<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Bowen Tech</title>
	<atom:link href="https://bowentech.co.uk/feed/" rel="self" type="application/rss+xml" />
	<link>https://bowentech.co.uk</link>
	<description>Tech support with a patient approach</description>
	<lastBuildDate>Sat, 15 Nov 2025 05:27:41 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9</generator>

<image>
	<url>https://bowentech.co.uk/wp-content/uploads/2025/04/cropped-cropped-Bowen-Tech-Logo-1-32x32.png</url>
	<title>Bowen Tech</title>
	<link>https://bowentech.co.uk</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Text Scam Alert: Protecting Yourself from Mobile Message Fraud.</title>
		<link>https://bowentech.co.uk/2025/04/08/text-scam-alert-protecting-yourself-from-mobile-message-fraud/</link>
		
		<dc:creator><![CDATA[Bowen Tech]]></dc:creator>
		<pubDate>Tue, 08 Apr 2025 10:35:18 +0000</pubDate>
				<category><![CDATA[Phishing scams]]></category>
		<category><![CDATA[SMS scams]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[SMS/MMS]]></category>
		<category><![CDATA[text scams]]></category>
		<category><![CDATA[voice mail scams]]></category>
		<guid isPermaLink="false">https://bowentech.co.uk/?p=819</guid>

