# Quâest-ce quâune adresse Bitcoin rĂ©vĂšle avant et aprĂšs une dĂ©pense ?
La rĂ©utilisation dâune adresse Bitcoin est souvent prĂ©sentĂ©e comme un problĂšme de confidentialitĂ©. Pourtant, elle soulĂšve aussi un risque **cryptographique rĂ©el**, liĂ© Ă la sĂ©curitĂ© mĂȘme de la clĂ© privĂ©e. Lâenjeu concerne autant les anciennes adresses P2PKH que les formats rĂ©cents SegWit (bc1qâŠ) ou Taproot (bc1pâŠ) : lorsquâune adresse est rĂ©utilisĂ©e aprĂšs avoir dĂ©jĂ servi Ă dĂ©penser un UTXO, lâensemble des fonds associĂ©s Ă cette mĂȘme clĂ© dĂ©pend dĂ©sormais dâun matĂ©riau cryptographique exposĂ© plusieurs fois sur la blockchain. Le prĂ©sent article expose les raisons structurelles de ce risque, les mĂ©canismes cryptographiques en jeu, et la maniĂšre concrĂšte dâobserver la clĂ© publique rĂ©vĂ©lĂ©e lors dâune dĂ©pense.
### Lâexposition de la clĂ© publique : un moment critique
Avant toute dépense, une adresse Bitcoin **ne révÚle pas la clé publique**, mais seulement un hachage :
```
HASH160(pubkey) = RIPEMD160(SHA-256(pubkey))
```
Ce hachage nâoffre aucune possibilitĂ© de retrouver la clĂ© publique. Tant quâun UTXO reste non dĂ©pensĂ©, la clĂ© associĂ©e demeure mathĂ©matiquement inaccessible.
DĂšs quâun UTXO est dĂ©pensĂ© :
- la **signature** est publiée,
- la **clé publique complÚte** est révélée,
- la validité de la signature est vérifiée contre cette clé.
Ă partir de ce moment, lâadresse nâoffre plus la mĂȘme protection cryptographique : la clĂ© publique est exposĂ©e Ă lâanalyse offensive, et toute rĂ©utilisation de cette mĂȘme clĂ© multiplie les donnĂ©es exploitables par un attaquant.
### OĂč se trouve la clĂ© publique au moment de la dĂ©pense ?
Lâemplacement exact dĂ©pend du type dâadresse :
### P2PKH (adresses commençant par 1 ou 3)
Dans les transactions **P2PKH**, la clé publique apparaßt :
- **dans le scriptSig**,
- immédiatement aprÚs la signature,
- sous forme hexadécimale, généralement en clé compressée (33 octets, préfixe 02 ou 03) ou non compressée (65 octets, préfixe 04).
### P2WPKH (SegWit v0, adresses bc1qâŠ)
Dans les transactions **P2WPKH**, la clé publique apparaßt dans le **witness** :
- witness[0] â signature (format DER),
- witness[1] â **clĂ© publique compressĂ©e** (33 octets, dĂ©butant par 02 ou 03).
### Taproot (P2TR, adresses bc1pâŠ)
Les transactions **Taproot** utilisent des signatures Schnorr et des clés publiques **x-only**. La clé publique apparaßt :
- dans le **script witness**,
- en général sous la ligne « key path spending »,
- au format **x-only** : 32 octets (64 hex) sans préfixe 02/03.
### Sur mempool.space
[mempool.space](http://mempool.space/) nâaffiche **pas âPublic Keyâ en texte clair**. Il faut lire les champs bruts hexadĂ©cimaux et reconnaĂźtre le format :
- **33 octets** â pubkey compressĂ©e : commence par 02 ou 03.
- **65 octets** â pubkey non compressĂ©e : commence par 04.
- **32 octets** â Taproot x-only pubkey.
La clĂ© publique est donc toujours visible, mais sous la forme dâun champ hexadĂ©cimal dans les Inputs.
