[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"nav-categories":3,"article-world-13-the-forbidden-floor-we-designed-to-fear":70},{"data":4},[5,37,57,64],{"name":6,"slug":7,"categories":8},"Productivity","productivity",[9,13,17,21,25,29,33],{"id":10,"title":11,"slug":12},17,"Branding","branding",{"id":14,"title":15,"slug":16},19,"Marketing","marketing",{"id":18,"title":19,"slug":20},20,"Work","work",{"id":22,"title":23,"slug":24},34,"Community","community",{"id":26,"title":27,"slug":28},21,"For newbies","for-newbies",{"id":30,"title":31,"slug":32},24,"Investment","investment",{"id":34,"title":35,"slug":36},22,"Finance","finance",{"name":38,"slug":39,"categories":40},"Tech","tech",[41,45,49,53],{"id":42,"title":43,"slug":44},28,"Technology","technology",{"id":46,"title":47,"slug":48},32,"Artificial Intelligence","artificial-intelligence",{"id":50,"title":51,"slug":52},26,"Security and protection","security-and-protection",{"id":54,"title":55,"slug":56},31,"YouTube Blog","youtube-blog",{"name":58,"slug":59,"categories":60},"News","news",[61],{"id":62,"title":58,"slug":63},18,"quasanews",{"name":65,"slug":66,"categories":67},"Business","business",[68],{"id":69,"title":65,"slug":66},16,{"post":71,"published_news":96,"popular_news":162,"categories":233},{"title":72,"description":73,"meta_title":72,"meta_description":73,"meta_keywords":74,"text":75,"slug":76,"created_at":77,"publish_at":78,"formatted_created_at":79,"category_id":22,"links":80,"view_type":85,"video_url":86,"views":87,"likes":88,"lang":89,"comments_count":88,"category":90},"World 13: The Forbidden Floor We Designed to Fear","Discover why we still skip floor 13 — and what it really means. From ancient myths to modern algorithms, World 13 is the shadow we designed into reality.","number 13 superstition, why is 13 unlucky, 13th floor elevators, world 13 myth, fear of 13, missing 13th floor, triskaidekaphobia","\u003Ch4>\u003Cstrong>You&rsquo;ve never stood on the 13th floor\u003C/strong>\u003C/h4>\n\n\u003Chr />\n\u003Cp>\u003Cpicture class=\"image-align-right\">\u003Csource srcset=\"https://cdn.quasa.io/photos/j/_e4280274-12d2-42b8-a609-e4b7d8343e55.webp\" type=\"image/webp\">\u003Cimg alt=\"World 13: The Forbidden Floor We Designed to Fear\" class=\"image-align-right\" height=\"210\" src=\"https://cdn.quasa.io/photos/j/_e4280274-12d2-42b8-a609-e4b7d8343e55.jpeg\" width=\"210\" />\u003C/picture>Not really.\u003Cbr />\nYou might have passed it. Slept one story above it. Worked in a building where it&hellip; wasn&#39;t.\u003Cbr />\nBut you&rsquo;ve never been there. Because officially, \u003Cstrong>it doesn&rsquo;t exist\u003C/strong>.\u003C/p>\n\n\u003Cp>Still, something&rsquo;s there.\u003Cbr />\nAn absence, perfectly shaped like a floor.\u003Cbr />\nA space edited out of architecture, culture, memory.\u003Cbr />\n\u003Cstrong>World 13.\u003C/strong>\u003C/p>\n\n\u003Chr />\n\u003Ch4>\u003Cstrong>The Ritual of Removal\u003C/strong>\u003C/h4>\n\n\u003Chr />\n\u003Cp>More than 85% of high-rise buildings in North America skip the 13th floor.\u003Cbr />\nNot due to engineering, but \u003Cstrong>superstition disguised as design\u003C/strong>.\u003Cbr />\nThey label it 12A. Or 14. Or M &mdash; the 13th letter of the alphabet.\u003Cbr />\nThey rename the ghost. But it stays.\u003C/p>\n\n\u003Cp>The elevator becomes a priest, performing a quiet exorcism:\u003Cbr />\n\u003Cem>&ldquo;Forgive us our fears, as we deny this floor.