<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Government Mobility &#8211; Purism</title>
	<atom:link href="https://puri.sm/posts/category/government-mobility/feed/" rel="self" type="application/rss+xml" />
	<link>https://puri.sm/</link>
	<description>High-quality computers that protect your freedom and privacy</description>
	<lastBuildDate>Wed, 01 Oct 2025 18:29:47 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=4.9.28</generator>

<image>
	<url>https://puri.sm/wp-content/uploads/2020/04/cropped-purism-logo-rectangle-1-32x32.png</url>
	<title>Government Mobility &#8211; Purism</title>
	<link>https://puri.sm/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Quantum Safe Private Communications: Building the Future Before the Threat Arrives</title>
		<link>https://puri.sm/posts/quantum-safe-private-communications-building-the-future-before-the-threat-arrives/</link>
		<pubDate>Fri, 26 Sep 2025 20:56:28 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Applications]]></category>
		<category><![CDATA[Government Mobility]]></category>
		<category><![CDATA[Industry News]]></category>
		<category><![CDATA[Librem PQC Comms Server]]></category>
		<category><![CDATA[Librem PQC Encryptor]]></category>
		<category><![CDATA[Mobile Ecosystem]]></category>
		<category><![CDATA[N79]]></category>
		<category><![CDATA[Post Quantum Cryptography]]></category>
		<category><![CDATA[Private Cellular Networking]]></category>
		<category><![CDATA[Quantum Safe]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[CISO]]></category>
		<category><![CDATA[Communications infrastructure]]></category>
		<category><![CDATA[Critical Infrastructure]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[infosec]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[Physical robustness]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84586</guid>
		<description><![CDATA[<p>Secure mobility is not just about encryption — it’s about sovereignty. The ability to own, control, and verify every layer of your communications stack is the difference between operational assurance and strategic vulnerability.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/quantum-safe-private-communications-building-the-future-before-the-threat-arrives/">Quantum Safe Private Communications: Building the Future Before the Threat Arrives</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Secret Service Telecom Bust Exposes Cellular Weaknesses</title>
		<link>https://puri.sm/posts/secret-service-telecom-bust-exposes-cellular-weaknesses/</link>
		<pubDate>Tue, 23 Sep 2025 19:31:07 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Civil Liberties]]></category>
		<category><![CDATA[Government Mobility]]></category>
		<category><![CDATA[Mobile Ecosystem]]></category>
		<category><![CDATA[Communications infrastructure]]></category>
		<category><![CDATA[Consumer Protection]]></category>
		<category><![CDATA[Critical Infrastructure]]></category>
		<category><![CDATA[Liberty Phone]]></category>
		<category><![CDATA[librem 5]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84546</guid>
		<description><![CDATA[<p>The Secret Service’s disruption of a massive SIM-server network near the U.N. is proof that the threats to our communications are real, organized, and capable of overwhelming public safety systems.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/secret-service-telecom-bust-exposes-cellular-weaknesses/">Secret Service Telecom Bust Exposes Cellular Weaknesses</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>The NYPD’s $3B “Domain Awareness System” isn’t just a New York problem—it’s a warning for every American</title>
		<link>https://puri.sm/posts/the-nypds-3b-domain-awareness-system-isnt-just-a-new-york-problem-its-a-warning-for-every-american/</link>
		<pubDate>Thu, 18 Sep 2025 17:48:28 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Civil Liberties]]></category>
		<category><![CDATA[Government Mobility]]></category>
		<category><![CDATA[Miscellaneous]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Consumer Privacy]]></category>
		<category><![CDATA[Consumer Protection]]></category>
		<category><![CDATA[Social media]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84454</guid>
