<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Critical Infrastructure &#8211; Purism</title>
	<atom:link href="https://puri.sm/posts/tag/critical-infrastructure/feed/" rel="self" type="application/rss+xml" />
	<link>https://puri.sm/</link>
	<description>High-quality computers that protect your freedom and privacy</description>
	<lastBuildDate>Wed, 01 Oct 2025 18:29:47 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=4.9.28</generator>

<image>
	<url>https://puri.sm/wp-content/uploads/2020/04/cropped-purism-logo-rectangle-1-32x32.png</url>
	<title>Critical Infrastructure &#8211; Purism</title>
	<link>https://puri.sm/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Quantum Safe Private Communications: Building the Future Before the Threat Arrives</title>
		<link>https://puri.sm/posts/quantum-safe-private-communications-building-the-future-before-the-threat-arrives/</link>
		<pubDate>Fri, 26 Sep 2025 20:56:28 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Applications]]></category>
		<category><![CDATA[Government Mobility]]></category>
		<category><![CDATA[Industry News]]></category>
		<category><![CDATA[Librem PQC Comms Server]]></category>
		<category><![CDATA[Librem PQC Encryptor]]></category>
		<category><![CDATA[Mobile Ecosystem]]></category>
		<category><![CDATA[N79]]></category>
		<category><![CDATA[Post Quantum Cryptography]]></category>
		<category><![CDATA[Private Cellular Networking]]></category>
		<category><![CDATA[Quantum Safe]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[CISO]]></category>
		<category><![CDATA[Communications infrastructure]]></category>
		<category><![CDATA[Critical Infrastructure]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[infosec]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[Physical robustness]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84586</guid>
		<description><![CDATA[<p>Secure mobility is not just about encryption — it’s about sovereignty. The ability to own, control, and verify every layer of your communications stack is the difference between operational assurance and strategic vulnerability.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/quantum-safe-private-communications-building-the-future-before-the-threat-arrives/">Quantum Safe Private Communications: Building the Future Before the Threat Arrives</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Secret Service Telecom Bust Exposes Cellular Weaknesses</title>
		<link>https://puri.sm/posts/secret-service-telecom-bust-exposes-cellular-weaknesses/</link>
		<pubDate>Tue, 23 Sep 2025 19:31:07 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Civil Liberties]]></category>
		<category><![CDATA[Government Mobility]]></category>
		<category><![CDATA[Mobile Ecosystem]]></category>
		<category><![CDATA[Communications infrastructure]]></category>
		<category><![CDATA[Consumer Protection]]></category>
		<category><![CDATA[Critical Infrastructure]]></category>
		<category><![CDATA[Liberty Phone]]></category>
		<category><![CDATA[librem 5]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84546</guid>
		<description><![CDATA[<p>The Secret Service’s disruption of a massive SIM-server network near the U.N. is proof that the threats to our communications are real, organized, and capable of overwhelming public safety systems.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/secret-service-telecom-bust-exposes-cellular-weaknesses/">Secret Service Telecom Bust Exposes Cellular Weaknesses</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Librem PQC Encryptor: Future‑Proofing Against Both SS7 and Quantum</title>
		<link>https://puri.sm/posts/librem-pqc-encryptor-future-proofing-against-both-ss7-and-quantum/</link>
		<pubDate>Sun, 21 Sep 2025 21:07:44 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Hardware Encryption (HWE)]]></category>
		<category><![CDATA[Librem PQC Comms Server]]></category>
		<category><![CDATA[Librem PQC Encryptor]]></category>
		<category><![CDATA[Miscellaneous]]></category>
		<category><![CDATA[Post Quantum Cryptography]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Communications infrastructure]]></category>
		<category><![CDATA[Critical Infrastructure]]></category>
		<category><![CDATA[cybersecurity]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84444</guid>