&rdquo;\u003C/em>\u003C/p>\n\n\u003Chr />\n\u003Ch4>\u003Cstrong>Not a Number &mdash; a Fracture\u003C/strong>\u003C/h4>\n\n\u003Chr />\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/j/_b711f8ba-fef3-4c93-bd71-5a84e0dc33ce.webp\" type=\"image/webp\">\u003Cimg alt=\"World 13: The Forbidden Floor We Designed to Fear\" class=\"image-align-left\" height=\"210\" src=\"https://cdn.quasa.io/photos/j/_b711f8ba-fef3-4c93-bd71-5a84e0dc33ce.jpeg\" width=\"210\" />\u003C/picture>Thirteen isn&rsquo;t just unlucky. It&rsquo;s \u003Cstrong>irregular\u003C/strong>.\u003C/p>\n\n\u003Cp>Twelve is clean: months, hours, apostles, zodiac signs.\u003Cbr />\nThirteen is the \u003Cstrong>extra one\u003C/strong> &mdash; the glitch, the imbalance, the guest who wasn&rsquo;t invited.\u003C/p>\n\n\u003Cp>It doesn&rsquo;t fit the table.\u003Cbr />\nSo we remove the chair.\u003Cbr />\nAnd pretend the room was always symmetrical.\u003C/p>\n\n\u003Chr />\n\u003Ch4>\u003Cstrong>Thirteen in Code: Digital Ghosts\u003C/strong>\u003C/h4>\n\n\u003Chr />\n\u003Cp>The fear didn&rsquo;t vanish with the Enlightenment. It evolved.\u003C/p>\n\n\u003Cp>In blockchain systems, anomalies often appear at iteration 13.\u003Cbr />\nIn AI testing, certain models &quot;break character&quot; on the 13th prompt &mdash; outputting surreal or unsettling results.\u003Cbr />\nA TikTok urban legend: the 13th video in a viral sequence always flops &mdash; or goes \u003Cem>too\u003C/em> viral.\u003C/p>\n\n\u003Cp>Coincidence? Or is fear just another kind of algorithm?\u003C/p>\n\n\u003Chr />\n\u003Ch4>\u003Cstrong>&nbsp;Deep Dive &mdash; \u003Cem>Bybit and the &ldquo;Thirteenth Step&rdquo; (a close read)\u003C/em>\u003C/strong>\u003C/h4>\n\n\u003Chr />\n\u003Cp>\u003Cpicture class=\"image-align-right\">\u003Csource srcset=\"https://cdn.quasa.io/photos/j/_cffe0288-a0ac-48a5-86ad-54e4faa41427.webp\" type=\"image/webp\">\u003Cimg alt=\"World 13: The Forbidden Floor We Designed to Fear\" class=\"image-align-right\" height=\"250\" src=\"https://cdn.quasa.io/photos/j/_cffe0288-a0ac-48a5-86ad-54e4faa41427.jpeg\" width=\"250\" />\u003C/picture>There is a practical anatomy to modern crypto heists &mdash; and it rarely looks like the movie version. The Bybit breach (Feb 21, 2025) reads instead like a surgical strike: careful reconnaissance, a supply-chain compromise, a small change to a UI &mdash; and then a single human click that reprograms the vault. The result: roughly \u003Cstrong>$1.4&ndash;1.5 billion\u003C/strong> in Ethereum-based assets drained &mdash; one of the largest crypto thefts recorded.&nbsp;\u003C/p>\n\n\u003Cp>\u003Cstrong>What actually happened (stepwise, but keep the metaphor):\u003C/strong>\u003C/p>\n\n\u003Col>\n\t\u003Cli>\u003Cstrong>Recon &amp; compromise.\u003C/strong> Attackers gained access to a developer machine or infrastructure in the ecosystem that hosted the Safe (multisig) wallet UI. Instead of directly attacking the multisig cryptography, they attacked the \u003Cem>interface\u003C/em>.&nbsp;\u003C/li>\n\t\u003Cli>\u003Cstrong>Malicious UI injection.\u003C/strong> The Safe UI was subtly altered (malicious JavaScript) so that when signers reviewed an apparently routine transfer, the screen showed the expected destination and amounts while the \u003Cem>underlying transaction\u003C/em> or contract payload was different. This is a classic supply-chain / UI-spoofing vector.&nbsp;\u003C/li>\n\t\u003Cli>\u003Cstrong>The fateful approval.\u003C/strong> Multiple authorised signers &mdash; acting in good faith &mdash; approved the spoofed request. Once signed, the malicious payload executed an upgrade or replacement of the multisig contract&rsquo;s implementation (often via a delegatecall/upgrade pattern). In short: the wallet&rsquo;s logic was replaced with a contract the attacker controlled. The &ldquo;vault&rdquo; became a door the attacker could open.