		<description><![CDATA[<p>In her September 15, 2025, New York Times opinion piece, Elizabeth Daniel Vasquez lays bare a reality too many Americans have ignored: the New York Police Department has quietly built one of the most expansive, integrated surveillance systems in the nation’s history.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/the-nypds-3b-domain-awareness-system-isnt-just-a-new-york-problem-its-a-warning-for-every-american/">The NYPD’s $3B “Domain Awareness System” isn’t just a New York problem—it’s a warning for every American</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>From Typhoon to Action: A Purism Playbook for Hardening Your Defenses</title>
		<link>https://puri.sm/posts/from-typhoon-to-action-a-purism-playbook-for-hardening-your-defenses/</link>
		<pubDate>Thu, 11 Sep 2025 12:00:17 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Applications]]></category>
		<category><![CDATA[Government Mobility]]></category>
		<category><![CDATA[Industry News]]></category>
		<category><![CDATA[Apps]]></category>
		<category><![CDATA[Consumer Privacy]]></category>
		<category><![CDATA[Consumer Protection]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Enterprise]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84293</guid>
		<description><![CDATA[<p>When the FBI, CISA, and NSA release joint advisories, it’s not theory — it’s reality. The latest warnings about Salt Typhoon and Volt Typhoon should be read as a weather alert: the storm isn’t “out there,” it’s already in progress. These campaigns target infrastructure, communications, and supply chains with patience and persistence.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/from-typhoon-to-action-a-purism-playbook-for-hardening-your-defenses/">From Typhoon to Action: A Purism Playbook for Hardening Your Defenses</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>California’s New Privacy Rules Are a National Signal</title>
		<link>https://puri.sm/posts/californias-new-privacy-rules-are-a-national-signal/</link>
		<pubDate>Sun, 07 Sep 2025 19:21:41 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Civil Liberties]]></category>
		<category><![CDATA[Government Mobility]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Regulatory]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Consumer Privacy]]></category>
		<category><![CDATA[Consumer Protection]]></category>
		<category><![CDATA[cybersecurity]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84134</guid>
		<description><![CDATA[<p>California’s New Privacy Rules Are a National Signal The California Privacy Protection Agency’s latest regulations redraw the playing field. This is the first set of rules in the U.S. to require: Annual, independent cybersecurity audits for high-risk businesses Comprehensive risk assessments for key data processing activities Bias and privacy impact reviews for automated decision-making systems [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/californias-new-privacy-rules-are-a-national-signal/">California’s New Privacy Rules Are a National Signal</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Introducing the Librem PQC Comms Server</title>
		<link>https://puri.sm/posts/introducing-the-librem-pqc-comms-server/</link>
		<pubDate>Wed, 27 Aug 2025 11:44:55 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Additional Press Information]]></category>
		<category><![CDATA[Government Mobility]]></category>
		<category><![CDATA[Hardware]]></category>
		<category><![CDATA[Librem PQC Comms Server]]></category>
		<category><![CDATA[Mobile Ecosystem]]></category>
		<category><![CDATA[Post Quantum Cryptography]]></category>
		<category><![CDATA[Press Releases]]></category>
		<category><![CDATA[Quantum Safe]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Voice & Data Services]]></category>
		<category><![CDATA[CISO]]></category>
		<category><![CDATA[Communications infrastructure]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[infosec]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[Product or service launch]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=83993</guid>
		<description><![CDATA[<p>SF, CA, US – Purism is excited to announce its <a href="https://puri.sm/products/librem-pqc-comms-server/">Librem PQC Comms Server</a>, encrypting data-in-transit (DIT) with post-quantum cryptography (PQC) according to the <a href="https://csrc.nist.gov/pubs/fips/203/final">NIST FIPS 203</a> standard. When bundled as a complete ecosystem with the <a href="https://puri.sm/products/liberty-phone/">Liberty Phone</a> or other Purism Products will also address data-at-rest (DAR) encrypted with PQC.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/introducing-the-librem-pqc-comms-server/">Introducing the Librem PQC Comms Server</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>FTC Issues Letters to Big Tech: No Back Doors</title>
