<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Jon Rahl &#8211; Purism</title>
	<atom:link href="https://puri.sm/posts/author/jon-rahl/feed/" rel="self" type="application/rss+xml" />
	<link>https://puri.sm/</link>
	<description>High-quality laptops that protect your freedom and privacy</description>
	<lastBuildDate>Mon, 09 Nov 2020 16:41:35 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=4.9.16</generator>

<image>
	<url>https://puri.sm/wp-content/uploads/2020/04/cropped-purism-logo-rectangle-1-32x32.png</url>
	<title>Jon Rahl &#8211; Purism</title>
	<link>https://puri.sm/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Hardware Can Be Your New Best Friend</title>
		<link>https://puri.sm/posts/hardware-can-be-your-new-best-friend/</link>
		<pubDate>Wed, 15 Jul 2015 00:46:56 +0000</pubDate>
		<dc:creator><![CDATA[Jon Rahl]]></dc:creator>
				<category><![CDATA[FAQs and documentation]]></category>
		<category><![CDATA[Firmware and BIOS]]></category>
		<category><![CDATA[Hardware]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=1284</guid>
		<description><![CDATA[<p>A visitor to the Purism site contacted us with a question. It&#8217;s a question that we sometimes encounter when we&#8217;re with friends or at events, and so we thought we&#8217;d share the response to his query. Q: On your website, you state: “All other laptops use hardware chips coupled with software that can betray you. [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/hardware-can-be-your-new-best-friend/">Hardware Can Be Your New Best Friend</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>A visitor to the Purism site contacted us with a question. It&#8217;s a question that we sometimes encounter when we&#8217;re with friends or at events, and so we thought we&#8217;d share the response to his query.</p>
<blockquote><p>Q: On your website, you state:</p>
<p>“All other laptops use hardware chips coupled with software that can betray you. News stories have shown how these chips can surreptitiously transmit voice, networking, picture or video signals. Other chips are used to install spyware, malware or viruses.”</p>
<p>I know about software vulnerabilities, but I had not heard of hardware itself having built-in backdoors. Could you provide any news articles to back up this assertion?</p></blockquote>
<p>Computerworld—a sober, technical publication—has an article outlining <a href="http://www.computerworld.com/article/2474275/cybercrime-hacking/17-exploits-the-nsa-uses-to-hack-pcs--routers-and-servers-for-surveillance.html" target="_blank">17 Exploits the NSA Uses to Hack PCs, Routers and Servers for Surveillance</a>, providing many links to original sources. It concerns their <em>Tailored Access Operations Program</em> (TAO) and reports from the Snowden Archive are six years old. Thus what we know of today is almost certainly worse that what’s current. And what we know now is very, <em>very</em> troubling.</p>
<p>As the computer trade magazine notes, before giving four screens of examples:</p>
<blockquote><p>Some of the exploits are deployed remotely and others are physically installed. Those hands-on operations may occur while the product is being shipped; it could be snagged during shipping so an obscure group like an FBI black bag team can do the NSA’s domestic dirty work. There are too many exploits listed in the leak to cover in one post, but I thought you might like to know about some that target servers, routers and PCs. Please note, however, that ANT can exploit nearly every major software, hardware and firmware.</p></blockquote>
<p>Noted computer security authority and journalist Jacob Appelbaum referenced exploits used to spy on Americans and foreigners alike – with the data-sharing agreements in place, it’s important to recognize this is fast becoming an academic distinction – by observing, “This is Turnkey Tyranny and it is here.”</p>
<p>Videos for the 30th Chaos Communication Congress, where Mr. Appelbaum’s two lectures (and many more covering this topic) are <a href="https://media.ccc.de/tags/30c3" target="_blank">here</a>.</p>
<p>As our blog article, &#8220;<a href="https://puri.sm/posts/shine-a-light-on-it-why-verifying-is-required-why-only-libre-allows-it/" target="_blank">Shine A Light On It: Why Verifying Is Required, Why Only Libre Allows It</a>&#8221; notes,</p>
<blockquote><p>In the tech field, what a few do today, more will do tomorrow and nearly everyone will be doing next week. Even if you trust intelligence agency bureaucracies – yours or others – to not spy too much on you, your family and your friends, it’s not “just” them. It’s those that will follow that will also be able to spy on you and yours using similar techniques, for much cheaper.</p></blockquote>
<p>Just since June ’15 alone, the OPM hacks purportedly by Chinese agents and—the irony—the Italian Hacking Team itself getting hacked proves our blog article’s concerns were, if not prescient, accurate. Smaller agencies than the NSA/GCHQ and even private parties—both who can categorically be characterized as not being particularly protective of American or even European citizens’ rights, security or well-being—are using similar exploits.</p>
<p>It’s code. It’s protocols. It doesn’t check first for the proper badge before running. There is no “magic golden key” allowing only The Good Guys™ from executing code.</p>
<p>All of this leaving aside the issue that hardware and software are becoming more conceptual categories than practical ones. Securing one or the other is no longer a guarantee of safety. You need to have both secured. And, given the complexities involved, the only reliable way to do this is to use the F/LOSSH (Free/Libre Open Source Software and Hardware) model. Since without verification, there can be no trust. Since, even though we may trust an institution or person now, we can’t have faith that five years from now, these organizations will be the same, or the people we trusted still in place.</p>