\u003C/li>\n\t\u003Cli>\u003Cstrong>Drain &amp; launder.\u003C/strong> Funds were moved on-chain through numerous &ldquo;hops&rdquo; &mdash; swaps and bridges such as THORChain, Paraswap, and DEX liquidity routes &mdash; obfuscating flows as the attacker consolidated value. Chain-analysis teams traced these hops in real time.&nbsp;\u003C/li>\n\u003C/ol>\n\n\u003Cp>If you want a single cinematic image for the paragraph: imagine twelve deliberate, careful checks &mdash; and then one last approval (the &ldquo;thirteenth&rdquo; in our story) that turns the safe into a mailbox. That moment is the hinge. Note: investigators do not record a literal &ldquo;13th click&rdquo; in public for Bybit &mdash; the thirteen motif here is a literary framing for the decisive approval step, not a forensic datum.\u003C/p>\n\n\u003Cp>\u003Cstrong>Why this is terrifying (and why the &ldquo;13&rdquo; metaphor fits):\u003C/strong>\u003C/p>\n\n\u003Cul>\n\t\u003Cli>\u003Cem>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/j/_75679a00-e1ba-440d-abf7-33d04e0b0518.webp\" type=\"image/webp\">\u003Cimg alt=\"World 13: The Forbidden Floor We Designed to Fear\" class=\"image-align-left\" height=\"210\" src=\"https://cdn.quasa.io/photos/j/_75679a00-e1ba-440d-abf7-33d04e0b0518.jpeg\" width=\"210\" />\u003C/picture>Trust is the weakest link.\u003C/em> Crypto&rsquo;s security often depends on human signers. Attackers increasingly target the \u003Cstrong>interface\u003C/strong> and the supply chain rather than brute-forcing keys. Bybit&rsquo;s exploit shows how a multisig &mdash; normally a gold standard for custody &mdash; can be circumvented by deceiving people, not math.&nbsp;\u003C/li>\n\t\u003Cli>\u003Cem>Contract upgrades are power tools.\u003C/em> Modern multisigs and upgradeable proxies use mechanisms (delegatecall, implementation swaps) that, if misused, let an attacker rewrite the contract&rsquo;s behavior. That single change can turn a locking mechanism into an exit hatch.&nbsp;\u003C/li>\n\t\u003Cli>\u003Cem>The money trail is fast but messy.\u003C/em> On-chain analysts followed funds through swaps and bridges; laundering patterns point to well-known mixers and decentralized routes. Tracing gives clues but recovering is complex.\u003C/li>\n\t\u003Cli>\u003Cstrong>Attribution &amp; fallout:\u003C/strong> Public reporting and investigative teams (and later authorities) linked the theft to persistent state-level actors (reporting pointed to Lazarus / North Korea-linked groups). The FBI and multiple blockchain forensics firms weighed in; the industry also noted two curious technical oddities (e.g., near-identical transaction hashes observed across chains) that complicated the trail.&nbsp;\u003C/li>\n\t\u003Cli>\u003Cstrong>How this could have been mitigated (practical takeaways):\u003C/strong>\u003C/li>\n\t\u003Cli>Out-of-band verification: signers should independently verify raw tx data (Etherscan or hardware wallet raw-data) rather than trusting a single shared UI.&nbsp;\u003C/li>\n\t\u003Cli>Supply-chain hygiene: hardened developer workflows, remote build attestations, and strict CI/CD controls to prevent injected JS on hosted UIs.&nbsp;\u003C/li>\n\t\u003Cli>Intrusion detection for contracts: runtime anomaly detection (on-chain IDS) that flags abnormal call patterns or unusual implementation upgrades. Research shows IDS can halt reentrancy-style or abnormal control-flow exploits.