<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Purism &#8211; Purism</title>
	<atom:link href="https://puri.sm/posts/author/purism/feed/" rel="self" type="application/rss+xml" />
	<link>https://puri.sm/</link>
	<description>High-quality computers that protect your freedom and privacy</description>
	<lastBuildDate>Wed, 01 Oct 2025 18:29:47 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=4.9.28</generator>

<image>
	<url>https://puri.sm/wp-content/uploads/2020/04/cropped-purism-logo-rectangle-1-32x32.png</url>
	<title>Purism &#8211; Purism</title>
	<link>https://puri.sm/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Dialing Back to Move Forward: Why the Landline Revival Signals a Future for Privacy</title>
		<link>https://puri.sm/posts/dialing-back-to-move-forward-why-the-landline-revival-signals-a-future-for-privacy/</link>
		<pubDate>Wed, 01 Oct 2025 15:55:47 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Customer Satisfaction]]></category>
		<category><![CDATA[Hardware]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Voice & Data Services]]></category>
		<category><![CDATA[Consumer Privacy]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[Phones]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84618</guid>
		<description><![CDATA[<p>On September 30, 2025, The Washington Post reported a quiet trend in Washington, D.C.: the return of landline phones among officials and journalists seeking refuge from the omnipresent surveillance of smartphones. In a recent story, NBC News spotlighted parents in Maine and Seattle who are reviving landlines for their children—creating “landline pods” so kids can connect without the addictive pull of screens or the predatory reach of social media platforms.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/dialing-back-to-move-forward-why-the-landline-revival-signals-a-future-for-privacy/">Dialing Back to Move Forward: Why the Landline Revival Signals a Future for Privacy</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Who Owns Your Digital Self?</title>
		<link>https://puri.sm/posts/who-owns-your-digital-self/</link>
		<pubDate>Wed, 01 Oct 2025 14:52:09 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Civil Liberties]]></category>
		<category><![CDATA[Customer Satisfaction]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Consumer Privacy]]></category>
		<category><![CDATA[Consumer Protection]]></category>
		<category><![CDATA[cybersecurity]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84608</guid>
		<description><![CDATA[<p>The lawsuits now circling Apple are not just about stolen phones. They are about stolen selves—stolen data, stolen memories, stolen identities.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/who-owns-your-digital-self/">Who Owns Your Digital Self?</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Quantum Safe Private Communications: Building the Future Before the Threat Arrives</title>
		<link>https://puri.sm/posts/quantum-safe-private-communications-building-the-future-before-the-threat-arrives/</link>
		<pubDate>Fri, 26 Sep 2025 20:56:28 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Applications]]></category>
		<category><![CDATA[Government Mobility]]></category>
		<category><![CDATA[Industry News]]></category>
		<category><![CDATA[Librem PQC Comms Server]]></category>
		<category><![CDATA[Librem PQC Encryptor]]></category>
		<category><![CDATA[Mobile Ecosystem]]></category>
		<category><![CDATA[N79]]></category>
		<category><![CDATA[Post Quantum Cryptography]]></category>
		<category><![CDATA[Private Cellular Networking]]></category>
		<category><![CDATA[Quantum Safe]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[CISO]]></category>
		<category><![CDATA[Communications infrastructure]]></category>
		<category><![CDATA[Critical Infrastructure]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[infosec]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[Physical robustness]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84586</guid>
		<description><![CDATA[<p>Secure mobility is not just about encryption — it’s about sovereignty. The ability to own, control, and verify every layer of your communications stack is the difference between operational assurance and strategic vulnerability.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/quantum-safe-private-communications-building-the-future-before-the-threat-arrives/">Quantum Safe Private Communications: Building the Future Before the Threat Arrives</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Safety Without Surveillance: Designing Digital Sovereignty for All Ages</title>
		<link>https://puri.sm/posts/safety-without-surveillance-designing-digital-sovereignty-for-all-ages/</link>
		<pubDate>Thu, 25 Sep 2025 14:41:11 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Applications]]></category>
		<category><![CDATA[Civil Liberties]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Social Purpose]]></category>
		<category><![CDATA[Apps]]></category>
		<category><![CDATA[Consumer Privacy]]></category>
