<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>cybersecurity &#8211; Purism</title>
	<atom:link href="https://puri.sm/posts/tag/cybersecurity/feed/" rel="self" type="application/rss+xml" />
	<link>https://puri.sm/</link>
	<description>High-quality computers that protect your freedom and privacy</description>
	<lastBuildDate>Wed, 01 Oct 2025 18:29:47 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=4.9.28</generator>

<image>
	<url>https://puri.sm/wp-content/uploads/2020/04/cropped-purism-logo-rectangle-1-32x32.png</url>
	<title>cybersecurity &#8211; Purism</title>
	<link>https://puri.sm/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Dialing Back to Move Forward: Why the Landline Revival Signals a Future for Privacy</title>
		<link>https://puri.sm/posts/dialing-back-to-move-forward-why-the-landline-revival-signals-a-future-for-privacy/</link>
		<pubDate>Wed, 01 Oct 2025 15:55:47 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Customer Satisfaction]]></category>
		<category><![CDATA[Hardware]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Voice & Data Services]]></category>
		<category><![CDATA[Consumer Privacy]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[Phones]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84618</guid>
		<description><![CDATA[<p>On September 30, 2025, The Washington Post reported a quiet trend in Washington, D.C.: the return of landline phones among officials and journalists seeking refuge from the omnipresent surveillance of smartphones. In a recent story, NBC News spotlighted parents in Maine and Seattle who are reviving landlines for their children—creating “landline pods” so kids can connect without the addictive pull of screens or the predatory reach of social media platforms.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/dialing-back-to-move-forward-why-the-landline-revival-signals-a-future-for-privacy/">Dialing Back to Move Forward: Why the Landline Revival Signals a Future for Privacy</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Who Owns Your Digital Self?</title>
		<link>https://puri.sm/posts/who-owns-your-digital-self/</link>
		<pubDate>Wed, 01 Oct 2025 14:52:09 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Civil Liberties]]></category>
		<category><![CDATA[Customer Satisfaction]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Consumer Privacy]]></category>
		<category><![CDATA[Consumer Protection]]></category>
		<category><![CDATA[cybersecurity]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84608</guid>
		<description><![CDATA[<p>The lawsuits now circling Apple are not just about stolen phones. They are about stolen selves—stolen data, stolen memories, stolen identities.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/who-owns-your-digital-self/">Who Owns Your Digital Self?</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Quantum Safe Private Communications: Building the Future Before the Threat Arrives</title>
		<link>https://puri.sm/posts/quantum-safe-private-communications-building-the-future-before-the-threat-arrives/</link>
		<pubDate>Fri, 26 Sep 2025 20:56:28 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Applications]]></category>
		<category><![CDATA[Government Mobility]]></category>
		<category><![CDATA[Industry News]]></category>
		<category><![CDATA[Librem PQC Comms Server]]></category>
		<category><![CDATA[Librem PQC Encryptor]]></category>
		<category><![CDATA[Mobile Ecosystem]]></category>
		<category><![CDATA[N79]]></category>
		<category><![CDATA[Post Quantum Cryptography]]></category>
		<category><![CDATA[Private Cellular Networking]]></category>
		<category><![CDATA[Quantum Safe]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[CISO]]></category>
		<category><![CDATA[Communications infrastructure]]></category>
		<category><![CDATA[Critical Infrastructure]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[infosec]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[Physical robustness]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84586</guid>
		<description><![CDATA[<p>Secure mobility is not just about encryption — it’s about sovereignty. The ability to own, control, and verify every layer of your communications stack is the difference between operational assurance and strategic vulnerability.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/quantum-safe-private-communications-building-the-future-before-the-threat-arrives/">Quantum Safe Private Communications: Building the Future Before the Threat Arrives</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Safety Without Surveillance: Designing Digital Sovereignty for All Ages</title>
		<link>https://puri.sm/posts/safety-without-surveillance-designing-digital-sovereignty-for-all-ages/</link>
		<pubDate>Thu, 25 Sep 2025 14:41:11 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Applications]]></category>
		<category><![CDATA[Civil Liberties]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Social Purpose]]></category>
		<category><![CDATA[Apps]]></category>
		<category><![CDATA[Consumer Privacy]]></category>
		<category><![CDATA[Consumer Protection]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84574</guid>