					<description><![CDATA[That little buzz in your pocket can sometimes bring more than just a friendly message. Increasingly, scammers are turning to SMS, or text messaging, to try and trick you out of your money and personal information. These mobile scams can be surprisingly sophisticated, but with a little awareness, you can significantly reduce your risk of getting caught in their net.]]></description>
										<content:encoded><![CDATA[<p data-sourcepos="3:1-3:367">That little buzz in your pocket can sometimes bring more than just a friendly message. Increasingly, scammers are turning to SMS, or text messaging, to try and trick you out of your money and personal information. These mobile scams can be surprisingly sophisticated, but with a little awareness, you can significantly reduce your risk of getting caught in their net.</p>
<h2 data-sourcepos="5:1-5:49"><strong>The Bait: What Do These Scam Texts Look Like?</strong></h2>
<p data-sourcepos="7:1-7:138">Scammers often rely on creating a sense of urgency or playing on your emotions. Here are some common types of SMS scams to watch out for:</p>
<ul data-sourcepos="9:1-14:0">
<li data-sourcepos="9:1-9:177"><strong>Fake Delivery Notifications:</strong> &#8220;Your parcel couldn&#8217;t be delivered. Click here to reschedule.&#8221; These links often lead to fake websites designed to steal your payment details.</li>
<li data-sourcepos="10:1-10:183"><strong>Urgent Bank Alerts:</strong> &#8220;Suspicious activity detected on your account. Verify immediately!&#8221; These messages aim to scare you into clicking a link and entering your login credentials.</li>
<li data-sourcepos="10:1-10:183"><strong>Voice mail from the bank&#8217;s fraud division: </strong>&#8220;Poor sounding mobile message, hard to hear, or the message goes straight to the point!&#8221; These messages try and fool you into thinking  the good guys are looking out for you, when in fact they are the fraudsters. Delete the message, do not engage with them.</li>
<li data-sourcepos="11:1-11:191"><strong>Phony Prize Wins:</strong> &#8220;Congratulations! You&#8217;ve won a [expensive item]! Claim it here.&#8221; These often require you to pay a &#8220;small processing fee&#8221; which goes straight into the scammer&#8217;s pocket.</li>
<li data-sourcepos="12:1-12:180"><strong>Tax or Government Agency Impersonation:</strong> &#8220;You owe unpaid taxes. Failure to pay will result in legal action.&#8221; These messages use authority to intimidate you into sending money.</li>
<li data-sourcepos="13:1-14:0"><strong>Job Offers or Investment Opportunities:</strong> &#8220;Exciting work-from-home opportunity! Click here for details.&#8221; These can lead to requests for upfront fees or the collection of your personal information.</li>
</ul>
<h2 data-sourcepos="15:1-15:39"><strong>The Hook: How They Try to Trick You</strong></h2>
<p data-sourcepos="17:1-17:68">Scammers use various tactics to make their messages seem legitimate:</p>
<ul data-sourcepos="19:1-23:0">
<li data-sourcepos="19:1-19:137"><strong>Spoofed Numbers:</strong> They can sometimes mask their number to appear as if the message is coming from a genuine company or organization.</li>
<li data-sourcepos="20:1-20:119"><strong>Generic Greetings:</strong> Often, the messages will use vague greetings like &#8220;Dear Customer&#8221; instead of your actual name.</li>
<li data-sourcepos="21:1-21:74"><strong>Sense of Urgency:</strong> They pressure you to act quickly without thinking.</li>
<li data-sourcepos="22:1-23:0"><strong>Misspellings and Poor Grammar:</strong> While not always the case, many scam texts contain errors that legitimate organizations wouldn&#8217;t make.</li>
</ul>
<h2 data-sourcepos="24:1-24:55"><strong>Reeling Yourself In: How to Avoid Mobile Scam Texts</strong></h2>
<p data-sourcepos="26:1-26:86">Protecting yourself from these scams is crucial. Here are some key steps you can take:</p>
<ul data-sourcepos="28:1-35:0">
<li data-sourcepos="28:1-28:142"><strong>Be Suspicious of Unsolicited Messages:</strong> If you weren&#8217;t expecting a text from a particular company or organization, treat it with caution.</li>
<li data-sourcepos="29:1-29:235"><strong>Never Click or Tap on Suspicious Links:</strong> <span style="color: #00ff00;">This is the golden rule.</span> If you&#8217;re unsure about a link, don&#8217;t tap it. Instead, manually visit the official website of the company in question or contact them directly through a known phone number.</li>
<li data-sourcepos="30:1-30:178"><strong>Don&#8217;t Share Personal Information Via Text:</strong> Legitimate companies will never ask for sensitive information like passwords, PINs, or full credit card details via text message.</li>
<li data-sourcepos="31:1-31:109"><strong>Be Wary of &#8220;Urgent&#8221; Requests:</strong> Scammers thrive on creating panic. Take a moment to think before you act.</li>
<li data-sourcepos="32:1-32:200"><strong>Verify Directly:</strong> If you receive a message claiming to be from your bank or another service, contact them directly using their official contact information (found on their website or statements).</li>
<li data-sourcepos="32:1-32:200"><strong>Do a Google search using the words &#8220;Who is 07xxxxxxxxx</strong>&#8220;. Normally you will be able to see who the scammer is from the text in the search result, without having to click into the website link. <span style="color: #00ff00;">Avoid clicking into websites</span> unless you know the site is safe.<br /><img fetchpriority="high" decoding="async" class="alignnone wp-image-821 size-large" src="https://bowentech.co.uk/wp-content/uploads/2025/04/Who-is-1024x540.jpg" alt="Who is a phone number" width="1024" height="540" srcset="https://bowentech.co.uk/wp-content/uploads/2025/04/Who-is-1024x540.jpg 1024w, https://bowentech.co.uk/wp-content/uploads/2025/04/Who-is-300x158.jpg 300w, https://bowentech.co.uk/wp-content/uploads/2025/04/Who-is-768x405.jpg 768w, https://bowentech.co.uk/wp-content/uploads/2025/04/Who-is.jpg 1150w" sizes="(max-width: 1024px) 100vw, 1024px" /></li>
<li data-sourcepos="33:1-33:171"><strong>Report Scam Texts:</strong> You can usually report spam texts through your phone&#8217;s messaging app or by forwarding them to a designated reporting number (like <span style="color: #00ff00;"><strong>7726</strong></span> in the UK).</li>
<li data-sourcepos="34:1-35:0"><strong>Keep Your Phone Software Updated:</strong> Ensure your phone&#8217;s operating system and security software are up to date to protect against malware.</li>
</ul>


<p></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Tired of Passwords? Your YubiKey is Your New Best Friend (Especially with MFA!)</title>
		<link>https://bowentech.co.uk/2025/03/24/tired-of-passwords-your-yubikey-is-your-new-best-friend-especially-with-mfa/</link>
		
		<dc:creator><![CDATA[Bowen Tech]]></dc:creator>
		<pubDate>Mon, 24 Mar 2025 21:39:21 +0000</pubDate>
				<category><![CDATA[MFA]]></category>
		<category><![CDATA[FIDO2]]></category>
		<category><![CDATA[LastPass]]></category>
		<category><![CDATA[Passwordless]]></category>
		<category><![CDATA[YubiKey]]></category>
		<guid isPermaLink="false">https://bowentech.co.uk/?p=758</guid>

