<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Consumer Protection &#8211; Purism</title>
	<atom:link href="https://puri.sm/posts/tag/consumer-protection/feed/" rel="self" type="application/rss+xml" />
	<link>https://puri.sm/</link>
	<description>High-quality computers that protect your freedom and privacy</description>
	<lastBuildDate>Wed, 01 Oct 2025 18:29:47 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=4.9.28</generator>

<image>
	<url>https://puri.sm/wp-content/uploads/2020/04/cropped-purism-logo-rectangle-1-32x32.png</url>
	<title>Consumer Protection &#8211; Purism</title>
	<link>https://puri.sm/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Who Owns Your Digital Self?</title>
		<link>https://puri.sm/posts/who-owns-your-digital-self/</link>
		<pubDate>Wed, 01 Oct 2025 14:52:09 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Civil Liberties]]></category>
		<category><![CDATA[Customer Satisfaction]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Consumer Privacy]]></category>
		<category><![CDATA[Consumer Protection]]></category>
		<category><![CDATA[cybersecurity]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84608</guid>
		<description><![CDATA[<p>The lawsuits now circling Apple are not just about stolen phones. They are about stolen selves—stolen data, stolen memories, stolen identities.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/who-owns-your-digital-self/">Who Owns Your Digital Self?</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Safety Without Surveillance: Designing Digital Sovereignty for All Ages</title>
		<link>https://puri.sm/posts/safety-without-surveillance-designing-digital-sovereignty-for-all-ages/</link>
		<pubDate>Thu, 25 Sep 2025 14:41:11 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Applications]]></category>
		<category><![CDATA[Civil Liberties]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Social Purpose]]></category>
		<category><![CDATA[Apps]]></category>
		<category><![CDATA[Consumer Privacy]]></category>
		<category><![CDATA[Consumer Protection]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84574</guid>
		<description><![CDATA[<p>In September, a single misconfiguration in Life360’s Android API turned a “family safety” app into a map of human lives exposed. More than 442,000 users had their precise GPS trails, names, and phone numbers dumped online by a threat actor known as Emo.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/safety-without-surveillance-designing-digital-sovereignty-for-all-ages/">Safety Without Surveillance: Designing Digital Sovereignty for All Ages</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Secret Service Telecom Bust Exposes Cellular Weaknesses</title>
		<link>https://puri.sm/posts/secret-service-telecom-bust-exposes-cellular-weaknesses/</link>
		<pubDate>Tue, 23 Sep 2025 19:31:07 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Civil Liberties]]></category>
		<category><![CDATA[Government Mobility]]></category>
		<category><![CDATA[Mobile Ecosystem]]></category>
		<category><![CDATA[Communications infrastructure]]></category>
		<category><![CDATA[Consumer Protection]]></category>
		<category><![CDATA[Critical Infrastructure]]></category>
		<category><![CDATA[Liberty Phone]]></category>
		<category><![CDATA[librem 5]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84546</guid>
		<description><![CDATA[<p>The Secret Service’s disruption of a massive SIM-server network near the U.N. is proof that the threats to our communications are real, organized, and capable of overwhelming public safety systems.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/secret-service-telecom-bust-exposes-cellular-weaknesses/">Secret Service Telecom Bust Exposes Cellular Weaknesses</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Purism Approach vs. Google Model</title>
		<link>https://puri.sm/posts/purism-approach-vs-google-model/</link>
		<pubDate>Tue, 23 Sep 2025 14:24:00 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Applications]]></category>
		<category><![CDATA[Civil Liberties]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Social Purpose]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Consumer Privacy]]></category>
		<category><![CDATA[Consumer Protection]]></category>
		<category><![CDATA[PureOS]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Software freedom]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84519</guid>