		<category><![CDATA[Consumer Protection]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84574</guid>
		<description><![CDATA[<p>In September, a single misconfiguration in Life360’s Android API turned a “family safety” app into a map of human lives exposed. More than 442,000 users had their precise GPS trails, names, and phone numbers dumped online by a threat actor known as Emo.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/safety-without-surveillance-designing-digital-sovereignty-for-all-ages/">Safety Without Surveillance: Designing Digital Sovereignty for All Ages</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Secret Service Telecom Bust Exposes Cellular Weaknesses</title>
		<link>https://puri.sm/posts/secret-service-telecom-bust-exposes-cellular-weaknesses/</link>
		<pubDate>Tue, 23 Sep 2025 19:31:07 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Civil Liberties]]></category>
		<category><![CDATA[Government Mobility]]></category>
		<category><![CDATA[Mobile Ecosystem]]></category>
		<category><![CDATA[Communications infrastructure]]></category>
		<category><![CDATA[Consumer Protection]]></category>
		<category><![CDATA[Critical Infrastructure]]></category>
		<category><![CDATA[Liberty Phone]]></category>
		<category><![CDATA[librem 5]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84546</guid>
		<description><![CDATA[<p>The Secret Service’s disruption of a massive SIM-server network near the U.N. is proof that the threats to our communications are real, organized, and capable of overwhelming public safety systems.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/secret-service-telecom-bust-exposes-cellular-weaknesses/">Secret Service Telecom Bust Exposes Cellular Weaknesses</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Purism Approach vs. Google Model</title>
		<link>https://puri.sm/posts/purism-approach-vs-google-model/</link>
		<pubDate>Tue, 23 Sep 2025 14:24:00 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Applications]]></category>
		<category><![CDATA[Civil Liberties]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Social Purpose]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Consumer Privacy]]></category>
		<category><![CDATA[Consumer Protection]]></category>
		<category><![CDATA[PureOS]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Software freedom]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84519</guid>
		<description><![CDATA[<p>The Justice Department and a coalition of states are pursuing antitrust action against Google, accusing it of running monopolistic ad-tech systems that exploit users and lock out competition. Regulators are weighing remedies that could force structural changes to Google’s ad empire.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/purism-approach-vs-google-model/">Purism Approach vs. Google Model</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Librem PQC Encryptor: Future‑Proofing Against Both SS7 and Quantum</title>
		<link>https://puri.sm/posts/librem-pqc-encryptor-future-proofing-against-both-ss7-and-quantum/</link>
		<pubDate>Sun, 21 Sep 2025 21:07:44 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Hardware Encryption (HWE)]]></category>
		<category><![CDATA[Librem PQC Comms Server]]></category>
		<category><![CDATA[Librem PQC Encryptor]]></category>
		<category><![CDATA[Miscellaneous]]></category>
		<category><![CDATA[Post Quantum Cryptography]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Communications infrastructure]]></category>
		<category><![CDATA[Critical Infrastructure]]></category>
		<category><![CDATA[cybersecurity]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84444</guid>
		<description><![CDATA[<p>Signaling System 7 (SS7) was designed in the 1970s to let telecom carriers route calls, deliver SMS, and enable roaming. It was never built with authentication or encryption in mind. Security wasn’t part of the plan.  The assumption was simple:  All carriers are trusted.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/librem-pqc-encryptor-future-proofing-against-both-ss7-and-quantum/">Librem PQC Encryptor: Future‑Proofing Against Both SS7 and Quantum</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Shortwave App Now Available</title>
		<link>https://puri.sm/posts/shortwave-app-now-available/</link>
		<pubDate>Sun, 21 Sep 2025 21:04:38 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Applications]]></category>
		<category><![CDATA[LibremOS]]></category>
		<category><![CDATA[Mobile Ecosystem]]></category>
		<category><![CDATA[Apps]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84397</guid>
		<description><![CDATA[<p>Shortwave is an internet radio player that provides access to a station database with over 50,000 stations. </p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/shortwave-app-now-available/">Shortwave App Now Available</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
<enclosure url="https://videos.puri.sm/librem5/apps/shortwave.mp4" length="5036912" type="video/mp4" />
		</item>
		<item>
