<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Randy Siegel &#8211; Purism</title>
	<atom:link href="https://puri.sm/posts/author/randy-siegel/feed/" rel="self" type="application/rss+xml" />
	<link>https://puri.sm/</link>
	<description>High-quality computers that protect your freedom and privacy</description>
	<lastBuildDate>Wed, 01 Oct 2025 18:29:47 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=4.9.28</generator>

<image>
	<url>https://puri.sm/wp-content/uploads/2020/04/cropped-purism-logo-rectangle-1-32x32.png</url>
	<title>Randy Siegel &#8211; Purism</title>
	<link>https://puri.sm/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Freedom of Choice vs. Oppression of Big Tech</title>
		<link>https://puri.sm/posts/freedom-of-choice-vs-oppression-of-big-tech/</link>
		<pubDate>Wed, 06 Nov 2024 17:13:31 +0000</pubDate>
		<dc:creator><![CDATA[Randy Siegel]]></dc:creator>
				<category><![CDATA[Civil Liberties]]></category>
		<category><![CDATA[Mobile Ecosystem]]></category>
		<category><![CDATA[Product Design]]></category>
		<category><![CDATA[Regulatory]]></category>
		<category><![CDATA[Apps]]></category>
		<category><![CDATA[Consumer Privacy]]></category>
		<category><![CDATA[Consumer Protection]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[PureOS]]></category>
		<category><![CDATA[Software freedom]]></category>
		<category><![CDATA[User empowerment]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=82572</guid>
		<description><![CDATA[<p>The modern smartphone landscape is dominated by a handful of technology giants, whose influence extends far beyond their own ecosystems. Unlike in the heyday of the PC revolution where multiple companies fought tooth and nail for market share by differentiating on feature functionality as well as price – offering a plethora of alternatives – today’s smartphone landscape is dominated by two main players: Apple’s IOS and Google’s Android.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/freedom-of-choice-vs-oppression-of-big-tech/">Freedom of Choice vs. Oppression of Big Tech</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>The Case for Free/Libre and Open-Source Software: Enhancing Security and Privacy in the Digital Age</title>
		<link>https://puri.sm/posts/the-case-for-free-libre-and-open-source-software-enhancing-security-and-privacy-in-the-digital-age/</link>
		<pubDate>Tue, 22 Oct 2024 20:23:39 +0000</pubDate>
		<dc:creator><![CDATA[Randy Siegel]]></dc:creator>
				<category><![CDATA[PureOS]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[FLOSS applications]]></category>
		<category><![CDATA[Giving and contributing back]]></category>
		<category><![CDATA[Software freedom]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=82548</guid>
		<description><![CDATA[<p>Given the 21st century world’s reliance on digital technology, it should go without saying that privacy and security are pressing concerns — for individuals as well as federal and corporate entities. With an abundance of tools at our disposal, however, how do we make informed decisions about which to use to best ensure sensitive information is safe from prying eyes? At Purism, we advocate for the use of Free/Libre and Open-Source Software (FLOSS / OSS) as a cornerstone of any secure and private digital environment.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/the-case-for-free-libre-and-open-source-software-enhancing-security-and-privacy-in-the-digital-age/">The Case for Free/Libre and Open-Source Software: Enhancing Security and Privacy in the Digital Age</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>RIP RSA AES: The Immediate Need of Quantum-Resistant Cryptography</title>
		<link>https://puri.sm/posts/rip-rsa-aes-the-immediate-need-of-quantum-resistant-cryptography/</link>
		<pubDate>Tue, 22 Oct 2024 20:01:30 +0000</pubDate>
		<dc:creator><![CDATA[Randy Siegel]]></dc:creator>
				<category><![CDATA[Government Mobility]]></category>
		<category><![CDATA[Post Quantum Cryptography]]></category>
		<category><![CDATA[Quantum Safe]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[CISO]]></category>
		<category><![CDATA[cybersecurity]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=82543</guid>
		<description><![CDATA[<p>The recent announcement from Chinese scientists about their successful use of a quantum computer to crack military-grade encryption has sent shockwaves through the cybersecurity community. This breakthrough, utilizing a D-Wave Advantage quantum computer, marks a significant milestone in the field of quantum computing. The implications of this development are profound, particularly for industries reliant on classical cryptographic systems like RSA and AES.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/rip-rsa-aes-the-immediate-need-of-quantum-resistant-cryptography/">RIP RSA AES: The Immediate Need of Quantum-Resistant Cryptography</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>True Choice for Smartphone Privacy and Security</title>