		<description><![CDATA[<p>The Justice Department and a coalition of states are pursuing antitrust action against Google, accusing it of running monopolistic ad-tech systems that exploit users and lock out competition. Regulators are weighing remedies that could force structural changes to Google’s ad empire.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/purism-approach-vs-google-model/">Purism Approach vs. Google Model</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Freedom by Design: Why Purism Rejects Big IT Status Quo</title>
		<link>https://puri.sm/posts/freedom-by-design-why-purism-rejects-big-it-status-quo/</link>
		<pubDate>Fri, 19 Sep 2025 17:05:52 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Consumer Privacy]]></category>
		<category><![CDATA[Consumer Protection]]></category>
		<category><![CDATA[cybersecurity]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84487</guid>
		<description><![CDATA[<p>Three recent IT‑privacy headlines tell the same unsettling story: that consumer trust is being squandered</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/freedom-by-design-why-purism-rejects-big-it-status-quo/">Freedom by Design: Why Purism Rejects Big IT Status Quo</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>When “Efficiency” Becomes Exposure: How DOGE Put America’s Identity at Risk</title>
		<link>https://puri.sm/posts/when-efficiency-becomes-exposure-how-doge-put-americas-identity-at-risk/</link>
		<pubDate>Fri, 19 Sep 2025 17:03:10 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Civil Liberties]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Consumer Privacy]]></category>
		<category><![CDATA[Consumer Protection]]></category>
		<category><![CDATA[cybersecurity]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84476</guid>
		<description><![CDATA[<p>Every American should be alarmed.  It was recently reported that a whistleblower from inside the Social Security Administration, Chief Data Officer Charles Borges, has revealed that the Department of Government Efficiency (DOGE) copied a live, full-fidelity version of the nation’s Social Security database onto an Amazon-hosted cloud environment that allegedly lacked independent security oversight. This affects any American who’s ever filled out a Social Security form,</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/when-efficiency-becomes-exposure-how-doge-put-americas-identity-at-risk/">When “Efficiency” Becomes Exposure: How DOGE Put America’s Identity at Risk</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Spotify “Panama” Leak Is a Wake-Up Call for Digital Privacy</title>
		<link>https://puri.sm/posts/spotify-panama-leak-is-a-wake-up-call-for-digital-privacy/</link>
		<pubDate>Fri, 19 Sep 2025 17:00:10 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Applications]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Apps]]></category>
		<category><![CDATA[Consumer Privacy]]></category>
		<category><![CDATA[Consumer Protection]]></category>
		<category><![CDATA[Software freedom]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84360</guid>
		<description><![CDATA[<p>The New York Times recently reported that a hacker using the pseudonym “Tim” scraped publicly available data from Spotify and published it on his own website. Using automated bots, “Tim” harvested user playlists — many of them tied to identifiable names, locations, and even personal notes in titles or descriptions.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/spotify-panama-leak-is-a-wake-up-call-for-digital-privacy/">Spotify “Panama” Leak Is a Wake-Up Call for Digital Privacy</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>When Technology Policy Defends Human Dignity</title>
		<link>https://puri.sm/posts/when-technology-policy-defends-human-dignity/</link>
		<pubDate>Thu, 18 Sep 2025 18:36:39 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Applications]]></category>
		<category><![CDATA[Civil Liberties]]></category>
		<category><![CDATA[Gender equality]]></category>
		<category><![CDATA[Apps]]></category>
		<category><![CDATA[Consumer Protection]]></category>
		<category><![CDATA[secure computing]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[Wireless and networking]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84366</guid>
		<description><![CDATA[<p>In late August, Italy took a decisive step to protect women from one of the most insidious forms of online abuse: the non‑consensual sharing of intimate or misappropriated images. After years of complaints, activism, and public outrage, a notorious website — home to thousands of stolen photos of women, from ordinary citizens to public figures — was forced offline following a wave of legal and political pressure.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/when-technology-policy-defends-human-dignity/">When Technology Policy Defends Human Dignity</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>The NYPD’s $3B “Domain Awareness System” isn’t just a New York problem—it’s a warning for every American</title>