		<title>Freedom by Design: Why Purism Rejects Big IT Status Quo</title>
		<link>https://puri.sm/posts/freedom-by-design-why-purism-rejects-big-it-status-quo/</link>
		<pubDate>Fri, 19 Sep 2025 17:05:52 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Consumer Privacy]]></category>
		<category><![CDATA[Consumer Protection]]></category>
		<category><![CDATA[cybersecurity]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84487</guid>
		<description><![CDATA[<p>Three recent IT‑privacy headlines tell the same unsettling story: that consumer trust is being squandered</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/freedom-by-design-why-purism-rejects-big-it-status-quo/">Freedom by Design: Why Purism Rejects Big IT Status Quo</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>When “Efficiency” Becomes Exposure: How DOGE Put America’s Identity at Risk</title>
		<link>https://puri.sm/posts/when-efficiency-becomes-exposure-how-doge-put-americas-identity-at-risk/</link>
		<pubDate>Fri, 19 Sep 2025 17:03:10 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Civil Liberties]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Consumer Privacy]]></category>
		<category><![CDATA[Consumer Protection]]></category>
		<category><![CDATA[cybersecurity]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84476</guid>
		<description><![CDATA[<p>Every American should be alarmed.  It was recently reported that a whistleblower from inside the Social Security Administration, Chief Data Officer Charles Borges, has revealed that the Department of Government Efficiency (DOGE) copied a live, full-fidelity version of the nation’s Social Security database onto an Amazon-hosted cloud environment that allegedly lacked independent security oversight. This affects any American who’s ever filled out a Social Security form,</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/when-efficiency-becomes-exposure-how-doge-put-americas-identity-at-risk/">When “Efficiency” Becomes Exposure: How DOGE Put America’s Identity at Risk</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Spotify “Panama” Leak Is a Wake-Up Call for Digital Privacy</title>
		<link>https://puri.sm/posts/spotify-panama-leak-is-a-wake-up-call-for-digital-privacy/</link>
		<pubDate>Fri, 19 Sep 2025 17:00:10 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Applications]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Apps]]></category>
		<category><![CDATA[Consumer Privacy]]></category>
		<category><![CDATA[Consumer Protection]]></category>
		<category><![CDATA[Software freedom]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84360</guid>
		<description><![CDATA[<p>The New York Times recently reported that a hacker using the pseudonym “Tim” scraped publicly available data from Spotify and published it on his own website. Using automated bots, “Tim” harvested user playlists — many of them tied to identifiable names, locations, and even personal notes in titles or descriptions.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/spotify-panama-leak-is-a-wake-up-call-for-digital-privacy/">Spotify “Panama” Leak Is a Wake-Up Call for Digital Privacy</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>When Technology Policy Defends Human Dignity</title>
		<link>https://puri.sm/posts/when-technology-policy-defends-human-dignity/</link>
		<pubDate>Thu, 18 Sep 2025 18:36:39 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Applications]]></category>
		<category><![CDATA[Civil Liberties]]></category>
		<category><![CDATA[Gender equality]]></category>
		<category><![CDATA[Apps]]></category>
		<category><![CDATA[Consumer Protection]]></category>
		<category><![CDATA[secure computing]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[Wireless and networking]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84366</guid>
		<description><![CDATA[<p>In late August, Italy took a decisive step to protect women from one of the most insidious forms of online abuse: the non‑consensual sharing of intimate or misappropriated images. After years of complaints, activism, and public outrage, a notorious website — home to thousands of stolen photos of women, from ordinary citizens to public figures — was forced offline following a wave of legal and political pressure.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/when-technology-policy-defends-human-dignity/">When Technology Policy Defends Human Dignity</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>The NYPD’s $3B “Domain Awareness System” isn’t just a New York problem—it’s a warning for every American</title>
		<link>https://puri.sm/posts/the-nypds-3b-domain-awareness-system-isnt-just-a-new-york-problem-its-a-warning-for-every-american/</link>
		<pubDate>Thu, 18 Sep 2025 17:48:28 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Civil Liberties]]></category>
		<category><![CDATA[Government Mobility]]></category>
		<category><![CDATA[Miscellaneous]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Consumer Privacy]]></category>
		<category><![CDATA[Consumer Protection]]></category>