		<link>https://puri.sm/posts/ftc-issues-letters-to-big-tech-no-back-doors/</link>
		<pubDate>Mon, 25 Aug 2025 21:07:47 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Civil Liberties]]></category>
		<category><![CDATA[Government Mobility]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Consumer Privacy]]></category>
		<category><![CDATA[Consumer Protection]]></category>
		<category><![CDATA[secure computing]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84107</guid>
		<description><![CDATA[<p>FTC to Big Tech: No Back Doors — Purism Was Already There Protecting against Jurisdictional Arbitrage When the Federal Trade Commission (FTC) makes a determined move like this, it’s not a casual policy tweak — it’s a line drawn in permanent ink. On August 21, FTC Chairman Andrew Ferguson sent formal notices to over a [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/ftc-issues-letters-to-big-tech-no-back-doors/">FTC Issues Letters to Big Tech: No Back Doors</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>The Signal Noise: A Wake-Up Call for Secure Communications</title>
		<link>https://puri.sm/posts/the-signal-noise-a-wake-up-call-for-secure-communications/</link>
		<pubDate>Mon, 31 Mar 2025 21:09:18 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Government Mobility]]></category>
		<category><![CDATA[Liberty Phone]]></category>
		<category><![CDATA[Made in USA Electronics]]></category>
		<category><![CDATA[Mobile Ecosystem]]></category>
		<category><![CDATA[Post Quantum Cryptography]]></category>
		<category><![CDATA[Private Cellular Networking]]></category>
		<category><![CDATA[Quantum Safe]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[CISO]]></category>
		<category><![CDATA[Critical Infrastructure]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[infosec]]></category>
		<category><![CDATA[most secure phone]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[Secure Supply Chain]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=82871</guid>
		<description><![CDATA[<p>When all the control is handled in-house and all communication is quantum-safe as well as on private networks you have the strongest possible security story and the most convenient offering for the toughest of security needs; including national security.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/the-signal-noise-a-wake-up-call-for-secure-communications/">The Signal Noise: A Wake-Up Call for Secure Communications</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>The Importance of Software Bill of Materials (SBOM)</title>
		<link>https://puri.sm/posts/the-importance-of-software-bill-of-materials-sbom/</link>
		<pubDate>Fri, 21 Mar 2025 14:02:56 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Civil Liberties]]></category>
		<category><![CDATA[Government Mobility]]></category>
		<category><![CDATA[PureOS]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Social Purpose]]></category>
		<category><![CDATA[Consumer Privacy]]></category>
		<category><![CDATA[Consumer Protection]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[FLOSS applications]]></category>
		<category><![CDATA[Linux kernel]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Secure Supply Chain]]></category>
		<category><![CDATA[Software freedom]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=82807</guid>
		<description><![CDATA[<p>The Department of Homeland Security (DHS) has been at the forefront of enhancing software supply chain security through its Software Bill of Materials (SBOM) initiatives. The SBOM is a comprehensive inventory of all components, libraries, and dependencies used in software development. This transparency is crucial for identifying potential vulnerabilities and mitigating risks associated with software supply chains.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/the-importance-of-software-bill-of-materials-sbom/">The Importance of Software Bill of Materials (SBOM)</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>RIP RSA AES: The Immediate Need of Quantum-Resistant Cryptography</title>
		<link>https://puri.sm/posts/rip-rsa-aes-the-immediate-need-of-quantum-resistant-cryptography/</link>
		<pubDate>Tue, 22 Oct 2024 20:01:30 +0000</pubDate>
		<dc:creator><![CDATA[Randy Siegel]]></dc:creator>
				<category><![CDATA[Government Mobility]]></category>
		<category><![CDATA[Post Quantum Cryptography]]></category>
		<category><![CDATA[Quantum Safe]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[CISO]]></category>