		<link>https://puri.sm/posts/the-nypds-3b-domain-awareness-system-isnt-just-a-new-york-problem-its-a-warning-for-every-american/</link>
		<pubDate>Thu, 18 Sep 2025 17:48:28 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Civil Liberties]]></category>
		<category><![CDATA[Government Mobility]]></category>
		<category><![CDATA[Miscellaneous]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Consumer Privacy]]></category>
		<category><![CDATA[Consumer Protection]]></category>
		<category><![CDATA[Social media]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84454</guid>
		<description><![CDATA[<p>In her September 15, 2025, New York Times opinion piece, Elizabeth Daniel Vasquez lays bare a reality too many Americans have ignored: the New York Police Department has quietly built one of the most expansive, integrated surveillance systems in the nation’s history.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/the-nypds-3b-domain-awareness-system-isnt-just-a-new-york-problem-its-a-warning-for-every-american/">The NYPD’s $3B “Domain Awareness System” isn’t just a New York problem—it’s a warning for every American</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Living in the Regulatory Future: Purism, the EU Data Act, and America’s Patchwork Privacy Laws</title>
		<link>https://puri.sm/posts/living-in-the-regulatory-future-purism-the-eu-data-act-and-americas-patchwork-privacy-laws/</link>
		<pubDate>Thu, 18 Sep 2025 16:55:30 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Civil Liberties]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Regulatory]]></category>
		<category><![CDATA[Consumer Privacy]]></category>
		<category><![CDATA[Consumer Protection]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84425</guid>
		<description><![CDATA[<p>Recently, the EU Data Act was officially enacted — and with it, a new era of enforceable digital rights. Where the GDPR set the policy framework, the Data Act demands proof: verifiable, auditable systems that deliver true data portability, secure interoperability, and privacy‑by‑design across sectors.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/living-in-the-regulatory-future-purism-the-eu-data-act-and-americas-patchwork-privacy-laws/">Living in the Regulatory Future: Purism, the EU Data Act, and America’s Patchwork Privacy Laws</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Google Mishandling School Children&#8217;s Data</title>
		<link>https://puri.sm/posts/google-mishandling-school-childrens-data/</link>
		<pubDate>Fri, 12 Sep 2025 18:31:21 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Product Design]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Consumer Privacy]]></category>
		<category><![CDATA[Consumer Protection]]></category>
		<category><![CDATA[Privacy]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84364</guid>
		<description><![CDATA[<p>When Google agreed to pay $30 million to settle a class-action lawsuit over its unauthorized collection of children’s data on YouTube, it wasn’t a revelation—it was a confirmation. A confirmation that Google’s public posture of compliance often masks a deeper, more calculated strategy: delayed monetization through long-tail data mining.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/google-mishandling-school-childrens-data/">Google Mishandling School Children&#8217;s Data</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Invisible Dependencies, Visible Damage: The Case for Supply Chain Hygiene</title>
		<link>https://puri.sm/posts/invisible-dependencies-visible-damage-the-case-for-supply-chain-hygiene/</link>
		<pubDate>Fri, 12 Sep 2025 09:13:20 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Apps]]></category>
		<category><![CDATA[Consumer Privacy]]></category>
		<category><![CDATA[Consumer Protection]]></category>
		<category><![CDATA[Critical Infrastructure]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Enterprise]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84291</guid>
		<description><![CDATA[<p>On September 8th, Check Point Research confirmed what many of us in the privacy and security trenches have been warning about for years: the weakest link in your security posture may not be your systems at all — it may be the invisible web of third-party integrations you’ve tacitly approved, often without full visibility into their downstream dependencies.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/invisible-dependencies-visible-damage-the-case-for-supply-chain-hygiene/">Invisible Dependencies, Visible Damage: The Case for Supply Chain Hygiene</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>From Typhoon to Action: A Purism Playbook for Hardening Your Defenses</title>
