<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="ar">
	<id>https://www.copticpedia.org/index.php?action=history&amp;feed=atom&amp;title=%D9%86%D9%82%D8%A7%D8%B4_%D8%A7%D9%84%D9%85%D8%B3%D8%AA%D8%AE%D8%AF%D9%85%3AKristineMedford</id>
	<title>نقاش المستخدم:KristineMedford - تاريخ المراجعة</title>
	<link rel="self" type="application/atom+xml" href="https://www.copticpedia.org/index.php?action=history&amp;feed=atom&amp;title=%D9%86%D9%82%D8%A7%D8%B4_%D8%A7%D9%84%D9%85%D8%B3%D8%AA%D8%AE%D8%AF%D9%85%3AKristineMedford"/>
	<link rel="alternate" type="text/html" href="https://www.copticpedia.org/index.php?title=%D9%86%D9%82%D8%A7%D8%B4_%D8%A7%D9%84%D9%85%D8%B3%D8%AA%D8%AE%D8%AF%D9%85:KristineMedford&amp;action=history"/>
	<updated>2026-04-26T16:25:00Z</updated>
	<subtitle>تاريخ التعديل لهذه الصفحة في الويكي</subtitle>
	<generator>MediaWiki 1.41.1</generator>
	<entry>
		<id>https://www.copticpedia.org/index.php?title=%D9%86%D9%82%D8%A7%D8%B4_%D8%A7%D9%84%D9%85%D8%B3%D8%AA%D8%AE%D8%AF%D9%85:KristineMedford&amp;diff=89958&amp;oldid=prev</id>
		<title>KristineMedford في ٢٠:٣٢، ٢٤ أبريل ٢٠٢٦</title>
		<link rel="alternate" type="text/html" href="https://www.copticpedia.org/index.php?title=%D9%86%D9%82%D8%A7%D8%B4_%D8%A7%D9%84%D9%85%D8%B3%D8%AA%D8%AE%D8%AF%D9%85:KristineMedford&amp;diff=89958&amp;oldid=prev"/>
		<updated>2026-04-24T20:32:59Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;ar&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;→ مراجعة أقدم&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;مراجعة ٢٠:٣٢، ٢٤ أبريل ٢٠٢٦&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l1&quot;&gt;سطر ١:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;سطر ١:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;{{Template&lt;/del&gt;:&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;Welcome|realName=Kristine Medford|name=KristineMedford}}&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;img  width: 750px;  iframe.movie  width&lt;/ins&gt;: &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;750px; height: 450px; &amp;lt;br&amp;gt;Secure web3 wallet setup connect to decentralized apps&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Secure Your Web3 Wallet A Step&lt;/ins&gt;-&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;by&lt;/ins&gt;-&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;Step Guide for DApp Connections&amp;lt;br&amp;gt;&lt;/ins&gt;&amp;lt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;br&amp;gt;Begin with a hardware-based vault like a Ledger or Trezor. This physical barrier isolates your cryptographic keys from internet exposure, making remote extraction practically impossible. Store the generated 12 or 24-word recovery phrase offline, engraved on steel, not on any digital device. This sequence is the absolute master key&lt;/ins&gt;; &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;its compromise means total loss of control.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Interact with autonomous platforms using a dedicated browser profile. Install only the official browser extension for your vault, directly from the source, and rigorously verify contract addresses before signing. Configure transaction previews and set explicit spending caps for each interaction to prevent drainer scripts from siphoning assets.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Treat every signature request with maximum scrutiny. Inspect permissions granted to smart contracts, revoking unnecessary allowances regularly through portals like Etherscan. For daily interactions, consider a low&lt;/ins&gt;-&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;balance, hot software profile, segregating it from your primary asset store. This compartmentalization limits potential damage.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Network choice directly impacts safety. Prefer established mainnets over unproven chains, and manually add networks through your vault's interface, never via a random website link. Your vigilance in these steps forms the non-negotiable foundation for all subsequent on-chain activity.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Secure Web3 Wallet Setup and Connection to Decentralized Apps&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Generate your seed phrase offline, ideally on a device that has never accessed the internet, to eliminate the risk of initial keylogger interception.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Immediately transcribe this 12 or 24-word recovery phrase onto a durable&lt;/ins&gt;, &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;non&lt;/ins&gt;-&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;digital medium like stainless steel plates, storing multiple copies in separate, physically secure locations&lt;/ins&gt;; &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;digital screenshots or cloud storage are unacceptable.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;For daily interactions, employ a hardware vault like a Ledger or Trezor, which keeps private keys isolated within the chip, ensuring transaction signing occurs in a shielded environment away from your computer's potentially compromised operating system.