		<category><![CDATA[cybersecurity]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=82543</guid>
		<description><![CDATA[<p>The recent announcement from Chinese scientists about their successful use of a quantum computer to crack military-grade encryption has sent shockwaves through the cybersecurity community. This breakthrough, utilizing a D-Wave Advantage quantum computer, marks a significant milestone in the field of quantum computing. The implications of this development are profound, particularly for industries reliant on classical cryptographic systems like RSA and AES.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/rip-rsa-aes-the-immediate-need-of-quantum-resistant-cryptography/">RIP RSA AES: The Immediate Need of Quantum-Resistant Cryptography</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>The Imperative of NIST-Approved Post-Quantum Resistant Algorithms for Securing Mobile Devices</title>
		<link>https://puri.sm/posts/the-imperative-of-nist-approved-post-quantum-resistant-algorithms-for-securing-mobile-devices/</link>
		<pubDate>Mon, 30 Sep 2024 15:47:44 +0000</pubDate>
		<dc:creator><![CDATA[Randy Siegel]]></dc:creator>
				<category><![CDATA[Government Mobility]]></category>
		<category><![CDATA[Mobile Ecosystem]]></category>
		<category><![CDATA[Post Quantum Cryptography]]></category>
		<category><![CDATA[Quantum Safe]]></category>
		<category><![CDATA[Regulatory]]></category>
		<category><![CDATA[CISO]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[PureOS]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=82475</guid>
		<description><![CDATA[<p>In the rapidly evolving landscape of cybersecurity, the advent of quantum computing presents both unprecedented opportunities and significant threats. As we stand on the brink of a quantum revolution, the need for robust, quantum-resistant cryptographic solutions has never been more urgent.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/the-imperative-of-nist-approved-post-quantum-resistant-algorithms-for-securing-mobile-devices/">The Imperative of NIST-Approved Post-Quantum Resistant Algorithms for Securing Mobile Devices</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>The Liberty Phone: Secure Government Mobility</title>
		<link>https://puri.sm/posts/the-liberty-phone-secure-government-mobility/</link>
		<pubDate>Tue, 17 Sep 2024 17:11:46 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Government Mobility]]></category>
		<category><![CDATA[Liberty Phone]]></category>
		<category><![CDATA[Made in America]]></category>
		<category><![CDATA[Made In USA]]></category>
		<category><![CDATA[Made in USA Electronics]]></category>
		<category><![CDATA[secure computing]]></category>
		<category><![CDATA[Secure Supply Chain]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Supply chain]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=82404</guid>
		<description><![CDATA[<p>The Liberty Phone delivers uncompromising security for government mobile computing. With Made in USA electronics, it ensures supply chain integrity. Hardware-based security, including physical kill switches, combines with the open-source PureOS to provide superior protection and control. Featuring end-to-end encryption and user-controlled cryptography, the Liberty Phone puts agency security first. Customizable and adaptable, it&#8217;s the [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/the-liberty-phone-secure-government-mobility/">The Liberty Phone: Secure Government Mobility</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
<enclosure url="https://videos.puri.sm/promo/l5-hardware-design-gov.webm" length="1623685" type="video/webm" />
<enclosure url="https://videos.puri.sm/promo/l5-hardware-design-gov.mp4" length="3780986" type="video/mp4" />
		</item>
		<item>
		<title>A Secure Foundry for Government Mobile Computing Needs</title>
		<link>https://puri.sm/posts/a-secure-foundry-for-government-mobile-computing-needs/</link>
		<pubDate>Thu, 12 Sep 2024 15:28:51 +0000</pubDate>
		<dc:creator><![CDATA[Randy Siegel]]></dc:creator>
				<category><![CDATA[Government Mobility]]></category>
		<category><![CDATA[Hardware]]></category>
		<category><![CDATA[Liberty Phone]]></category>
		<category><![CDATA[Made in USA Electronics]]></category>
		<category><![CDATA[Mobile Ecosystem]]></category>
		<category><![CDATA[PureOS]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[infosec]]></category>
		<category><![CDATA[Made In USA]]></category>