		<link>https://puri.sm/posts/true-choice-for-smartphone-privacy-and-security/</link>
		<pubDate>Tue, 08 Oct 2024 17:22:41 +0000</pubDate>
		<dc:creator><![CDATA[Randy Siegel]]></dc:creator>
				<category><![CDATA[Privacy]]></category>
		<category><![CDATA[PureOS]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Liberty Phone]]></category>
		<category><![CDATA[librem 5]]></category>
		<category><![CDATA[Linux kernel]]></category>
		<category><![CDATA[most secure phone]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=82492</guid>
		<description><![CDATA[<p>Since the mass-adoption of consumer smartphones in 2007, much has been written about the tradeoffs consumers and business users alike have been forced to accept when it comes to mobile computing.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/true-choice-for-smartphone-privacy-and-security/">True Choice for Smartphone Privacy and Security</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>The Imperative of NIST-Approved Post-Quantum Resistant Algorithms for Securing Mobile Devices</title>
		<link>https://puri.sm/posts/the-imperative-of-nist-approved-post-quantum-resistant-algorithms-for-securing-mobile-devices/</link>
		<pubDate>Mon, 30 Sep 2024 15:47:44 +0000</pubDate>
		<dc:creator><![CDATA[Randy Siegel]]></dc:creator>
				<category><![CDATA[Government Mobility]]></category>
		<category><![CDATA[Mobile Ecosystem]]></category>
		<category><![CDATA[Post Quantum Cryptography]]></category>
		<category><![CDATA[Quantum Safe]]></category>
		<category><![CDATA[Regulatory]]></category>
		<category><![CDATA[CISO]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[PureOS]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=82475</guid>
		<description><![CDATA[<p>In the rapidly evolving landscape of cybersecurity, the advent of quantum computing presents both unprecedented opportunities and significant threats. As we stand on the brink of a quantum revolution, the need for robust, quantum-resistant cryptographic solutions has never been more urgent.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/the-imperative-of-nist-approved-post-quantum-resistant-algorithms-for-securing-mobile-devices/">The Imperative of NIST-Approved Post-Quantum Resistant Algorithms for Securing Mobile Devices</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Purism&#8217;s Secure Supply Chain Reminder</title>
		<link>https://puri.sm/posts/purisms-secure-supply-chain-reminder/</link>
		<pubDate>Sun, 22 Sep 2024 15:30:48 +0000</pubDate>
		<dc:creator><![CDATA[Randy Siegel]]></dc:creator>
				<category><![CDATA[Made in USA Electronics]]></category>
		<category><![CDATA[Manufacturing Operations and Logistics]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Physical robustness]]></category>
		<category><![CDATA[Secure Supply Chain]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=82442</guid>
		<description><![CDATA[<p>In a world where supply chain compromises are making headlines, it is important to reiterate that Purism has been manufacturing Made in USA electronics since 2018 at our US based facility with a secure component supply chain.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/purisms-secure-supply-chain-reminder/">Purism&#8217;s Secure Supply Chain Reminder</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>FTC Highlights &#8220;Vast Surveillance&#8221; by Big Tech in Latest Report</title>
		<link>https://puri.sm/posts/ftc-highlights-vast-surveillance-by-big-tech-in-latest-report/</link>
		<pubDate>Fri, 20 Sep 2024 20:08:13 +0000</pubDate>
		<dc:creator><![CDATA[Randy Siegel]]></dc:creator>
				<category><![CDATA[Civil Liberties]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Regulatory]]></category>
		<category><![CDATA[Social Purpose]]></category>
		<category><![CDATA[Press]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=82432</guid>
		<description><![CDATA[<p>The Federal Trade Commission (FTC) released a groundbreaking <a href="https://www.ftc.gov/news-events/news/press-releases/2024/09/ftc-staff-report-finds-large-social-media-video-streaming-companies-have-engaged-vast-surveillance">report</a> this past week that sheds light on the vast surveillance practices of major social media and video streaming companies. The report. which was released on September 19th, is a stark reminder of the extensive data collection and monetization strategies employed by these tech giants, often at the expense of user privacy and security.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/ftc-highlights-vast-surveillance-by-big-tech-in-latest-report/">FTC Highlights &#8220;Vast Surveillance&#8221; by Big Tech in Latest Report</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Smartphones Leaking Data</title>
