<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Sean O&#8217;Brien &#8211; Purism</title>
	<atom:link href="https://puri.sm/posts/author/sean/feed/" rel="self" type="application/rss+xml" />
	<link>https://puri.sm/</link>
	<description>High-quality laptops that protect your freedom and privacy</description>
	<lastBuildDate>Mon, 09 Nov 2020 16:41:35 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=4.9.16</generator>

<image>
	<url>https://puri.sm/wp-content/uploads/2020/04/cropped-purism-logo-rectangle-1-32x32.png</url>
	<title>Sean O&#8217;Brien &#8211; Purism</title>
	<link>https://puri.sm/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Privacy &#038; Security Reading List</title>
		<link>https://puri.sm/posts/holiday-reading-list/</link>
		<pubDate>Sun, 23 Dec 2018 21:19:02 +0000</pubDate>
		<dc:creator><![CDATA[Sean O'Brien]]></dc:creator>
				<category><![CDATA[Miscellaneous]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=61807</guid>
		<description><![CDATA[<p>If you&#8217;re traveling this weekend, nestled in front of the fire, or just trying to offset the effect of sugar-coated holiday specials, we&#8217;ve got a reading list for you. These picks were recommended by team members at Purism and reflect our dedication to digital privacy, security, and freedom. With daily headlines about Big Tech scandals [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/holiday-reading-list/">Privacy &#038; Security Reading List</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>If you&#8217;re traveling this weekend, nestled in front of the fire, or just trying to offset the effect of sugar-coated holiday specials, we&#8217;ve got a reading list for you. These picks were recommended by team members at Purism and reflect our dedication to digital privacy, security, and freedom. With daily headlines about <a href="https://diginomica.com/2018/12/21/2018-the-year-big-tech-lost-its-innocence/" target="_blank" rel="noopener">Big Tech scandals</a> like Facebook&#8217;s <a href="https://www.nytimes.com/2018/12/19/business/dealbook/facebook-data-scandal.html" target="_blank" rel="noopener">clandestine data-sharing</a>, there&#8217;s no better time to read up on these topics.</p>
<p>The choices below are listed in no particular order and, wherever possible, we link to author websites and privacy-respecting sources.</p>
<p>Reading about surveillance capitalism may not warm your heart, but it could put a fire in your belly and encourage you to <a href="https://puri.sm/posts/2018-holiday-season-bundle-sale/">#DemandFreedom in 2019</a>.</p>
<h6><strong><a href="https://www.eff.org/the-end-of-trust" target="_blank" rel="noopener"><em>The End of Trust</em></a></strong> – McSweeney’s Issue 54 (Nov. 2018)</h6>
<p>Compiled by the team at the Electronic Frontier Foundation (EFF) for McSweeney&#8217;s, this collection features writing by luminaries like Cory Doctorow, Gabriella Coleman, Edward Snowden, Bruce Schneier, and many more. Among the gems within is a conversation between artist Trevor Paglen and journalist Julia Angwin, with Paglen having this to say about the intersection of freedom and privacy:</p>
<p><em>&#8220;I think I had the sense of growing up within structures that didn’t work for me and feeling like there was a deep injustice around that. Feeling like the world was set up to move you down certain paths and to enforce certain behaviors and norms [didn’t] work for me, and realizing that the value of this word formerly known as </em>privacy<em>, otherwise known as </em>liberty<em>, plays not only at the scale of the individual, but also as a kind of public resource that allows for the possibility of, on one hand, experimentation, but then, on the other hand, things like civil liberties and self-representation.&#8221;</em></p>
<h6><a href="https://www.schneier.com/books/click_here/" target="_blank" rel="noopener"><strong><em>Click Here to Kill Everybody: Security and Survival in a Hyper-connected World</em></strong></a> – Bruce Schneier, W. W. Norton &amp; Company (Sep. 2018)</h6>
<p>Schneier&#8217;s latest book is a sobering account of the pitfalls of modern technology. It covers a lot of ground, such as the huge gap between security and implementation in Internet-of-Things devices. The author has a gift for raising questions that cause the reader to rethink the underlying technology behind seemingly-simple tech, like network-connected baby monitors:</p>
<p><em>&#8220;They&#8217;re surveillance devices by design, and can pick up a lot more than a baby&#8217;s cries. Of course, I had a lot of security questions. How is the audio and video transmission secured? What&#8217;s the encryption algorithm? How are encryption keys generated, and who has copies of them? If data is stored on the cloud, how long is it stored and how is it secured? How does the smartphone app, if the monitor uses one, authenticate to the cloud server?&#8221;</em></p>