		<category><![CDATA[most secure phone]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=82388</guid>
		<description><![CDATA[<p>Purism offers a comprehensive solution for those seeking to protect their digital lives. As threats to digital security continue to evolve, Purism’s dedication to privacy and security positions it as a leader in the field, providing a solid foundation for secure mobile computing.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/a-secure-foundry-for-government-mobile-computing-needs/">A Secure Foundry for Government Mobile Computing Needs</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Flipping the Script: Exploring New Paradigms in Secure Mobile Computing</title>
		<link>https://puri.sm/posts/flipping-the-script-exploring-new-paradigms-in-secure-mobile-computing/</link>
		<pubDate>Thu, 22 Aug 2024 00:53:20 +0000</pubDate>
		<dc:creator><![CDATA[Randy Siegel]]></dc:creator>
				<category><![CDATA[Government Mobility]]></category>
		<category><![CDATA[Hardware]]></category>
		<category><![CDATA[Industry News]]></category>
		<category><![CDATA[Liberty Phone]]></category>
		<category><![CDATA[Made in USA Electronics]]></category>
		<category><![CDATA[Manufacturing Operations and Logistics]]></category>
		<category><![CDATA[N79]]></category>
		<category><![CDATA[Partnerships]]></category>
		<category><![CDATA[Private Cellular Networking]]></category>
		<category><![CDATA[Regulatory]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[CISO]]></category>
		<category><![CDATA[Communications infrastructure]]></category>
		<category><![CDATA[Critical Infrastructure]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Hardware Kill Switches]]></category>
		<category><![CDATA[Made in America]]></category>
		<category><![CDATA[most secure phone]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[Secure Supply Chain]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=82344</guid>
		<description><![CDATA[<p>This solution leverages private cellular networks (PCNs) owned and operated by government entities rather than the traditional dependence on Public Switched Network Providers (PSNs) such as AT&#038;T, Verizon, Vodafone, Orange and others around the world.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/flipping-the-script-exploring-new-paradigms-in-secure-mobile-computing/">Flipping the Script: Exploring New Paradigms in Secure Mobile Computing</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>The Evolution of Smartphone Security</title>
		<link>https://puri.sm/posts/the-evolution-of-smartphone-security/</link>
		<pubDate>Wed, 07 Aug 2024 17:41:49 +0000</pubDate>
		<dc:creator><![CDATA[Randy Siegel]]></dc:creator>
				<category><![CDATA[Government Mobility]]></category>
		<category><![CDATA[Hardware Encryption (HWE)]]></category>
		<category><![CDATA[Made in USA Electronics]]></category>
		<category><![CDATA[Mobile Ecosystem]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[infosec]]></category>
		<category><![CDATA[Liberty Phone]]></category>
		<category><![CDATA[most secure phone]]></category>
		<category><![CDATA[Secure Supply Chain]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=82318</guid>
		<description><![CDATA[<p>When smartphones first emerged in the early 2000s, the attack surface was relatively small. Devices were primarily used for Personal Information Management (PIM) such as calls, texts, email, calendaring, and basic internet browsing. However, the landscape changed dramatically with the introduction of the iPhone and Android platforms in 2007. These devices brought about a revolution [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/the-evolution-of-smartphone-security/">The Evolution of Smartphone Security</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
<enclosure url="https://videos.puri.sm/promo/CNBC_USA.mp4" length="20914889" type="video/mp4" />
		</item>
		<item>
		<title>Hardware Based Security For Government</title>
		<link>https://puri.sm/posts/hardware-based-security-for-government/</link>
		<pubDate>Thu, 01 Aug 2024 20:33:29 +0000</pubDate>
		<dc:creator><![CDATA[Randy Siegel]]></dc:creator>
				<category><![CDATA[Government Mobility]]></category>
		<category><![CDATA[Hardware Encryption (HWE)]]></category>
		<category><![CDATA[Liberty Phone]]></category>
		<category><![CDATA[CISO]]></category>
		<category><![CDATA[Made in USA Electronics]]></category>
		<category><![CDATA[Secure Supply Chain]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=82279</guid>