		<link>https://puri.sm/posts/from-typhoon-to-action-a-purism-playbook-for-hardening-your-defenses/</link>
		<pubDate>Thu, 11 Sep 2025 12:00:17 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Applications]]></category>
		<category><![CDATA[Government Mobility]]></category>
		<category><![CDATA[Industry News]]></category>
		<category><![CDATA[Apps]]></category>
		<category><![CDATA[Consumer Privacy]]></category>
		<category><![CDATA[Consumer Protection]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Enterprise]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84293</guid>
		<description><![CDATA[<p>When the FBI, CISA, and NSA release joint advisories, it’s not theory — it’s reality. The latest warnings about Salt Typhoon and Volt Typhoon should be read as a weather alert: the storm isn’t “out there,” it’s already in progress. These campaigns target infrastructure, communications, and supply chains with patience and persistence.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/from-typhoon-to-action-a-purism-playbook-for-hardening-your-defenses/">From Typhoon to Action: A Purism Playbook for Hardening Your Defenses</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Apple’s Latest iPhone: Sleeker Walls, Same Garden</title>
		<link>https://puri.sm/posts/apples-latest-iphone-sleeker-walls-same-garden/</link>
		<pubDate>Wed, 10 Sep 2025 17:43:14 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Industry News]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Consumer Privacy]]></category>
		<category><![CDATA[Consumer Protection]]></category>
		<category><![CDATA[User empowerment]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84301</guid>
		<description><![CDATA[<p>Yesterday, Apple unveiled the latest iPhone lineup adding an iPhone Air — described by them as their thinnest, lightest yet. The headlines were predictable fanfare while missing the larger points.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/apples-latest-iphone-sleeker-walls-same-garden/">Apple’s Latest iPhone: Sleeker Walls, Same Garden</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>California’s New Privacy Rules Are a National Signal</title>
		<link>https://puri.sm/posts/californias-new-privacy-rules-are-a-national-signal/</link>
		<pubDate>Sun, 07 Sep 2025 19:21:41 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Civil Liberties]]></category>
		<category><![CDATA[Government Mobility]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Regulatory]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Consumer Privacy]]></category>
		<category><![CDATA[Consumer Protection]]></category>
		<category><![CDATA[cybersecurity]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84134</guid>
		<description><![CDATA[<p>California’s New Privacy Rules Are a National Signal The California Privacy Protection Agency’s latest regulations redraw the playing field. This is the first set of rules in the U.S. to require: Annual, independent cybersecurity audits for high-risk businesses Comprehensive risk assessments for key data processing activities Bias and privacy impact reviews for automated decision-making systems [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/californias-new-privacy-rules-are-a-national-signal/">California’s New Privacy Rules Are a National Signal</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Google’s New Sideloading Restrictions: Why Purism Thinks Differently</title>
		<link>https://puri.sm/posts/googles-new-sideloading-restrictions-why-purism-thinks-differently/</link>
		<pubDate>Thu, 28 Aug 2025 21:52:46 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Applications]]></category>
		<category><![CDATA[Customer Satisfaction]]></category>
		<category><![CDATA[Hardware]]></category>
		<category><![CDATA[Apps]]></category>
		<category><![CDATA[Consumer Protection]]></category>
		<category><![CDATA[Hardware Kill Switches]]></category>
		<category><![CDATA[smartphone]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84185</guid>
		<description><![CDATA[<p>Google’s New Sideloading Restrictions: Why Purism Thinks Differently Google is introducing a new developer verification system claiming to increase security and combat malware (in the name of controlling users).  Google’s “security” push is a double-edged sword. It may help fight a certain type of malware. But it also reminds us all that Android’s identity is [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/googles-new-sideloading-restrictions-why-purism-thinks-differently/">Google’s New Sideloading Restrictions: Why Purism Thinks Differently</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>A Privacy Shield in the Wake of AT&#038;T Data Breaches</title>