		<link>https://puri.sm/posts/smartphones-leaking-data/</link>
		<pubDate>Wed, 18 Sep 2024 19:45:36 +0000</pubDate>
		<dc:creator><![CDATA[Randy Siegel]]></dc:creator>
				<category><![CDATA[Liberty Phone]]></category>
		<category><![CDATA[Mobile Ecosystem]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Consumer Privacy]]></category>
		<category><![CDATA[Consumer Protection]]></category>
		<category><![CDATA[Hardware Kill Switches]]></category>
		<category><![CDATA[infosec]]></category>
		<category><![CDATA[Software freedom]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=82417</guid>
		<description><![CDATA[<p>When you use smartphones from big tech companies, you’re often trading your privacy for convenience. These devices are designed to collect vast amounts of data about you, from your location to your browsing habits, and even your conversations. This data is then used to build detailed profiles that are sold to advertisers, used to exploit you, and even handed over to government agencies without your knowledge nor consent.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/smartphones-leaking-data/">Smartphones Leaking Data</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>A Secure Foundry for Government Mobile Computing Needs</title>
		<link>https://puri.sm/posts/a-secure-foundry-for-government-mobile-computing-needs/</link>
		<pubDate>Thu, 12 Sep 2024 15:28:51 +0000</pubDate>
		<dc:creator><![CDATA[Randy Siegel]]></dc:creator>
				<category><![CDATA[Government Mobility]]></category>
		<category><![CDATA[Hardware]]></category>
		<category><![CDATA[Liberty Phone]]></category>
		<category><![CDATA[Made in USA Electronics]]></category>
		<category><![CDATA[Mobile Ecosystem]]></category>
		<category><![CDATA[PureOS]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[infosec]]></category>
		<category><![CDATA[Made In USA]]></category>
		<category><![CDATA[most secure phone]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=82388</guid>
		<description><![CDATA[<p>Purism offers a comprehensive solution for those seeking to protect their digital lives. As threats to digital security continue to evolve, Purism’s dedication to privacy and security positions it as a leader in the field, providing a solid foundation for secure mobile computing.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/a-secure-foundry-for-government-mobile-computing-needs/">A Secure Foundry for Government Mobile Computing Needs</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Flipping the Script: Exploring New Paradigms in Secure Mobile Computing</title>
		<link>https://puri.sm/posts/flipping-the-script-exploring-new-paradigms-in-secure-mobile-computing/</link>
		<pubDate>Thu, 22 Aug 2024 00:53:20 +0000</pubDate>
		<dc:creator><![CDATA[Randy Siegel]]></dc:creator>
				<category><![CDATA[Government Mobility]]></category>
		<category><![CDATA[Hardware]]></category>
		<category><![CDATA[Industry News]]></category>
		<category><![CDATA[Liberty Phone]]></category>
		<category><![CDATA[Made in USA Electronics]]></category>
		<category><![CDATA[Manufacturing Operations and Logistics]]></category>
		<category><![CDATA[N79]]></category>
		<category><![CDATA[Partnerships]]></category>
		<category><![CDATA[Private Cellular Networking]]></category>
		<category><![CDATA[Regulatory]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[CISO]]></category>
		<category><![CDATA[Communications infrastructure]]></category>
		<category><![CDATA[Critical Infrastructure]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Hardware Kill Switches]]></category>
		<category><![CDATA[Made in America]]></category>
		<category><![CDATA[most secure phone]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[Secure Supply Chain]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=82344</guid>
		<description><![CDATA[<p>This solution leverages private cellular networks (PCNs) owned and operated by government entities rather than the traditional dependence on Public Switched Network Providers (PSNs) such as AT&#038;T, Verizon, Vodafone, Orange and others around the world.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/flipping-the-script-exploring-new-paradigms-in-secure-mobile-computing/">Flipping the Script: Exploring New Paradigms in Secure Mobile Computing</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Phone Kernel Development at Purism</title>
		<link>https://puri.sm/posts/phone-kernel-development-at-purism/</link>
		<pubDate>Mon, 19 Aug 2024 00:05:22 +0000</pubDate>