<p>We genuinely wish we lived in a world where our caution we have for our customers was unjustified or even, hysterical. We genuinely wish there wasn’t a need for someone like Purism to develop verifiably secure, transparent ways for people to organize their thoughts then share them. The world would be a better place. We’d probably all enjoy a bit more extra sleep. But that’s not the world we’ve inherited. So instead, we’re energized at the challenges we all face. And we’re excited at the opportunity to do our small part in correcting this very unwelcome change in our digital environment.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/hardware-can-be-your-new-best-friend/">Hardware Can Be Your New Best Friend</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></content:encoded>
			</item>
		<item>
		<title>Librem13 Protects Privacy</title>
		<link>https://puri.sm/posts/librem13-protects-privacy/</link>
		<pubDate>Sat, 20 Jun 2015 15:02:10 +0000</pubDate>
		<dc:creator><![CDATA[Jon Rahl]]></dc:creator>
				<category><![CDATA[Hardware]]></category>
		<category><![CDATA[Laptops]]></category>
		<category><![CDATA[Privacy]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=1223</guid>
		<description><![CDATA[<p>Introducing the Librem 13, a beautiful, svelte notebook computer built to respect and protect your privacy, security and freedom. It’s the world’s first laptop computer with every feature and application designed specifically around your security and privacy the minute the box is opened. There are no “backdoors” or “mystery code” in the hardware, kernel, operating system or software. Verifiably [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/librem13-protects-privacy/">Librem13 Protects Privacy</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Introducing the Librem 13, a beautiful, svelte notebook computer built to respect and protect your privacy, security and freedom. It’s the world’s first laptop computer with <em>every</em> feature and application designed specifically around your security and privacy the minute the box is opened. There are no “backdoors” or “mystery code” in the hardware, kernel, operating system or software. <a href="https://puri.sm/posts/shine-a-light-on-it-why-verifying-is-required-why-only-libre-allows-it/" target="_blank">Verifiably so</a>. Once the Librem is powered on, there are no additional software applications or utilities required to protect your privacy.</p>
<p><strong>Purism Kill Switches </strong></p>
<p>Innovative slider toggle switches, placed near the Librem’s hinge, ensure that the electrical circuits for Bluetooth, wireless, camera and microphone are physically severed. These hardware kill switches prevent digital adversaries from eavesdropping using the microphone or accessing the camera remotely. Another switch severs the over-the-air connections, reducing the possibility of remote access. On ordinary computers these features – and their purportedly fail-safe LED indicator lights – are activated via software. Malicious entities have already been proven to remotely surreptitiously use these devices while bypassing their LED. With the Librem 13, you have the ability to toggle one, either or both of the hardware kill switches.</p>
<p>“With massive data breaches of users’ private financial information happening seemingly weekly, we cannot afford to trust our most personal data to ordinary computers anymore. This is why we created the Librem, the first truly private personal computer, to protect and respect users’ rights to privacy, security and freedom,” says Purism CEO Todd Weaver.</p>
<p><strong>Verifiably Secure, Assuredly Privacy-Respecting, Fundamentally Freedom-Ensuring Software Pre-Installed</strong></p>
<p>The Librem 13 ships without “mystery code” or proprietary software of any kind, offering users complete transparency into the source code and control over all software.</p>
<p>Purism’s own PureOS is a secure, user-friendly Linux-based OS built using entirely Free/Libre Open Source software (F/LOSS). PureOS ships with hundreds of free software applications, all respecting users’ rights to privacy, security and freedom.</p>
<p>PureOS also included LibreOffice, a F/LOSS office suite, including spreadsheet, word processor, presentation &amp; drawing programs. These programs maintain file compatibility with Microsoft Office, ensuring users will work productively with MS Word, Excel, and Powerpoint files, as well as Adobe PDFs. Maintain workgroup compatibility without a monthly subscription or an always-on network connection.</p>
<p>PureBrowser is provided by default within PureOS, a completely <a href="https://puri.sm/posts/the-four-browser-freedoms/" target="_blank">secure and private web browser</a>, is based on the Firefox browser. Also pre-installed on your Librem 13 is the anonymity-preserving Tor browser.</p>
<p>Conventional computers ship with proprietary software pre-installed. These proprietary software updates contain “mystery code” (hidden, proprietary software without source code) or “binary blobs” (compiled binary files without source code). This “mystery code” creates a vulnerability that adversaries, data thieves and criminals can exploit to access your data.</p>
<p>Numerous examples – just from the past year alone – illustrate threats Librem computers will prevent:</p>
<ul>
<li>Corporate Exploits – Lenovo, a major Microsoft Windows-based manufacturer, was caught secretly installing the “Superfish&#8221; man-in-the-middle malware. All secure communications were intercepted, including user’s bank login credentials.</li>
<li>Social media – Over 2 million Facebook, Gmail, and Twitter accounts were intercepted from keylogger malware.</li>
