<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Boot and BIOS &#8211; Purism</title>
	<atom:link href="https://puri.sm/posts/tag/boot-and-bios/feed/" rel="self" type="application/rss+xml" />
	<link>https://puri.sm/</link>
	<description>High-quality computers that protect your freedom and privacy</description>
	<lastBuildDate>Wed, 01 Oct 2025 18:29:47 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=4.9.28</generator>

<image>
	<url>https://puri.sm/wp-content/uploads/2020/04/cropped-purism-logo-rectangle-1-32x32.png</url>
	<title>Boot and BIOS &#8211; Purism</title>
	<link>https://puri.sm/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Hidden Operating Systems in Chips vs. Secure, Auditable OSes: A Cybersecurity Comparison</title>
		<link>https://puri.sm/posts/hidden-operating-systems-in-chips-vs-secure-auditable-oses-a-cybersecurity-comparison/</link>
		<pubDate>Tue, 10 Jun 2025 15:18:36 +0000</pubDate>
		<dc:creator><![CDATA[Rex M. Lee]]></dc:creator>
				<category><![CDATA[Hardware]]></category>
		<category><![CDATA[Hardware Encryption (HWE)]]></category>
		<category><![CDATA[Manufacturing Operations and Logistics]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Product Design]]></category>
		<category><![CDATA[PureOS]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Boot and BIOS]]></category>
		<category><![CDATA[Consumer Privacy]]></category>
		<category><![CDATA[Consumer Protection]]></category>
		<category><![CDATA[Critical Infrastructure]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[infosec]]></category>
		<category><![CDATA[Linux kernel]]></category>
		<category><![CDATA[most secure computer]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[secure computing]]></category>
		<category><![CDATA[Secure Supply Chain]]></category>
		<category><![CDATA[Supply chain]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=83347</guid>
		<description><![CDATA[<p>The Threat Beneath: The Invisible Operating Systems Inside Your Devices Beneath the surface of nearly every modern computer lies a hidden threat—one most users never see or control. Today’s Intel and AMD processors ship with embedded subsystems like the Intel Management Engine (ME) and AMD’s Platform Security Processor (PSP)—proprietary, low-level firmware environments that operate outside and below your main operating system.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/hidden-operating-systems-in-chips-vs-secure-auditable-oses-a-cybersecurity-comparison/">Hidden Operating Systems in Chips vs. Secure, Auditable OSes: A Cybersecurity Comparison</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>PureBoot Not Vulnerable to UEFI Exploits (Again)</title>
		<link>https://puri.sm/posts/pureboot-not-vulnerable-to-uefi-exploits-again/</link>
		<pubDate>Mon, 11 Dec 2023 16:16:48 +0000</pubDate>
		<dc:creator><![CDATA[Jonathon Hall]]></dc:creator>
				<category><![CDATA[Firmware and BIOS]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Boot and BIOS]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=80949</guid>
		<description><![CDATA[<p>LogoFAIL: Subverting UEFI Secure Boot The Binarly Research Team recently presented LogoFAIL, a new exploit defeating UEFI Secure Boot. In short, an attacker with access to the hard disk of a UEFI system could gain firmware-level control over the computer, even on a device using UEFI Secure Boot.  LogoFAIL appears to affect most UEFI implementations. [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/pureboot-not-vulnerable-to-uefi-exploits-again/">PureBoot Not Vulnerable to UEFI Exploits (Again)</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Librem 11 Memory Adventures</title>
		<link>https://puri.sm/posts/librem-11-memory-adventures/</link>
		<pubDate>Wed, 27 Sep 2023 13:04:42 +0000</pubDate>
		<dc:creator><![CDATA[Jonathon Hall]]></dc:creator>
				<category><![CDATA[Firmware and BIOS]]></category>
		<category><![CDATA[Librem 11]]></category>
		<category><![CDATA[Advanced readers]]></category>
		<category><![CDATA[Boot and BIOS]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=80511</guid>
		<description><![CDATA[<p>A Recent Memory When I started porting coreboot to the Librem 11, one of the first few tasks was to get memory working. Like the Librem 5, the Librem 11 has soldered memory (&#8220;memory down&#8221;).  This has implications on the firmware.  Socketed memory carries a small SPD EEPROM with information about the memory module.  Memory [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/librem-11-memory-adventures/">Librem 11 Memory Adventures</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>PureBoot Framebuffer Boot Support</title>