		<description><![CDATA[<p>Signaling System 7 (SS7) was designed in the 1970s to let telecom carriers route calls, deliver SMS, and enable roaming. It was never built with authentication or encryption in mind. Security wasn’t part of the plan.  The assumption was simple:  All carriers are trusted.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/librem-pqc-encryptor-future-proofing-against-both-ss7-and-quantum/">Librem PQC Encryptor: Future‑Proofing Against Both SS7 and Quantum</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Invisible Dependencies, Visible Damage: The Case for Supply Chain Hygiene</title>
		<link>https://puri.sm/posts/invisible-dependencies-visible-damage-the-case-for-supply-chain-hygiene/</link>
		<pubDate>Fri, 12 Sep 2025 09:13:20 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Apps]]></category>
		<category><![CDATA[Consumer Privacy]]></category>
		<category><![CDATA[Consumer Protection]]></category>
		<category><![CDATA[Critical Infrastructure]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Enterprise]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84291</guid>
		<description><![CDATA[<p>On September 8th, Check Point Research confirmed what many of us in the privacy and security trenches have been warning about for years: the weakest link in your security posture may not be your systems at all — it may be the invisible web of third-party integrations you’ve tacitly approved, often without full visibility into their downstream dependencies.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/invisible-dependencies-visible-damage-the-case-for-supply-chain-hygiene/">Invisible Dependencies, Visible Damage: The Case for Supply Chain Hygiene</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>The 2025 Most Secure Phone in The World Reviews Are In: Efani, Analytics Insight, Navi, and Cashify</title>
		<link>https://puri.sm/posts/the-2025-most-secure-phone-in-the-world-reviews-are-in-efani-analytics-insight-navi-and-cashify/</link>
		<pubDate>Fri, 27 Jun 2025 09:16:22 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Liberty Phone]]></category>
		<category><![CDATA[Librem 5]]></category>
		<category><![CDATA[Made in USA Electronics]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[PureOS]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Critical Infrastructure]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[infosec]]></category>
		<category><![CDATA[librem 5]]></category>
		<category><![CDATA[most secure phone]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=83592</guid>
		<description><![CDATA[<p>Purism’s Librem 5 and Liberty Phones Named the Most Secure Smartphones in the World Top cybersecurity and tech publications agree—Purism leads the industry in mobile security for 2025.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/the-2025-most-secure-phone-in-the-world-reviews-are-in-efani-analytics-insight-navi-and-cashify/">The 2025 Most Secure Phone in The World Reviews Are In: Efani, Analytics Insight, Navi, and Cashify</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Hidden Operating Systems in Chips vs. Secure, Auditable OSes: A Cybersecurity Comparison</title>
		<link>https://puri.sm/posts/hidden-operating-systems-in-chips-vs-secure-auditable-oses-a-cybersecurity-comparison/</link>
		<pubDate>Tue, 10 Jun 2025 15:18:36 +0000</pubDate>
		<dc:creator><![CDATA[Rex M. Lee]]></dc:creator>
				<category><![CDATA[Hardware]]></category>
		<category><![CDATA[Hardware Encryption (HWE)]]></category>
		<category><![CDATA[Manufacturing Operations and Logistics]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Product Design]]></category>
		<category><![CDATA[PureOS]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Boot and BIOS]]></category>
		<category><![CDATA[Consumer Privacy]]></category>
		<category><![CDATA[Consumer Protection]]></category>
		<category><![CDATA[Critical Infrastructure]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[infosec]]></category>
		<category><![CDATA[Linux kernel]]></category>
		<category><![CDATA[most secure computer]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[secure computing]]></category>
		<category><![CDATA[Secure Supply Chain]]></category>
		<category><![CDATA[Supply chain]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=83347</guid>
		<description><![CDATA[<p>The Threat Beneath: The Invisible Operating Systems Inside Your Devices Beneath the surface of nearly every modern computer lies a hidden threat—one most users never see or control. Today’s Intel and AMD processors ship with embedded subsystems like the Intel Management Engine (ME) and AMD’s Platform Security Processor (PSP)—proprietary, low-level firmware environments that operate outside and below your main operating system.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/hidden-operating-systems-in-chips-vs-secure-auditable-oses-a-cybersecurity-comparison/">Hidden Operating Systems in Chips vs. Secure, Auditable OSes: A Cybersecurity Comparison</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>The Signal Noise: A Wake-Up Call for Secure Communications</title>