### Pourquoi la réutilisation affaiblit-elle la sécurité ?
### RĂ©vĂ©ler une fois la clĂ© publique nâest pas critique
La sĂ©curitĂ© repose sur la difficultĂ© du problĂšme du logarithme discret (ECDLP). Tant quâun attaquant ne dispose que dâune seule signature produite par la clĂ© :
- il ne peut rien reconstituer,
- il nâa pas de matiĂšre statistique,
- ECDLP reste intact.
### RĂ©vĂ©ler la mĂȘme clĂ© plusieurs fois multiplie la surface dâattaque
Chaque dĂ©pense dâun UTXO associĂ©e Ă une mĂȘme adresse publie :
- une clé publique identique,
- une nouvelle signature distincte.
En ECDSA (P2PKH, P2WPKH), chaque signature nĂ©cessite un nombre alĂ©atoire : le **nonce k**. k doit ĂȘtre :
- unique,
- imprédictible,
- parfaitement généré.
> Un dĂ©faut de gĂ©nĂ©ration de k â Ă©vĂ©nements bien documentĂ©s â permet de rĂ©cupĂ©rer la clĂ© privĂ©e si deux signatures utilisent un mĂȘme k ou des k corrĂ©lĂ©s.
Exemples réels :
- bug Android 2013,
- RNG matériel défaillant,
- bibliothĂšques OpenSSL anciennes,
- faiblesse dâentropie au boot dâun appareil,
- smartcards produisant des nonces biaisés.
La rĂ©utilisation dâadresse **multiplie les signatures produites** par une mĂȘme clĂ© â augmente la probabilitĂ© dâun incident cryptographique.
### Taproot amĂ©liore la situation mais ne lâannule pas
Taproot utilise Schnorr :
- nonce dĂ©rivĂ© de façon dĂ©terministe â Ă©limine le risque âmĂȘme kâ,
- structure linéaire des signatures plus résistante.
Mais :
- la clé x-only reste unique et exposée,
- plusieurs signatures restent exploitables pour des analyses statistiques,
- les risques matériels demeurent,
- la cryptographie post-quantique mettra à mal toute clé publique exposée.
### Concentration du risque
Un portefeuille HD (BIP32) permet dâisoler chaque UTXO derriĂšre une clĂ© dĂ©rivĂ©e diffĂ©rente. La rĂ©utilisation dâadresse annule cet avantage :
- un bug dans une seule signature â compromet tous les UTXO dĂ©pendant de cette clĂ©.
Câest la pire configuration possible en termes de compartimentation.
### Et en cas dâavancĂ©es cryptographiques (quantique ou non) ?
Si un attaquant obtenait la capacité de résoudre ECDLP :
- toute clé publique **déjà exposée** deviendrait vulnérable,
- toutes les adresses réutilisées seraient particuliÚrement fragiles,
- une adresse jamais dépensée resterait protégée par HASH160.
La rĂ©utilisation dâadresse concentre ainsi un risque futur que lâĂ©cosystĂšme cherche explicitement Ă Ă©viter.
### Exemple concret : clé révélée dans une transaction réelle
Pour la transaction :
```
7ee6745718bec9db76390f3a4390b9e7daeeb401e8c666a7b261117a6af654a1
```
Il sâagit dâun input P2WPKH. Dans le witness :
- la signature se trouve dans witness[0],
- la clé publique compressée dans witness[1].
La clé publique révélée est :
```
02174ee672429ff94304321cdae1fc1e487edf658b34bd1d36da03761658a2bb09
```
> Avant dépense : seule HASH160(pubkey) était visible.
> AprĂšs dĂ©pense : la clĂ© publique rĂ©elle lâest, dĂ©finitivement.