		<link>https://puri.sm/posts/pureboot-framebuffer-boot-support/</link>
		<pubDate>Wed, 05 Jul 2023 13:00:46 +0000</pubDate>
		<dc:creator><![CDATA[Jonathon Hall]]></dc:creator>
				<category><![CDATA[Firmware and BIOS]]></category>
		<category><![CDATA[PureOS]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Advanced readers]]></category>
		<category><![CDATA[Boot and BIOS]]></category>
		<category><![CDATA[Linux kernel]]></category>
		<category><![CDATA[User experience design]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=79869</guid>
		<description><![CDATA[<p>The latest release of PureBoot, Release 27, now boots memtest86+, Debian netinst, and other OSes that rely on framebuffer output! We worked with the Heads team to implement this change upstream, and it is now in our latest release. Update your firmware with our update instructions! If you&#8217;ve ever tried to boot from PureBoot, and [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/pureboot-framebuffer-boot-support/">PureBoot Framebuffer Boot Support</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Protect Infrastructure with Librem L1UM v2 (Press Release)</title>
		<link>https://puri.sm/posts/protect-infrastructure-with-librem-l1um-v2-press-release/</link>
		<pubDate>Thu, 27 Apr 2023 18:58:34 +0000</pubDate>
		<dc:creator><![CDATA[Jonathon Hall]]></dc:creator>
				<category><![CDATA[Additional Press Information]]></category>
		<category><![CDATA[Firmware and BIOS]]></category>
		<category><![CDATA[Hardware]]></category>
		<category><![CDATA[Librem One]]></category>
		<category><![CDATA[Press Releases]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Product Design]]></category>
		<category><![CDATA[PureOS]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Service Offering]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Boot and BIOS]]></category>
		<category><![CDATA[Chipsets and]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=79187</guid>
		<description><![CDATA[<p>FOR IMMEDIATE RELEASE- Purism has added a new model to the Librem L1UM product line with new hardware designed to protect infrastructure, including critical infrastructure. There are numerous threats posed by nation-state hackers, criminal organizations, and bad actors who are constantly exploiting vulnerabilities within networks that operate critical infrastructure posing numerous security, privacy, and safety [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/protect-infrastructure-with-librem-l1um-v2-press-release/">Protect Infrastructure with Librem L1UM v2 (Press Release)</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>New Automatic Power-On firmware for Librem Mini</title>
		<link>https://puri.sm/posts/new-automatic-power-on-firmware-for-librem-mini/</link>
		<pubDate>Wed, 29 Mar 2023 15:27:43 +0000</pubDate>
		<dc:creator><![CDATA[Jonathon Hall]]></dc:creator>
				<category><![CDATA[Firmware and BIOS]]></category>
		<category><![CDATA[Librem Mini]]></category>
		<category><![CDATA[Boot and BIOS]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=77648</guid>
		<description><![CDATA[<p>Our latest coreboot/SeaBIOS and PureBoot releases bring new firmware configurations for the Librem Mini v1 and v2!  Many users use the Librem Mini as a headless server and have asked for firmware that would boot up automatically when powered, like an appliance. Once enabled, the setting persists as long as the RTC battery is plugged [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/new-automatic-power-on-firmware-for-librem-mini/">New Automatic Power-On firmware for Librem Mini</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Introducing PureBoot Restricted Boot</title>
		<link>https://puri.sm/posts/introducing-pureboot-restricted-boot/</link>
		<pubDate>Thu, 03 Nov 2022 22:54:10 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Firmware and BIOS]]></category>
		<category><![CDATA[Librem 14]]></category>
		<category><![CDATA[Librem Mini]]></category>
		<category><![CDATA[Boot and BIOS]]></category>
		<category><![CDATA[most secure computer]]></category>
		<category><![CDATA[most secure laptop]]></category>
		<category><![CDATA[most secure pc]]></category>
		<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=76293</guid>
		<description><![CDATA[<p>We have been busy on the PureBoot front! Recently we announced &#8220;PureBoot Basic Mode&#8221; which is a low-security option for PureBoot that disables tamper detection, but leaves you with the robust PureBoot recovery console for debugging boot issues. To balance our last &#8220;low security&#8221; feature, our most recent PureBoot release, version 23, offers a new [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/introducing-pureboot-restricted-boot/">Introducing PureBoot Restricted Boot</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Introducing PureBoot Basic</title>