		<link>https://puri.sm/posts/the-signal-noise-a-wake-up-call-for-secure-communications/</link>
		<pubDate>Mon, 31 Mar 2025 21:09:18 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Government Mobility]]></category>
		<category><![CDATA[Liberty Phone]]></category>
		<category><![CDATA[Made in USA Electronics]]></category>
		<category><![CDATA[Mobile Ecosystem]]></category>
		<category><![CDATA[Post Quantum Cryptography]]></category>
		<category><![CDATA[Private Cellular Networking]]></category>
		<category><![CDATA[Quantum Safe]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[CISO]]></category>
		<category><![CDATA[Critical Infrastructure]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[infosec]]></category>
		<category><![CDATA[most secure phone]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[Secure Supply Chain]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=82871</guid>
		<description><![CDATA[<p>When all the control is handled in-house and all communication is quantum-safe as well as on private networks you have the strongest possible security story and the most convenient offering for the toughest of security needs; including national security.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/the-signal-noise-a-wake-up-call-for-secure-communications/">The Signal Noise: A Wake-Up Call for Secure Communications</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Why the Salt Typhoon Hacks Make Our Public Networks Vulnerable</title>
		<link>https://puri.sm/posts/why-the-salt-typhoon-hacks-make-our-public-networks-vulnerable/</link>
		<pubDate>Sat, 18 Jan 2025 18:39:34 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Liberty Phone]]></category>
		<category><![CDATA[Made in USA Electronics]]></category>
		<category><![CDATA[N79]]></category>
		<category><![CDATA[Post Quantum Cryptography]]></category>
		<category><![CDATA[PureOS]]></category>
		<category><![CDATA[Quantum Safe]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[CISO]]></category>
		<category><![CDATA[Communications infrastructure]]></category>
		<category><![CDATA[Critical Infrastructure]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[infosec]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[Physical robustness]]></category>
		<category><![CDATA[Secure Supply Chain]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=82719</guid>
		<description><![CDATA[<p>The recent Salt Typhoon hacks by the People's Republic of China (PRC) have exposed significant vulnerabilities in our public networks. These hacks, which targeted major telecommunications providers like Verizon, AT&#038;T, Lumen Technologies, Charter Communications, Consolidated Communications, Windstream, and T-Mobile (although the later says that they prevented access to PII data) have shown just how susceptible our public communication systems are to sophisticated cyber threats. The hackers exploited weaknesses in unencrypted messages and phone calls, allowing them to gain access to sensitive data and even geolocate individuals. The compromise to the public networks may indeed have follow-on repercussions such as muti-factor authentication (MFA) via SMS texts but that is a subject for a future post.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/why-the-salt-typhoon-hacks-make-our-public-networks-vulnerable/">Why the Salt Typhoon Hacks Make Our Public Networks Vulnerable</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Flipping the Script: Exploring New Paradigms in Secure Mobile Computing</title>
		<link>https://puri.sm/posts/flipping-the-script-exploring-new-paradigms-in-secure-mobile-computing/</link>
		<pubDate>Thu, 22 Aug 2024 00:53:20 +0000</pubDate>
		<dc:creator><![CDATA[Randy Siegel]]></dc:creator>
				<category><![CDATA[Government Mobility]]></category>
		<category><![CDATA[Hardware]]></category>
		<category><![CDATA[Industry News]]></category>
		<category><![CDATA[Liberty Phone]]></category>
		<category><![CDATA[Made in USA Electronics]]></category>
		<category><![CDATA[Manufacturing Operations and Logistics]]></category>
		<category><![CDATA[N79]]></category>
		<category><![CDATA[Partnerships]]></category>
		<category><![CDATA[Private Cellular Networking]]></category>