		<link>https://puri.sm/posts/a-privacy-shield-in-the-wake-of-att-data-breaches/</link>
		<pubDate>Tue, 26 Aug 2025 19:55:51 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[AweSIM]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[SIMple]]></category>
		<category><![CDATA[Voice & Data Services]]></category>
		<category><![CDATA[Consumer Privacy]]></category>
		<category><![CDATA[Consumer Protection]]></category>
		<category><![CDATA[SIMple Plus]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84140</guid>
		<description><![CDATA[<p>Purism AweSIM: A Privacy Shield in the Wake of AT&#38;T Data Breaches AT&#38;T was found liable to pay customers an estimated $177M to resolve multiple lawsuits stemming from two separate data breaches – March 30 and July 12, 2024. Both breaches exposed huge amounts of Personal Identifiable Information (PII) to the public. These two breaches [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/a-privacy-shield-in-the-wake-of-att-data-breaches/">A Privacy Shield in the Wake of AT&#038;T Data Breaches</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>FTC Issues Letters to Big Tech: No Back Doors</title>
		<link>https://puri.sm/posts/ftc-issues-letters-to-big-tech-no-back-doors/</link>
		<pubDate>Mon, 25 Aug 2025 21:07:47 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Civil Liberties]]></category>
		<category><![CDATA[Government Mobility]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Consumer Privacy]]></category>
		<category><![CDATA[Consumer Protection]]></category>
		<category><![CDATA[secure computing]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84107</guid>
		<description><![CDATA[<p>FTC to Big Tech: No Back Doors — Purism Was Already There Protecting against Jurisdictional Arbitrage When the Federal Trade Commission (FTC) makes a determined move like this, it’s not a casual policy tweak — it’s a line drawn in permanent ink. On August 21, FTC Chairman Andrew Ferguson sent formal notices to over a [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/ftc-issues-letters-to-big-tech-no-back-doors/">FTC Issues Letters to Big Tech: No Back Doors</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>AI, Big Tech, and the Fight for Digital Freedom: Purism’s Role</title>
		<link>https://puri.sm/posts/ai-big-tech-and-the-fight-for-digital-freedom-purisms-role/</link>
		<pubDate>Wed, 13 Aug 2025 01:45:12 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Civil Liberties]]></category>
		<category><![CDATA[Industry News]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Consumer Privacy]]></category>
		<category><![CDATA[Consumer Protection]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84006</guid>
		<description><![CDATA[<p>We are living through a pivotal moment in the digital age—one where artificial intelligence and corporate consolidation are colliding with the fundamental rights of individuals. AI is no longer just a tool for innovation; it’s become the engine behind mass surveillance, behavioral profiling, and algorithmic manipulation. And the companies driving this transformation—Amazon, Apple, Meta, Google—are not just shaping technology. They’re shaping society.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/ai-big-tech-and-the-fight-for-digital-freedom-purisms-role/">AI, Big Tech, and the Fight for Digital Freedom: Purism’s Role</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Instagram’s Mapping Feature: A Privacy Wake-Up Call</title>
		<link>https://puri.sm/posts/instagrams-mapping-feature-a-privacy-wake-up-call/</link>
		<pubDate>Wed, 13 Aug 2025 01:38:59 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[GNU/Linux]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[PureOS]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Consumer Privacy]]></category>
		<category><![CDATA[Consumer Protection]]></category>
		<category><![CDATA[Social media]]></category>
		<category><![CDATA[User empowerment]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84003</guid>
		<description><![CDATA[<p>Instagram’s latest update introduces a mapping feature that quietly turns your location into a public breadcrumb trail. While it may seem like a harmless way to tag your favorite coffee shop or scenic overlook, the reality is more insidious: this feature keeps your location sharing always-on by default. That means every time you post, you’re potentially broadcasting your whereabouts—not just to friends, but to advertisers, data brokers, and anyone else watching. It’s a textbook example of how convenience is weaponized against privacy.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/instagrams-mapping-feature-a-privacy-wake-up-call/">Instagram’s Mapping Feature: A Privacy Wake-Up Call</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Ethics over Exploits &#8211; Use PureOS over Android/iOS</title>