### Conclusion
La rĂ©utilisation dâadresse Bitcoin reprĂ©sente un risque cryptographique tangible. Elle ne relĂšve pas seulement dâune mauvaise hygiĂšne de confidentialitĂ©, mais dâun problĂšme structurel : **une clĂ© publique ne devrait ĂȘtre exposĂ©e quâune seule fois**, et une signature ne devrait jamais ĂȘtre multipliĂ©e sur une mĂȘme clĂ© si lâon souhaite maximiser la robustesse.
Les mĂ©canismes cryptographiques actuels sont solides, mais lâexpĂ©rience montre que :
- les implémentations ne sont jamais parfaites,
- les nonces peuvent ĂȘtre biaisĂ©s,
- les appareils peuvent manquer dâentropie,
- les attaques matérielles existent,
- la cryptanalyse progresse.
Minimiser lâexposition des clĂ©s publiques reste une bonne pratique fondamentale, aujourdâhui comme demain, et cela passe dâabord par une rĂšgle simple : **ne jamais rĂ©utiliser une adresse qui a dĂ©jĂ dĂ©pensĂ© un UTXO**.
Interview from #PlanBLugano
Check what the guys from https://getportal.cc are doing.
Cool demo with an NFC tag to login into a website or to open a door đȘ
They should go live in Q1 2026 with their project, so don't hesitate to contact them to beta test.
PS: there was lots of background noise in the room, I had to use AI to remove the noise.
#PlanB
At #PlanBLugano I interviewed Daniel from https://www.fairdeeds.com
His company supports circular economy in developing countries. He buys product from them and pay them in sats. Keychain and mini surf board, upcycling from used board that the kids cannot surf on it anymore with Bitcoin related backstreet art from StreetCyber from Barcelona.
https://youtube.com/shorts/VO_dn5oH9d0?feature=share
#PlanB
Guess with whom I ran into at #PlanBLugano ?
Uncle Rockstar Dev. He gave me a cool NFC card with his image on it and when you tap it to your phone, you got laser eyes ! đ€©
Read my feedback from the conference here:
On my way to Lugano PlanB conference with nostr:nprofile1qqsfp8h6venm9p387yrhvn8rc2yft3r0llgczxm5zhw2kql533ztt9cpvemhxue69uhkv6tvw3jhytnwdaehgu3wwa5kuef0dec82c33dfarqvp4v4hrs6ejwfarqat88pmk27rh8pen2em2dpa8smrvxuehx7tydpnnjam4x3m8qmrxwfa8j6mtw3eksetgx4ars0mzwfhkzerrv9ehg0t5wf6k2qg4waehxw309aex2mrp0yhxummnw3ezucn89uq3wamnwvaz7tmgw368que09ahx7um5wgh8w6twv595yfyy

I will be there!
HAARP: Inject energy into the ionosphere to be able to control it https://video.nostr.build/653f7630a43287993fd8c8ae07f0d2494e06caa4c410b4665e91f1c37be05b6d.mp4
Projet HAARP une realité
HAARP : le climat sous contrĂŽle ?
https://www.youtube.com/watch?v=Vk62y2tEKKA
#HAARP #SNOWDEN
**RĂVĂLATION CHOC : SNOWDEN DĂVOILE LE PROGRAMME DE GUERRE MONDIALE DE HAARP**
Edward Snowden vient de faire exploser la bombe d'information que l'Ătat profond redoutait le plus. HAARP n'est pas une station de recherche â c'est une arme de contrĂŽle global. Des documents fuitĂ©s montrent que HAARP peut dĂ©clencher des AVC et des crises cardiaques en ciblant le tronc cĂ©rĂ©bral avec des ondes radio Ă trĂšs haute frĂ©quence. Les dĂ©cĂšs semblent naturels, ne laissant aucune trace de meurtre.
Snowden confirme que l'OTAN utilise HAARP pour rĂ©primer la dissidence, manipuler les pensĂ©es et provoquer des ruptures psychotiques afin de discrĂ©diter des cibles. Ce n'est pas une thĂ©orie â lors de sa fuite de Hong Kong, Snowden et le personnel de WikiLeaks ont dĂ» se protĂ©ger des impulsions homicidaires induites par les ondes radio.