&nbsp;\u003C/li>\n\u003C/ul>\n\n\u003Cblockquote>\n\u003Cp>\u003Cstrong>\u003Cem>We like to imagine vaults are sealed with iron and math. In reality, they are sealed by attention: a dozen careful checks, and then one blind click. Call it the thirteenth step &mdash; not because investigators wrote the number into the logs, but because one extra act of trust was all it took to turn a fortress into a mailbox.\u003C/em>\u003C/strong>\u003C/p>\n\u003C/blockquote>\n\n\u003Chr />\n\u003Ch3>Sources (key investigations &amp; reporting)\u003C/h3>\n\n\u003Cul>\n\t\u003Cli>In-depth on-chain trace and analysis (Nansen).\u003C/li>\n\t\u003Cli>Technical breakdown of the multisig UI compromise (NCC Group).\u003C/li>\n\t\u003Cli>Coverage of malicious UI injection and technical vectors (Check Point, Cointelegraph).\u003C/li>\n\t\u003Cli>Reported attribution and timeline (Business Insider / FBI reporting).\u003C/li>\n\t\u003Cli>Notes on odd on-chain artifacts (identical tx hashes, etc.) and security implications\u003C/li>\n\u003C/ul>\n\n\u003Chr />\n\u003Ch4>\u003Cstrong>From Curse to Charm\u003C/strong>\u003C/h4>\n\n\u003Chr />\n\u003Cp>\u003Cpicture class=\"image-align-right\">\u003Csource srcset=\"https://cdn.quasa.io/photos/j/_b195ca2f-f32d-416d-88fa-11de22075bf4.webp\" type=\"image/webp\">\u003Cimg alt=\"World 13: The Forbidden Floor We Designed to Fear\" class=\"image-align-right\" height=\"250\" src=\"https://cdn.quasa.io/photos/j/_b195ca2f-f32d-416d-88fa-11de22075bf4.jpeg\" width=\"250\" />\u003C/picture>Not everyone avoids 13.\u003Cbr />\nSome claim it. As armor, as provocation, as glitch-magic.\u003C/p>\n\n\u003Cp>Taylor Swift calls 13 her lucky number &mdash; paints it on her hand like a ward.\u003Cbr />\nCrypto collectors launch &ldquo;13th editions&rdquo; as rare drops.\u003Cbr />\nGamers create secret 13th levels &mdash; warped, broken, beloved.\u003C/p>\n\n\u003Cp>\u003Cstrong>What was once a curse becomes a key.\u003C/strong>\u003Cbr />\nBecause a flaw is also a door.\u003C/p>\n\n\u003Chr />\n\u003Ch4>\u003Cstrong>The Architecture of Fear\u003C/strong>\u003C/h4>\n\n\u003Chr />\n\u003Cp>Why do we reshape the world around a number?\u003C/p>\n\n\u003Cp>Because \u003Cstrong>beliefs build\u003C/strong>, too.\u003Cbr />\nA missing floor is a scar where culture split from logic.\u003Cbr />\nA crack sealed not with plaster, but with silence.\u003C/p>\n\n\u003Cp>We think we&rsquo;re modern.\u003Cbr />\nBut deep down, we&rsquo;re still drawing circles in the sand.\u003Cbr />\nAnd skipping numbers, hoping the spirits won&rsquo;t notice.\u003C/p>\n\n\u003Chr />\n\u003Ch4>\u003Cstrong>The Atlas Forgot This One\u003C/strong>\u003C/h4>\n\n\u003Chr />\n\u003Cp>World 13 wasn&rsquo;t in the first edition of the Atlas.\u003Cbr />\nIt was hidden. Folded between entries. Not lost &mdash; just unlisted.\u003C/p>\n\n\u003Cp>Because it moves.\u003Cbr />\nIt doesn&rsquo;t stay between 12 and 14.\u003Cbr />\nSometimes it&rsquo;s between reason and doubt.\u003Cbr />\nSometimes between breath and silence.\u003Cbr />\nSometimes... between the click of the elevator and the door opening onto something that isn&rsquo;t quite the same anymore.\u003C/p>\n\n\u003Chr />\n\u003Ch4>\u003Cstrong>You don&rsquo;t find World 13\u003C/strong>\u003C/h4>\n\n\u003Chr />\n\u003Cp>\u003Cstrong>You fall into it.\u003C/strong>\u003C/p>","world-13-the-forbidden-floor-we-designed-to-fear","2025-08-09T21:03:12.000000Z","2025-08-12T08:17:00.000000Z","12.08.2025",{"image":81,"image_webp":82,"thumb":83,"thumb_webp":84},"https://cdn.quasa.io/images/news/Ivg0hX52U1mCOXbcrMLTD08oHpqGv3rw3jvcQCKK.jpg","https://cdn.quasa.io/images/news/Ivg0hX52U1mCOXbcrMLTD08oHpqGv3rw3jvcQCKK.