					<description><![CDATA[We all know the drill: create a complex password, try to remember it (and fail!), reset it, and repeat. It's a frustrating cycle, and frankly, in today's digital landscape, relying solely on passwords is like leaving your front door unlocked. ]]></description>
										<content:encoded><![CDATA[<p data-sourcepos="3:1-3:342">We all know the drill: create a complex password, try to remember it (and fail!), reset it, and repeat. It&#8217;s a frustrating cycle, and frankly, in today&#8217;s digital landscape, relying solely on passwords is like leaving your front door unlocked. That&#8217;s where <strong>Multi-Factor Authentication (MFA)</strong>, or <strong>2-Factor Authentication (2FA)</strong>, comes in.</p>
<p data-sourcepos="5:1-5:324">MFA adds an extra layer of security beyond just your password. Think of it like having two locks on that front door. Even if someone somehow gets their hands on your password, they still need that second factor to gain access. This significantly reduces the risk of unauthorized logins and keeps your valuable accounts safe.</p>
<p data-sourcepos="7:1-7:223">You&#8217;ve likely encountered various forms of MFA: codes sent to your phone via SMS, authenticator apps generating time-based codes, or even biometric scans. These are all steps in the right direction, adding crucial security.</p>
<h2 data-sourcepos="7:1-7:223">The Password Problem and the MFA Solution</h2>
<p data-sourcepos="9:1-9:147"><strong>But what if you could take your security a step further and, in many cases, practically ditch the password entry altogether? Enter the YubiKey.</strong></p>
<p data-sourcepos="11:1-11:223"><img decoding="async" class="alignnone wp-image-761 size-large" src="https://bowentech.co.uk/wp-content/uploads/2025/03/YubiKey-Banner-Image-1024x520.webp" alt="YubiKey-Banner-Image" width="1024" height="520" srcset="https://bowentech.co.uk/wp-content/uploads/2025/03/YubiKey-Banner-Image-1024x520.webp 1024w, https://bowentech.co.uk/wp-content/uploads/2025/03/YubiKey-Banner-Image-300x152.webp 300w, https://bowentech.co.uk/wp-content/uploads/2025/03/YubiKey-Banner-Image-768x390.webp 768w, https://bowentech.co.uk/wp-content/uploads/2025/03/YubiKey-Banner-Image.webp 1416w" sizes="(max-width: 1024px) 100vw, 1024px" /></p>
<p data-sourcepos="11:1-11:223">This small, portable hardware security key is a game-changer for anyone serious about security and tired of the password struggle. Here&#8217;s why it&#8217;s so incredibly useful, especially when it comes to minimizing password usage:</p>
<h2 data-sourcepos="13:1-13:40"><strong>Why a YubiKey Excels Beyond Traditional MFA</strong></h2>
<p data-sourcepos="13:1-13:40"><strong>The Power of Passwordless (Almost!):</strong></p>
<ul data-sourcepos="15:1-20:0">
<li data-sourcepos="15:1-15:222"><strong>Physical Presence = Stronger Security:</strong> Unlike software-based MFA methods, a YubiKey requires physical possession. An attacker can&#8217;t intercept a code sent to your phone if they don&#8217;t have the actual key in their hand.</li>
<li data-sourcepos="16:1-16:322"><strong>Tap-and-Go Convenience:</strong> For many services and applications, using a YubiKey is as simple as plugging it into your USB port (or tapping it via NFC) and touching a sensor. <strong>No more fumbling with typing in codes from an app or waiting for an SMS!</strong> This streamlined process makes strong security incredibly convenient.</li>
<li data-sourcepos="17:1-17:329"><strong>Resistant to Phishing:</strong> Phishing attacks try to trick you into entering your credentials on fake websites. Because the YubiKey verifies the authenticity of the login request at a hardware level, it&#8217;s highly resistant to these types of attacks. Even if you accidentally land on a malicious site, your YubiKey won&#8217;t be fooled.</li>
<li data-sourcepos="18:1-18:512"><strong>Works Seamlessly with Password Managers (Like LastPass!):</strong> If you&#8217;re already using a password manager like LastPass (smart move!), a YubiKey adds an even more robust layer of security. You can configure LastPass to require your YubiKey for login. This means even if someone were to somehow compromise your LastPass master password, they would still need your physical YubiKey to access your vault. <strong>This effectively turns your YubiKey into the master key for all your online accounts managed by LastPass.</strong></li>
<li data-sourcepos="19:1-20:0"><strong>Multiple Protocol Support:</strong> YubiKeys often support multiple authentication protocols like FIDO2/WebAuthn (which enables true passwordless logins on compatible websites and services), U2F, Yubico OTP, and PIV. This versatility ensures compatibility with a wide range of platforms.</li>
</ul>
<h2 data-sourcepos="21:1-21:318">The Near Passwordless Experience with a YubiKey</h2>
<p data-sourcepos="21:1-21:318"><strong>Imagine this:</strong> You go to log into your LastPass account. Instead of typing your master password, you simply plug in your YubiKey and tap it. Boom! You&#8217;re in, with all your secure passwords at your fingertips. The same tap-and-go convenience can extend to numerous other services that support YubiKey authentication.</p>
<p data-sourcepos="23:1-23:377">While the complete elimination of passwords across the entire internet isn&#8217;t a reality yet, using a YubiKey, especially in conjunction with MFA and a password manager like LastPass, gets you incredibly close. It offers a powerful combination of robust security and unparalleled ease of use, making the often-dreaded task of logging in a secure and almost effortless experience.</p>
<h2 data-sourcepos="23:1-23:377">Take the Next Step in Security</h2>
<p data-sourcepos="25:1-25:186"><strong>Ready to ditch the password headaches and level up your security? Consider a YubiKey. </strong></p>
<p data-sourcepos="25:1-25:186">Mike has two YubiKeys and one FIDO2-compliant security keys, which he uses for everything Google.  It&#8217;s a small investment that offers significant peace of mind in our increasingly digital world.</p>
<p data-sourcepos="25:1-25:186"> </p>