		<link>https://puri.sm/posts/introducing-pureboot-basic/</link>
		<pubDate>Thu, 01 Sep 2022 18:02:12 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Firmware and BIOS]]></category>
		<category><![CDATA[Librem 14]]></category>
		<category><![CDATA[Librem Mini]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Boot and BIOS]]></category>
		<category><![CDATA[most secure computer]]></category>
		<category><![CDATA[most secure laptop]]></category>
		<category><![CDATA[most secure pc]]></category>
		<category><![CDATA[secure computing]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=75803</guid>
		<description><![CDATA[<p>PureBoot is our high-security, tamper-detecting boot firmware that we offer as an alternative to our default coreboot firmware on hardware like our Librem 14 and Librem Mini. The combination of PureBoot, our anti-interdiction services, and the option of Qubes as the pre-installed OS makes hardware like the Librem 14 among the most secure computers you [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/introducing-pureboot-basic/">Introducing PureBoot Basic</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Privacy in Depth</title>
		<link>https://puri.sm/posts/privacy-in-depth/</link>
		<pubDate>Thu, 14 Jul 2022 15:52:51 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[AweSIM]]></category>
		<category><![CDATA[Firmware and BIOS]]></category>
		<category><![CDATA[Librem 14]]></category>
		<category><![CDATA[Librem 5]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[PureOS]]></category>
		<category><![CDATA[SIMple]]></category>
		<category><![CDATA[Boot and BIOS]]></category>
		<category><![CDATA[FLOSS applications]]></category>
		<category><![CDATA[librem 5]]></category>
		<category><![CDATA[Librem 5 USA]]></category>
		<category><![CDATA[private computing]]></category>
		<category><![CDATA[SIMple Plus]]></category>
		<category><![CDATA[User empowerment]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=75493</guid>
		<description><![CDATA[<p>In the security world there is a concept called &#8220;Defense in Depth&#8221; that refers to setting up layers of defense so that if an attacker bypasses one layer there are other layers they must contend with. In physical security this might take the form of a lock on the outside door of an office building, [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/privacy-in-depth/">Privacy in Depth</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>PureBoot&#8217;s Powerful Recovery Console</title>
		<link>https://puri.sm/posts/pureboots-powerful-recovery-console/</link>
		<pubDate>Thu, 09 Jun 2022 18:39:05 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Firmware and BIOS]]></category>
		<category><![CDATA[Librem 14]]></category>
		<category><![CDATA[Librem Mini]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Advanced readers]]></category>
		<category><![CDATA[Boot and BIOS]]></category>
		<category><![CDATA[Tips and tricks]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=75219</guid>
		<description><![CDATA[<p>Normally when we talk about our high-security boot firmware PureBoot, it&#8217;s in the context of the advanced tamper detection it adds to a system. For instance, recently we added the ability to detect tampering even in the root file system. While that&#8217;s a critical benefit PureBoot provides over our default coreboot firmware, it also provides [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/pureboots-powerful-recovery-console/">PureBoot&#8217;s Powerful Recovery Console</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
<enclosure url="https://videos.puri.sm/shorts/pureboot_cmd.webm" length="471135" type="video/webm" />
<enclosure url="https://videos.puri.sm/shorts/pureboot_cmd.mp4" length="1108947" type="video/mp4" />
		</item>
		<item>
		<title>PureBoot 101 &#124; First Boot, First Update, and Detecting Software Tampering</title>
		<link>https://puri.sm/posts/pureboot-101-first-boot-first-update-and-detecting-software-tampering/</link>
		<pubDate>Wed, 09 Mar 2022 16:20:21 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Librem 14]]></category>
		<category><![CDATA[Librem Mini]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Boot and BIOS]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=74328</guid>