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/Ivg0hX52U1mCOXbcrMLTD08oHpqGv3rw3jvcQCKK.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/Ivg0hX52U1mCOXbcrMLTD08oHpqGv3rw3jvcQCKK.webp","video","https://www.youtube.com/embed/rs0IzEbmClk?rel=0&amp;showinfo=0;autoplay=1",1038,0,"en",{"id":22,"title":23,"slug":24,"meta_title":91,"meta_description":92,"meta_keywords":91,"deleted_at":93,"created_at":94,"updated_at":95,"lang":89},"All the community news from around the world","From heart warming stories to everyday heroes and shocking events, we've got the latest real life stories to keep you entertained",null,"2025-01-10T08:48:23.000000Z","2025-01-10T09:34:07.000000Z",[97,112,124,136,149],{"title":98,"description":99,"slug":100,"created_at":101,"publish_at":101,"formatted_created_at":102,"category":103,"links":104,"view_type":109,"video_url":93,"views":110,"likes":88,"lang":89,"comments_count":88,"is_pinned":111},"Cloudflare Just Made Email a First-Class Citizen for AI Agents — And Traditional Email Services Are Feeling It","On April 17, 2026, Cloudflare quietly turned a long-standing dream into reality: it moved Email Service into public beta and added full Email Sending alongside the years-old Email Routing.","cloudflare-just-made-email-a-first-class-citizen-for-ai-agents-and-traditional-email-services-are-feeling-it","2026-04-19T18:41:05.000000Z","19.04.2026",{"title":43,"slug":44},{"image":105,"image_webp":106,"thumb":107,"thumb_webp":108},"https://cdn.quasa.io/images/news/BL8rqDdPh380Xfk5TP00aXBFWdOVXI5BUQ1TuSaC.jpg","https://cdn.quasa.io/images/news/BL8rqDdPh380Xfk5TP00aXBFWdOVXI5BUQ1TuSaC.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/BL8rqDdPh380Xfk5TP00aXBFWdOVXI5BUQ1TuSaC.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/BL8rqDdPh380Xfk5TP00aXBFWdOVXI5BUQ1TuSaC.webp","small",6,false,{"title":113,"description":114,"slug":115,"created_at":116,"publish_at":116,"formatted_created_at":102,"category":117,"links":118,"view_type":109,"video_url":93,"views":123,"likes":88,"lang":89,"comments_count":88,"is_pinned":111},"Mozilla Nails It: Thunderbolt Brings “ChatGPT at Home” to the Enterprise — Without Vendor Lock-In","While OpenAI and Anthropic race to sell their proprietary AI platforms to big corporations, Mozilla’s subsidiary MZLA Technologies has taken a very different route.","mozilla-nails-it-thunderbolt-brings-chatgpt-at-home-to-the-enterprise-without-vendor-lock-in","2026-04-19T15:37:27.000000Z",{"title":58,"slug":63},{"image":119,"image_webp":120,"thumb":121,"thumb_webp":122},"https://cdn.quasa.io/images/news/qaAODXSpJy6qpJc0eO9DQ2Y6ccJR1tlL5i3mN0kV.jpg","https://cdn.quasa.io/images/news/qaAODXSpJy6qpJc0eO9DQ2Y6ccJR1tlL5i3mN0kV.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/qaAODXSpJy6qpJc0eO9DQ2Y6ccJR1tlL5i3mN0kV.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/qaAODXSpJy6qpJc0eO9DQ2Y6ccJR1tlL5i3mN0kV.webp",23,{"title":125,"description":126,"slug":127,"created_at":128,"publish_at":128,"formatted_created_at":102,"category":129,"links":130,"view_type":109,"video_url":93,"views":135,"likes":88,"lang":89,"comments_count":88,"is_pinned":111},"X Is Finally Cracking Down on Unlabeled Ads — And It’s Personal","For years, X (formerly Twitter) has been a playground for undisclosed promotions, coordinated spam networks, and “native” advertising that masquerades as organic content.","x-is-finally-cracking-down-on-unlabeled-ads-and-it-s-personal","2026-04-19T15:07:48.000000Z",{"title":65,"slug":66},{"image":131,"image_webp":132,"thumb":133,"thumb_webp":134},"https://cdn.quasa.io/images/news/CQJ1gdssFGyJpfhfmRU2X4WT5fk5Boc8APXsjWX6.jpg","https://cdn.quasa.io/images/news/CQJ1gdssFGyJpfhfmRU2X4WT5fk5Boc8APXsjWX6.