ll explain.</p><p>Arcium being a parallelized confidential computing means it makes use of cloud-based computing technology, which isolates data inside a secure Central Processing Unit (CPU) while it's being processed. It is also backed by reputable projects like Coinbase Ventures, Jump, Green field and Anagram, to mention but a few.</p><p>Industries involved in the likes of&nbsp; blockchain technology, healthcare, and artificial intelligence (AI) that depend on sensitive or valuable data are the most to benefit from the network known as Arcium. It works with dispersed construction, within this construction are multiple nodes that are capable of carrying out Multi-Party Computation (MPC) tasks. Together, these nodes process encrypted data, guaranteeing that the data's integrity and confidentiality are maintained throughout the computation process.</p><p>The Arcium Network, as of this article, makes use of an on-chain mechanism that runs on the Solana Chain (and others in the future), which allows for all network management tasks, including computation scheduling, compensation for computational work, and punishment enforcement to maintain their network integrity. The Nodes within the network form things called Clusters to perform particular duties, where they operate under stringent protocols to ensure secure and efficient computation. Data being put in the Network remains confidential throughout its stay there, with insights obtained without ever really exposing the actual data. This technology, therefore, not only lowers the learning curve for developers and increases overall productivity, but it also seamlessly connects with current blockchain technologies, fostering trust amongst participating companies.</p><p>Arcium alongside its innovation of confidential computing has some core features that need to be taken note of, such as;</p><ul><li><p>Trustless, Arbitrary Confidential Computing</p></li><li><p>Guaranteed Execution</p></li><li><p>Verifiability and Transparency</p></li><li><p>On-Chain Orchestration</p></li><li><p>Multi-Chain Strategy, and its</p></li><li><p>Developer friendly interface</p></li></ul><p>So far, we&#8217;ve only talked on the shallow bit of Arcium Network&#8217;s main feature, Confidential Computing, why don&#8217;t we have a deep dive on the matter, no?</p><p>As earlier stated, Confidential Computing is the use of cloud&nbsp; based computing technology that can isolate data within a protected CPU while it is being processed. Within said CPU, the data is only accessible to specially authorized programming code (for the purpose of providing privileged access). The resources of the CPU are also invisible and cannot be found by any program or person and this as well applies to the cloud provider.</p><p>By now you might be wondering how exactly it works, well let me explain it now. Before any application can process data, it would have to pass through a decryption in memory, this is because the data, at its early state, is encrypted and vulnerable to attacks on its information. Confidential computing, however, fixes this issue by using a hardware-based architecture referred to as a Trusted Execution Environment (TEE) which is a secure coprocessor within a CPU and is secured by embedded encryption keys. The coprocessor uses attestation mechanisms that are embedded within, to make sure the TEEs are only accessible to the application code authorized for it.</p><p>All this helps sensitive data to stay protected while in memory. When the application tells the TEE to decrypt it, the data is released for processing. While decrypted and being processed by the computer, the data is invisible to everything and everyone else. This includes the cloud provider, other computer resources, hypervisors, virtual machines, and even the operating system.</p><p>With this now we can easily perceive the benefits of the Confidential Computing innovation, some of which are;</p><ul><li><p>Protecting sensitive data while it is being processed</p></li><li><p>Protecting sensitive intellectual property</p></li><li><p>Collaboration with partners in the creation of novel cloud solutions</p></li><li><p>Giving customers more confidence as they choose a cloud provider</p></li><li><p>Protecting data processing that happens at the edge</p></li></ul><p>Confidential Computing&#8217;s value and importance can not be overlooked because protection of sensitive data while being processed is a feature that has been longed for in most projects and firms for a long time now. It also gives businesses the confidence to upload certain data to the cloud without compromising the promise of customer information safety. It plays a dominant role in data protection of both individuals and projects at large, no wonder the concept is being used in Arcium Network being the first ever parallelized confidential computing network.</p><p>Still on the Arcium Network, its architecture is something to take note of as well. Its architecture is designed to be extremely versatile and flexible, making it suited for any distributed confidential computing requirements. The confidential computing tasks are divided down into discrete computation definitions that are run within dedicated MPC environments known as Multiparty computation eXecution Environments (MXEs). These MXEs run on top of Clusters, which are groups of Arx (MPC) nodes which are computing service providers that contribute to collective computation processes. So in essence we can say;</p><ul><li><p>Clusters are analogous to the system&#8217;s hardware,</p></li><li><p>The MXEs represent the system's state,</p></li><li><p>Computation definitions act as functions, and&nbsp;</p></li><li><p>Each scheduled Computation resembles an individual function call instance.