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Interaction Type&amp;lt;br&amp;gt;Recommended Tool&amp;lt;br&amp;gt;Primary Security Rationale&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;High-value, long&lt;/ins&gt;-&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;term asset storage&amp;lt;br&amp;gt;Hardware vault + paper backup&amp;lt;br&amp;gt;Complete air-gap for private keys&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Frequent trading, DeFi, NFT minting&amp;lt;br&amp;gt;Browser extension (e.g., MetaMask) paired with hardware vault&amp;lt;br&amp;gt;Hardware confirmation for every transaction&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Small amounts, experimental protocols&amp;lt;br&amp;gt;Dedicated, isolated browser extension with limited funds&amp;lt;br&amp;gt;Compartmentalization of risk&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Before linking your interface to a new protocol, manually verify the contract address against multiple official project channels–their official Twitter, GitHub repository, and Discord announcement–as phishing sites clone front-ends with altered, malicious addresses.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Configure custom RPC endpoints for networks you frequently use; relying on public defaults can expose your transaction data and IP address to centralized aggregators, compromising privacy.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Revoke token allowances periodically using tools like Etherscan's &quot;Token Approvals&quot; checker, as many protocols request unlimited spending permissions, leaving assets vulnerable if the contract is later exploited.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Treat every signature request with extreme suspicion, especially those demanding &quot;setApprovalForAll&quot; for NFTs or access to unrelated tokens; these are common vectors for draining entire portfolios in a single, unauthorized transaction.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Choosing the Right Wallet&lt;/ins&gt;: &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;Hardware vs. Software for Your Needs&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;For managing significant digital asset holdings, a hardware module like a Ledger or Trezor is non&lt;/ins&gt;-&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;negotiable. These physical devices store private keys offline, making them immune to remote hacking attempts. This isolation provides a robust defense for your portfolio, especially when interacting with various blockchain&lt;/ins&gt;-&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;based services.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Browser extensions such as MetaMask or Phantom offer superior convenience for frequent engagement with on&lt;/ins&gt;-&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;chain protocols. They facilitate instant transactions and portfolio management directly from your desktop. However&lt;/ins&gt;, &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;this accessibility introduces risk, as the keys reside on an internet-connected machine, potentially exposed to malware&lt;/ins&gt;. &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;Use these primarily for smaller, operational sums&lt;/ins&gt;.&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Evaluate your transaction volume and asset value. A hybrid approach is pragmatic: store the majority of holdings on a hardware vault and transfer only necessary amounts to a hot extension for active use. This method balances stringent protection with daily utility.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Always initiate transactions directly from the manufacturer's site, verify contract addresses meticulously before signing&lt;/ins&gt;, &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;and never share your secret recovery phrase.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Generating and Storing Your Secret Recovery Phrase Offline&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Immediately disconnect your device from all networks–Wi-Fi and mobile data–before the software creates the phrase.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Write each word in the exact sequence presented, using the correct letter case. Verify every character&lt;/ins&gt;; &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;a single mistake like &lt;/ins&gt;&quot;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;angle&quot; instead of &quot;angel&quot; will cause permanent loss of access.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&lt;/ins&gt;&amp;gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;Employ a physical medium designed for longevity:&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Titanium or stainless steel plates resistant to fire and corrosion.&amp;lt;br&amp;gt;Industrial-grade punch sets that stamp words into metal.&amp;lt;br&amp;gt;Cryptographic paper with acid-free, archival quality.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Standard paper is a temporary, vulnerable solution.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Split the 12 or 24-word sequence using a method like Shamir&lt;/ins&gt;'&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;s Secret Sharing if your tool supports it. Store fragments in separate, geographically distinct physical locations–a safe deposit box, a personal safe, a trusted relative&lt;/ins&gt;'&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;s secure location. This prevents a single point of failure.