		<description><![CDATA[<p>Whether you face serious threats or just want peace of mind, PureBoot lets you detect tampering starting from your boot firmware down into the OS itself. The PureBoot bundle is comprised of the BIOS, Librem Key, and USB vault. This video dives into what each part does. This next video shows you what to expect [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/pureboot-101-first-boot-first-update-and-detecting-software-tampering/">PureBoot 101 | First Boot, First Update, and Detecting Software Tampering</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
<enclosure url="https://videos.puri.sm/promo/PureBoot101_v2_part1.webm" length="9290826" type="video/webm" />
<enclosure url="https://videos.puri.sm/promo/PureBoot101_v2_part1.mp4" length="89455450" type="video/mp4" />
<enclosure url="https://videos.puri.sm/promo/PureBoot101_v2_part2.webm" length="10070286" type="video/webm" />
<enclosure url="https://videos.puri.sm/promo/PureBoot101_v2_part2.mp4" length="70018059" type="video/mp4" />
<enclosure url="https://videos.puri.sm/promo/self-signed.webm" length="19785233" type="video/webm" />
<enclosure url="https://videos.puri.sm/promo/self-signed.mp4" length="22081323" type="video/mp4" />
		</item>
		<item>
		<title>The Beat of a Different DRM</title>
		<link>https://puri.sm/posts/the-beat-of-a-different-drm/</link>
		<pubDate>Sat, 15 Jan 2022 02:40:10 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Civil Liberties]]></category>
		<category><![CDATA[Firmware and BIOS]]></category>
		<category><![CDATA[Hardware]]></category>
		<category><![CDATA[Boot and BIOS]]></category>
		<category><![CDATA[Chipsets and components]]></category>
		<category><![CDATA[User empowerment]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=73683</guid>
		<description><![CDATA[<p>Canon made big news this past week when it started telling customers how to defeat the Digital Rights Management (DRM) in its toner cartridges because of supply chain issues with the chips they normally use to enforce it. That Canon explained how to bypass the DRM when it suited them, and that it didn&#8217;t negatively [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/the-beat-of-a-different-drm/">The Beat of a Different DRM</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Librem 14: Adding Librem EC, Freed Embedded Controller Firmware</title>
		<link>https://puri.sm/posts/librem-14-adding-librem-ec-freed-embedded-controller-firmware/</link>
		<pubDate>Mon, 22 Feb 2021 12:35:16 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Firmware and BIOS]]></category>
		<category><![CDATA[Hardware]]></category>
		<category><![CDATA[Boot and BIOS]]></category>
		<category><![CDATA[Chipsets and components]]></category>
		<category><![CDATA[Laptops]]></category>
		<category><![CDATA[Newsletter and status updates]]></category>
		<category><![CDATA[Software freedom]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=71068</guid>
		<description><![CDATA[<p>Starting with the Librem 14 laptop we are including fully liberated Embedded Controller (EC) firmware with all the source code available. This is something we set as a goal a long time ago, and now we are finally here. Let&#8217;s first start by explaining what the EC is and does. A PC these days is [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/librem-14-adding-librem-ec-freed-embedded-controller-firmware/">Librem 14: Adding Librem EC, Freed Embedded Controller Firmware</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Librem 14 Status Update: Shipping Starts in December</title>
		<link>https://puri.sm/posts/librem-14-status-update-shipping-starts-in-december/</link>
		<pubDate>Mon, 09 Nov 2020 08:00:15 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Firmware and BIOS]]></category>
		<category><![CDATA[Hardware]]></category>
		<category><![CDATA[Manufacturing Operations and Logistics]]></category>
		<category><![CDATA[Product Design]]></category>
		<category><![CDATA[Boot and BIOS]]></category>
		<category><![CDATA[Chipsets and components]]></category>
		<category><![CDATA[Laptops]]></category>
		<category><![CDATA[most secure laptop]]></category>
		<category><![CDATA[Power management]]></category>
		<category><![CDATA[Product or service launch]]></category>
		<category><![CDATA[Supply chain]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=69848</guid>
		<description><![CDATA[<p>Librem 14 will begin shipping in December with all backorders shipped in January and reaching shipping parity in February.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/librem-14-status-update-shipping-starts-in-december/">Librem 14 Status Update: Shipping Starts in December</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Why the GRUB2 Secure Boot Flaw Doesn&#8217;t Affect Purism Computers</title>
		<link>https://puri.sm/posts/why-the-grub2-secure-boot-flaw-doesnt-affect-purism-computers/</link>