</p></li></ul><p>This Network uses Solana Blockchain based programs to plan and manage its state and services. It contains an on-chain memepool architecture that stores all pending Computations awaiting execution by the Network. Also, participation incentivization occurs on-chain, with compensation for confidential computing operations flowing directly from Computation Customers to Arx Operators and 3rd-Party Delegates.</p><p>Now a fun fact, the Arcium and Arx terms are derived from Latin, meaning fortification and protection, where &#8220;Arx&#8221; is gotten directly from the Latin "<em>arx</em>", which means "fortress" or "citadel", symbolizing the nodes as&nbsp; a robust, secure point in the network. "<em>Arcium</em>", on the other hand, is the genitive plural form of "<em>arx</em>", translating to "of the citadels" or "of the fortresses". This means "Arcium Network" is the &#8220;network of the fortresses&#8221;. All this, therefore, helps in highlighting the Network's strong security architecture and the resilience and cooperative strength of its components. It&#8217;s also important to take note of some of its key concepts like;</p><ul><li><p>Multiparty Computation: enables multiple parties to jointly perform computations on private data without revealing their individual inputs, ensuring data privacy and security during computation.</p></li><li><p>Adversary Model: is a theoretical representation of the types of threats and attack methods a security system may face. It outlines the capabilities, resources, and goals of potential attackers, helping designers and engineers to understand and anticipate security vulnerabilities, and to develop effective countermeasures and security protocols.</p></li><li><p>Zero-Knowledge Proofs (ZKPs): Validates computations without revealing the underlying data or computations.&nbsp;</p></li></ul><p>As well as its functions in general, such as;</p><ul><li><p>Computation Execution</p></li><li><p>Data decryption and encryption, and</p></li><li><p>Validation of computations by ZKPs</p></li></ul><p>Knowing Arcium and what it entails as well as incorporating its functions into everyday businesses and firms in the real world can be a substantial step to help in the battle against the theft of confidential information in business data. With Arcium&#8217;s Confidential Computing feature, a company or business can combine its sensitive data with another company's proprietary calculations to create new solutions while maintaining data confidentiality meaning neither of them has to share any data that it doesn't want to share.</p><p>Its use cases span from business and even into everyday life where Confidential Computation can help in;</p><ul><li><p>Personal data protection: whereby individuals can go on with identity verification and still have autonomy over their personal information like home lines or addresses</p></li><li><p>AI computation: Arcium enables privacy-preserving AI computations on sensitive industrial/infrastructural&nbsp; data.</p></li><li><p>Safe electoral practice: with Arcium, voting practices can now be safer where terms of user information leaks abound, confidential computing can stand in to help.</p></li><li><p>Revenue stream generation: Arcium allows for the secure data sharing and collaboration of businesses, enabling new business models and revenue streams.</p></li></ul><p>Concerning specific tools that can be built with Arcium Network, it varies from;</p><ul><li><p>&nbsp;Decentralized Finance (DeFi) applications</p></li><li><p>Encrypted Data Storage Vaults</p></li><li><p>Secure ID Verification apps, and even</p></li><li><p>Privacy Based AI Systems</p></li></ul><p><strong>Personal Prejudice</strong></p><p>Arcium is trying to build up a system that boosts data privacy and control that bridges both web2 and web3 ventures, with this data leaks and information theft will be reduced to a bare minimum and almost cut out completely.&nbsp;</p><p>Although it is still in its testnet phase, the progress with the project and the help of its vibrant community can only give off good expectations for the network&#8217;s grand launch.</p><p><em>References:</em></p><p>https://docs.arcium.com/</p><p>https://blog.arcium.com/</p><p>https://www.fortinet.com/</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://kvngrileyy.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Rileyy&#8217;s Substack! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Coming soon]]></title><description><![CDATA[This is Rileyy&#8217;s Substack.]]></description><link>https://kvngrileyy.substack.com/p/coming-soon</link><guid isPermaLink="false">https://kvngrileyy.substack.com/p/coming-soon</guid><dc:creator><![CDATA[Rileyy]]></dc:creator><pubDate>Fri, 28 Jun 2024 22:36:31 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!mvo0!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47919aa8-00ef-4029-b641-0eb61a2e02c8_144x144.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>This is Rileyy&#8217;s Substack.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://kvngrileyy.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://kvngrileyy.substack.com/subscribe?"><span>Subscribe now</span></a></p>]]></content:encoded></item></channel></rss>