		<dc:creator><![CDATA[Randy Siegel]]></dc:creator>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Linux kernel]]></category>
		<category><![CDATA[Software freedom]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=82328</guid>
		<description><![CDATA[<p>At its core, the kernel is the fundamental layer of the operating system, acting as a bridge between the hardware and software. It manages system resources, handles memory allocation, and facilitates communication between applications and the hardware. Without a robust and efficient kernel, even the most advanced smartphone would struggle to perform basic tasks.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/phone-kernel-development-at-purism/">Phone Kernel Development at Purism</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>The Evolution of Smartphone Security</title>
		<link>https://puri.sm/posts/the-evolution-of-smartphone-security/</link>
		<pubDate>Wed, 07 Aug 2024 17:41:49 +0000</pubDate>
		<dc:creator><![CDATA[Randy Siegel]]></dc:creator>
				<category><![CDATA[Government Mobility]]></category>
		<category><![CDATA[Hardware Encryption (HWE)]]></category>
		<category><![CDATA[Made in USA Electronics]]></category>
		<category><![CDATA[Mobile Ecosystem]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[infosec]]></category>
		<category><![CDATA[Liberty Phone]]></category>
		<category><![CDATA[most secure phone]]></category>
		<category><![CDATA[Secure Supply Chain]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=82318</guid>
		<description><![CDATA[<p>When smartphones first emerged in the early 2000s, the attack surface was relatively small. Devices were primarily used for Personal Information Management (PIM) such as calls, texts, email, calendaring, and basic internet browsing. However, the landscape changed dramatically with the introduction of the iPhone and Android platforms in 2007. These devices brought about a revolution [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/the-evolution-of-smartphone-security/">The Evolution of Smartphone Security</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
<enclosure url="https://videos.puri.sm/promo/CNBC_USA.mp4" length="20914889" type="video/mp4" />
		</item>
		<item>
		<title>Hardware Based Security For Government</title>
		<link>https://puri.sm/posts/hardware-based-security-for-government/</link>
		<pubDate>Thu, 01 Aug 2024 20:33:29 +0000</pubDate>
		<dc:creator><![CDATA[Randy Siegel]]></dc:creator>
				<category><![CDATA[Government Mobility]]></category>
		<category><![CDATA[Hardware Encryption (HWE)]]></category>
		<category><![CDATA[Liberty Phone]]></category>
		<category><![CDATA[CISO]]></category>
		<category><![CDATA[Made in USA Electronics]]></category>
		<category><![CDATA[Secure Supply Chain]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=82279</guid>
		<description><![CDATA[<p>Explore the critical role of a hardware root of trust in ensuring the security and integrity of smartphones.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/hardware-based-security-for-government/">Hardware Based Security For Government</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>A Secure Supply Chain and Your Privacy: Smartphone Components</title>
		<link>https://puri.sm/posts/a-secure-supply-chain-and-your-privacy-smartphone-components/</link>
		<pubDate>Tue, 30 Jul 2024 15:53:13 +0000</pubDate>
		<dc:creator><![CDATA[Randy Siegel]]></dc:creator>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Secure Supply Chain]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=82264</guid>
		<description><![CDATA[<p>A compromised component, whether it's a backdoor in a chipset or a tainted software update, can unravel the entire security architecture of a device. It's like a house with a gaping hole in the foundation. No amount of locks on the doors will keep intruders out [...]</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/a-secure-supply-chain-and-your-privacy-smartphone-components/">A Secure Supply Chain and Your Privacy: Smartphone Components</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Avoiding a Monoculture with Secure Diverse Technology</title>
		<link>https://puri.sm/posts/avoiding-a-monoculture-with-secure-diverse-technology/</link>
		<pubDate>Thu, 25 Jul 2024 16:28:08 +0000</pubDate>
		<dc:creator><![CDATA[Randy Siegel]]></dc:creator>
				<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Critical Infrastructure]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[PureOS]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=82237</guid>