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Never, under any circumstance, digitize these words. Prohibit:&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Photographs with any device.&amp;lt;br&amp;gt;Cloud storage notes or documents.&amp;lt;br&amp;gt;Typing into a word processor or email draft.&amp;lt;br&amp;gt;Screenshots or screen recordings.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Digital copies exponentially increase theft risk.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Conduct a restoration test. Use the written phrase to recover your access on the same offline device, then permanently delete the newly created interface. This confirms the accuracy of your backup without exposing it.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Establish a protocol for periodic verification. Every six months, physically inspect your storage mediums for degradation. Check that the locations remain secure and that your inheritance instructions are current and understood by the necessary person.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;This phrase is the absolute master key. Its security depends entirely on its permanent isolation from any network-connected device and the durability of its physical backup.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;FAQ:&amp;lt;br&amp;gt;What&lt;/ins&gt;'&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;s the absolute first step I should take before even downloading a Web3 wallet?&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;The very first step is independent research. Never click a link from an unknown source. Visit the official website of the wallet you&lt;/ins&gt;'&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;re considering (like MetaMask.io, Rabby.io, or the site for a hardware wallet). Bookmark this official site. Use app stores or official repositories for downloads. This initial step of verifying authenticity protects you from fake wallet apps designed to steal your recovery phrase from the start.&amp;lt;br&amp;gt;&lt;/ins&gt;&amp;lt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;br&lt;/ins&gt;&amp;gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;I have my wallet. How do I actually connect it to a dApp, and is it safe?&lt;/ins&gt;&amp;lt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;br&lt;/ins&gt;&amp;gt;&amp;lt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;br&amp;gt;Connecting is usually straightforward. When you visit a dApp like a decentralized exchange or NFT platform, look for a &lt;/ins&gt;&quot;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;Connect Wallet&quot; button. Click it, select your wallet type (e.g., MetaMask), and a pop-up from your wallet will ask for permission to connect. This only shares your public address. It is generally safe for viewing. The critical safety point comes next&lt;/ins&gt;: &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;when you perform an action that requires a transaction, your wallet will show a detailed prompt. You must verify every detail—the contract address, the amount, and the gas fees—before signing. Never sign a transaction you don't understand.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;What's the single biggest security risk in using a hot wallet with dApps, and how do I minimize it?&amp;lt;br&amp;gt;&amp;lt;br&lt;/ins&gt;&amp;gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;The largest risk is approving malicious token permissions. When you swap tokens, you often sign a contract that grants the dApp an allowance to spend that token. A malicious contract could have an unlimited allowance. To minimize this, use your wallet&lt;/ins&gt;'&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;s permission review feature. Revoke old approvals regularly using tools like Etherscan&lt;/ins&gt;'&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;s Token Approval Checker or dedicated revoke sites. Consider using wallets like Rabby that simulate transactions and warn about suspicious approvals before you sign.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Is a hardware wallet necessary if I only use well-known dApps?&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Yes, it is a strong recommendation. A hardware wallet keeps your private keys offline. Even if you interact with a dApp that later has a security breach or you accidentally sign a malicious transaction on a reputable-looking fake site, the hardware wallet requires physical confirmation. Your private keys never leave the device. This means a hacker cannot drain your funds remotely. For any significant amount of crypto, a hardware wallet is the most effective security layer.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Can my funds be stolen just by connecting my wallet to a dApp?&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;No, not by connecting alone. The simple act of connecting only shares your public address, which is already visible on the blockchain. Theft requires you to sign a malicious transaction or contract. However, a compromised dApp could present a fake transaction interface. This is why you must never rely solely on the dApp&lt;/ins&gt;'&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;s website display. Always cross-check the transaction details in your wallet&lt;/ins&gt;'&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;s own pop-up window, as that is generated by your secured wallet software, not the website.