		<category><![CDATA[Social media]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84454</guid>
		<description><![CDATA[<p>In her September 15, 2025, New York Times opinion piece, Elizabeth Daniel Vasquez lays bare a reality too many Americans have ignored: the New York Police Department has quietly built one of the most expansive, integrated surveillance systems in the nation’s history.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/the-nypds-3b-domain-awareness-system-isnt-just-a-new-york-problem-its-a-warning-for-every-american/">The NYPD’s $3B “Domain Awareness System” isn’t just a New York problem—it’s a warning for every American</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Living in the Regulatory Future: Purism, the EU Data Act, and America’s Patchwork Privacy Laws</title>
		<link>https://puri.sm/posts/living-in-the-regulatory-future-purism-the-eu-data-act-and-americas-patchwork-privacy-laws/</link>
		<pubDate>Thu, 18 Sep 2025 16:55:30 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Civil Liberties]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Regulatory]]></category>
		<category><![CDATA[Consumer Privacy]]></category>
		<category><![CDATA[Consumer Protection]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84425</guid>
		<description><![CDATA[<p>Recently, the EU Data Act was officially enacted — and with it, a new era of enforceable digital rights. Where the GDPR set the policy framework, the Data Act demands proof: verifiable, auditable systems that deliver true data portability, secure interoperability, and privacy‑by‑design across sectors.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/living-in-the-regulatory-future-purism-the-eu-data-act-and-americas-patchwork-privacy-laws/">Living in the Regulatory Future: Purism, the EU Data Act, and America’s Patchwork Privacy Laws</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>PureOS Crimson: August 2025 &#8211; Alpha Released</title>
		<link>https://puri.sm/posts/pureos-crimson-august-2025-alpha-released/</link>
		<pubDate>Mon, 15 Sep 2025 17:33:02 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[PureOS]]></category>
		<category><![CDATA[Advanced readers]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84330</guid>
		<description><![CDATA[<p>We have released alpha images for PureOS Crimson for all Librem devices and have closed the first milestone!</p>
<p>Thank you to all of our supporters and PureOS subscribers who have made this possible.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/pureos-crimson-august-2025-alpha-released/">PureOS Crimson: August 2025 &#8211; Alpha Released</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Blanket App Now Available</title>
		<link>https://puri.sm/posts/blanket-app-now-available/</link>
		<pubDate>Mon, 15 Sep 2025 17:32:24 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Applications]]></category>
		<category><![CDATA[LibremOS]]></category>
		<category><![CDATA[Mobile Ecosystem]]></category>
		<category><![CDATA[Apps]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84346</guid>
		<description><![CDATA[<p>Blanket lets you improve focus and increase your productivity by listening to different ambient sounds.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/blanket-app-now-available/">Blanket App Now Available</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
<enclosure url="https://videos.puri.sm/librem5/apps/blanket.mp4" length="4309458" type="video/mp4" />
		</item>
		<item>
		<title>Google Mishandling School Children&#8217;s Data</title>
		<link>https://puri.sm/posts/google-mishandling-school-childrens-data/</link>
		<pubDate>Fri, 12 Sep 2025 18:31:21 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Product Design]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Consumer Privacy]]></category>
		<category><![CDATA[Consumer Protection]]></category>
		<category><![CDATA[Privacy]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84364</guid>
		<description><![CDATA[<p>When Google agreed to pay $30 million to settle a class-action lawsuit over its unauthorized collection of children’s data on YouTube, it wasn’t a revelation—it was a confirmation. A confirmation that Google’s public posture of compliance often masks a deeper, more calculated strategy: delayed monetization through long-tail data mining.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/google-mishandling-school-childrens-data/">Google Mishandling School Children&#8217;s Data</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Invisible Dependencies, Visible Damage: The Case for Supply Chain Hygiene</title>
		<link>https://puri.sm/posts/invisible-dependencies-visible-damage-the-case-for-supply-chain-hygiene/</link>
		<pubDate>Fri, 12 Sep 2025 09:13:20 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Apps]]></category>
		<category><![CDATA[Consumer Privacy]]></category>
		<category><![CDATA[Consumer Protection]]></category>
		<category><![CDATA[Critical Infrastructure]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Enterprise]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84291</guid>
