<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>N79 &#8211; Purism</title>
	<atom:link href="https://puri.sm/posts/category/n79/feed/" rel="self" type="application/rss+xml" />
	<link>https://puri.sm/</link>
	<description>High-quality computers that protect your freedom and privacy</description>
	<lastBuildDate>Wed, 01 Oct 2025 18:29:47 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=4.9.28</generator>

<image>
	<url>https://puri.sm/wp-content/uploads/2020/04/cropped-purism-logo-rectangle-1-32x32.png</url>
	<title>N79 &#8211; Purism</title>
	<link>https://puri.sm/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Quantum Safe Private Communications: Building the Future Before the Threat Arrives</title>
		<link>https://puri.sm/posts/quantum-safe-private-communications-building-the-future-before-the-threat-arrives/</link>
		<pubDate>Fri, 26 Sep 2025 20:56:28 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Applications]]></category>
		<category><![CDATA[Government Mobility]]></category>
		<category><![CDATA[Industry News]]></category>
		<category><![CDATA[Librem PQC Comms Server]]></category>
		<category><![CDATA[Librem PQC Encryptor]]></category>
		<category><![CDATA[Mobile Ecosystem]]></category>
		<category><![CDATA[N79]]></category>
		<category><![CDATA[Post Quantum Cryptography]]></category>
		<category><![CDATA[Private Cellular Networking]]></category>
		<category><![CDATA[Quantum Safe]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[CISO]]></category>
		<category><![CDATA[Communications infrastructure]]></category>
		<category><![CDATA[Critical Infrastructure]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[infosec]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[Physical robustness]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84586</guid>
		<description><![CDATA[<p>Secure mobility is not just about encryption — it’s about sovereignty. The ability to own, control, and verify every layer of your communications stack is the difference between operational assurance and strategic vulnerability.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/quantum-safe-private-communications-building-the-future-before-the-threat-arrives/">Quantum Safe Private Communications: Building the Future Before the Threat Arrives</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Why the Salt Typhoon Hacks Make Our Public Networks Vulnerable</title>
		<link>https://puri.sm/posts/why-the-salt-typhoon-hacks-make-our-public-networks-vulnerable/</link>
		<pubDate>Sat, 18 Jan 2025 18:39:34 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Liberty Phone]]></category>
		<category><![CDATA[Made in USA Electronics]]></category>
		<category><![CDATA[N79]]></category>
		<category><![CDATA[Post Quantum Cryptography]]></category>
		<category><![CDATA[PureOS]]></category>
		<category><![CDATA[Quantum Safe]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[CISO]]></category>
		<category><![CDATA[Communications infrastructure]]></category>
		<category><![CDATA[Critical Infrastructure]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[infosec]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[Physical robustness]]></category>
		<category><![CDATA[Secure Supply Chain]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=82719</guid>
		<description><![CDATA[<p>The recent Salt Typhoon hacks by the People's Republic of China (PRC) have exposed significant vulnerabilities in our public networks. These hacks, which targeted major telecommunications providers like Verizon, AT&#038;T, Lumen Technologies, Charter Communications, Consolidated Communications, Windstream, and T-Mobile (although the later says that they prevented access to PII data) have shown just how susceptible our public communication systems are to sophisticated cyber threats. The hackers exploited weaknesses in unencrypted messages and phone calls, allowing them to gain access to sensitive data and even geolocate individuals. The compromise to the public networks may indeed have follow-on repercussions such as muti-factor authentication (MFA) via SMS texts but that is a subject for a future post.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/why-the-salt-typhoon-hacks-make-our-public-networks-vulnerable/">Why the Salt Typhoon Hacks Make Our Public Networks Vulnerable</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Flipping the Script: Exploring New Paradigms in Secure Mobile Computing</title>
		<link>https://puri.sm/posts/flipping-the-script-exploring-new-paradigms-in-secure-mobile-computing/</link>
		<pubDate>Thu, 22 Aug 2024 00:53:20 +0000</pubDate>
		<dc:creator><![CDATA[Randy Siegel]]></dc:creator>
				<category><![CDATA[Government Mobility]]></category>
		<category><![CDATA[Hardware]]></category>
		<category><![CDATA[Industry News]]></category>
		<category><![CDATA[Liberty Phone]]></category>
		<category><![CDATA[Made in USA Electronics]]></category>
		<category><![CDATA[Manufacturing Operations and Logistics]]></category>
		<category><![CDATA[N79]]></category>
		<category><![CDATA[Partnerships]]></category>
		<category><![CDATA[Private Cellular Networking]]></category>
		<category><![CDATA[Regulatory]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[CISO]]></category>
		<category><![CDATA[Communications infrastructure]]></category>
		<category><![CDATA[Critical Infrastructure]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Hardware Kill Switches]]></category>
		<category><![CDATA[Made in America]]></category>
		<category><![CDATA[most secure phone]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[Secure Supply Chain]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=82344</guid>
		<description><![CDATA[<p>This solution leverages private cellular networks (PCNs) owned and operated by government entities rather than the traditional dependence on Public Switched Network Providers (PSNs) such as AT&#038;T, Verizon, Vodafone, Orange and others around the world.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/flipping-the-script-exploring-new-paradigms-in-secure-mobile-computing/">Flipping the Script: Exploring New Paradigms in Secure Mobile Computing</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Private Cellular Networking and Secure Client Devices</title>
		<link>https://puri.sm/posts/private-cellular-networking-and-secure-client-devices/</link>
		<pubDate>Tue, 23 Jul 2024 18:36:30 +0000</pubDate>
		<dc:creator><![CDATA[Randy Siegel]]></dc:creator>
				<category><![CDATA[Government Mobility]]></category>
		<category><![CDATA[Mobile Ecosystem]]></category>
		<category><![CDATA[N79]]></category>
		<category><![CDATA[Private Cellular Networking]]></category>
		<category><![CDATA[CISO]]></category>
		<category><![CDATA[Communications infrastructure]]></category>
		<category><![CDATA[Critical Infrastructure]]></category>
		<category><![CDATA[infosec]]></category>
		<category><![CDATA[Made in USA Electronics]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=82220</guid>
		<description><![CDATA[<p>Private cellular networking and secure client devices provide a holistic, turnkey solution leveraging the N79 band for government or enterprise networks. 5G The advent of 5G technology has revolutionized the world of wireless communication. Among the various aspects of 5G, the N79 band and private 5G networks have emerged as significant components. This post explores [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/private-cellular-networking-and-secure-client-devices/">Private Cellular Networking and Secure Client Devices</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
	</channel>
</rss>