<li>Spying – There have been numerous reports of stalkers remotely activating user’s microphone, webcam, or recording VoIP services.</li>
<li>Backdoors – Government entities creating software and hardware entry points that other countries – even groups not even feigning to serve a higher purpose – used for their own, nefarious purposes. Even destroying innocent users’ hardware in their attempts to compromise personal computers.</li>
<li>Data-mining – Third-party and ad trackers gather personal information about users’ browsing habits, selling the information far beyond the limited scope many assumed they’d agreed to.</li>
<li>Ransomware – Malware such as CryptoLocker and CryptoWall, encrypt users’ drives, forcing them to pay for a decryption key to retrieve their data within days or their hard drive will be “bricked”. Antivirus applications cannot prevent these threats.</li>
</ul>
<p>These violations are recent. More will follow. Some will be done by nations or politicians you won’t trust as much, if you trust those doing it are doing it now. Inevitably, these techniques be common enough that casual groups will form this threat.</p>
<p>Our lives are digital. It’s how we learn. How we express ourselves, with who, when. Who inspires us. Who we strive to become. Strangers – corporate, governmental or criminal – will <strong>no </strong>longer entitled to be part of deeply personal process.</p>
<p>Years ago, your computer being compromised by viruses was a routine. No longer.</p>
<p>Some claim “<a href="https://www.eff.org/deeplinks/2009/12/google-ceo-eric-schmidt-dismisses-privacy" target="_blank">privacy is over, get  over it</a>”. Purism wholeheartedly disagrees.</p>
<p>The days of blindly trusting proprietary mystery code, running on unverified mystery hardware, are done. The days of relying on the protection Purism provides has just begun.</p>
<p>Join us.</p>
<p><strong>Photos, Further Information &amp; Specifications</strong></p>
<p>For complete software and hardware specifications for the Librem 13, please visit the<strong> <a href="https://puri.sm/products/librem-13/" target="_blank" class="broken_link">Librem 13 Product Page</a></strong>.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/librem13-protects-privacy/">Librem13 Protects Privacy</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></content:encoded>
			</item>
		<item>
		<title>Pepcom Reveals</title>
		<link>https://puri.sm/posts/pepcom-reveals/</link>
		<pubDate>Tue, 16 Jun 2015 23:41:56 +0000</pubDate>
		<dc:creator><![CDATA[Jon Rahl]]></dc:creator>
				<category><![CDATA[Additional Press Information]]></category>
		<category><![CDATA[Events]]></category>
		<category><![CDATA[Laptops]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=1177</guid>
		<description><![CDATA[<p>Purism Reveals New Privacy-Enhancing Features in New York Members of the news media can meet Purism at the Digital Experience in New York City where we will be demonstrating our latest privacy-protecting hardware offerings This is an invite-only event for press and analysts, June 18, 2015, 6 pm – 9 pm EST in New York, New [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/pepcom-reveals/">Pepcom Reveals</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p style="text-align: center;"><strong>Purism Reveals New Privacy-Enhancing Features in New York</strong></p>
<p>Members of the news media can meet Purism at the Digital Experience in New York City where we will be demonstrating our latest privacy-protecting hardware offerings</span></p>
<p>This is an invite-only event for press and analysts, June 18, 2015, 6 pm – 9 pm EST in New York, New York.</p>
<p>Digital Experience! @ NYC is Pepcom&#8217;s annual summer showcase, a media event dedicated to showcasing the latest innovations in laptops, tablets, smartphones, apps, TVs, videogames, toys, gadgets, GPS, online shopping and a wide variety of technologies.</p>
<p>Please email <a href="mailto:rsvp@pepcom.com">rsvp@pepcom.com</a> if you are a member of the news media and can attend. West Coast and International press who cannot attend the event, please contact pr@puri.sm and you will receive the press release when we announce our news on June 18.</p>
<p><img class="size-full wp-image-1179" src="https://puri.sm/wp-content/uploads/2015/06/pepcom.jpeg" alt="Pepcom Digital Experience" width="801" height="403" srcset="https://puri.sm/wp-content/uploads/2015/06/pepcom.jpeg 801w, https://puri.sm/wp-content/uploads/2015/06/pepcom-300x151.jpeg 300w" sizes="(max-width: 801px) 100vw, 801px" /></p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/pepcom-reveals/">Pepcom Reveals</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></content:encoded>
			</item>
		<item>
		<title>Librem 15 Rev1 Sold Out, Shipped! Rev2 Begins Testing Phase</title>
		<link>https://puri.sm/posts/librem-15-rev1-sold-out-shipped-rev2-begins-testing-phase/</link>
		<pubDate>Tue, 09 Jun 2015 21:26:55 +0000</pubDate>
		<dc:creator><![CDATA[Jon Rahl]]></dc:creator>
				<category><![CDATA[Hardware]]></category>
		<category><![CDATA[Laptops]]></category>
		<category><![CDATA[Newsletter and status updates]]></category>
		<category><![CDATA[Supply chain]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=1092</guid>
		<description><![CDATA[<p>Things are moving right along at Purism! We’ve begun shipping the Librem 15 Rev1. We are excited to announce that the Librem 15 Rev1 has sold out! We will begin testing on the second prototype of the Librem 15 Rev2. If our rigorous standards are met during the testing process, we will immediately begin assembly in a rolling shipment plan, beginning [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/librem-15-rev1-sold-out-shipped-rev2-begins-testing-phase/">Librem 15 Rev1 Sold Out, Shipped! Rev2 Begins Testing Phase</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Things are moving right along at Purism!</p>