		<description><![CDATA[<p>On September 8th, Check Point Research confirmed what many of us in the privacy and security trenches have been warning about for years: the weakest link in your security posture may not be your systems at all — it may be the invisible web of third-party integrations you’ve tacitly approved, often without full visibility into their downstream dependencies.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/invisible-dependencies-visible-damage-the-case-for-supply-chain-hygiene/">Invisible Dependencies, Visible Damage: The Case for Supply Chain Hygiene</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>From Typhoon to Action: A Purism Playbook for Hardening Your Defenses</title>
		<link>https://puri.sm/posts/from-typhoon-to-action-a-purism-playbook-for-hardening-your-defenses/</link>
		<pubDate>Thu, 11 Sep 2025 12:00:17 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Applications]]></category>
		<category><![CDATA[Government Mobility]]></category>
		<category><![CDATA[Industry News]]></category>
		<category><![CDATA[Apps]]></category>
		<category><![CDATA[Consumer Privacy]]></category>
		<category><![CDATA[Consumer Protection]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Enterprise]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84293</guid>
		<description><![CDATA[<p>When the FBI, CISA, and NSA release joint advisories, it’s not theory — it’s reality. The latest warnings about Salt Typhoon and Volt Typhoon should be read as a weather alert: the storm isn’t “out there,” it’s already in progress. These campaigns target infrastructure, communications, and supply chains with patience and persistence.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/from-typhoon-to-action-a-purism-playbook-for-hardening-your-defenses/">From Typhoon to Action: A Purism Playbook for Hardening Your Defenses</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Apple’s Latest iPhone: Sleeker Walls, Same Garden</title>
		<link>https://puri.sm/posts/apples-latest-iphone-sleeker-walls-same-garden/</link>
		<pubDate>Wed, 10 Sep 2025 17:43:14 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Industry News]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Consumer Privacy]]></category>
		<category><![CDATA[Consumer Protection]]></category>
		<category><![CDATA[User empowerment]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84301</guid>
		<description><![CDATA[<p>Yesterday, Apple unveiled the latest iPhone lineup adding an iPhone Air — described by them as their thinnest, lightest yet. The headlines were predictable fanfare while missing the larger points.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/apples-latest-iphone-sleeker-walls-same-garden/">Apple’s Latest iPhone: Sleeker Walls, Same Garden</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Mousai App Now Available</title>
		<link>https://puri.sm/posts/mousai-app-now-available/</link>
		<pubDate>Tue, 09 Sep 2025 14:01:03 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Applications]]></category>
		<category><![CDATA[LibremOS]]></category>
		<category><![CDATA[Mobile Ecosystem]]></category>
		<category><![CDATA[Apps]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84077</guid>
		<description><![CDATA[<p>Mousai is a simple application that can recognize songs similar to Shazam. Just click the listen button, and then wait a few seconds. It will magically return the title and artist of that song!</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/mousai-app-now-available/">Mousai App Now Available</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
<enclosure url="https://videos.puri.sm/librem5/apps/mousai.mp4" length="4649456" type="video/mp4" />
		</item>
		<item>
		<title>California’s New Privacy Rules Are a National Signal</title>
		<link>https://puri.sm/posts/californias-new-privacy-rules-are-a-national-signal/</link>
		<pubDate>Sun, 07 Sep 2025 19:21:41 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Civil Liberties]]></category>
		<category><![CDATA[Government Mobility]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Regulatory]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Consumer Privacy]]></category>
		<category><![CDATA[Consumer Protection]]></category>
		<category><![CDATA[cybersecurity]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84134</guid>
		<description><![CDATA[<p>California’s New Privacy Rules Are a National Signal The California Privacy Protection Agency’s latest regulations redraw the playing field. This is the first set of rules in the U.S. to require: Annual, independent cybersecurity audits for high-risk businesses Comprehensive risk assessments for key data processing activities Bias and privacy impact reviews for automated decision-making systems [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/californias-new-privacy-rules-are-a-national-signal/">California’s New Privacy Rules Are a National Signal</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>The Quiet Revolution: GNU/Linux Crosses 6% Desktop Market Share—And It’s Just the Beginning</title>