		<pubDate>Thu, 30 Jul 2020 18:03:11 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Firmware and BIOS]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Boot and BIOS]]></category>
		<category><![CDATA[Laptops]]></category>
		<category><![CDATA[most secure computer]]></category>
		<category><![CDATA[most secure laptop]]></category>
		<category><![CDATA[most secure pc]]></category>
		<category><![CDATA[most secure server]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=68918</guid>
		<description><![CDATA[<p>Whenever a new security issue gets announced one of the first questions we all ask ourselves is: am I vulnerable? We have started to get questions from our customers after the announcement of a series of major security bugs in GRUB2 so I felt that it was appropriate to write up a quick post to [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/why-the-grub2-secure-boot-flaw-doesnt-affect-purism-computers/">Why the GRUB2 Secure Boot Flaw Doesn&#8217;t Affect Purism Computers</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Librem Mini Shipping with Active Cooling</title>
		<link>https://puri.sm/posts/librem-mini-shipping-with-active-cooling/</link>
		<pubDate>Fri, 03 Jul 2020 17:44:07 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Hardware]]></category>
		<category><![CDATA[Librem Mini]]></category>
		<category><![CDATA[Boot and BIOS]]></category>
		<category><![CDATA[most secure pc]]></category>
		<category><![CDATA[Newsletter and status updates]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=68625</guid>
		<description><![CDATA[<p>There&#8217;s nothing like making a public announcement to ensure that a situation will change. That&#8217;s certainly been true in the case of our Librem Mini. Just over a week ago we announced the Librem Mini was ready to ship and highlighted one issue we intended to solve with a future software update: If you ordered [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/librem-mini-shipping-with-active-cooling/">Librem Mini Shipping with Active Cooling</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Librem Mini Update: Hardware is Here, Finishing Coreboot</title>
		<link>https://puri.sm/posts/librem-mini-update-hardware-is-here-finishing-coreboot/</link>
		<pubDate>Mon, 08 Jun 2020 18:50:11 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Hardware]]></category>
		<category><![CDATA[Librem Mini]]></category>
		<category><![CDATA[Boot and BIOS]]></category>
		<category><![CDATA[most secure pc]]></category>
		<category><![CDATA[Newsletter and status updates]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=68465</guid>
		<description><![CDATA[<p>In our last Librem Mini Update we mentioned that the hardware should be arriving around the end of May and we&#8217;re happy to announce that our estimates were mostly on track: we received the first Librem Mini batch a bit over a week ago! In parallel we have been working hard to port coreboot to [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/librem-mini-update-hardware-is-here-finishing-coreboot/">Librem Mini Update: Hardware is Here, Finishing Coreboot</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Librem Hardware and the Intel CSME Vulnerability</title>
		<link>https://puri.sm/posts/librem-hardware-and-the-intel-csme-vulnerability/</link>
		<pubDate>Fri, 20 Mar 2020 09:06:59 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Firmware and BIOS]]></category>
		<category><![CDATA[Hardware]]></category>
		<category><![CDATA[Advanced readers]]></category>
		<category><![CDATA[Boot and BIOS]]></category>
		<category><![CDATA[Laptops]]></category>
		<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=67777</guid>
		<description><![CDATA[<p>Whenever a security vulnerability comes out one of the first questions that come to many peoples&#8217; minds is: am I affected? The last couple of years in particular have seen a lot of hardware-based vulnerabilities in Intel processors and in those cases generally it&#8217;s a matter of looking at the affected list of hardware and [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/librem-hardware-and-the-intel-csme-vulnerability/">Librem Hardware and the Intel CSME Vulnerability</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>2019 Year in Review: Security</title>
		<link>https://puri.sm/posts/2019-year-in-review-security/</link>
		<pubDate>Mon, 30 Dec 2019 15:24:43 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Firmware and BIOS]]></category>
		<category><![CDATA[Hardware]]></category>
		<category><![CDATA[Librem 5]]></category>
		<category><![CDATA[Boot and BIOS]]></category>
		<category><![CDATA[Laptops]]></category>
		<category><![CDATA[Phones]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Supply chain]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=66884</guid>