		<category><![CDATA[Regulatory]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[CISO]]></category>
		<category><![CDATA[Communications infrastructure]]></category>
		<category><![CDATA[Critical Infrastructure]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Hardware Kill Switches]]></category>
		<category><![CDATA[Made in America]]></category>
		<category><![CDATA[most secure phone]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[Secure Supply Chain]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=82344</guid>
		<description><![CDATA[<p>This solution leverages private cellular networks (PCNs) owned and operated by government entities rather than the traditional dependence on Public Switched Network Providers (PSNs) such as AT&#038;T, Verizon, Vodafone, Orange and others around the world.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/flipping-the-script-exploring-new-paradigms-in-secure-mobile-computing/">Flipping the Script: Exploring New Paradigms in Secure Mobile Computing</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Avoiding a Monoculture with Secure Diverse Technology</title>
		<link>https://puri.sm/posts/avoiding-a-monoculture-with-secure-diverse-technology/</link>
		<pubDate>Thu, 25 Jul 2024 16:28:08 +0000</pubDate>
		<dc:creator><![CDATA[Randy Siegel]]></dc:creator>
				<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Critical Infrastructure]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[PureOS]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=82237</guid>
		<description><![CDATA[<p>In the world of technology, diversity is not just a virtue, but a necessity. At Purism, a company dedicated to creating secure, privacy-respecting, and freedom-preserving digital solutions, we are deeply concerned about the growing trend of reliance on just a handful of operating systems (OSs). This monoculture in the OS landscape poses significant risks to our digital security, privacy, and freedom [...]</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/avoiding-a-monoculture-with-secure-diverse-technology/">Avoiding a Monoculture with Secure Diverse Technology</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Private Cellular Networking and Secure Client Devices</title>
		<link>https://puri.sm/posts/private-cellular-networking-and-secure-client-devices/</link>
		<pubDate>Tue, 23 Jul 2024 18:36:30 +0000</pubDate>
		<dc:creator><![CDATA[Randy Siegel]]></dc:creator>
				<category><![CDATA[Government Mobility]]></category>
		<category><![CDATA[Mobile Ecosystem]]></category>
		<category><![CDATA[N79]]></category>
		<category><![CDATA[Private Cellular Networking]]></category>
		<category><![CDATA[CISO]]></category>
		<category><![CDATA[Communications infrastructure]]></category>
		<category><![CDATA[Critical Infrastructure]]></category>
		<category><![CDATA[infosec]]></category>
		<category><![CDATA[Made in USA Electronics]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=82220</guid>
		<description><![CDATA[<p>Private cellular networking and secure client devices provide a holistic, turnkey solution leveraging the N79 band for government or enterprise networks. 5G The advent of 5G technology has revolutionized the world of wireless communication. Among the various aspects of 5G, the N79 band and private 5G networks have emerged as significant components. This post explores [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/private-cellular-networking-and-secure-client-devices/">Private Cellular Networking and Secure Client Devices</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Introducing the Liberty Phone</title>
		<link>https://puri.sm/posts/introducing-the-liberty-phone/</link>
		<pubDate>Fri, 30 Jun 2023 19:22:48 +0000</pubDate>
		<dc:creator><![CDATA[François Téchené]]></dc:creator>
				<category><![CDATA[AweSIM]]></category>
		<category><![CDATA[Civil Liberties]]></category>
		<category><![CDATA[Liberty Phone]]></category>
		<category><![CDATA[Manufacturing Operations and Logistics]]></category>
		<category><![CDATA[Product Design]]></category>
		<category><![CDATA[PureOS]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Social Purpose]]></category>
		<category><![CDATA[Voice & Data Services]]></category>
		<category><![CDATA[CISO]]></category>
		<category><![CDATA[Consumer Privacy]]></category>
		<category><![CDATA[Consumer Protection]]></category>
		<category><![CDATA[Critical Infrastructure]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Enterprise]]></category>
		<category><![CDATA[infosec]]></category>