<p>We’ve begun shipping the Librem 15 Rev1. We are excited to announce that the Librem 15 Rev1 has sold out!</p>
<p><a href="https://puri.sm/wp-content/uploads/2014/11/librem-laptop-opened-right-side.jpg"><img class=" size-large wp-image-466 aligncenter" src="https://puri.sm/wp-content/uploads/2014/11/librem-laptop-opened-right-side-1024x682.jpg" alt="librem-laptop-opened-right-side" width="700" height="466" srcset="https://puri.sm/wp-content/uploads/2014/11/librem-laptop-opened-right-side-1024x682.jpg 1024w, https://puri.sm/wp-content/uploads/2014/11/librem-laptop-opened-right-side-300x200.jpg 300w" sizes="(max-width: 700px) 100vw, 700px" /></a></p>
<p>We will begin testing on the second prototype of the Librem 15 Rev2. If our rigorous standards are met during the testing process, we will immediately begin assembly in a rolling shipment plan, beginning with those orders placed earliest with the least complex configurations, and commencing with the later, more complex configurations.</p>
<p>Thanks again to all the backers for helping us specify what should be included in the Librem 15 Rev2! As a reminder, the Librem 15 Rev2 includes:</p>
<ul>
<li>An option for 32GB of RAM</li>
<li>USB 3.1 support</li>
<li>Longer battery life</li>
<li>And, of course, the Hardware Kill Switches, one for mic/camera, another for Wi-Fi &amp; Bluetooth signals. The Purism HKS is included as a free upgrade for our backers who’ve already ordered a Rev2.</li>
</ul>
<p>Once the Librem 15 Rev2 prototype is approved, we will announce it here. Keep checking! We’ll also communicate your specific ship date individually.</p>
<p>Any orders placed after today’s date will ship in September. The Purism Kill Switches will be available as a (wonderful) option.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/librem-15-rev1-sold-out-shipped-rev2-begins-testing-phase/">Librem 15 Rev1 Sold Out, Shipped! Rev2 Begins Testing Phase</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></content:encoded>
			</item>
		<item>
		<title>The Four [Browser] Freedoms</title>
		<link>https://puri.sm/posts/the-four-browser-freedoms/</link>
		<pubDate>Tue, 19 May 2015 02:49:12 +0000</pubDate>
		<dc:creator><![CDATA[Jon Rahl]]></dc:creator>
				<category><![CDATA[Software]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[PureOS]]></category>
		<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=623</guid>
		<description><![CDATA[<p>Seventy-five years ago, Franklin D. Roosevelt proposed four fundamental freedoms that people everywhere in the world should enjoy. Purism now proposes four fundamental freedoms we should insist in our digital lives. In the first of a series of discussions, we focus on what we demand in a web browser before it’s included in PureOS. Purism&#8217;s [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/the-four-browser-freedoms/">The Four [Browser] Freedoms</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Seventy-five years ago, Franklin D. Roosevelt <a href="https://en.wikipedia.org/wiki/Four_Freedoms" target="_blank">proposed</a> four fundamental freedoms that people everywhere in the world should enjoy. Purism now proposes four fundamental freedoms we should insist in our digital lives. In the first of a series of discussions, we focus on what we demand in a web browser before it’s included in PureOS.</p>
<p>Purism&#8217;s default web browser—PureBrowser—is one of the most secure, private, and freedom-respecting browser available, with a philosophy that will keep it respecting users’ rights in the future as new exploits and vulnerabilities are exposed and discovered.</p>
<p>There is only one sure way to ensure total security and privacy: <em>don’t go online.</em> However, that would make us even less free. Freedom compels risk-taking. Inaction is another path to servitude.</p>
<p><a href="https://pureos.net/">PureOS</a> demands four fundamental freedoms:</p>
<ol>
<li><b>Useable to everyone; safety in numbers.</b> A secure system few use is as bad as a compromised system everyone uses. Safety is contagious. If only a few people are using online privacy schemes, they stand out to thieves and other hostile entities. This isolation makes them targets. Thus, everyone’s privacy matters. Protecting less technically sophisticated users strengthens even the most sophisticated of us.</li>
<li><b>Individual &amp; personal</b>. Everyone’s threat model – who is after you, for what, why &amp; how – differs. Even for the same person, it changes, depending on context. Freedom means making knowledgeable choices that best suit our circumstances. Our <i>fluid</i> circumstances.</li>
<li><b>Collectively verifiable &amp; reliable</b>. With your digital life at stake, promises are the wind. Only by using Free/Libre Open Software &amp; Hardware (F/LOSSH) can we objectively verify claims.</li>
<li><b>Transparent</b>. Your software and hardware – and those making it – should be forthright in its function, capable in delivering them and limited to doing only what they promise.</li>
</ol>
<p>Compared to common browsers, PureBrowser respects and protects your rights to privacy, security, and freedom by:</p>
<ol>
<li><b>Blocking third party trackers &amp; advertisers by default.</b> These are designed to gather private details about your browsing habits. Opting in should be your choice – not opting out.</li>
<li><b>Using HTTPS where ever possible by default.</b> Encrypting these connections prevents your behavior and information from being monitored by malicious groups while it is in transit. This also prevents you or the site you think you’re visiting from being hijacked by a third party.</li>
<li><b>Being Free/Libre Open Software (F/LOSS).</b> Without the ability to audit the software, it’s impossible to be certain how it works. Since Libre software&#8217;s source is made available – every line of code, by definition, has to be – it can be verified that it is what it purports to be. Communities together ensure this is the case. F/LOSS principles don’t require that we trust the author, it requires we trust <b>the community</b>.</li>