		<description><![CDATA[<p>In September, a single misconfiguration in Life360’s Android API turned a “family safety” app into a map of human lives exposed. More than 442,000 users had their precise GPS trails, names, and phone numbers dumped online by a threat actor known as Emo.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/safety-without-surveillance-designing-digital-sovereignty-for-all-ages/">Safety Without Surveillance: Designing Digital Sovereignty for All Ages</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Librem PQC Encryptor: Future‑Proofing Against Both SS7 and Quantum</title>
		<link>https://puri.sm/posts/librem-pqc-encryptor-future-proofing-against-both-ss7-and-quantum/</link>
		<pubDate>Sun, 21 Sep 2025 21:07:44 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Hardware Encryption (HWE)]]></category>
		<category><![CDATA[Librem PQC Comms Server]]></category>
		<category><![CDATA[Librem PQC Encryptor]]></category>
		<category><![CDATA[Miscellaneous]]></category>
		<category><![CDATA[Post Quantum Cryptography]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Communications infrastructure]]></category>
		<category><![CDATA[Critical Infrastructure]]></category>
		<category><![CDATA[cybersecurity]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84444</guid>
		<description><![CDATA[<p>Signaling System 7 (SS7) was designed in the 1970s to let telecom carriers route calls, deliver SMS, and enable roaming. It was never built with authentication or encryption in mind. Security wasn’t part of the plan.  The assumption was simple:  All carriers are trusted.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/librem-pqc-encryptor-future-proofing-against-both-ss7-and-quantum/">Librem PQC Encryptor: Future‑Proofing Against Both SS7 and Quantum</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Freedom by Design: Why Purism Rejects Big IT Status Quo</title>
		<link>https://puri.sm/posts/freedom-by-design-why-purism-rejects-big-it-status-quo/</link>
		<pubDate>Fri, 19 Sep 2025 17:05:52 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Consumer Privacy]]></category>
		<category><![CDATA[Consumer Protection]]></category>
		<category><![CDATA[cybersecurity]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84487</guid>
		<description><![CDATA[<p>Three recent IT‑privacy headlines tell the same unsettling story: that consumer trust is being squandered</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/freedom-by-design-why-purism-rejects-big-it-status-quo/">Freedom by Design: Why Purism Rejects Big IT Status Quo</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>When “Efficiency” Becomes Exposure: How DOGE Put America’s Identity at Risk</title>
		<link>https://puri.sm/posts/when-efficiency-becomes-exposure-how-doge-put-americas-identity-at-risk/</link>
		<pubDate>Fri, 19 Sep 2025 17:03:10 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Civil Liberties]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Consumer Privacy]]></category>
		<category><![CDATA[Consumer Protection]]></category>
		<category><![CDATA[cybersecurity]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84476</guid>
		<description><![CDATA[<p>Every American should be alarmed.  It was recently reported that a whistleblower from inside the Social Security Administration, Chief Data Officer Charles Borges, has revealed that the Department of Government Efficiency (DOGE) copied a live, full-fidelity version of the nation’s Social Security database onto an Amazon-hosted cloud environment that allegedly lacked independent security oversight. This affects any American who’s ever filled out a Social Security form,</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/when-efficiency-becomes-exposure-how-doge-put-americas-identity-at-risk/">When “Efficiency” Becomes Exposure: How DOGE Put America’s Identity at Risk</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Living in the Regulatory Future: Purism, the EU Data Act, and America’s Patchwork Privacy Laws</title>
		<link>https://puri.sm/posts/living-in-the-regulatory-future-purism-the-eu-data-act-and-americas-patchwork-privacy-laws/</link>
		<pubDate>Thu, 18 Sep 2025 16:55:30 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Civil Liberties]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Regulatory]]></category>
		<category><![CDATA[Consumer Privacy]]></category>
		<category><![CDATA[Consumer Protection]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84425</guid>
		<description><![CDATA[<p>Recently, the EU Data Act was officially enacted — and with it, a new era of enforceable digital rights. Where the GDPR set the policy framework, the Data Act demands proof: verifiable, auditable systems that deliver true data portability, secure interoperability, and privacy‑by‑design across sectors.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/living-in-the-regulatory-future-purism-the-eu-data-act-and-americas-patchwork-privacy-laws/">Living in the Regulatory Future: Purism, the EU Data Act, and America’s Patchwork Privacy Laws</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Invisible Dependencies, Visible Damage: The Case for Supply Chain Hygiene</title>
		<link>https://puri.sm/posts/invisible-dependencies-visible-damage-the-case-for-supply-chain-hygiene/</link>
		<pubDate>Fri, 12 Sep 2025 09:13:20 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Apps]]></category>
		<category><![CDATA[Consumer Privacy]]></category>