<h6><em><strong><a href="https://www.americanspies.com/" target="_blank" rel="noopener">American Spies: Modern Surveillance, Why You Should Care, and What to Do About It</a></strong> </em>– Jennifer Stisa Granick, Cambridge University Press (Jan. 2017)</h6>
<p>Granick gives the reader a real sense of just how big, and just how pervasive, U.S. intelligence programs really are. The author doesn&#8217;t stop with government programs, however, and calls out Big Tech for its major role in population surveillance:</p>
<p><em>&#8220;Spying is thriving not only because of technology, but also because of modern business models. Much of the modern privacy problem is the result of people giving up their data – knowingly or otherwise – to obtain cool new products and services.&#8221;</em></p>
<h6><a href="https://en.wikipedia.org/wiki/Nothing_to_Hide_(book)" target="_blank" rel="noopener"><strong><em>Nothing to Hide: The False Tradeoff between Privacy and Security</em></strong></a> – Daniel J. Solove, Yale University Press (Jan. 2013)</h6>
<p>This is a now-classic rumination on the deeply important role of privacy in autonomy and freedom. It quickly demolishes the &#8220;nothing to hide argument&#8221;, a constant refrain in today&#8217;s privacy debates, and continues to shed light on social and legal dimensions of surveillance. Here, Solove highlights contradictory perceptions of audio and video snooping:</p>
<p><em>&#8220;The electronic-surveillance statutes strongly protect against the government&#8217;s eavesdropping on your conversations but don&#8217;t protect against the government&#8217;s watching you. This distinction doesn&#8217;t make a lot of sense. Video surveillance involves similar threats to privacy as audio surveillance. As one court noted: &#8216;Television surveillance is identical in its indiscriminate character to wiretapping and bugging. It is even more invasive of privacy&#8230; but it is not more indiscriminate: the microphone is as &#8216;dumb&#8217; as the television camera; both devices pick up anything within their electronic reach, however irrelevant to the investigation.'&#8221;</em></p>
<h6><a href="http://juliaangwin.com/dragnet-nation-available-now/" target="_blank" rel="noopener"><strong><em>Dragnet Nation: A Quest for Privacy, Security, and Freedom in a World of Relentless Surveillance</em></strong></a> – Julia Angwin, Times Books (Feb. 2014)</h6>
<p>Angwin is no stranger to the many facets of surveillance capitalism, and this book is just as prescient now as it was five years ago. In that time, the author&#8217;s concerns have been validated, with the pace of Big Tech&#8217;s blunders only escalating. Angwin keeps the human element in constant view, giving vital context to headlines about privacy and data catastrophes:</p>
<p><em>&#8220;Skeptics say: &#8216;What&#8217;s wrong with all of our data being collected by unseen watchers? Who is being harmed?&#8217; Admittedly, it can be difficult to demonstrate personal harm from a data breach. If Sharon or Bilal is denied a job or insurance, they may never know which piece of data caused the denial. People placed on the no-fly list are never informed about the data that contributed to the decision. But, on a larger scale, the answer is simple: troves of personal data can and will be abused.&#8221;</em></p>
<h6><a href="https://shop.fsf.org/books-docs/free-software-free-society-selected-essays-richard-m-stallman-3rd-edition" target="_blank" rel="noopener"><strong><em>Free Software, Free Society, 3rd Edition</em></strong></a> – Richard M. Stallman, Free Software Foundation (Oct. 2015)</h6>
<p>Stallman&#8217;s status as an icon in the Free/Libre world is often the focus of press. Bootstrapping GNU and the Free Software movement was no small feat, but there is too little focus on Stallman&#8217;s writing. The author&#8217;s philosophy is grounded in practical concerns and explained with a clear and mindful tone that few writers possess. This most recent edition of Stallman&#8217;s collected essays describes just how important liberty is in the contemporary digital context:</p>
<p><em>&#8220;If &#8216;cloud computing&#8217; has a meaning, it is not a way of doing computing, but rather a way of thinking about computing: a devil-may-care approach which says, &#8216;Don’t ask questions. Don’t worry about who controls your computing or who holds your data. Don’t check for a hook hidden inside our service before you swallow it. Trust companies without hesitation.&#8217; In other words, &#8216;Be a sucker.&#8217;”</em></p>
<h6><strong><a href="https://cltc.berkeley.edu/defendingpvos/" target="_blank" rel="noopener"><em>Defending Politically Vulnerable Organizations Online</em></a></strong> – Sean Brooks, Center for Long-Term Cybersecurity (July 2018)</h6>