		<category><![CDATA[Made in USA Electronics]]></category>
		<category><![CDATA[most secure phone]]></category>
		<category><![CDATA[Phones]]></category>
		<category><![CDATA[smartphone]]></category>
		<category><![CDATA[Supply chain]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=79598</guid>
		<description><![CDATA[<p>Introducing the Liberty Phone with more RAM and more drive space, starting at $2199. Learn More Buy Now The Liberty Phone is the upgraded version of our popular Librem 5 USA phone with Made in USA Electronics. The Liberty Phone integrates 4GB of RAM and 128GB of internal storage. Made in USA Electronics All the [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/introducing-the-liberty-phone/">Introducing the Liberty Phone</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>DHS Security Report: Data Security &#038; Privacy At The OS Level</title>
		<link>https://puri.sm/posts/dhs-security-report-data-security-privacy-at-the-os-level/</link>
		<pubDate>Mon, 05 Jun 2023 18:38:39 +0000</pubDate>
		<dc:creator><![CDATA[Rex M. Lee]]></dc:creator>
				<category><![CDATA[Applications]]></category>
		<category><![CDATA[Librem 14]]></category>
		<category><![CDATA[Librem 5 USA]]></category>
		<category><![CDATA[PureOS]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Apps]]></category>
		<category><![CDATA[CISO]]></category>
		<category><![CDATA[Consumer Privacy]]></category>
		<category><![CDATA[Critical Infrastructure]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Enterprise]]></category>
		<category><![CDATA[infosec]]></category>
		<category><![CDATA[librem 5]]></category>
		<category><![CDATA[Linux kernel]]></category>
		<category><![CDATA[Made in USA Electronics]]></category>
		<category><![CDATA[secure computing]]></category>
		<category><![CDATA[smartphone]]></category>
		<category><![CDATA[Software freedom]]></category>
		<category><![CDATA[Supply chain]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=79467</guid>
		<description><![CDATA[<p>Data security and end user privacy requires focusing on the operating system (OS) that supports smartphones, tablet PCs, connected products, IoT/IIoT devices, wearable tech, and PCs. The Problem- Leaky Operating Systems and Intrusive Apps Intrusive app and social media developers, plus nation-state hackers, know that one of the largest gateways to the smartphone or PC [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/dhs-security-report-data-security-privacy-at-the-os-level/">DHS Security Report: Data Security &#038; Privacy At The OS Level</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Introducing the Librem Server v2</title>
		<link>https://puri.sm/posts/introducing-the-librem-server-v2/</link>
		<pubDate>Tue, 30 May 2023 10:56:10 +0000</pubDate>
		<dc:creator><![CDATA[François Téchené]]></dc:creator>
				<category><![CDATA[Hardware]]></category>
		<category><![CDATA[Librem Server V2]]></category>
		<category><![CDATA[Product Design]]></category>
		<category><![CDATA[PureOS]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[CISO]]></category>
		<category><![CDATA[Critical Infrastructure]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Enterprise]]></category>
		<category><![CDATA[infosec]]></category>
		<category><![CDATA[most secure computer]]></category>
		<category><![CDATA[most secure server]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[private computing]]></category>
		<category><![CDATA[Product or service launch]]></category>
		<category><![CDATA[Supply chain]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=79503</guid>
		<description><![CDATA[<p>Introducing the Librem Server v2 The new Librem Server features a 9th generation Intel Core i7 processor with 8 Cores and 12MB of cache. It can get up to 128GB of DDR4 RAM. It also features 6 USB 3.2 ports, a slim optical disk drive, 2 internal drive bays, and 4 &#8220;hot-swap&#8221; 3.5 SATA 3.0 [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/introducing-the-librem-server-v2/">Introducing the Librem Server v2</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Is Advanced AI A Reason To Decouple From The Centralized Internet?</title>
		<link>https://puri.sm/posts/is-advanced-ai-a-reason-to-decouple-from-the-centralized-internet/</link>
		<pubDate>Tue, 16 May 2023 19:20:27 +0000</pubDate>
		<dc:creator><![CDATA[Rex M. Lee]]></dc:creator>
				<category><![CDATA[Applications]]></category>
		<category><![CDATA[Civil Liberties]]></category>
		<category><![CDATA[Hardware]]></category>