<li><b>Never “phoning home” any personally identifying information surreptitiously.</b> Information collected is, inevitably, information used. Chekhov’s Database, if you will.</li>
</ol>
<p>&nbsp;</p>
<h2 class="tablepress-table-name tablepress-table-name-id-13">The Four [Browser] Freedoms</h2>

<table id="tablepress-13" class="tablepress tablepress-id-13">
<thead>
<tr class="row-1 odd">
	<th class="column-1">&nbsp;</th><th class="column-2"><div style="width:100%;height:100%;text-align: center">MS Internet <br />
Explorer</th><th class="column-3"><div style="width:100%;height:100%;text-align: center">Google <br />
Chrome</th><th class="column-4"><div style="width:100%;height:100%;text-align: center">Mozilla <br />
Firefox</th><th class="column-5"><div style="width:100%;height:100%;text-align: center">Apple <br />
Safari</th><th class="column-6"><div style="width:100%;height:100%;text-align: center">Purism <br />
PureBrowser</th>
</tr>
</thead>
<tbody class="row-hover">
<tr class="row-2 even">
	<td class="column-1"><div style=“width:50%;height:100%">Blocks sending identifying details</td><td class="column-2"><div style="width:100%;height:100%; background: darkred;text-align: center"><span style="color: white; font-weight: normal">No</span></div></td><td class="column-3"><div style="width:100%;height:100%; background: darkred;text-align: center"><span style="color: white; font-weight: normal">No</span></div></td><td class="column-4"><div style="width:100%;height:100%; background: darkred;text-align: center"><span style="color: white; font-weight: normal">No</span></div></td><td class="column-5"><div style="width:100%;height:100%; background: orange;text-align: center"><span style="color: white; font-weight: normal">Partial<sup><a href="#fn1" id="ref1" style="color: white">1</a></sup></span></div></td><td class="column-6"><div style="width:100%;height:100%; background: green;text-align: center"><span style="color: white; font-weight: normal">Yes</span></div></td>
</tr>
<tr class="row-3 odd">
	<td class="column-1"><div style=“width:50%;height:100%">HTTPS Everywhere by default</td><td class="column-2"><div style="width:100%;height:100%; background: darkred;text-align: center"><span style="color: white; font-weight: normal">No</span></div></td><td class="column-3"><div style="width:100%;height:100%; background: darkred;text-align: center"><span style="color: white; font-weight: normal">No</span></div></td><td class="column-4"><div style="width:100%;height:100%; background: darkred;text-align: center"><span style="color: white; font-weight: normal">No</span></div></td><td class="column-5"><div style="width:100%;height:100%; background: darkred;text-align: center"><span style="color: white; font-weight: normal">No</span></div></td><td class="column-6"><div style="width:100%;height:100%; background: green;text-align: center"><span style="color: white; font-weight: normal">Yes</span></div></td>
</tr>
<tr class="row-4 even">
	<td class="column-1"><div style=“width:50%;height:100%">Free/Libre &amp; Open Source</td><td class="column-2"><div style="width:100%;height:100%; background: darkred;text-align: center"><span style="color: white; font-weight: normal">No</span></div></td><td class="column-3"><div style="width:100%;height:100%; background: orange;text-align: center"><span style="color: white; font-weight: normal">Partial<sup><a href="#fn2" id="ref2" style="color: white">2</a></sup></span></div></td><td class="column-4"><div style="width:100%;height:100%; background: green;text-align: center"><span style="color: white; font-weight: normal">Yes</span></div></td><td class="column-5"><div style="width:100%;height:100%; background: darkred;text-align: center"><span style="color: white; font-weight: normal">No</span></div></td><td class="column-6"><div style="width:100%;height:100%; background: green;text-align: center"><span style="color: white; font-weight: normal">Yes</span></div></td>
</tr>
<tr class="row-5 odd">
	<td class="column-1"><div style=“width:50%;height:100%">Blocks 3rd Party trackers by default</td><td class="column-2"><div style="width:100%;height:100%; background: darkred;text-align: center"><span style="color: white; font-weight: normal">No</span></div></td><td class="column-3"><div style="width:100%;height:100%; background: darkred;text-align: center"><span style="color: white; font-weight: normal">No</span></div></td><td class="column-4"><div style="width:100%;height:100%; background: darkred;text-align: center"><span style="color: white; font-weight: normal">No</span></div></td><td class="column-5"><div style="width:100%;height:100%; background: orange;text-align: center"><span style="color: white; font-weight: normal">Partial<sup><a href="#fn3" id="ref3" style="color: white">3</a></sup></span></div></td><td class="column-6"><div style="width:100%;height:100%; background: green;text-align: center"><span style="color: white; font-weight: normal">Yes</span></div></td>
</tr>
</tbody>
</table>
<span class="tablepress-table-description tablepress-table-description-id-13"><sup id="fn1">1. Sends information to Apple for diagnostic purposes and to facilitate user-anticipated services.</sup><br />
<sup id="fn2">2. Source code is released under free licenses, but other freedom and privacy restricting features exist.</sup><br />
<sup id="fn3">3. Blocks 3rd party cookies; can send HTTP header request to them.</sup></span>
<!-- #tablepress-13 from cache -->
<p>Summarizing the table above:</p>
<ul>
<li>Microsoft’s Internet Explorer – and most likely their in-development browser, Edge – fail all four of these essential tests.</li>
<li>Google’s browser fails more than three of the four.</li>