<p></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Don&#8217;t Get Hooked! Spotting and Avoiding Phishing Email Scams (My Close Call with a &#8220;PayPal&#8221; Phishing Attack)</title>
		<link>https://bowentech.co.uk/2025/03/20/dont-get-hooked-spotting-and-avoiding-phishing-email-scams-my-close-call-with-a-paypal-phishing-attack/</link>
		
		<dc:creator><![CDATA[Bowen Tech]]></dc:creator>
		<pubDate>Thu, 20 Mar 2025 19:31:26 +0000</pubDate>
				<category><![CDATA[Phishing email scams]]></category>
		<category><![CDATA[alarm bells]]></category>
		<category><![CDATA[hacked]]></category>
		<category><![CDATA[ID theft]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[scams]]></category>
		<guid isPermaLink="false">https://bowentech.co.uk/?p=140</guid>

					<description><![CDATA[We all rely on email for everything these days – from keeping in touch with loved ones to managing our finances. But this convenience comes with a dark side: phishing email scams.]]></description>
										<content:encoded><![CDATA[
<p>We all rely on email for everything these days – from keeping in touch with loved ones to managing our finances. But this convenience comes with a dark side: phishing email scams. I recently had a close call myself, which prompted me to write this post and warn everyone about these deceptive tactics. I received a suspicious email that was supposedly from PayPal, but my &#8220;scam sense&#8221; tingled immediately. It got me thinking about how many people might not be as familiar with the red flags and could easily fall victim. Let&#8217;s dive into what phishing is, how to spot it, and how to protect yourself.</p>



<figure class="wp-block-image size-large"><img decoding="async" width="1024" height="705" src="https://bowentech.co.uk/wp-content/uploads/2025/03/Dont-get-hooked-spotting-and-avoiding-phishing-email-scams-My-close-call-with-a-PayPal-phishing-attack-1024x705.png" alt="" class="wp-image-141" srcset="https://bowentech.co.uk/wp-content/uploads/2025/03/Dont-get-hooked-spotting-and-avoiding-phishing-email-scams-My-close-call-with-a-PayPal-phishing-attack-1024x705.png 1024w, https://bowentech.co.uk/wp-content/uploads/2025/03/Dont-get-hooked-spotting-and-avoiding-phishing-email-scams-My-close-call-with-a-PayPal-phishing-attack-300x207.png 300w, https://bowentech.co.uk/wp-content/uploads/2025/03/Dont-get-hooked-spotting-and-avoiding-phishing-email-scams-My-close-call-with-a-PayPal-phishing-attack-768x529.png 768w, https://bowentech.co.uk/wp-content/uploads/2025/03/Dont-get-hooked-spotting-and-avoiding-phishing-email-scams-My-close-call-with-a-PayPal-phishing-attack-1536x1057.png 1536w, https://bowentech.co.uk/wp-content/uploads/2025/03/Dont-get-hooked-spotting-and-avoiding-phishing-email-scams-My-close-call-with-a-PayPal-phishing-attack.png 1768w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<h2 class="wp-block-heading"><strong>What is Phishing?</strong></h2>