<p>In this report from the Center for Long-Term Cybersecurity (CLTC), Brooks provides a broad overview of the cybersecurity landscape. This is a great introduction for industry professionals and consumers alike, though it focuses on civil organizations that are often targeted for political reasons. The report&#8217;s citations are a valuable resource in their own right, providing context as well as technological solutions. The author is quick to point out lackluster investment in cybersecurity in both the public and private spheres, describing the vicious cycle this creates:</p>
<p><em>&#8220;The broad asymmetry between attackers and defenders online is unsurprising; politically vulnerable organizations lack resources and are therefore particularly under-protected. This problem is not unique to politically vulnerable organizations. Many public and private organizations have underinvested in cybersecurity and have become soft targets for criminals and other bad actors. Online attackers have continued to develop their offensive capabilities, exacerbating the mismatch.&#8221;</em></p>
<h6><em><strong><a href="https://en.wikipedia.org/wiki/Bad_Blood%3A_Secrets_and_Lies_in_a_Silicon_Valley_Startup" target="_blank" rel="noopener">Bad Blood: Secrets and Lies in a Silicon Valley Startup</a></strong></em> – John Carreyrou, Penguin Random House (May 2018)</h6>
<p>This story of the rise and fall of biotech startup Theranos is a page-turner, described here with all the detail of investigative journalism. Carreyrou&#8217;s most interesting passages are those where the author describes the culture of Silicon Valley, where fraudulent CEO Elizabeth Holmes was desperately trying to fill the mold of her Big Tech heroes:</p>
<p><em>&#8220;For a young entrepreneur building a business in the heart of Silicon Valley, it was hard to escape the shadow of Steve Jobs. By 2007, Apple&#8217;s founder had cemented his legend in the technology world and in American society at large&#8230; to anyone who spent time with Elizabeth, it was clear that she worshipped Jobs and Apple.&#8221;</em></p>
<h6><em><strong><a href="http://www.ellsberg.net/doomsday/" target="_blank" rel="noopener">The Doomsday Machine: Confessions of a Nuclear War Planner</a></strong></em> – Daniel Ellsberg, Bloomsbury USA (Dec. 2017)</h6>
<p>Decades after the legendary whistleblower disclosed the Pentagon Papers to the American public, Ellsberg&#8217;s warnings will still ring alarm bells and shock the reader. Through first-hand accounts, the author chronicles the nuclear program of the 1960&#8217;s and the dangers of the present day, describing the contrasting roles of secrecy and transparency, as well as their relationship to trust:</p>
<p><em>&#8220;Like discussion of covert operations and assassination plots, nuclear war plans and threats are taboo for public discussion by the small minority of officials and consultants who know anything about them. In addition to their own sense of identity as trustworthy keepers of these most-sensitive secrets, there is a strong careerist aspect to their silence.&#8221;</em></p>
<h6><em><a href="https://gabriellacoleman.org/category/academic-writing/" target="_blank" rel="noopener"><strong>The Participatory Condition in the Digital Age</strong></a></em> – Electronic Mediations Book 51 (Nov. 2016)</h6>
<p>This collection of articles spans the gamut from street protests to online &#8220;hacktivism&#8221; to Free and Open-Source collaboration. The editors expertly summarize the transdisciplinary tone of the volume in an introductions that&#8217;s worth contemplating in its own right. Among other issues, Gabriella Coleman describes Kate Crawford&#8217;s work on the power and scale of spying:</p>
<p><em>&#8220;Ubiquitous surveillance facilitated by [i<span class="module__title__link">nformation and communications technology or </span>ICTs] – what Crawford designates as &#8216;algorithmic listening&#8217; – and the gathering of personal data currently operated by web-based corporations (commercial surveillance) and governments (the NSA program, for example) are not simply matters of privacy but also of scale and lack of accountability.&#8221;<br />
</em></p>
<h6><em><strong><a href="http://shop.oreilly.com/product/0636920020103.do" target="_blank" rel="noopener">Privacy and Big Data: The Players, Regulators, and Stakeholders</a></strong></em> – Terence Craig &amp; Mary Ludloff, O&#8217;Reilly Media (Sep. 2011)</h6>
<p>Published at a time when &#8220;Big Data&#8221; was more of a buzzword than a factor of everyday life, this book is a quick and easy introduction to the perils of the data economy. The lessons would seem dated if they weren&#8217;t still applicable, and there&#8217;s perhaps nothing more prescient than the fact that data can not only be sold by Big Tech to business partners, it can be given away:</p>
<p><em>&#8220;While the IP stakeholders have been busy redefining &#8220;privacy&#8221; for their own ends, Google, Yahoo, Facebook, and others have been equally busy making billions of dollars collecting your data and using it for targeted advertising. Of course, any company or organization that collects data can offer it for sale or free.&#8221;<br />