<li>As of this writing, the general release of Firefox also fails three-quarters of them.</li>
<li>Apple’s Safari fails half.</li>
<li>PureBrowser passes all four of these essential tests. From the start, Purism’s PureBrowser blocks your personal information from being sent to groups you most likely do not want them to have.</li>
</ul>
<p>Purism uses a fork—creates a distinct &amp; separate piece of software—of Firefox, developed by the Trisquel development team. Wikipedia <a href="https://en.wikipedia.org/wiki/Trisquel" target="_blank">characterizes</a> Trisquel as a fully F/LOSS system without proprietary software or firmware, noting that it is “listed by the Free Software Foundation as a distribution that contains only Free software.” Purism takes this already exemplary version then optimize it for the Librem laptops running PureOS and adds more privacy protections.</p>
<p>We carefully select privacy-enhancing add-ons, by default, such as the <a href="https://www.eff.org/" target="_blank">EFF’s</a> <i>Privacy Badger</i>, that blocks third-party advertisers tracking literally every site you visit, page you view &amp; video you watch.</p>
<p>PureOS also includes the EFF’s <i>HTTPS Everywhere</i> browser extension, which is also turned on by default.</p>
<p>Finally, we proudly include the superlative Tor Browser from the <a href="https://www.torproject.org/index.html.en" target="_blank" class="broken_link">Tor Project</a> to ensure your anonymity.</p>
<p>The threats we face are many, varied and constantly evolving. Purism will be constantly evolving, too. We’ll continue evaluating the best, most effective add-ons, the tightest, best source code and most cunning new exploits to keep PureBrowser the most rights-respecting browser available to safeguard your privacy.</p>
<p>We were delighted to discover, while writing this article, that the founder of the <a href="https://www.fsf.org/" target="_blank">Free Software Movement</a>, Dr. <a href="https://en.wikipedia.org/wiki/Richard_Stallman" target="_blank">Richard</a> <a href="https://www.stallman.org/" target="_blank">Stallman</a>, was also inspired by President Roosevelt when he proposed his <a href="https://en.wikipedia.org/wiki/The_Free_Software_Definition" target="_blank">Four Essential Freedoms</a>. We ecstatically, humbly, follow these two superlative tracks of footsteps.</p>
<p>Rather than close with a <em>The only thing we have to fear…</em>, let us instead close with Mr. Roosevelt’s, <em>Happiness lies in the joy of achievement and the thrill of creative effort</em>.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/the-four-browser-freedoms/">The Four [Browser] Freedoms</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></content:encoded>
			</item>
		<item>
		<title>Shine A Light On It: Why Verifying Is Required, Why Only Libre Allows It</title>
		<link>https://puri.sm/posts/shine-a-light-on-it-why-verifying-is-required-why-only-libre-allows-it/</link>
		<pubDate>Mon, 18 May 2015 23:49:40 +0000</pubDate>
		<dc:creator><![CDATA[Jon Rahl]]></dc:creator>
				<category><![CDATA[Hardware]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Laptops]]></category>
		<category><![CDATA[PureOS]]></category>
		<category><![CDATA[Software freedom]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=635</guid>
		<description><![CDATA[<p>Why is the ability to independently verify source code in software or hardware required? Supporters of Free/Libre software often emphasize the benefit of being able to verify code. Why is this a big deal? Why is it a big deal now? A key benefit of Free/Libre Open Source software and hardware is that you don’t [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/shine-a-light-on-it-why-verifying-is-required-why-only-libre-allows-it/">Shine A Light On It: Why Verifying Is Required, Why Only Libre Allows It</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Why is the ability to independently verify source code in software or hardware required?</p>
<p>Supporters of Free/Libre software often emphasize the benefit of being able to verify code. Why is this a big deal? Why is it a big deal now?</p>
<p>A key benefit of Free/Libre Open Source software and hardware is that you don’t have to trust the man behind the curtain swearing The Great Oz is, in fact, great. You don’t have to trust. You can verify.</p>
<p>In a closed source world, I may trust one company, for instance. I may trust another company, generally, but less. I may (or may not) trust a third company. You may trust different companies’ business models, ethics or values along a continuum. Who’s right? Who’s wrong? Who knows?</p>
<p>Wouldn’t it be great if, instead of figuring which of the three is less bad, I (and other vast pools of individuals with expertise working together) had a way to know if something they said was actually something they did? Wouldn’t it be great if, companies know that any hidden backdoors compromising most of their users true interests would be exposed, so they’d be less inclined to consider leaving them in the lurch? Software that is open source (or Free, Libre or Free/Libre (loosely, synonyms)) does exactly that. It allows everyone to verify everyone else’s work to make sure it does what it says it does. By relying on each other and themselves, instead of marketing or PR.</p>
<p>We all know now, that there’s more software burned into the ROM of a thermostat than those Apollo guys used to get to Venus. What’s in that?</p>
<p>Few gave it much thought since until recently, there wasn’t much information collected. It wasn’t linked. There weren’t techniques to parse it into anything useful. Now there is. That’s what the popular press refers to with “Big Data”. There’s really cool stuff we can do. There’s a lot of really bad stuff we can do. Most of us don’t. When the Snowden archive hit, we – those paying attention, at least – collectively realized our worst-case “bad” was so much more benign than what has actually been going on.</p>