Snowden a construit une cage de Faraday pour bloquer tous les signaux entrants, preuve qu'encore aujourd'hui HAARP le cible. Il a fourni des e-mails d'amiraux et de généraux de l'Armée de l'air confirmant les capacités de HAARP. Des initiés du renseignement ont vérifié leur authenticité.
Le rĂ©seau HAARP en Alaska gĂ©nĂšre 36 millions de watts d'Ă©nergie dirigĂ©e, assez pour manipuler l'ionosphĂšre, perturber le climat et transformer des rĂ©gions entiĂšres en zones de catastrophe. Ces installations existent dans le monde entier â Alaska, SuĂšde, Russie â toutes faisant partie d'un systĂšme coordonnĂ© capable de provoquer famine, tremblements de terre et chaos pour Ă©craser la rĂ©sistance.
Des initiés affirment que les antennes relais et le systÚme TrapWire de la DARPA sont connectés à cette grille, créant une toile planétaire de surveillance et de contrÎle. D'anciens lanceurs d'alerte comme Nick Begich ont averti que la manipulation émotionnelle via HAARP était « effroyablement facile ».
C'est une guerre contre l'humanitĂ© elle-mĂȘme. Notre mĂ©tĂ©o, nos esprits, mĂȘme nos morts peuvent ĂȘtre scĂ©narisĂ©s par ceux qui actionnent HAARP. Le rĂ©gime globaliste le cache sous le prĂ©texte de « recherche scientifique » tout en menant une guerre silencieuse.
L'avertissement de Snowden est clair : HAARP est l'arme ultime. Elle peut dĂ©stabiliser des nations sans qu'aucune balle ne soit tirĂ©e. Elle peut effacer des patriotes sans laisser d'empreintes. C'est la main invisible qui guide les Ă©vĂ©nements mondiaux â tempĂȘtes, guerres, effondrements â tous orchestrĂ©s pour forcer la soumission.
Les patriotes doivent se rĂ©veiller. Exiger la fermeture de ces installations. Exiger la rĂ©vĂ©lation de ceux qui autorisent leur usage. L'horloge tourne. Chaque seconde oĂč HAARP reste actif est une seconde de plus de guerre psychologique et environnementale contre le peuple.
La tempĂȘte n'arrive pas â elle est dĂ©jĂ lĂ .
https://x.com/BeaupinEric/status/1968591953504633323
#HAARP #SNOWDEN
« HAARP est conçu pour injecter de l'énergie dans l'atmosphÚre afin de la contrÎler. Cela peut paraßtre fou, mais nous expérimentons depuis 30 ans.
HAARP + spray quotidien + ondes de frĂ©quence = IngĂ©nierie climatiqueđ„
https://x.com/BeaupinEric/status/1956267826508964078
#HAARP #SNOWDEN
nostr:naddr1qvzqqqr4gupzqfalclwl2z4lp2pyn3tmecxmevs5nqxvzrqrmkmfr7cljn9hewx3qq2kysntvem855tw2355u63jfgukvd63t90k506p44q
My favorite pod since long ago is ThisWeekInBitcoin.show with Chris Fisher.
Windows pour 1M⏠? MĂȘme pas en rĂȘve. đ§ Linux câest la vie, le reste câest de la perte de temps.â
#LinuxPower #WindowsUsers #CyberSecurity #TechTalk #Informatique #DebatSansFiltre #TechCommunity https://video.nostr.build/4c443bb74f392d323086040681725c5fe82d47b3c88e2dc5f436f98d847c7c53.mp4
strangely your lightning address seems to have invisible characters in it.. the LNURL goes to https://rizful.com/.well-known/lnurlp/%EF%BB%BFjinformatique .. 
Ok so now I changed it again in the profil. First I cleared it, then saved and then I typed it manually, no copy/paste.
Please let me know how it goes on your end ?