		<description><![CDATA[<p>PureBoot The big news for Purism and security in 2019 was PureBoot, the name we gave to the many different technologies we use to secure the boot process including a neutralized and disabled Intel Management Engine, our coreboot firmware, our TPM chip integration, Heads our tamper-evident boot software, our Librem Key USB security token we [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/2019-year-in-review-security/">2019 Year in Review: Security</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Librem 5 November 2019 Software Update</title>
		<link>https://puri.sm/posts/librem-5-november-2019-software-update/</link>
		<pubDate>Tue, 24 Dec 2019 13:32:33 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Librem 5]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Battery life]]></category>
		<category><![CDATA[Boot and BIOS]]></category>
		<category><![CDATA[Graphics]]></category>
		<category><![CDATA[Linux kernel]]></category>
		<category><![CDATA[Phones]]></category>
		<category><![CDATA[Power management]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=66849</guid>
		<description><![CDATA[<p>General In November, we shipped the Birch batch of Librem 5, fixed audio routing, made changes to various apps and shared Librem 5 at various meetups and talks. A couple of other articles appeared about software development: Oxidizing Squeekboard described the use of the Rust programming language in the Librem 5’s virtual keyboard, and the [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/librem-5-november-2019-software-update/">Librem 5 November 2019 Software Update</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>PureBoot Best Practices</title>
		<link>https://puri.sm/posts/pureboot-best-practices/</link>
		<pubDate>Tue, 22 Oct 2019 01:57:42 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Firmware and BIOS]]></category>
		<category><![CDATA[Boot and BIOS]]></category>
		<category><![CDATA[Laptops]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Tips and tricks]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=66007</guid>
		<description><![CDATA[<p>PureBoot is our cutting-edge secured boot process that combines a number of technologies including: Neutralized and Disabled Intel Management Engine where only the code absolutely essential for the system to boot is left in the ME. Coreboot the free software BIOS replacement. A Trusted Platform Module (TPM) chip. Heads, our tamper-evident boot software that loads [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/pureboot-best-practices/">PureBoot Best Practices</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Announcing the PureBoot Bundle: Tamper-evident Firmware from the Factory</title>
		<link>https://puri.sm/posts/announcing-the-pureboot-bundle-tamper-evident-firmware-from-the-factory/</link>
		<pubDate>Tue, 03 Sep 2019 18:39:16 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Firmware and BIOS]]></category>
		<category><![CDATA[Hardware]]></category>
		<category><![CDATA[Service Offering]]></category>
		<category><![CDATA[Boot and BIOS]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=65391</guid>
		<description><![CDATA[<p>We have been promoting the benefits of our PureBoot tamper-evident firmware with a Librem Key for some time, but until now our laptops have shipped with standard coreboot firmware, that didn&#8217;t include tamper-evident features. To get tamper-evident features, you had to reflash your Librem laptop with PureBoot firmware after the fact, using our standard firmware [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/announcing-the-pureboot-bundle-tamper-evident-firmware-from-the-factory/">Announcing the PureBoot Bundle: Tamper-evident Firmware from the Factory</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Security Advisory: Kernel and Firmware Updates for Intel MDS Vulnerability</title>
		<link>https://puri.sm/posts/security-advisory-kernel-and-firmware-updates-for-intel-mds-vulnerability/</link>
		<pubDate>Mon, 20 May 2019 22:31:05 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Firmware and BIOS]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Boot and BIOS]]></category>
		<category><![CDATA[Linux kernel]]></category>
		<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=63788</guid>