<p>In the tech field, what a few do today, more will do tomorrow and nearly everyone will be doing next week. Even if you trust intelligence agency bureaucracies – yours or others – to not spy too much on you, your family and your friends, it’s not “just” them. It’s those that will follow that will also be able to spy on you and yours using similar techniques, for much cheaper.</p>
<p>These techniques and layers of software &amp; hardware complication are going to vastly increase, not decrease. That ship’s sailed. We can’t change that. And honestly, most people want the benefits these changes bring.</p>
<p>So, what can we control? Verifying our software (Richard Stallman started raising this issue back in 1983). Verifying our hardware (we only recently figured out a way to make this possible for laptops about a year ago). We have a roadmap to get it all verified (the last, most complicated part concerns the CPU and how it talks to the motherboard, which we’re making progress on).</p>
<p>It’s this ability to verify not only the software but also the hardware, that is a really big deal. Beyond legions of crowds of people reviewing the code, just the potential of this is enough to keep the hardware and software manufacturers relatively honest. We no longer have to take the Great Oz’s word for it, we can verify. Everyone can verify Purism products in unparalleled ways – that they cannot do with Win/Tel, Google or Apple – because finally, both software and hardware are F/LOSS.</p>
<p>So. That’s why being able to independently verify claims made about software and hardware is both really important and is something that we created Purism to be able to do. So all of us working together can trust each other. Without having to close our eyes and leap, using blind faith. It’s a claim that no matter how much you may trust Apple, Google, Microsoft, Sony or Lenovo, none of these other companies can make.</p>
<p>Join us. Working together is the only way we will truly protect ourselves.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/shine-a-light-on-it-why-verifying-is-required-why-only-libre-allows-it/">Shine A Light On It: Why Verifying Is Required, Why Only Libre Allows It</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></content:encoded>
			</item>
		<item>
		<title>Production and Shipping Update</title>
		<link>https://puri.sm/posts/production-and-shipping-update/</link>
		<pubDate>Sun, 17 May 2015 22:49:59 +0000</pubDate>
		<dc:creator><![CDATA[Jon Rahl]]></dc:creator>
				<category><![CDATA[Hardware]]></category>
		<category><![CDATA[Manufacturing Operations and Logistics]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Laptops]]></category>
		<category><![CDATA[Newsletter and status updates]]></category>
		<category><![CDATA[PureOS]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=646</guid>
		<description><![CDATA[<p>Hello, Backers! Thank you again for helping us improve the world of privacy, security, and freedom in computing! Here at Purism, we have been busy working on production of the Librem 15 laptops, and we are excited to share the following updates with you. Most importantly, we need to let you know about about some [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/production-and-shipping-update/">Production and Shipping Update</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Hello, Backers!</p>
<p>Thank you again for helping us improve the world of privacy, security, and freedom in computing!</p>
<p>Here at Purism, we have been busy working on production of the Librem 15 laptops, and we are excited to share the following updates with you. Most importantly, we need to let you know about about some of the configuration and design decisions we are facing<del>, as well our findings regarding the physical hardware boundaries from Intel</del>. We see this as a wonderful opportunity to work directly with our faithful backers, to not only create the ideal laptop for our users, but to craft hardware and software that aligns with our beliefs.</p>
<h3>SHIP DATES</h3>
<p>We are shipping the Librem 15 rev1 configuration within the next few weeks.</p>
<p>The Librem 15 rev2 base model will ship beginning in June. Models with different configuration options will be shipped following the base model.</p>
<p>If you have not received an explicit email about Librem 15 rev1, you are in line to receive the Librem rev2 configuration.</p>
<p>Please contact us at <a href="mailto:info@puri.sm">info@puri.sm</a> if it is unclear which model you are receiving, and we will clarify when you can expect to receive your Librem 15 laptop.</p>
<h3>CHANGES TO THE REVISION CONFIGURATIONS</h3>
<p>Some of the changes to the Librem 15 rev1 and Librem 15 rev2 configurations have directly affected the CPU, battery life, <del>RAM,</del> optical drive, and some hardware choices.</p>
<h4>CASE</h4>
<p>Librem 15 rev1 will support an optical drive and RJ-45, as represented by our images of the existing case. Librem 15 rev2 will be thinner, removing the optical drive and RJ-45.</p>
<h4>CPU</h4>
<ul>
<li>Librem 15 rev1 will include the i7-4712MQ of CPU, a 4th Gen Intel CPU.</li>
<li>Librem 15 rev2 will include the i7-5557U of CPU, a 5th Gen Intel CPU.</li>
</ul>
<p>Due to the design of our case, there was not enough physical space to fit four RAM slots. We can only physically fit two RAM slots in our case. As such, after production, we found we cannot support 32GB of RAM with the 4x8GB configuration. The company Intelligent Memory was brought to our attention (www.intelligentmemory.com), as they supply 16GB sticks, but we discovered those sticks only work with 5th Gen Intel CPUs. We then decided to look more closely at 5th Gen CPUs, which have 2 cores and a longer battery life. Our next step was to look into using two RAM slots at 16GB each to equal the 32GB RAM physical maximum. <del>This was not possible, because Intel’s 5th Gen CPUs have a physical memory maximum of 16GB.</del> See <a href="https://puri.sm/posts/32gb-is-back/" target="_blank">32GB Is Back!</a> post. Intel appears to use a stated limit of 16GB. PC World and others informed us that their 5th Gen CPUs support 32GB. Thus, we&#8217;ll tentatively continue offering this configuration, pending our own testing.</p>