		<description><![CDATA[<p>Explore the critical role of a hardware root of trust in ensuring the security and integrity of smartphones.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/hardware-based-security-for-government/">Hardware Based Security For Government</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Private Cellular Networking and Secure Client Devices</title>
		<link>https://puri.sm/posts/private-cellular-networking-and-secure-client-devices/</link>
		<pubDate>Tue, 23 Jul 2024 18:36:30 +0000</pubDate>
		<dc:creator><![CDATA[Randy Siegel]]></dc:creator>
				<category><![CDATA[Government Mobility]]></category>
		<category><![CDATA[Mobile Ecosystem]]></category>
		<category><![CDATA[N79]]></category>
		<category><![CDATA[Private Cellular Networking]]></category>
		<category><![CDATA[CISO]]></category>
		<category><![CDATA[Communications infrastructure]]></category>
		<category><![CDATA[Critical Infrastructure]]></category>
		<category><![CDATA[infosec]]></category>
		<category><![CDATA[Made in USA Electronics]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=82220</guid>
		<description><![CDATA[<p>Private cellular networking and secure client devices provide a holistic, turnkey solution leveraging the N79 band for government or enterprise networks. 5G The advent of 5G technology has revolutionized the world of wireless communication. Among the various aspects of 5G, the N79 band and private 5G networks have emerged as significant components. This post explores [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/private-cellular-networking-and-secure-client-devices/">Private Cellular Networking and Secure Client Devices</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Purpose-Built Smartphones for Government vs. Commercial Off-The-Shelf Devices</title>
		<link>https://puri.sm/posts/purpose-built-smartphones-for-government-vs-commercial-off-the-shelf-devices/</link>
		<pubDate>Fri, 19 Jul 2024 00:03:05 +0000</pubDate>
		<dc:creator><![CDATA[Randy Siegel]]></dc:creator>
				<category><![CDATA[Government Mobility]]></category>
		<category><![CDATA[Industry News]]></category>
		<category><![CDATA[Liberty Phone]]></category>
		<category><![CDATA[Made in USA Electronics]]></category>
		<category><![CDATA[Mobile Ecosystem]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[infosec]]></category>
		<category><![CDATA[most secure phone]]></category>
		<category><![CDATA[Network Security]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=82192</guid>
		<description><![CDATA[<p>The rise of the smartphone as both an indispensable consumer electronic device and an omnipresent tool for performing tasks at work has led to an inevitable question: Should enterprise and government centralized IT organizations deploy Commercial Off-the-Shelf (COTS) devices such as the iPhone, Google Pixel, Samsung Galaxy and attempt to secure them, or should organizations [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/purpose-built-smartphones-for-government-vs-commercial-off-the-shelf-devices/">Purpose-Built Smartphones for Government vs. Commercial Off-The-Shelf Devices</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Federal Government Mobility Veteran Randy Siegel Joins Purism</title>
		<link>https://puri.sm/posts/federal-government-mobility-veteran-randy-siegel-joins-purism/</link>
		<pubDate>Mon, 15 Jul 2024 00:00:46 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Government Mobility]]></category>
		<category><![CDATA[Liberty Phone]]></category>
		<category><![CDATA[Made in USA Electronics]]></category>
		<category><![CDATA[Mobile Ecosystem]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[CISO]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[infosec]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[PureOS]]></category>
		<category><![CDATA[Secure Supply Chain]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=82035</guid>
		<description><![CDATA[<p>Purism is pleased to announce that long-time mobility industry insider Randy Siegel has joined the company to direct our strategic government business development efforts. &#8220;Adding Randy to lead our secure mobile offering is a natural fit to expand our governmental focused Liberty Phone manufactured at our facility on US Soil. We are extremely excited that [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/federal-government-mobility-veteran-randy-siegel-joins-purism/">Federal Government Mobility Veteran Randy Siegel Joins Purism</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
	</channel>
</rss>