		<description><![CDATA[<p>Last week Intel announced a new group of speculative execution vulnerabilities in its processors related to the well-known Spectre and Meltdown vulnerabilities from over a year ago. These new attacks have been labeled as the MDS (Microarchitectural Data Sampling) vulnerabilities by Intel, but in the age of branded vulnerabilities they also have been given more [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/security-advisory-kernel-and-firmware-updates-for-intel-mds-vulnerability/">Security Advisory: Kernel and Firmware Updates for Intel MDS Vulnerability</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Complete PureBoot Demo and More Progress</title>
		<link>https://puri.sm/posts/complete-pureboot-demo-and-more-progress/</link>
		<pubDate>Mon, 29 Apr 2019 16:10:43 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Firmware and BIOS]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Boot and BIOS]]></category>
		<category><![CDATA[Laptops]]></category>
		<category><![CDATA[Newsletter and status updates]]></category>
		<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=63353</guid>
		<description><![CDATA[<p>Hi again! Things have been busy on the PureBoot front since our last blog post on overall coreboot progress. – and we can prove it: we now have a video that walks us through the complete PureBoot demo we showed for the first time at SCALE a few weeks ago. The video, as you can [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/complete-pureboot-demo-and-more-progress/">Complete PureBoot Demo and More Progress</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Purism&#8217;s Librem 5 Progress in Videos</title>
		<link>https://puri.sm/posts/purisms-librem-5-progress-in-videos/</link>
		<pubDate>Wed, 17 Apr 2019 15:10:05 +0000</pubDate>
		<dc:creator><![CDATA[Todd Weaver]]></dc:creator>
				<category><![CDATA[Firmware and BIOS]]></category>
		<category><![CDATA[Hardware]]></category>
		<category><![CDATA[Product Design]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Boot and BIOS]]></category>
		<category><![CDATA[Communications infrastructure]]></category>
		<category><![CDATA[FLOSS applications]]></category>
		<category><![CDATA[Graphics]]></category>
		<category><![CDATA[Phones]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=63071</guid>
		<description><![CDATA[<p>The Purism team is making a remarkable progress to deliver the Librem 5 phone. Nothing shows the progress we have been making quite as clearly as a demonstration of the Librem 5 status from the devkit itself – so let us take you through a handful of (short) videos showcasing the current possibilities and development [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/purisms-librem-5-progress-in-videos/">Purism&#8217;s Librem 5 Progress in Videos</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
<enclosure url="https://puri.sm/wp-content/uploads/2019/04/purism-librem-5-power-up-2019-04-05.webm" length="1498988" type="video/webm" />
<enclosure url="https://puri.sm/wp-content/uploads/2019/04/purism-librem-5-power-up-2019-04-05.mp4" length="668655" type="video/mp4" />
<enclosure url="https://puri.sm/wp-content/uploads/2019/04/purism-librem-5-voice-calling-2019-04-05.webm" length="750333" type="video/webm" />
<enclosure url="https://puri.sm/wp-content/uploads/2019/04/purism-librem-5-voice-calling-2019-04-05.mp4" length="435222" type="video/mp4" />
<enclosure url="https://puri.sm/wp-content/uploads/2019/04/purism-librem-5-sms-text-messaging-2019-04-05.webm" length="1941888" type="video/webm" />
<enclosure url="https://puri.sm/wp-content/uploads/2019/04/purism-librem-5-sms-text-messaging-2019-04-05.mp4" length="560951" type="video/mp4" />
<enclosure url="https://puri.sm/wp-content/uploads/2019/04/purism-librem-5-web-browser-2019-04-05.webm" length="4623668" type="video/webm" />
<enclosure url="https://puri.sm/wp-content/uploads/2019/04/purism-librem-5-devkit-to-devkit-call-2019-04-05.webm" length="7777657" type="video/webm" />
<enclosure url="https://puri.sm/wp-content/uploads/2019/04/purism-librem-5-devkit-to-devkit-call-2019-04-05.mp4" length="4962572" type="video/mp4" />
		</item>
		<item>
		<title>Coreboot News: New Script, Pre-built Binaries and PureBoot on Non-TPM Laptops</title>
		<link>https://puri.sm/posts/coreboot-news-new-script-pre-built-binaries-and-pureboot-on-non-tpm-laptops/</link>
		<pubDate>Thu, 11 Apr 2019 14:05:17 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Firmware and BIOS]]></category>
		<category><![CDATA[Hardware]]></category>
		<category><![CDATA[Boot and BIOS]]></category>
		<category><![CDATA[Chipsets and components]]></category>
		<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=63149</guid>