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/CQJ1gdssFGyJpfhfmRU2X4WT5fk5Boc8APXsjWX6.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/CQJ1gdssFGyJpfhfmRU2X4WT5fk5Boc8APXsjWX6.webp",25,{"title":137,"description":138,"slug":139,"created_at":140,"publish_at":141,"formatted_created_at":102,"category":142,"links":143,"view_type":109,"video_url":93,"views":148,"likes":88,"lang":89,"comments_count":88,"is_pinned":111},"Bitcoin Developers Propose BIP-361: Quantum-Proof Migration That Would Freeze Millions of Legacy Coins","In a move that could reshape the security of Bitcoin’s unspent transaction outputs forever, Bitcoin developers have introduced BIP-361 — officially titled “Post Quantum Migration and Legacy Signature Sunset.”","bitcoin-developers-propose-bip-361-quantum-proof-migration-that-would-freeze-millions-of-legacy-coins","2026-04-17T11:38:06.000000Z","2026-04-19T11:29:00.000000Z",{"title":43,"slug":44},{"image":144,"image_webp":145,"thumb":146,"thumb_webp":147},"https://cdn.quasa.io/images/news/XW07GuAbFLRaVskP2iUsv0witLmM4GwiSlwMPZpp.jpg","https://cdn.quasa.io/images/news/XW07GuAbFLRaVskP2iUsv0witLmM4GwiSlwMPZpp.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/XW07GuAbFLRaVskP2iUsv0witLmM4GwiSlwMPZpp.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/XW07GuAbFLRaVskP2iUsv0witLmM4GwiSlwMPZpp.webp",46,{"title":150,"description":151,"slug":152,"created_at":153,"publish_at":154,"formatted_created_at":102,"category":155,"links":156,"view_type":109,"video_url":93,"views":161,"likes":88,"lang":89,"comments_count":88,"is_pinned":111},"Thomas Peterffy’s Bold Vision for Prediction Markets: Why Interactive Brokers Is Betting Big on “Useful” Bets","In a wide-ranging conversation on Bloomberg’s Odd Lots podcast, Thomas Peterffy — founder, chairman, and CEO of Interactive Brokers (IBKR) — sat down to discuss one of the most intriguing projects in his company’s 50-year history: IBKR ForecastTrader, the brokerage giant’s freshly launched prediction market platform.","thomas-peterffy-s-bold-vision-for-prediction-markets-why-interactive-brokers-is-betting-big-on-useful-bets","2026-04-16T18:39:15.000000Z","2026-04-19T09:31:00.000000Z",{"title":65,"slug":66},{"image":157,"image_webp":158,"thumb":159,"thumb_webp":160},"https://cdn.quasa.io/images/news/48nr7BL364AeGyF1lbFbh13tx14RNr0P2uUnbVe0.jpg","https://cdn.quasa.io/images/news/48nr7BL364AeGyF1lbFbh13tx14RNr0P2uUnbVe0.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/48nr7BL364AeGyF1lbFbh13tx14RNr0P2uUnbVe0.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/48nr7BL364AeGyF1lbFbh13tx14RNr0P2uUnbVe0.webp",57,[163,176,192,204,219],{"title":164,"description":165,"slug":166,"created_at":167,"publish_at":168,"formatted_created_at":169,"category":170,"links":171,"view_type":109,"video_url":93,"views":174,"likes":175,"lang":89,"comments_count":88,"is_pinned":111},"The Anatomy of an Entrepreneur","Entrepreneur is a French word that means an enterpriser. Enterprisers are people who undertake a business or enterprise with the chance of earning profits or suffering from loss.","the-anatomy-of-an-entrepreneur","2021-08-04T15:18:21.000000Z","2025-12-14T06:09:00.000000Z","14.12.2025",{"title":65,"slug":66},{"image":172,"image_webp":93,"thumb":173,"thumb_webp":173},"https://cdn.quasa.io/images/news/mVsXPTMuHZuI7UXCsENgL1Qwp1uSOf7Rz3uVPMfm.