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;I&lt;/ins&gt;'&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;m new to this. What&lt;/ins&gt;'&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;s the very first physical step I should take to set up a secure Web3 wallet?&amp;lt;br&amp;gt;&lt;/ins&gt;&amp;lt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;br&amp;gt;The first and most critical physical step is to acquire a hardware wallet, such as a Ledger or Trezor device, from the official manufacturer's website. Never buy a hardware wallet from third-party marketplaces. This device will generate and store your private keys offline, completely isolated from internet-connected devices. It serves as the foundational security layer for all your subsequent [https://extension-web3.com&lt;/ins&gt;/&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;index.php web3 wallet browser extension&lt;/ins&gt;] &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;activities.&lt;/ins&gt;&amp;lt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;br&lt;/ins&gt;&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt; &lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-side-added&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;-- &lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;[[مستخدم:Gerges|&lt;/del&gt;&amp;lt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;span style=&quot;color:#FFF&lt;/del&gt;;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;font&lt;/del&gt;-&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;family:Aref Ruqaa &lt;/del&gt;,&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;sans&lt;/del&gt;-&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;serif&lt;/del&gt;;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;font&lt;/del&gt;-&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;size&lt;/del&gt;:&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;20px;text&lt;/del&gt;-&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;shadow:&lt;/del&gt;-&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;1px &lt;/del&gt;-&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;1px #3AA&lt;/del&gt;,&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;1&lt;/del&gt;.&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;5px 1&lt;/del&gt;.&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;5px #3AA&lt;/del&gt;,&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;0 0 10px #0FF&lt;/del&gt;;&quot;&amp;gt;'''&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;Gerges''&lt;/del&gt;'&amp;lt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;/span&lt;/del&gt;&amp;gt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;]] &lt;/del&gt;&amp;lt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;sub&lt;/del&gt;&amp;gt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;[[نقاش مستخدم:Gerges|&lt;/del&gt;&amp;lt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;span style=&lt;/del&gt;&quot;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;color&lt;/del&gt;:&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;#3AA;&quot;&lt;/del&gt;&amp;gt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;(&lt;/del&gt;'''&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;راسل الأدمن جرجس&lt;/del&gt;'''&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;)&lt;/del&gt;&amp;lt;/&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;span&amp;gt;]&lt;/del&gt;]&amp;lt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;/sub&lt;/del&gt;&amp;gt; &lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;١٩:٠٩، ٢٤ أبريل ٢٠٢٦ (ت ع م)&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-side-added&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>KristineMedford</name></author>
	</entry>
	<entry>
		<id>https://www.copticpedia.org/index.php?title=%D9%86%D9%82%D8%A7%D8%B4_%D8%A7%D9%84%D9%85%D8%B3%D8%AA%D8%AE%D8%AF%D9%85:KristineMedford&amp;diff=89954&amp;oldid=prev</id>
		<title>New user message: إضافة رسالة ترحيب إلى صفحة نقاش مستخدم جديد</title>
		<link rel="alternate" type="text/html" href="https://www.copticpedia.org/index.php?title=%D9%86%D9%82%D8%A7%D8%B4_%D8%A7%D9%84%D9%85%D8%B3%D8%AA%D8%AE%D8%AF%D9%85:KristineMedford&amp;diff=89954&amp;oldid=prev"/>
		<updated>2026-04-24T19:09:10Z</updated>

		<summary type="html">&lt;p&gt;إضافة &lt;a href=&quot;/index.php/%D9%82%D8%A7%D9%84%D8%A8:Welcome&quot; class=&quot;mw-redirect&quot; title=&quot;قالب:Welcome&quot;&gt;رسالة ترحيب&lt;/a&gt; إلى صفحة نقاش مستخدم جديد&lt;/p&gt;
&lt;p&gt;&lt;b&gt;صفحة جديدة&lt;/b&gt;&lt;/p&gt;&lt;div&gt;{{Template:Welcome|realName=Kristine Medford|name=KristineMedford}}&lt;br /&gt;
&lt;br /&gt;
-- [[مستخدم:Gerges|&amp;lt;span style=&amp;quot;color:#FFF;font-family:Aref Ruqaa ,sans-serif;font-size:20px;text-shadow:-1px -1px #3AA,1.5px 1.5px #3AA,0 0 10px #0FF;&amp;quot;&amp;gt;'''Gerges'''&amp;lt;/span&amp;gt;]] &amp;lt;sub&amp;gt;[[نقاش مستخدم:Gerges|&amp;lt;span style=&amp;quot;color:#3AA;&amp;quot;&amp;gt;('''راسل الأدمن جرجس''')&amp;lt;/span&amp;gt;]]&amp;lt;/sub&amp;gt; ١٩:٠٩، ٢٤ أبريل ٢٠٢٦ (ت ع م)&lt;/div&gt;</summary>
		<author><name>New user message</name></author>
	</entry>
</feed>