		<link>https://puri.sm/posts/ethics-over-exploits-use-pureos-over-android-ios/</link>
		<pubDate>Wed, 06 Aug 2025 22:07:12 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Mobile Ecosystem]]></category>
		<category><![CDATA[Product Design]]></category>
		<category><![CDATA[PureOS]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Consumer Protection]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Phones]]></category>
		<category><![CDATA[Privacy]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=83951</guid>
		<description><![CDATA[<p>As Purism has been saying for years, the battleground for digital privacy has shifted squarely into our pockets in the form of smartphones. Mobile devices are now (more than ever) the prime targets for sophisticated cyber threats, having a duopoly with centralized control from two vendors; Apple and Google; the problem gets exacerbated.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/ethics-over-exploits-use-pureos-over-android-ios/">Ethics over Exploits &#8211; Use PureOS over Android/iOS</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Fairness Isn’t Just a Feature—It’s the Future</title>
		<link>https://puri.sm/posts/fairness-isnt-just-a-feature-its-the-future/</link>
		<pubDate>Wed, 06 Aug 2025 14:48:03 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Civil Liberties]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Regulatory]]></category>
		<category><![CDATA[Consumer Privacy]]></category>
		<category><![CDATA[Consumer Protection]]></category>
		<category><![CDATA[User empowerment]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=83942</guid>
		<description><![CDATA[<p>The European Union is making bold moves to reshape the digital landscape—and if you're a consumer, developer, or platform operator, you’ll want to pay attention. Two major regulatory shifts are now underway: the proposed Digital Fairness Act and the activation of key provisions in the EU AI Act. Together, they signal a new era of transparency, accountability, and ethical design in the digital economy.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/fairness-isnt-just-a-feature-its-the-future/">Fairness Isn’t Just a Feature—It’s the Future</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>AI Puts Your Personal Privacy at Risk</title>
		<link>https://puri.sm/posts/ai-puts-your-personal-privacy-at-risk/</link>
		<pubDate>Wed, 30 Jul 2025 16:44:20 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[Civil Liberties]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Consumer Protection]]></category>
		<category><![CDATA[User empowerment]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=83733</guid>
		<description><![CDATA[<p>The proliferation of AI models across consumer platforms has ushered in a new era of convenience—but it’s also accelerated the erosion of personal privacy.<br />
Large language models (LLMs) are trained on staggering volumes of data, including publicly available content and, in some cases, personally identifiable information (PII). That means sensitive metadata—everything from search history and location trails to voice recordings and biometric markers—can be folded into systems that behave like omniscient assistants, but without full user transparency or consent. In the monolithic culture of big tech, “innovation” often comes at the cost of ethical boundaries.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/ai-puts-your-personal-privacy-at-risk/">AI Puts Your Personal Privacy at Risk</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Hidden Operating Systems in Chips vs. Secure, Auditable OSes: A Cybersecurity Comparison</title>
		<link>https://puri.sm/posts/hidden-operating-systems-in-chips-vs-secure-auditable-oses-a-cybersecurity-comparison/</link>
		<pubDate>Tue, 10 Jun 2025 15:18:36 +0000</pubDate>
		<dc:creator><![CDATA[Rex M. Lee]]></dc:creator>
				<category><![CDATA[Hardware]]></category>
		<category><![CDATA[Hardware Encryption (HWE)]]></category>
		<category><![CDATA[Manufacturing Operations and Logistics]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Product Design]]></category>
		<category><![CDATA[PureOS]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Boot and BIOS]]></category>
		<category><![CDATA[Consumer Privacy]]></category>
		<category><![CDATA[Consumer Protection]]></category>
		<category><![CDATA[Critical Infrastructure]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[infosec]]></category>