</em></p>
<h6><em><a href="https://cyrusfarivar.com/blog/2018-book-tour/" target="_blank" rel="noopener"><strong>Habeas Data: Privacy vs. the Rise of Surveillance Tech</strong></a> </em>– Cyrus Farivar, Melville House (May 2018)</h6>
<p>Farivar exposes the role of common, household tech in the global surveillance apparatus, diving into the court cases and legal precedent that shapes the scope and limits of privacy and security. Above all, the author steeps his analysis in history, with quotes from legal heavyweights like Louis Brandeis, here discussing wiretaps in a famous dissenting opinion:</p>
<p><em>&#8220;&#8216;The progress of science in furnishing the Government with means of espionage is not likely to stop with wiretapping,&#8217; Brandeis wrote. &#8216;Ways may someday be developed by which the Government, without removing papers from secret drawers, can reproduce them in court, and by which it will be enabled to expose to a jury the most intimate occurences of the home.'&#8221;</em></p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/holiday-reading-list/">Privacy &#038; Security Reading List</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></content:encoded>
			</item>
		<item>
		<title>&#8220;It&#8217;s a Secure Life&#8221; holiday bundles</title>
		<link>https://puri.sm/posts/2018-holiday-season-bundle-sale/</link>
		<pubDate>Sun, 16 Dec 2018 19:00:32 +0000</pubDate>
		<dc:creator><![CDATA[Sean O'Brien]]></dc:creator>
				<category><![CDATA[Promotions]]></category>
		<category><![CDATA[Laptops]]></category>
		<category><![CDATA[Phones]]></category>
		<category><![CDATA[Privacy]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=61758</guid>
		<description><![CDATA[<p>The holidays are around the corner. Are you one of the millions of shoppers who aren&#8217;t finished buying presents? It&#8217;s easy to panic and impulse buy, but that can lead to gifts that no one is happy with and, worse, expose your loved ones to Big Tech snooping. These days, even gag gifts are linked [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/2018-holiday-season-bundle-sale/">&#8220;It&#8217;s a Secure Life&#8221; holiday bundles</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>The holidays are around the corner. Are you one of the millions of shoppers who aren&#8217;t finished buying presents? It&#8217;s easy to panic and impulse buy, but that can lead to gifts that no one is happy with and, worse, expose your loved ones to Big Tech snooping. These days, even gag gifts are linked to surveillance devices—the world&#8217;s favorite <a href="https://www.pcmag.com/review/365395/big-mouth-billy-bass-compatible-with-alexa">talking fish</a> is now a mouthpiece for Amazon&#8217;s eavesdropping Alexa. Sure, you&#8217;d have to buy a spy speaker to go along with it, but that&#8217;s becoming a common accessory that may soon be as required as alkaline batteries were in the 90&#8217;s.</p>
<p>All this pressure to conform and bring <a href="https://www.theguardian.com/technology/2018/nov/10/spy-christmas-smart-home-facebook-portal-google-home-hub-amazon-show-alexa">spy hubs into homes</a> is a strange phenomenon: it&#8217;s occurring while the U.S. has near-monthly Congressional hearings on Big Tech&#8217;s blunders and at a time when consumer desire for privacy is at an <a href="https://www.janrain.com/resources/industry-research/consumer-attitudes-towards-data-privacy-survey-q3-2018">all-time high</a>.</p>
<p>At Purism, we believe that privacy is more than a choice—it&#8217;s a requirement. We make beautiful, functional, smart computer hardware that puts you in control with the safety, security, and verification that there is no built-in tracking or surveillance. <a href="https://puri.sm/posts/protecting-the-digital-supply-chain/">We protect the supply chain</a> from boot to browser, giving you the tools you need to safeguard your digital life.</p>
<p><strong>From now until January 6th, we&#8217;re introducing &#8220;It&#8217;s a Secure Life&#8221; bundles.</strong> Enjoy 15% to 18% off on bundles containing the Librem 5 smartphone (preorder), the Librem 15 laptop, and the Librem Key. To benefit from this, simply add the two or three qualifying items (a Librem 15, a Librem Key, and, optionally, a Librem 5) to your cart and you will see a coupon automatically applied for you. There are many combinations possible, so this promotion&#8217;s rebates can be summarized roughly as follows:</p>
<ul>
<li>Save from $350 to $467 on the full bundle comprised of the Librem 15, Librem 5 and Librem Key</li>
<li>Save from $250 to $358 on the Librem 15 + Librem Key only bundle</li>
</ul>
<p>The amount of base price savings depend on your keyboard configurations and the choice of a TPM model or not. In particular, there are still a few non-TPM UK models or German TPM models that are on clearance, where additional price savings will compound with the rebates mentioned above.</p>