		<link>https://puri.sm/posts/the-quiet-revolution-gnu-linux-crosses-6-desktop-market-share-and-its-just-the-beginning/</link>
		<pubDate>Fri, 29 Aug 2025 01:21:31 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[GNU/Linux]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[PureOS]]></category>
		<category><![CDATA[Apps]]></category>
		<category><![CDATA[FLOSS applications]]></category>
		<category><![CDATA[GNOME]]></category>
		<category><![CDATA[Linux kernel]]></category>
		<category><![CDATA[Software freedom]]></category>
		<category><![CDATA[User empowerment]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84000</guid>
		<description><![CDATA[<p>For decades, the phrase “Year of the Linux Desktop” has been tossed around like a tech industry punchline. But now, it’s no longer a meme—it’s a movement. According to the U.S. government’s own analytics, GNU/Linux has officially crossed the 6% threshold in desktop usage. That’s not hype. That’s hard data.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/the-quiet-revolution-gnu-linux-crosses-6-desktop-market-share-and-its-just-the-beginning/">The Quiet Revolution: GNU/Linux Crosses 6% Desktop Market Share—And It’s Just the Beginning</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Google’s New Sideloading Restrictions: Why Purism Thinks Differently</title>
		<link>https://puri.sm/posts/googles-new-sideloading-restrictions-why-purism-thinks-differently/</link>
		<pubDate>Thu, 28 Aug 2025 21:52:46 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Applications]]></category>
		<category><![CDATA[Customer Satisfaction]]></category>
		<category><![CDATA[Hardware]]></category>
		<category><![CDATA[Apps]]></category>
		<category><![CDATA[Consumer Protection]]></category>
		<category><![CDATA[Hardware Kill Switches]]></category>
		<category><![CDATA[smartphone]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84185</guid>
		<description><![CDATA[<p>Google’s New Sideloading Restrictions: Why Purism Thinks Differently Google is introducing a new developer verification system claiming to increase security and combat malware (in the name of controlling users).  Google’s “security” push is a double-edged sword. It may help fight a certain type of malware. But it also reminds us all that Android’s identity is [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/googles-new-sideloading-restrictions-why-purism-thinks-differently/">Google’s New Sideloading Restrictions: Why Purism Thinks Differently</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>PureOS Crimson Development Report: July 2025</title>
		<link>https://puri.sm/posts/pureos-crimson-development-report-july-2025/</link>
		<pubDate>Thu, 28 Aug 2025 12:18:53 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Miscellaneous]]></category>
		<category><![CDATA[Advanced readers]]></category>
		<category><![CDATA[PureOS]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84155</guid>
		<description><![CDATA[<p>Welcome back!  In our last update, we mentioned a fix in pureos-meta for some missing essential system components.</p>
<p>This seemed trivial at the time - just add the missing components.  However, when the fix went into review and we looked deeper, it turned out to be anything but trivial.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/pureos-crimson-development-report-july-2025/">PureOS Crimson Development Report: July 2025</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Introducing the Librem PQC Comms Server</title>
		<link>https://puri.sm/posts/introducing-the-librem-pqc-comms-server/</link>
		<pubDate>Wed, 27 Aug 2025 11:44:55 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Additional Press Information]]></category>
		<category><![CDATA[Government Mobility]]></category>
		<category><![CDATA[Hardware]]></category>
		<category><![CDATA[Librem PQC Comms Server]]></category>
		<category><![CDATA[Mobile Ecosystem]]></category>
		<category><![CDATA[Post Quantum Cryptography]]></category>
		<category><![CDATA[Press Releases]]></category>
		<category><![CDATA[Quantum Safe]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Voice & Data Services]]></category>
		<category><![CDATA[CISO]]></category>
		<category><![CDATA[Communications infrastructure]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[infosec]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[Product or service launch]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=83993</guid>
		<description><![CDATA[<p>SF, CA, US – Purism is excited to announce its <a href="https://puri.sm/products/librem-pqc-comms-server/">Librem PQC Comms Server</a>, encrypting data-in-transit (DIT) with post-quantum cryptography (PQC) according to the <a href="https://csrc.nist.gov/pubs/fips/203/final">NIST FIPS 203</a> standard. When bundled as a complete ecosystem with the <a href="https://puri.sm/products/liberty-phone/">Liberty Phone</a> or other Purism Products will also address data-at-rest (DAR) encrypted with PQC.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/introducing-the-librem-pqc-comms-server/">Introducing the Librem PQC Comms Server</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>A Privacy Shield in the Wake of AT&#038;T Data Breaches</title>