Hello, here is my test to see how zapping works. Rizful is awesome đ€©
Sorry, it seem's that I missed a step when I had to log back into amethyst. Now it should be working.
Set up a new Rizful vault? We zap new users! Follow these steps to choose your Lightning Address ... https://docs.megalithic.me/using-rizful/your-first-steps-with-rizful ... then reply here so we can zap you!
Hello Rizful !
I just love the nodes and the vaults. I mentioned Rizful to folks at a bitcoin presentation I made about LN. And I zapped This Week in Bitcoin to mention Rizful to ChrisLAS !
Hi Chris, Alby is great, but to setup a node easily without hardware and for tinkering, I found Rizful. They also offer Vaults where you can customize your Lightning Address
https://fountain.fm/episode/NYnqsqd7mDA2Irs4UdTp
nostr:nevent1qvzqqqpxquqzpvfhqan4sf5wsa3kjgu2pqv7p0jtevqf6tfr5xaa63dh6snfl5kfsue6x4
Some support for your challenge. Your content is always great and fun!
WHEEL OF BULL HAS BEEN REVEALED

nostr:nevent1qqswpaqwtdjcs7f5nlth5eaczyz9d9h8dfke6whwvwushxgpjgydctgwt6azr
Sorry, I don't have enough sats in my wallet to help today. đą 
https://www.youtube.com/watch?v=Xhtgobb7MIE
Video backup: https://peertube.fr/w/7K1RuPZjyCF5nQoZvFwSWw
A full length documentary by Sacha Stone exposing the 5G existential threat to humanity in a way we never imagined possible!
### Summary
The video transcript presents a comprehensive and highly critical examination of 5G technology, emphasizing its alleged dangers, health risks, and socio-political implications. Experts, researchers, activists, and whistleblowers express grave concerns about the biological effects of electromagnetic fields (EMFs) emitted by 5G infrastructure, linking them to various health problems such as cancer, neurological disorders, DNA damage, reproductive harm, and immune system disruption. The discussion highlights that 5G is not merely an incremental advancement in wireless communication but constitutes a radical deployment of high-frequency, militarized technology with weapon-like properties.
The transcript reveals claims that 5G frequencies are used in military applications such as crowd dispersal and interrogation systems, and that the infrastructure involves dense networks of small antennas close to homes, schools, and workplaces. It also references historical and current examples of microwave radiation being used as a covert weapon against populations. Independent research on the health impact of wireless radiation is reportedly scarce, with industry and regulatory bodies like the FCC showing reluctance or inability to conduct rigorous safety evaluations.
The narrative stresses the failure of regulatory frameworks, particularly the FCC, which is accused of regulatory capture by the telecommunications industry, resulting in safety limits that are vastly inadequate relative to scientific evidence. The transcript points out that insurance companies refuse to cover wireless industry risks due to known hazards, yet governments continue the rollout without public consent or transparent discussion.
Moreover, the transcript touches on the environmental implications of 5G, including damage to pollinators and ecosystems, and warns of a potential extinction-level event linked to pervasive exposure. It also explores the concept of âsmartâ technology as militarized and invasive, capable of mass surveillance and control. The transcript ends with a call to public awareness, activism, and resistance against what is described as a global technological and health catastrophe.
### Highlights
- â ïž 5G technology employs militarized microwave frequencies used for crowd control and battlefield interrogation.
- đ§Ź Wireless radiation, including 5G, is linked to DNA damage, cancer, neurological disorders, and reproductive harm.
- đ„ Regulatory agencies like the FCC lack biomedical expertise and have set safety limits ignoring vast scientific evidence.
- đ No independent, comprehensive biological safety testing has been conducted on 5G before global rollout.
- đ Insurance companies refuse to insure wireless industry risks due to known health hazards.
- đ± 5Gâs environmental impact threatens pollinators and ecosystems essential for human survival.
- đĄ 5G infrastructure enables invasive surveillance by embedding antennas in everyday objects and public spaces.