<p>Don&#8217;t buy <a href="https://www.theverge.com/2018/4/13/17233122/android-software-patch-trust-problem">dodgy tablets and smartphones</a>, gag gifts, or toy robots that record the <a href="https://www.commonsense.org/education/blog/privacy-and-security-evaluation-of-the-anki-vector-robot">conversations of children</a>. You and your loved ones can start off 2019 with a secure digital life instead, pioneering the path to privacy with Purism.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/2018-holiday-season-bundle-sale/">&#8220;It&#8217;s a Secure Life&#8221; holiday bundles</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></content:encoded>
			</item>
		<item>
		<title>Break Free from Privacy Prison with Purism</title>
		<link>https://puri.sm/posts/break-free-from-privacy-prison-with-purism/</link>
		<pubDate>Mon, 10 Dec 2018 19:50:33 +0000</pubDate>
		<dc:creator><![CDATA[Sean O'Brien]]></dc:creator>
				<category><![CDATA[Hardware]]></category>
		<category><![CDATA[Miscellaneous]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Software freedom]]></category>
		<category><![CDATA[Supply chain]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=61714</guid>
		<description><![CDATA[<p>As 2018 comes to a close, people around the world have to face the stark truth of surveillance capitalism. Nearly all consumer products — speakers, phones, cars, and perhaps even mattresses — are recording devices, storing metrics on our movements and behavior. The New York Times just published a detailed report on location tracking in [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/break-free-from-privacy-prison-with-purism/">Break Free from Privacy Prison with Purism</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>As 2018 comes to a close, people around the world have to face the stark truth of surveillance capitalism. Nearly all consumer products — speakers, phones, cars, and <a href="https://www.theguardian.com/world/2018/nov/30/mattress-firm-sleep-number-tells-customers-beds-do-not-record-them" target="_blank" rel="noopener">perhaps even mattresses</a> — are recording devices, storing metrics on our movements and behavior. <em>The New York Times</em> just published a <a href="https://www.nytimes.com/interactive/2018/12/10/business/location-data-privacy-apps.html" target="_blank" rel="noopener">detailed report</a> on location tracking in leaky Android and iOS apps. That&#8217;s just a fact of life when people use smartphones, right? Wrong. In 2019, Purism&#8217;s <a href="https://puri.sm/products/librem-5/">Librem 5 smartphone</a> will be proof that no one has to live with spies in their pockets.</p>
<p>If anything has changed since Facebook&#8217;s <a href="https://www.chicagotribune.com/news/nationworld/ct-facebook-advertisers-user-data-20181205-story,amp.html" target="_blank" rel="noopener">Cambridge Analytica scandal</a>, it&#8217;s that more and more people are jumping ship from the <a href="https://www.nytimes.com/2017/10/18/technology/frightful-five-start-ups.html" target="_blank" rel="noopener">Frightful Five</a>: Google, Amazon, Facebook, Apple, and Microsoft. At Purism, we offer an alternative to the polluted software ecosystems of these tech giants.</p>
<p>Our code is Free and Open-Source Software (FOSS), the industry standard in security because it can be verified by experts and amateurs alike. The software on our Librem laptops and our upcoming phone stands on a strong, foundational <a href="https://puri.sm/posts/protecting-the-digital-supply-chain/">chain of trust</a> that is matched by hardware features such as <a href="https://puri.sm/learn/hardware-kill-switches/">kill switches</a>. These switches give people the added assurance that their devices won&#8217;t record or &#8220;phone home&#8221; to advertisers, spies, and cyber criminals. Turn off WiFi, microphone, and webcam on the Librem 5 and they&#8217;re off, no question about it.</p>
<p>Purism&#8217;s combination of trustworthy hardware and software is a win for privacy advocates, <a href="https://puri.sm/enterprise/">enterprise</a>, and the so-called average user. We believe that everyone deserves privacy and that security, freedom, and autonomy are closely linked. To build a <em>libre</em> and privacy-respecting world, however, we need to fathom the scope of the problem and meet it head-on.</p>
<p><em>The Times</em> exposé follows the movements of Lisa Magrin, a school teacher. On Ms. Magrin&#8217;s trips to school, location markers were recorded &#8220;more than 800 times&#8221; often in her classroom. But it doesn&#8217;t stop there: &#8220;An app on the device gathered her location information, which was then sold without her knowledge. It recorded her whereabouts as often as every two seconds&#8230; While Ms. Magrin’s identity was not disclosed in [phone] records, <em>The Times</em> was able to easily connect her to [a spot on the map].&#8221;</p>