		<link>https://puri.sm/posts/a-privacy-shield-in-the-wake-of-att-data-breaches/</link>
		<pubDate>Tue, 26 Aug 2025 19:55:51 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[AweSIM]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[SIMple]]></category>
		<category><![CDATA[Voice & Data Services]]></category>
		<category><![CDATA[Consumer Privacy]]></category>
		<category><![CDATA[Consumer Protection]]></category>
		<category><![CDATA[SIMple Plus]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84140</guid>
		<description><![CDATA[<p>Purism AweSIM: A Privacy Shield in the Wake of AT&#38;T Data Breaches AT&#38;T was found liable to pay customers an estimated $177M to resolve multiple lawsuits stemming from two separate data breaches – March 30 and July 12, 2024. Both breaches exposed huge amounts of Personal Identifiable Information (PII) to the public. These two breaches [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/a-privacy-shield-in-the-wake-of-att-data-breaches/">A Privacy Shield in the Wake of AT&#038;T Data Breaches</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>FTC Issues Letters to Big Tech: No Back Doors</title>
		<link>https://puri.sm/posts/ftc-issues-letters-to-big-tech-no-back-doors/</link>
		<pubDate>Mon, 25 Aug 2025 21:07:47 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Civil Liberties]]></category>
		<category><![CDATA[Government Mobility]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Consumer Privacy]]></category>
		<category><![CDATA[Consumer Protection]]></category>
		<category><![CDATA[secure computing]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84107</guid>
		<description><![CDATA[<p>FTC to Big Tech: No Back Doors — Purism Was Already There Protecting against Jurisdictional Arbitrage When the Federal Trade Commission (FTC) makes a determined move like this, it’s not a casual policy tweak — it’s a line drawn in permanent ink. On August 21, FTC Chairman Andrew Ferguson sent formal notices to over a [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/ftc-issues-letters-to-big-tech-no-back-doors/">FTC Issues Letters to Big Tech: No Back Doors</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>AI, Big Tech, and the Fight for Digital Freedom: Purism’s Role</title>
		<link>https://puri.sm/posts/ai-big-tech-and-the-fight-for-digital-freedom-purisms-role/</link>
		<pubDate>Wed, 13 Aug 2025 01:45:12 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Civil Liberties]]></category>
		<category><![CDATA[Industry News]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Consumer Privacy]]></category>
		<category><![CDATA[Consumer Protection]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84006</guid>
		<description><![CDATA[<p>We are living through a pivotal moment in the digital age—one where artificial intelligence and corporate consolidation are colliding with the fundamental rights of individuals. AI is no longer just a tool for innovation; it’s become the engine behind mass surveillance, behavioral profiling, and algorithmic manipulation. And the companies driving this transformation—Amazon, Apple, Meta, Google—are not just shaping technology. They’re shaping society.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/ai-big-tech-and-the-fight-for-digital-freedom-purisms-role/">AI, Big Tech, and the Fight for Digital Freedom: Purism’s Role</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Instagram’s Mapping Feature: A Privacy Wake-Up Call</title>
		<link>https://puri.sm/posts/instagrams-mapping-feature-a-privacy-wake-up-call/</link>
		<pubDate>Wed, 13 Aug 2025 01:38:59 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[GNU/Linux]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[PureOS]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Consumer Privacy]]></category>
		<category><![CDATA[Consumer Protection]]></category>
		<category><![CDATA[Social media]]></category>
		<category><![CDATA[User empowerment]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84003</guid>
		<description><![CDATA[<p>Instagram’s latest update introduces a mapping feature that quietly turns your location into a public breadcrumb trail. While it may seem like a harmless way to tag your favorite coffee shop or scenic overlook, the reality is more insidious: this feature keeps your location sharing always-on by default. That means every time you post, you’re potentially broadcasting your whereabouts—not just to friends, but to advertisers, data brokers, and anyone else watching. It’s a textbook example of how convenience is weaponized against privacy.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/instagrams-mapping-feature-a-privacy-wake-up-call/">Instagram’s Mapping Feature: A Privacy Wake-Up Call</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
	</channel>
</rss>