		<description><![CDATA[<p>Things have been busy in the coreboot department, lately, and we are excited to announce a number of new improvements: Pre-built binaries of our default coreboot BIOS firmware Pre-built binaries of our tamper-evident PureBoot firmware Improved script to automate coreboot builds and flashing from pre-built binaries PureBoot tamper-evident support for non-TPM Librem 13 version 2 and [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/coreboot-news-new-script-pre-built-binaries-and-pureboot-on-non-tpm-laptops/">Coreboot News: New Script, Pre-built Binaries and PureBoot on Non-TPM Laptops</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Protecting the Digital Supply Chain</title>
		<link>https://puri.sm/posts/protecting-the-digital-supply-chain/</link>
		<pubDate>Tue, 13 Nov 2018 20:21:44 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Firmware and BIOS]]></category>
		<category><![CDATA[Manufacturing Operations and Logistics]]></category>
		<category><![CDATA[Miscellaneous]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Advanced readers]]></category>
		<category><![CDATA[Boot and BIOS]]></category>
		<category><![CDATA[Chipsets and components]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Supply chain]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=61307</guid>
		<description><![CDATA[<p>You first learn about the importance of the supply chain as a child. You discover a shiny object on the ground and as you reach down to pick it up your parent says &#8220;Don&#8217;t touch that! You don&#8217;t know where it&#8217;s been!&#8221; But why does it matter whether you know where it&#8217;s been? When your [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/protecting-the-digital-supply-chain/">Protecting the Digital Supply Chain</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Adventures with coreboot and NVM Express storage</title>
		<link>https://puri.sm/posts/adventures-with-coreboot-and-nvm-express-storage/</link>
		<pubDate>Thu, 11 Oct 2018 23:11:21 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Firmware and BIOS]]></category>
		<category><![CDATA[Advanced readers]]></category>
		<category><![CDATA[Boot and BIOS]]></category>
		<category><![CDATA[Laptops]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=17164</guid>
		<description><![CDATA[<p>Let me tell you how I made NVMe SSD support work on the first generation Librem laptops. This story is pretty old, from before the Librem 13 version 2 was even released, so it has been simplified and brought back to the current state of things as much as possible. The solutions presented here have [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/adventures-with-coreboot-and-nvm-express-storage/">Adventures with coreboot and NVM Express storage</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>The Librem Key Makes Tamper Detection Easy</title>
		<link>https://puri.sm/posts/the-librem-key-makes-tamper-detection-easy/</link>
		<pubDate>Mon, 24 Sep 2018 14:38:35 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Firmware and BIOS]]></category>
		<category><![CDATA[Hardware]]></category>
		<category><![CDATA[Advanced readers]]></category>
		<category><![CDATA[Boot and BIOS]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Videos]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=59616</guid>
		<description><![CDATA[<p>From the beginning we have had big plans for the Librem Key. When we first announced our partnership with Nitrokey to produce the Librem Key all we could talk about publicly was the standard USB security token features it would have and some of the integration possibilities between the Librem laptop and Librem Key that [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/the-librem-key-makes-tamper-detection-easy/">The Librem Key Makes Tamper Detection Easy</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Introducing the Librem Key</title>
		<link>https://puri.sm/posts/introducing-the-librem-key/</link>
		<pubDate>Thu, 20 Sep 2018 15:03:39 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Additional Press Information]]></category>
		<category><![CDATA[Hardware]]></category>
		<category><![CDATA[Boot and BIOS]]></category>
		<category><![CDATA[Laptops]]></category>
		<category><![CDATA[Phones]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Product or service launch]]></category>
		<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=58801</guid>
		<description><![CDATA[<p>A few months ago we announced that we were partnering with Nitrokey to produce a new security token: the Librem Key and I&#8217;m pleased to announce that today the Librem Key is available for purchase on our site for $59. What is a USB Security Token? In case you haven&#8217;t heard of USB security tokens [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/introducing-the-librem-key/">Introducing the Librem Key</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
	</channel>
</rss>