<p>Think that&#8217;s invasive? Apps continued to track Ms. Magrin while she traveled to a Weight Watchers meeting, to a dermatologist, hiking with her dog, and to her ex-boyfriend&#8217;s home. Many people know that tracking is ubiquitous, but facing the stark results is a harrowing experience.</p>
<p>Privacy researchers have known the pitfalls of ever-listening sensors for a long time, so I wish I could say this is news to me. My research at Yale Privacy Lab has explored smartphone spying in detail, and I&#8217;ve personally dug into the privacy pitfalls of everything from <a href="https://finance.yahoo.com/news/ap-exclusive-google-tracks-movements-075349852.html" target="_blank" rel="noopener">Google&#8217;s bogus location settings</a> to <a href="https://medium.com/s/thenewnew/irl-ads-are-taking-scary-inspiration-from-social-media-7088e8241beb" target="_blank" rel="noopener">snooping billboards</a>. This time last year, Yale Privacy Lab collaborated with the researchers at Exodus Privacy and utilized the excellent Exodus scanner to reveal <a href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/" target="_blank" rel="noopener">just how polluted</a> the mobile app ecosystem really is.</p>
<p>What do I mean when I say &#8220;polluted&#8221;?  Apps that are submitted to either Google Play or the iOS App Store contain <a href="https://privacylab.yale.edu/tmt">hidden trackers</a> in the form of Software Development Kits (SDKs). These are clandestine snippets of code that ask for invasive permissions such as camera, network, and microphone control. Such tracker SDKs may collect and transmit location, personal information, and behavioral analytics.  In some cases, these hidden snippets of code react to <a href="https://www.nytimes.com/2017/12/28/business/media/alphonso-app-tracking.html" target="_blank" rel="noopener">ultrasonic tones</a> that are silent to humans, allowing retailers and marketers to track the proximity of users as they walk around malls and retail outlets. These hidden &#8220;anti-features&#8221; have been a standard part of both Google and Apple&#8217;s <a href="https://www.wired.com/story/android-users-to-avoid-malware-ditch-googles-app-store/" target="_blank" rel="noopener">app store model</a>, communicating with spying Internet-of-Things devices such as iBeacons.</p>
<p>I work at Purism because I know we can solve this problem. Big changes are on the horizon in society at large, and people are fed up with surveillance capitalism. Purism offers replacements for the privacy prisons of the Frightful Five. You don&#8217;t have to become a luddite to enjoy them, either — our products are as beautiful as they are secure.</p>
<p>Take a stand, #DemandFreedom, and join the world that we&#8217;re making.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/break-free-from-privacy-prison-with-purism/">Break Free from Privacy Prison with Purism</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></content:encoded>
			</item>
		<item>
		<title>Make Today Cybersecurity Monday with Deep Discounts at Purism</title>
		<link>https://puri.sm/posts/2018-cybermonday/</link>
		<pubDate>Mon, 26 Nov 2018 18:41:59 +0000</pubDate>
		<dc:creator><![CDATA[Sean O'Brien]]></dc:creator>
				<category><![CDATA[Promotions]]></category>
		<category><![CDATA[Laptops]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=61544</guid>
		<description><![CDATA[<p>I&#8217;m typing this on a Librem 15 laptop, a secure computer from Purism. On Cyber Monday you can get a deep discount on your own Librem, gaining the assurance that your device is secure, private, and malware-free. Make today a Cybersecurity Monday and get peace-of-mind as well as beautiful hardware. The &#8220;proof of the pudding [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/2018-cybermonday/">Make Today Cybersecurity Monday with Deep Discounts at Purism</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>I&#8217;m typing this on a Librem 15 laptop, a secure computer from Purism. On Cyber Monday you can <a href="https://shop.puri.sm/shop/">get a deep discount on your own Librem</a>, gaining the assurance that your device is secure, private, and malware-free. Make today a Cybersecurity Monday and get peace-of-mind as well as beautiful hardware.</p>
<p>The &#8220;proof of the pudding is in the eating&#8221;, and Purism devices are much more than a treat. For decades, the IT security industry has understood that software must be verified to be trusted, and that such trust can only be provided by Free and Open-Source Software (FOSS). Way back in 1999, <a href="https://www.schneier.com/crypto-gram/archives/1999/0915.html">security expert Bruce Schneier</a> made the observation: &#8220;In the cryptography world, we consider [FOSS] necessary for good security; we have for decades&#8230; For us, [FOSS] isn&#8217;t just a business model; it&#8217;s smart engineering practice.&#8221;</p>