		<description><![CDATA[<p>In the world of technology, diversity is not just a virtue, but a necessity. At Purism, a company dedicated to creating secure, privacy-respecting, and freedom-preserving digital solutions, we are deeply concerned about the growing trend of reliance on just a handful of operating systems (OSs). This monoculture in the OS landscape poses significant risks to our digital security, privacy, and freedom [...]</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/avoiding-a-monoculture-with-secure-diverse-technology/">Avoiding a Monoculture with Secure Diverse Technology</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Private Cellular Networking and Secure Client Devices</title>
		<link>https://puri.sm/posts/private-cellular-networking-and-secure-client-devices/</link>
		<pubDate>Tue, 23 Jul 2024 18:36:30 +0000</pubDate>
		<dc:creator><![CDATA[Randy Siegel]]></dc:creator>
				<category><![CDATA[Government Mobility]]></category>
		<category><![CDATA[Mobile Ecosystem]]></category>
		<category><![CDATA[N79]]></category>
		<category><![CDATA[Private Cellular Networking]]></category>
		<category><![CDATA[CISO]]></category>
		<category><![CDATA[Communications infrastructure]]></category>
		<category><![CDATA[Critical Infrastructure]]></category>
		<category><![CDATA[infosec]]></category>
		<category><![CDATA[Made in USA Electronics]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=82220</guid>
		<description><![CDATA[<p>Private cellular networking and secure client devices provide a holistic, turnkey solution leveraging the N79 band for government or enterprise networks. 5G The advent of 5G technology has revolutionized the world of wireless communication. Among the various aspects of 5G, the N79 band and private 5G networks have emerged as significant components. This post explores [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/private-cellular-networking-and-secure-client-devices/">Private Cellular Networking and Secure Client Devices</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Purpose-Built Smartphones for Government vs. Commercial Off-The-Shelf Devices</title>
		<link>https://puri.sm/posts/purpose-built-smartphones-for-government-vs-commercial-off-the-shelf-devices/</link>
		<pubDate>Fri, 19 Jul 2024 00:03:05 +0000</pubDate>
		<dc:creator><![CDATA[Randy Siegel]]></dc:creator>
				<category><![CDATA[Government Mobility]]></category>
		<category><![CDATA[Industry News]]></category>
		<category><![CDATA[Liberty Phone]]></category>
		<category><![CDATA[Made in USA Electronics]]></category>
		<category><![CDATA[Mobile Ecosystem]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[infosec]]></category>
		<category><![CDATA[most secure phone]]></category>
		<category><![CDATA[Network Security]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=82192</guid>
		<description><![CDATA[<p>The rise of the smartphone as both an indispensable consumer electronic device and an omnipresent tool for performing tasks at work has led to an inevitable question: Should enterprise and government centralized IT organizations deploy Commercial Off-the-Shelf (COTS) devices such as the iPhone, Google Pixel, Samsung Galaxy and attempt to secure them, or should organizations [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/purpose-built-smartphones-for-government-vs-commercial-off-the-shelf-devices/">Purpose-Built Smartphones for Government vs. Commercial Off-The-Shelf Devices</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Your Phone is Giving Away More Than You Ever Bargained For</title>
		<link>https://puri.sm/posts/your-phone-is-giving-away-more-than-you-ever-bargained-for/</link>
		<pubDate>Mon, 15 Jul 2024 00:05:47 +0000</pubDate>
		<dc:creator><![CDATA[Randy Siegel]]></dc:creator>
				<category><![CDATA[Civil Liberties]]></category>
		<category><![CDATA[Hardware]]></category>
		<category><![CDATA[Industry News]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Regulatory]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[infosec]]></category>
		<category><![CDATA[Liberty Phone]]></category>
		<category><![CDATA[Linux kernel]]></category>
		<category><![CDATA[Made In USA]]></category>
		<category><![CDATA[most secure phone]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=82040</guid>
		<description><![CDATA[<p>The year 2007 represented a watershed moment for the modern smartphone industry as we know it. This was the year that Apple introduced its first iPhone device and Google announced Android via its participation in The Open Handset Alliance (which notably leveraged the Linux kernel and open-source code to create its mobile OS). Fast forward [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/your-phone-is-giving-away-more-than-you-ever-bargained-for/">Your Phone is Giving Away More Than You Ever Bargained For</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
	</channel>
</rss>