		<category><![CDATA[Librem 14]]></category>
		<category><![CDATA[Librem 5 USA]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[PureOS]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Consumer Privacy]]></category>
		<category><![CDATA[Consumer Protection]]></category>
		<category><![CDATA[Critical Infrastructure]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[infosec]]></category>
		<category><![CDATA[librem 5]]></category>
		<category><![CDATA[Linux kernel]]></category>
		<category><![CDATA[Made in America]]></category>
		<category><![CDATA[Made In USA]]></category>
		<category><![CDATA[private computing]]></category>
		<category><![CDATA[User empowerment]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=79270</guid>
		<description><![CDATA[<p>With the recent advancements and proliferation of AI (such as ChatGPT and other probabilistic algorithms), it may be time for individuals, companies and governments to consider exiting the centralized internet. There is high concern over security, privacy, and safety threats exposed by artificial intelligence pioneers and industry voices who have recently come forward including Alphabet&#8217;s [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/is-advanced-ai-a-reason-to-decouple-from-the-centralized-internet/">Is Advanced AI A Reason To Decouple From The Centralized Internet?</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Cybersecurity Attacks Launched From Operating Systems &#038; Apps On The Rise</title>
		<link>https://puri.sm/posts/cybersecurity-attacks-launched-from-operating-systems-apps-on-the-rise/</link>
		<pubDate>Thu, 11 May 2023 12:32:34 +0000</pubDate>
		<dc:creator><![CDATA[Rex M. Lee]]></dc:creator>
				<category><![CDATA[Miscellaneous]]></category>
		<category><![CDATA[PureOS]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Apps]]></category>
		<category><![CDATA[Critical Infrastructure]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[infosec]]></category>
		<category><![CDATA[Phones]]></category>
		<category><![CDATA[smartphone]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=77632</guid>
		<description><![CDATA[<p>According to a new report from Secureworks, endpoint attack vectors that include email, popular operating systems, and apps are on the rise. In response to attacks by way of Android apps, Google has removed thousands of nefarious apps that had the capability to launch malware enabling developers to launch a wide array of attacks including Distributed [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/cybersecurity-attacks-launched-from-operating-systems-apps-on-the-rise/">Cybersecurity Attacks Launched From Operating Systems &#038; Apps On The Rise</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Purism Offers Secure Private Voice &#038; Data Services For Smartphone Owners</title>
		<link>https://puri.sm/posts/purism-offers-secure-private-voice-data-services-for-smartphone-owners/</link>
		<pubDate>Wed, 10 May 2023 17:23:02 +0000</pubDate>
		<dc:creator><![CDATA[Rex M. Lee]]></dc:creator>
				<category><![CDATA[AweSIM]]></category>
		<category><![CDATA[Civil Liberties]]></category>
		<category><![CDATA[Customer Satisfaction]]></category>
		<category><![CDATA[Librem 5]]></category>
		<category><![CDATA[Librem 5 USA]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Social Purpose]]></category>
		<category><![CDATA[Voice & Data Services]]></category>
		<category><![CDATA[CISO]]></category>
		<category><![CDATA[Critical Infrastructure]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Enterprise]]></category>
		<category><![CDATA[infosec]]></category>
		<category><![CDATA[librem 5]]></category>
		<category><![CDATA[most secure phone]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[smartphone]]></category>
		<category><![CDATA[User empowerment]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=79236</guid>
		<description><![CDATA[<p>Purism is excited to announce that anyone who owns a qualified smartphone can port their voice and data services, including their existing phone number, to Purism by purchasing the Librem AweSIM, a VPN for cellular like service. Unlike AT&#38;T, Verizon, T-Mobile, MetroPCS and Cricket, Purism’s Librem AweSIM does not support unified customer identifiers based on customer [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/purism-offers-secure-private-voice-data-services-for-smartphone-owners/">Purism Offers Secure Private Voice &#038; Data Services For Smartphone Owners</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
	</channel>
</rss>