<p>Phishing is a type of cybercrime where scammers attempt to trick you into revealing personal information, such as passwords, credit card numbers, or bank account details. They often impersonate trusted organizations like banks, credit card companies, social media platforms, or, as in my case, PayPal. These scams are often carried out through emails, but can also occur via text messages (smishing) or phone calls (vishing).</p>



<h2 class="wp-block-heading has-black-color has-text-color has-link-color wp-elements-727ad8eba78202c2c39371ab6ad09840"><strong>My Close Call with a &#8220;PayPal&#8221; Phishing Attempt</strong></h2>



<p>I was surprised to find an email in my inbox from someone called <strong>Margaret Michael</strong>. I don&#8217;t know any Margaret&#8217;s, so that was the first alarm bell going off. The second alarm bell was the subject matter. It made no sense! While it looked somewhat legitimate at first glance, several things raised alarm bells. Here&#8217;s what made me suspicious:</p>



<ul class="wp-block-list">
<li><strong>Lack of Personalization:</strong> The email was generic and didn&#8217;t address me by my name. Legitimate companies like PayPal almost always use your name in their communications.</li>



<li><strong>Suspicious Attachment (or Link):</strong> In my case, there was no actual email message, only an attachment. This is a huge red flag. The attachment was a <strong>*.webp file</strong>, supposedly containing an invoice. I knew better than to open it. Phishing emails often contain malicious attachments or links that lead to fake websites designed to steal your information.</li>



<li><strong>Urgency or Threat:</strong> Phishing emails often create a sense of urgency or use threatening language to pressure you into acting quickly without thinking. They might say your account is suspended or that you need to verify your information immediately.</li>



<li><strong>Poor Grammar and Spelling:</strong> While not always the case, phishing emails often contain grammatical errors, typos, and awkward phrasing.</li>



<li><strong>Unexpected Communication:</strong> I don&#8217;t have an account with PayPal, which is another reason to be suspicious.</li>
</ul>



<h2 class="wp-block-heading"><strong>Why This is So Dangerous</strong></h2>



<p>Phishing attacks can have devastating consequences. If you fall victim, scammers can:</p>



<ul class="wp-block-list">
<li><strong>Steal your financial information:</strong> This can lead to identity theft, fraudulent charges on your credit cards, and unauthorized access to your bank accounts.</li>



<li><strong>Compromise your online accounts:</strong> Scammers can use your stolen passwords to access your email, social media, and other online accounts.</li>



<li><strong>Install malware on your computer or device:</strong> Malicious attachments or links can install viruses, spyware, or other harmful software that can steal your data or damage your device.</li>
</ul>



<h2 class="wp-block-heading has-black-color has-text-color has-link-color wp-elements-8e1b133fa5159a77800b1eb29bdd8e9f"><strong>How to Protect Yourself from Phishing Scams</strong></h2>



<p>Here are some crucial steps you can take to protect yourself from phishing attacks:</p>



<ul class="wp-block-list">
<li><strong>Be suspicious of unsolicited emails:</strong> Never click on links or open attachments in emails from unknown or suspicious senders.</li>



<li><strong>Verify the sender&#8217;s identity:</strong> If you receive an email from a company you do business with, verify its legitimacy by contacting the company directly through a known and trusted channel, such as their official website or customer service phone number. Do not use the contact information provided in the email.</li>



<li><strong>Check the URL carefully:</strong> Before clicking on any link, hover your mouse over it (without clicking) to see the actual website address. Make sure it matches the website of the organization it claims to be from. Look for misspellings or unusual domain names.</li>



<li><strong>Enable two-factor authentication (2FA):</strong> 2FA adds an extra layer of security to your accounts by requiring a second verification step, such as a code sent to your phone, in addition to your password.</li>



<li><strong>Keep your software up to date:</strong> Regularly update your operating system, web browser, and antivirus software to patch security vulnerabilities.</li>



<li><strong>Use strong, unique passwords:</strong> Create strong passwords for each of your online accounts and avoid reusing the same password for multiple accounts. Consider using a password manager to help you generate and store strong passwords securely.</li>



<li><strong>Educate yourself and others:</strong> Stay informed about the latest phishing tactics and share your knowledge with friends and family.</li>
</ul>



<h2 class="wp-block-heading has-black-color has-text-color has-link-color wp-elements-4fb75f7a25c99d1d09437a03d04bd12e"><strong>What to Do If You Suspect a Phishing Attempt</strong></h2>