<p>At Purism, our laptops and upcoming <a href="https://puri.sm/products/librem-5/">Librem 5 smartphone</a> have this &#8220;smart engineering practice&#8221; baked-in — the operating system is 100% FOSS and we&#8217;ve replaced the sketchy proprietary BIOS with <a href="https://puri.sm/coreboot/">coreboot</a>. PureOS meets the high standards of the <a href="https://www.fsf.org/news/fsf-adds-pureos-to-list-of-endorsed-gnu-linux-distributions-1">Free Software Foundation’s endorsement</a>, giving you the assurance that it contains no secret, unverifiable, proprietary code.</p>
<p>Cybersecurity firms have witnessed big changes in the digital landscape and a series of high-profile data breaches like the one <a href="https://www.theguardian.com/technology/2018/nov/21/amazon-hit-with-major-data-breach-days-before-black-friday">last week at Amazon</a>. However, the basic security principles have stayed the same.</p>
<p>When there are questions about <a href="https://web.archive.org/web/20181011221602/https://www.bloomberg.com/news/features/2018-10-04/the-big-hack-how-china-used-a-tiny-chip-to-infiltrate-america-s-top-companies">spying microchips at Apple and Amazon</a>, for example, security analysts look at the supply chain as the suspect. At Purism, we <a href="https://puri.sm/posts/protecting-the-digital-supply-chain/">protect the digital supply chain</a>. Our pioneering development of the Librem 5 smartphone requires us to validate each component, taking an active role in the design and testing of the device from the <a href="https://puri.sm/posts/librem5-2018-09-hardware-report/">silicon and schematics on up</a>.</p>
<p>If you take cybersecurity seriously, you need to steer clear from the <a href="https://arstechnica.com/gadgets/2018/10/amazon-patents-alexa-tech-to-tell-if-youre-sick-depressed-and-sell-you-meds/">ever-creepier Amazon gadgets</a> and get Purism in your life. Beyond trust and assurance, you get the simple features you need to make security easy. The Librem line of laptops features hardware kill switches for webcam, microphone, bluetooth, and WiFi, and the Librem 5 smartphone will have them too. Our Librem Key is a one-of-a-kind <a href="https://puri.sm/posts/introducing-the-librem-key/">USB security token</a>, and doesn&#8217;t just offer multi-factor authentication, it tells you if your device has been <a href="https://puri.sm/posts/the-librem-key-makes-tamper-detection-easy/">tampered with</a> via a green or red LED.</p>
<p>Show your friends, your family, your co-workers, or your clients that you care about cybersecurity. Purism devices <a href="https://puri.sm/enterprise/">mean business</a>, and we don&#8217;t mess around when it comes to privacy, trust, and assurance.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/2018-cybermonday/">Make Today Cybersecurity Monday with Deep Discounts at Purism</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></content:encoded>
			</item>
		<item>
		<title>Give the Gift of Privacy with Purism&#8217;s Black Friday Deals</title>
		<link>https://puri.sm/posts/2018-black-friday-deals/</link>
		<pubDate>Thu, 22 Nov 2018 19:57:00 +0000</pubDate>
		<dc:creator><![CDATA[Sean O'Brien]]></dc:creator>
				<category><![CDATA[Promotions]]></category>
		<category><![CDATA[Privacy]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=61408</guid>
		<description><![CDATA[<p>2018 has been a rough year for digital privacy, but this is the home stretch. Many shoppers will be looking for retail therapy this holiday season, scanning retail shelves and storefronts across the Web. When the shopping&#8217;s over, and the presents are opened, what will you have given your friends and loved ones? Will you [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/2018-black-friday-deals/">Give the Gift of Privacy with Purism&#8217;s Black Friday Deals</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
				<content:encoded><![CDATA[<figure id="attachment_61415" style="width: 521px" class="wp-caption alignright"><a href="https://puri.sm/products/"><img class="wp-image-61415" style="border: 1px solid #333;" src="https://puri.sm/wp-content/uploads/2018/11/librem_holiday_graphic-1024x576.png" alt="Purism Librem Line" width="521" height="293" srcset="https://puri.sm/wp-content/uploads/2018/11/librem_holiday_graphic-1024x576.png 1024w, https://puri.sm/wp-content/uploads/2018/11/librem_holiday_graphic-300x169.png 300w, https://puri.sm/wp-content/uploads/2018/11/librem_holiday_graphic-768x432.png 768w, https://puri.sm/wp-content/uploads/2018/11/librem_holiday_graphic.png 1280w" sizes="(max-width: 521px) 100vw, 521px" /></a><figcaption class="wp-caption-text"><a href="https://puri.sm/products/">Give the Gift of Privacy</a></figcaption></figure>