<p>In conclusion, we opted for the i7-5557U 5th Gen, with 28W for longer battery life<del>, and had to drop to 16GB physical CPU memory maximum</del> for Librem 15 rev2.</p>
<h4><del>MEMORY</del></h4>
<p><del>As described above, with the hard limit in our case, the CPU physical memory maximum for the Librem 15 rev2 is 16GB 32GB of RAM. (Note: Refunding the difference for those that ordered &gt; 16GB will be occurring within the next three weeks).</del></p>
<h4>2ND DRIVE BAY</h4>
<ul>
<li>Librem 15 rev1 will ship with a CD/DVD ROM only for the 2nd drive bay.</li>
<li>Librem 15 rev2 will ship with a battery or 2nd drive only (no optical drives) for the 2nd drive bay. (Note: If his effects your order, we will be in contact individually to adjust your configuration and associated costs/refunds).</li>
</ul>
<h4>HARDWARE KILL SWITCHES</h4>
<p>The hardware kill switch is an exciting feature. We know we can physically cut the circuits, however, the issue is where to put the kill switches to have them externally accessible and not get accidentally tripped, while also providing visual feedback as to the on/off status (either through a toggle/color, or through a hardware LED).</p>
<p>Modifying the case for this feature has presented a challenge. We are not able to place a large enough order to warrant case tooling modifications. So we then decided to look at modifying existing keyboard keys to accomplish our hardware kill switch goals. For example, we researched moving PRTSCR/SysRq and Pause/Break into Fn keystrokes, and using those keys as the hardware kill switches, but we were faced with loss of visible on/off status.</p>
<p>This brought us back to case modifications, adding an LED light when those keys are toggled.</p>
<p>We find ourselves at the original idea of case modification, employing physical circuit cutting hardware kill switches. We will keep working to solve this issue and will update you on our progress.</p>
<h4>TOUCHPAD DRIVER</h4>
<p>The touchpad driver, upon testing, works as a PS/2 Mouse. While the touchpad driver has proper movement and scrolling, the driver doesn’t currently support true multitouch functionality. We also are continuing to investigate a tap-to-click usability issue, and are working to track down the protocol specifications to improve the kernel driver, allowing us to use the hardware with the multitouch function.</p>
<h4>PureOS (Trisquel Based Purism Operating System)</h4>
<p>PureOS is humming along nicely. We expect to have a release within the next month. The OS will improve default security and privacy protocols, as well as improve the usability of the UI.</p>
<p>The entire Purism team thanks you for your input and our initial collaboration on this exciting project.</p>
<p>It’s a privilege to be able to work on something like this, and work so closely with people who can have an impact on privacy and security in computing. Our innovations, our efforts, would not be possible without you.</p>
<p><em>April 28, 2015</em></p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/production-and-shipping-update/">Production and Shipping Update</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></content:encoded>
			</item>
		<item>
		<title>32GB is Back!</title>
		<link>https://puri.sm/posts/32gb-is-back/</link>
		<pubDate>Sat, 16 May 2015 22:50:13 +0000</pubDate>
		<dc:creator><![CDATA[Jon Rahl]]></dc:creator>
				<category><![CDATA[Hardware]]></category>
		<category><![CDATA[Product Design]]></category>
		<category><![CDATA[Laptops]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=651</guid>
		<description><![CDATA[<p>We love our backers! After our last update regarding Intel’s physical 16GB memory maximum for 5th Generation CPUs, we heard from a backer that Intelligent Memory can run 32GB even though the specification states 16GB! This was corroborated by both PCWorld and our direct contact at Intelligent Memory this morning. We are back to offering [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/32gb-is-back/">32GB is Back!</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
				<content:encoded><![CDATA[<h3>We love our backers!</h3>
<div class="rendered-content">
<p>After our last update regarding Intel’s physical 16GB memory maximum for 5th Generation CPUs, we heard from a backer that Intelligent Memory can run 32GB even though the specification states 16GB! This was corroborated by both <a href="http://www.pcworld.com/article/2894509/want-32gb-of-ram-in-your-laptop-or-nuc-you-can finally-do-it.html" target="_blank">PCWorld</a> and our direct contact at Intelligent Memory this morning. We are back to offering 32GB, and will not change the existing orders down to 16GB.</p>
<p>We are going to receive a handful of sticks of memory to test that these statements are true ourselves.</p>
<p>This and all feedback, support, and help from all our backers is extremely appreciated!</p>
<p>(Note: We will be increasing the price of 32GB of RAM for all future orders because Intelligent Memory’s DDR3 RAM sticks are very expensive! If you already had 32GB of RAM specified, you will not be charged for the increase in cost).</p>
</div>
<p><em>April 29, 2015</em></p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/32gb-is-back/">32GB is Back!</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></content:encoded>
			</item>
	</channel>
</rss>