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/mVsXPTMuHZuI7UXCsENgL1Qwp1uSOf7Rz3uVPMfm.webp",70822,2,{"title":177,"description":178,"slug":179,"created_at":180,"publish_at":181,"formatted_created_at":182,"category":183,"links":184,"view_type":189,"video_url":93,"views":190,"likes":191,"lang":89,"comments_count":88,"is_pinned":111},"Advertising on QUASA","QUASA MEDIA is read by more than 400 thousand people a month. We offer to place your article, add a link or order the writing of an article for publication.","advertising-on-quasa","2022-07-06T07:33:02.000000Z","2025-12-15T17:33:02.000000Z","15.12.2025",{"title":58,"slug":63},{"image":185,"image_webp":186,"thumb":187,"thumb_webp":188},"https://cdn.quasa.io/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.jpg","https://cdn.quasa.io/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.webp","large",70586,4,{"title":193,"description":194,"slug":195,"created_at":196,"publish_at":197,"formatted_created_at":198,"category":199,"links":200,"view_type":109,"video_url":93,"views":203,"likes":191,"lang":89,"comments_count":88,"is_pinned":111},"What is a Startup?","A startup is not a new company, not a tech company, nor a new tech company. You can be a new tech company, if your goal is not to grow high and fast; then, you are not a startup. ","what-is-a-startup","2021-08-04T12:05:17.000000Z","2025-12-17T13:02:00.000000Z","17.12.2025",{"title":65,"slug":66},{"image":201,"image_webp":93,"thumb":202,"thumb_webp":202},"https://cdn.quasa.io/images/news/EOsQhSW3VXyG7a6NPdE1oZd00xfJXe3bjY5aJGb7.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/EOsQhSW3VXyG7a6NPdE1oZd00xfJXe3bjY5aJGb7.webp",68219,{"title":205,"description":206,"slug":207,"created_at":208,"publish_at":209,"formatted_created_at":210,"category":211,"links":212,"view_type":109,"video_url":93,"views":217,"likes":175,"lang":89,"comments_count":218,"is_pinned":111},"Top 5 Tips to Make More Money as a Content Creator","Content creators are one of the most desired job titles right now. Who wouldn’t want to earn a living online?","top-5-tips-to-make-more-money-as-a-content-creator","2022-01-17T17:31:51.000000Z","2026-01-17T11:30:00.000000Z","17.01.2026",{"title":19,"slug":20},{"image":213,"image_webp":214,"thumb":215,"thumb_webp":216},"https://cdn.quasa.io/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.jpg","https://cdn.quasa.io/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.webp",42197,1,{"title":220,"description":221,"slug":222,"created_at":223,"publish_at":224,"formatted_created_at":225,"category":226,"links":227,"view_type":189,"video_url":93,"views":232,"likes":175,"lang":89,"comments_count":88,"is_pinned":111},"8 Logo Design Tips for Small Businesses","Your logo tells the story of your business and the values you stand for.","8-logo-design-tips-for-small-businesses","2021-12-04T21:59:52.000000Z","2025-05-05T03:30:00.000000Z","05.05.2025",{"title":15,"slug":16},{"image":228,"image_webp":229,"thumb":230,"thumb_webp":231},"https://cdn.quasa.io/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.jpg","https://cdn.quasa.io/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.webp",41293,[234,235,236,237,238,239,240,241,242,243,244,245,246],{"title":23,"slug":24},{"title":47,"slug":48},{"title":55,"slug":56},{"title":43,"slug":44},{"title":51,"slug":52},{"title":31,"slug":32},{"title":35,"slug":36},{"title":27,"slug":28},{"title":19,"slug":20},{"title":15,"slug":16},{"title":58,"slug":63},{"title":11,"slug":12},{"title":65,"slug":66}]