		<category><![CDATA[Linux kernel]]></category>
		<category><![CDATA[most secure computer]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[secure computing]]></category>
		<category><![CDATA[Secure Supply Chain]]></category>
		<category><![CDATA[Supply chain]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=83347</guid>
		<description><![CDATA[<p>The Threat Beneath: The Invisible Operating Systems Inside Your Devices Beneath the surface of nearly every modern computer lies a hidden threat—one most users never see or control. Today’s Intel and AMD processors ship with embedded subsystems like the Intel Management Engine (ME) and AMD’s Platform Security Processor (PSP)—proprietary, low-level firmware environments that operate outside and below your main operating system.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/hidden-operating-systems-in-chips-vs-secure-auditable-oses-a-cybersecurity-comparison/">Hidden Operating Systems in Chips vs. Secure, Auditable OSes: A Cybersecurity Comparison</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Privacy on Trial: Meta’s DOJ Battle vs. Purism’s User-Centric Philosophy</title>
		<link>https://puri.sm/posts/privacy-on-trial-metas-doj-battle-vs-purisms-user-centric-philosophy/</link>
		<pubDate>Tue, 29 Apr 2025 20:12:46 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Antitrust]]></category>
		<category><![CDATA[Civil Liberties]]></category>
		<category><![CDATA[Industry News]]></category>
		<category><![CDATA[Regulatory]]></category>
		<category><![CDATA[Social Purpose]]></category>
		<category><![CDATA[Consumer Privacy]]></category>
		<category><![CDATA[Consumer Protection]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Social media]]></category>
		<category><![CDATA[User empowerment]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=83000</guid>
		<description><![CDATA[<p>The Department of Justice's (DOJ) current lawsuit against Meta spotlights a crucial discourse in the tech world, highlighting the fundamental right to privacy in the digital age.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/privacy-on-trial-metas-doj-battle-vs-purisms-user-centric-philosophy/">Privacy on Trial: Meta’s DOJ Battle vs. Purism’s User-Centric Philosophy</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>The Importance of Software Bill of Materials (SBOM)</title>
		<link>https://puri.sm/posts/the-importance-of-software-bill-of-materials-sbom/</link>
		<pubDate>Fri, 21 Mar 2025 14:02:56 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Civil Liberties]]></category>
		<category><![CDATA[Government Mobility]]></category>
		<category><![CDATA[PureOS]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Social Purpose]]></category>
		<category><![CDATA[Consumer Privacy]]></category>
		<category><![CDATA[Consumer Protection]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[FLOSS applications]]></category>
		<category><![CDATA[Linux kernel]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Secure Supply Chain]]></category>
		<category><![CDATA[Software freedom]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=82807</guid>
		<description><![CDATA[<p>The Department of Homeland Security (DHS) has been at the forefront of enhancing software supply chain security through its Software Bill of Materials (SBOM) initiatives. The SBOM is a comprehensive inventory of all components, libraries, and dependencies used in software development. This transparency is crucial for identifying potential vulnerabilities and mitigating risks associated with software supply chains.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/the-importance-of-software-bill-of-materials-sbom/">The Importance of Software Bill of Materials (SBOM)</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Freedom of Choice vs. Oppression of Big Tech</title>
		<link>https://puri.sm/posts/freedom-of-choice-vs-oppression-of-big-tech/</link>
		<pubDate>Wed, 06 Nov 2024 17:13:31 +0000</pubDate>
		<dc:creator><![CDATA[Randy Siegel]]></dc:creator>
				<category><![CDATA[Civil Liberties]]></category>
		<category><![CDATA[Mobile Ecosystem]]></category>
		<category><![CDATA[Product Design]]></category>
		<category><![CDATA[Regulatory]]></category>
		<category><![CDATA[Apps]]></category>
		<category><![CDATA[Consumer Privacy]]></category>
		<category><![CDATA[Consumer Protection]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[PureOS]]></category>
		<category><![CDATA[Software freedom]]></category>
		<category><![CDATA[User empowerment]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=82572</guid>