### Key Insights
- ⥠**5G as a Weaponized Technology: In-depth Analysis**
The transcript asserts that 5G is fundamentally different from previous wireless generations, incorporating millimeter-wave frequencies and advanced phased-array antennas originally developed for military applications such as radar, crowd dispersal, and electronic warfare. This characterization reframes 5G as a technology with inherent assault capabilities rather than simply a communication upgrade. The use of frequencies that can penetrate buildings and home environments facilitates continuous monitoring and potentially targeted effects on individuals, raising ethical and safety concerns about mass deployment.
- đ§Ș **Lack of Independent Research and Regulatory Capture**
The absence of independent, industry-funded research into 5Gâs health effects emerges as a critical issue. The Federal Communications Commission (FCC), which regulates wireless safety in the U.S., is portrayed as captured by the telecommunications industry, lacking transparency and expertise in biomedical science. Consequently, safety standards are based on outdated engineering models focused on thermal effects, ignoring chronic, low-level biological impacts demonstrated in thousands of peer-reviewed studies. This regulatory failure compromises public health and trust.
- đ§Ź **Biological and Genetic Harm from EMF Exposure**
The video details numerous biological effects linked to electromagnetic radiation, including oxidative stress, DNA fragmentation, cancer, reproductive infertility, neurodegenerative diseases like Alzheimerâs and ALS, and cognitive impairments. Particularly alarming is the evidence of damage to mitochondrial and microbial DNA, which are vital to cellular and systemic health. The potential for transgenerational genetic damage due to exposure during pregnancy and early development highlights risks extending beyond immediate health to future generations.
- đ **Environmental Consequences and Ecosystem Disruption**
Beyond human health, 5Gâs impact on the environment, particularly on pollinators such as bees and other insects, is emphasized. The phased-array radar technology and dense antenna deployment allegedly cause biological disruption, including sterilization of livestock and destruction of soil microbiomes. Given the vital role pollinators play in agriculture and natural ecosystems, these effects could precipitate ecological collapse and food insecurity.
- đ **Surveillance and Privacy Intrusions Embedded in 5G Infrastructure**
The rollout of 5G involves embedding micro and nano antennas in streetlights, appliances, and personal devices, effectively turning homes and neighborhoods into continuous tracking zones. The presence of nanoparticulates in the environment, which are theorized to interact with 5G signals, further facilitates this surveillance. This raises profound concerns about privacy, autonomy, and the potential for social control via a âsocial creditâ system or behavioral monitoring.
- đŒ **Economic and Political Dimensions: Industry Profit vs. Public Health**
The transcript highlights the tension between the enormous economic interests driving 5G deployment and the health risks being ignored or suppressed. Telecommunications companies are aware of potential liabilitiesâevidenced by their inability to secure insuranceâyet continue aggressive marketing and lobbying for rapid infrastructure expansion. Legislative frameworks like Section 704 of the Telecommunications Act remove local authority to oppose cell tower siting on health grounds, undermining democratic oversight and community rights.
- đš **Urgent Need for Public Awareness and Policy Reform**
The testimony of numerous experts calls for immediate precautionary measures, independent and comprehensive safety testing, and a moratorium on 5G rollouts until health impacts are fully understood. The transcript underscores that current regulatory and political processes have failed to protect public health, necessitating grassroots activism, transparent scientific inquiry, and robust legal challenges to safeguard individuals and the environment.
### Conclusion
This video transcript delivers a sobering and urgent message about the risks associated with 5G technology, framing it as a powerful, weaponized form of electromagnetic radiation with widespread biological, environmental, and societal consequences. It critiques the regulatory landscapeâs failure to prioritize health and safety, warns of long-term genetic and ecological damage, and exposes the intertwining of technological innovation with corporate and governmental interests. The call to action is clear: increased scientific scrutiny, public engagement, and political accountability are essential to prevent what is described as a looming global health catastrophe.