<p>2018 has been a rough year for digital privacy, but this is the home stretch. Many shoppers will be looking for <a href="https://en.wikipedia.org/wiki/Retail_therapy" target="_blank" rel="noopener">retail therapy</a> this holiday season, scanning retail shelves and storefronts across the Web. When the shopping&#8217;s over, and the presents are opened, what will you have given your friends and loved ones? Will you have saddled them with spying &#8220;smart home&#8221; appliances, mobile app trackers, and <a href="https://www.nbcnews.com/tech/innovation/alexa-privacy-fail-highlights-risks-smart-speakers-n877671" target="_blank" rel="noopener">eavesdropping speakers</a>?</p>
<p>Tech doesn&#8217;t have to give people the <em>agita</em> of home surveillance—<strong><a href="https://puri.sm/products/">give the gift of privacy</a> this holiday season.</strong> All Purism laptops will be on sale from Black Friday through Cyber Monday. And you can even pay <a href="https://puri.sm/posts/splitit-payments-financing-introduction/" target="_blank" rel="noopener">with monthly installments</a> now!</p>
<p>Why support Purism? To start, it&#8217;s a <a href="https://puri.sm/about/social-purpose/">Social Purpose Corporation</a> dedicated to privacy, security, and freedom. Your digital rights come before the interests of investors, and we have a strong commitment to technology that doesn&#8217;t spy on you, track you, or expose you to malware and viruses. When you buy Purism devices, you get:</p>
<ul>
<li>hardware features built for your privacy such as physical <a href="https://puri.sm/learn/hardware-kill-switches/">kill switches</a> for the webcam, microphone, bluetooth, and WiFi;</li>
<li>the benefit of secure and verifiable software, from the moment you boot your device to the time you spend in your Web browser;</li>
<li>an economic vote signalling demand for security, privacy and freedom, supporting our R&amp;D efforts. Indeed, you are not <em>just</em> buying hardware: the margins we make on hardware sales are what pays our team of 30+ people to do software, firmware and hardware enablement work around coreboot, PureOS, the Librem 5 phone platform, and services and support.</li>
</ul>
<p>Our Librem line of laptops ship with <a href="https://pureos.net/">PureOS</a>, an operating system that meets the high standards of the <a href="https://www.fsf.org/news/fsf-adds-pureos-to-list-of-endorsed-gnu-linux-distributions-1" target="_blank" rel="noopener">Free Software Foundation&#8217;s endorsement</a>, and <a href="/coreboot/">coreboot</a> as a replacement for proprietary BIOSes. The Librem 5 smartphone will ship with it too, raising the bar for private and secure mobile devices worldwide and challenging Apple and Google to meet that standard.</p>
<p>When Apple CEO Tim Cook was deriding Facebook for it&#8217;s <a href="https://www.nytimes.com/2018/11/14/technology/facebook-data-russia-election-racism.html" target="_blank" rel="noopener">dismal privacy record</a>, he said Apple was &#8220;not going to traffic in your personal life&#8221; and that privacy is a &#8220;human right&#8221; and a &#8220;civil liberty&#8221;. At Purism we agree with this sentiment, but we also ask Apple to take a long look in the mirror. Macbooks contain a &#8220;security&#8221; microchip that contains secret, unverifiable, proprietary code. The T2 chip not only means the &#8220;Hey Siri&#8221; voice assistant is always listening, it can also <a href="https://www.extremetech.com/computing/280501-apple-confirms-t2-chip-can-brick-macs-after-third-party-repairs" target="_blank" rel="noopener">brick your Mac</a> if you don&#8217;t follow Apple&#8217;s repair rules.</p>
<p>iPhones, it turns out, are just as bad as Google&#8217;s Android when it comes to tracking you. In one experiment, an iPhone was found to be <a href="https://www.abc.net.au/news/2018-11-16/datalife-i-spied-on-my-phone-and-here-is-what-i-found/10496450" target="_blank" rel="noopener">making contact hundreds of times</a> with Apple&#8217;s servers and third-parties, while the user was sleeping and the phone was &#8220;inactive&#8221;. Worse, Apple invented the iBeacon standard that is now used worldwide to <a href="https://blog.beaconstac.com/2018/07/proximity-marketing-in-2018-and-the-market-forecast-for-2022/" target="_blank" rel="noopener">track the movements and proximity</a> of users to each other, to smart digital signs, and to products in malls and grocery stores. Though Apple has been able to dodge privacy criticisms with hand-waving and clever marketing, Tim Cook was on the defensive this week when asked about the company&#8217;s <a href="https://www.nbcnews.com/news/amp/ncna937981" target="_blank" rel="noopener">relationship with Google</a>.</p>
<p>In 2018, the world has had to face the reality that surveillance tech tries to track and monetize our every move. Make room for Purism on your shopping list and you make a change for 2019, distancing yourself from the data merchants watching everyone, even in their sleep.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/2018-black-friday-deals/">Give the Gift of Privacy with Purism&#8217;s Black Friday Deals</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></content:encoded>
			</item>
	</channel>
</rss>