		<description><![CDATA[<p>The modern smartphone landscape is dominated by a handful of technology giants, whose influence extends far beyond their own ecosystems. Unlike in the heyday of the PC revolution where multiple companies fought tooth and nail for market share by differentiating on feature functionality as well as price – offering a plethora of alternatives – today’s smartphone landscape is dominated by two main players: Apple’s IOS and Google’s Android.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/freedom-of-choice-vs-oppression-of-big-tech/">Freedom of Choice vs. Oppression of Big Tech</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Smartphones Leaking Data</title>
		<link>https://puri.sm/posts/smartphones-leaking-data/</link>
		<pubDate>Wed, 18 Sep 2024 19:45:36 +0000</pubDate>
		<dc:creator><![CDATA[Randy Siegel]]></dc:creator>
				<category><![CDATA[Liberty Phone]]></category>
		<category><![CDATA[Mobile Ecosystem]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Consumer Privacy]]></category>
		<category><![CDATA[Consumer Protection]]></category>
		<category><![CDATA[Hardware Kill Switches]]></category>
		<category><![CDATA[infosec]]></category>
		<category><![CDATA[Software freedom]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=82417</guid>
		<description><![CDATA[<p>When you use smartphones from big tech companies, you’re often trading your privacy for convenience. These devices are designed to collect vast amounts of data about you, from your location to your browsing habits, and even your conversations. This data is then used to build detailed profiles that are sold to advertisers, used to exploit you, and even handed over to government agencies without your knowledge nor consent.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/smartphones-leaking-data/">Smartphones Leaking Data</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>SXSW 2024 Day 5- AI And Privacy In The News, So I Thought?</title>
		<link>https://puri.sm/posts/sxsw-2024-day-5-ai-and-privacy-in-the-news-so-i-thought/</link>
		<pubDate>Wed, 13 Mar 2024 17:35:44 +0000</pubDate>
		<dc:creator><![CDATA[Rex M. Lee]]></dc:creator>
				<category><![CDATA[Civil Liberties]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[PureOS]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Consumer Privacy]]></category>
		<category><![CDATA[Consumer Protection]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=81526</guid>
		<description><![CDATA[<p>I attended a session titled &#8220;AI and Privacy&#8221; yesterday and was under the impression that the discussion was going to be about AI the threat to privacy. Although the subject matter was addressed by the panel somewhat, the discussion seemed to be more focused on how an alarm company partnered with Google protects their alarm [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/sxsw-2024-day-5-ai-and-privacy-in-the-news-so-i-thought/">SXSW 2024 Day 5- AI And Privacy In The News, So I Thought?</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Missing from Privacy Legislation- The Abolishment of Surveillance Capitalism (Predatory &#038; Harmful Surveillance Business Practices)!</title>
		<link>https://puri.sm/posts/missing-from-privacy-legislation-the-abolishment-of-surveillance-capitalism-predatory-harmful-surveillance-business-practices/</link>
		<pubDate>Wed, 07 Feb 2024 14:25:35 +0000</pubDate>
		<dc:creator><![CDATA[Rex M. Lee]]></dc:creator>
				<category><![CDATA[Civil Liberties]]></category>
		<category><![CDATA[Invest]]></category>
		<category><![CDATA[Investment]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Product Design]]></category>
		<category><![CDATA[PureOS]]></category>
		<category><![CDATA[Social Purpose]]></category>
		<category><![CDATA[Consumer Privacy]]></category>
		<category><![CDATA[Consumer Protection]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Made in USA Electronics]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=81449</guid>
		<description><![CDATA[<p>Surveillance capitalism is predatory data mining typically via addictive and harmful sites and applications with social validation feedback loops/intermittent variable rewards along with manipulative targeted advertising based on one&#8217;s personal identity and gathered preferences. I am a former app/platform developer, and I have been an advisor to numerous lawmakers regarding tech congressional hearings dating back [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/missing-from-privacy-legislation-the-abolishment-of-surveillance-capitalism-predatory-harmful-surveillance-business-practices/">Missing from Privacy Legislation- The Abolishment of Surveillance Capitalism (Predatory &#038; Harmful Surveillance Business Practices)!</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
	</channel>
</rss>