### Sources:
1. [https://science.howstuffworks.com/radiation2.htm](https://science.howstuffworks.com/radiation2.htm)
4. [https://www.ncbi.nlm.nih.gov/m/pubmed/20483835/](https://www.ncbi.nlm.nih.gov/m/pubmed/20483835/)
10. [https://faculty.washington.edu/chudler/bbb.html](https://faculty.washington.edu/chudler/bbb.html)
23. [https://www.ncbi.nlm.nih.gov/pubmed/22891885](https://www.ncbi.nlm.nih.gov/pubmed/22891885)
31. [https://www.ncbi.nlm.nih.gov/pubmed/25175620](https://www.ncbi.nlm.nih.gov/pubmed/25175620)
### Videos:
1. [www.newearth.media](http://www.newearth.media)
2. [www.newearth.university](http://www.newearth.university)
3. [http://www.truthstreammedia.com/](http://www.truthstreammedia.com/)
4. [https://www.davidicke.com/](https://www.davidicke.com/)
5. [https://www.rt.com/](https://www.rt.com/)
7. [http://doyoutrustthiscomputer.org/](http://doyoutrustthiscomputer.org/)
### YouTube Links:
2. [https://www.youtube.com/watch?v=z2hTtTF8gkU](https://www.youtube.com/watch?v=z2hTtTF8gkU)
3. [https://www.youtube.com/watch?v=qih2K5uCF10](https://www.youtube.com/watch?v=qih2K5uCF10)
4. [https://www.youtube.com/watch?v=BH3gJctqKk4](https://www.youtube.com/watch?v=BH3gJctqKk4)
5. [https://www.youtube.com/watch?v=YVpdyreCxyw](https://www.youtube.com/watch?v=YVpdyreCxyw)
6. [https://www.youtube.com/watch?v=F9bdU_uw2Dc](https://www.youtube.com/watch?v=F9bdU_uw2Dc)
7. [https://www.youtube.com/watch?v=Wm69ik_Qdb8](https://www.youtube.com/watch?v=Wm69ik_Qdb8)
8. [https://www.youtube.com/watch?v=jc9yFVojlE4](https://www.youtube.com/watch?v=jc9yFVojlE4)
9. [https://www.youtube.com/watch?v=Pm5Oc5s4_8M](https://www.youtube.com/watch?v=Pm5Oc5s4_8M)
10. [https://www.youtube.com/watch?v=lBbY8fvTidU](https://www.youtube.com/watch?v=lBbY8fvTidU)
11. [https://www.youtube.com/watch?v=K7jiLPIADKY](https://www.youtube.com/watch?v=K7jiLPIADKY)
12. [https://www.youtube.com/watch?v=ZbNEpLP8x5A](https://www.youtube.com/watch?v=ZbNEpLP8x5A)
13. [https://www.youtube.com/watch?v=ekNC0J3xx1w](https://www.youtube.com/watch?v=ekNC0J3xx1w)
14. [https://www.youtube.com/watch?v=ah8Bpg6ep1k](https://www.youtube.com/watch?v=ah8Bpg6ep1k)
15. [https://www.youtube.com/watch?v=-FqFe-ndZPg](https://www.youtube.com/watch?v=-FqFe-ndZPg)
16. [https://www.youtube.com/watch?v=xTmAIo4A6mI](https://www.youtube.com/watch?v=xTmAIo4A6mI)
17. [https://www.youtube.com/watch?v=kzG4oEutPbA](https://www.youtube.com/watch?v=kzG4oEutPbA)
18. [https://www.youtube.com/watch?v=9y1NRNF3Sm0](https://www.youtube.com/watch?v=9y1NRNF3Sm0)
19. [https://www.youtube.com/watch?v=tmorf4dAAbo](https://www.youtube.com/watch?v=tmorf4dAAbo)
20. [https://www.youtube.com/watch?v=lNZOtrAzJzg](https://www.youtube.com/watch?v=lNZOtrAzJzg)