<ul class="wp-block-list">
<li><strong>Don&#8217;t click on anything:</strong> Do not click on any links or open any attachments in the suspicious email.</li>



<li><strong>Report the phishing attempt:</strong> Report the phishing email to the organization being impersonated (e.g., PayPal, your bank) and to your email provider.</li>



<li><strong>Change your passwords:</strong> If you think you may have clicked on a link or entered your information on a fake website, change your passwords for all your important online accounts immediately.</li>



<li><strong>Monitor your accounts:</strong> Keep a close eye on your bank statements, credit card transactions, and online accounts for any unauthorized activity.</li>
</ul>



<h2 class="wp-block-heading"><strong>Why Phishing Emails Slip Through Filters (Like Gmail)</strong>?</h2>



<p>Even with advanced spam filters, some phishing emails can still slip through. This can happen for several reasons:</p>



<ul class="wp-block-list">
<li><strong>Sophisticated Techniques:</strong> Scammers are constantly evolving their tactics to bypass spam filters. They may use new email addresses, obfuscate links, or use more convincing language.</li>



<li><strong>Zero-Day Attacks:</strong> New phishing campaigns may not be immediately recognized by filters, especially if they haven&#8217;t been seen before.</li>



<li><strong>Human Error:</strong> Sometimes, users accidentally mark legitimate emails as spam, which can train filters to be less effective.</li>
</ul>



<h2 class="wp-block-heading"><strong>Conclusion</strong></h2>



<p>Phishing attacks are a serious threat, but by staying informed and being vigilant, you can significantly reduce your risk of falling victim. Remember to always be suspicious of unsolicited emails, verify the sender&#8217;s identity, and never click on links or open attachments from unknown sources. My recent experience served as a valuable reminder of the importance of online security. Please share this post with your friends and family to help spread awareness and protect them from these scams.</p>



<ul class="wp-block-social-links is-layout-flex wp-block-social-links-is-layout-flex"><li class="wp-social-link wp-social-link-gravatar  wp-block-social-link"><a rel="me noopener" href="https://gravatar.com/maximumvoid0de0bf6f38" class="wp-block-social-link-anchor" target="_blank"><svg width="24" height="24" viewBox="0 0 24 24" version="1.1" xmlns="http://www.w3.org/2000/svg" aria-hidden="true" focusable="false"><path d="M10.8001 4.69937V10.6494C10.8001 11.1001 10.9791 11.5323 11.2978 11.851C11.6165 12.1697 12.0487 12.3487 12.4994 12.3487C12.9501 12.3487 13.3824 12.1697 13.7011 11.851C14.0198 11.5323 14.1988 11.1001 14.1988 10.6494V6.69089C15.2418 7.05861 16.1371 7.75537 16.7496 8.67617C17.3622 9.59698 17.6589 10.6919 17.595 11.796C17.5311 12.9001 17.1101 13.9535 16.3954 14.7975C15.6807 15.6415 14.711 16.2303 13.6325 16.4753C12.5541 16.7202 11.4252 16.608 10.4161 16.1555C9.40691 15.703 8.57217 14.9348 8.03763 13.9667C7.50308 12.9985 7.29769 11.8828 7.45242 10.7877C7.60714 9.69266 8.11359 8.67755 8.89545 7.89537C9.20904 7.57521 9.38364 7.14426 9.38132 6.69611C9.37899 6.24797 9.19994 5.81884 8.88305 5.50195C8.56616 5.18506 8.13704 5.00601 7.68889 5.00369C7.24075 5.00137 6.80979 5.17597 6.48964 5.48956C5.09907 6.8801 4.23369 8.7098 4.04094 10.6669C3.84819 12.624 4.34 14.5873 5.43257 16.2224C6.52515 17.8575 8.15088 19.0632 10.0328 19.634C11.9146 20.2049 13.9362 20.1055 15.753 19.3529C17.5699 18.6003 19.0695 17.241 19.9965 15.5066C20.9234 13.7722 21.2203 11.7701 20.8366 9.84133C20.4528 7.91259 19.4122 6.17658 17.892 4.92911C16.3717 3.68163 14.466 2.99987 12.4994 3C12.0487 3 11.6165 3.17904 11.2978 3.49773C10.9791 3.81643 10.8001 4.24867 10.8001 4.69937Z" /></svg><span class="wp-block-social-link-label screen-reader-text">Gravatar</span></a></li></ul>



<p></p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