		<category><![CDATA[Consumer Protection]]></category>
		<category><![CDATA[Critical Infrastructure]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Enterprise]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84291</guid>
		<description><![CDATA[<p>On September 8th, Check Point Research confirmed what many of us in the privacy and security trenches have been warning about for years: the weakest link in your security posture may not be your systems at all — it may be the invisible web of third-party integrations you’ve tacitly approved, often without full visibility into their downstream dependencies.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/invisible-dependencies-visible-damage-the-case-for-supply-chain-hygiene/">Invisible Dependencies, Visible Damage: The Case for Supply Chain Hygiene</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>From Typhoon to Action: A Purism Playbook for Hardening Your Defenses</title>
		<link>https://puri.sm/posts/from-typhoon-to-action-a-purism-playbook-for-hardening-your-defenses/</link>
		<pubDate>Thu, 11 Sep 2025 12:00:17 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Applications]]></category>
		<category><![CDATA[Government Mobility]]></category>
		<category><![CDATA[Industry News]]></category>
		<category><![CDATA[Apps]]></category>
		<category><![CDATA[Consumer Privacy]]></category>
		<category><![CDATA[Consumer Protection]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Enterprise]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84293</guid>
		<description><![CDATA[<p>When the FBI, CISA, and NSA release joint advisories, it’s not theory — it’s reality. The latest warnings about Salt Typhoon and Volt Typhoon should be read as a weather alert: the storm isn’t “out there,” it’s already in progress. These campaigns target infrastructure, communications, and supply chains with patience and persistence.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/from-typhoon-to-action-a-purism-playbook-for-hardening-your-defenses/">From Typhoon to Action: A Purism Playbook for Hardening Your Defenses</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>California’s New Privacy Rules Are a National Signal</title>
		<link>https://puri.sm/posts/californias-new-privacy-rules-are-a-national-signal/</link>
		<pubDate>Sun, 07 Sep 2025 19:21:41 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Civil Liberties]]></category>
		<category><![CDATA[Government Mobility]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Regulatory]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Consumer Privacy]]></category>
		<category><![CDATA[Consumer Protection]]></category>
		<category><![CDATA[cybersecurity]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84134</guid>
		<description><![CDATA[<p>California’s New Privacy Rules Are a National Signal The California Privacy Protection Agency’s latest regulations redraw the playing field. This is the first set of rules in the U.S. to require: Annual, independent cybersecurity audits for high-risk businesses Comprehensive risk assessments for key data processing activities Bias and privacy impact reviews for automated decision-making systems [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/californias-new-privacy-rules-are-a-national-signal/">California’s New Privacy Rules Are a National Signal</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Introducing the Librem PQC Comms Server</title>
		<link>https://puri.sm/posts/introducing-the-librem-pqc-comms-server/</link>
		<pubDate>Wed, 27 Aug 2025 11:44:55 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Additional Press Information]]></category>
		<category><![CDATA[Government Mobility]]></category>
		<category><![CDATA[Hardware]]></category>
		<category><![CDATA[Librem PQC Comms Server]]></category>
		<category><![CDATA[Mobile Ecosystem]]></category>
		<category><![CDATA[Post Quantum Cryptography]]></category>
		<category><![CDATA[Press Releases]]></category>
		<category><![CDATA[Quantum Safe]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Voice & Data Services]]></category>
		<category><![CDATA[CISO]]></category>
		<category><![CDATA[Communications infrastructure]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[infosec]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[Product or service launch]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=83993</guid>
		<description><![CDATA[<p>SF, CA, US – Purism is excited to announce its <a href="https://puri.sm/products/librem-pqc-comms-server/">Librem PQC Comms Server</a>, encrypting data-in-transit (DIT) with post-quantum cryptography (PQC) according to the <a href="https://csrc.nist.gov/pubs/fips/203/final">NIST FIPS 203</a> standard. When bundled as a complete ecosystem with the <a href="https://puri.sm/products/liberty-phone/">Liberty Phone</a> or other Purism Products will also address data-at-rest (DAR) encrypted with PQC.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/introducing-the-librem-pqc-comms-server/">Introducing the Librem PQC Comms Server</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Introducing the Librem PQC Encryptor</title>
		<link>https://puri.sm/posts/introducing-the-librem-pqc-encryptor/</link>
		<pubDate>Tue, 12 Aug 2025 22:12:45 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Additional Press Information]]></category>
		<category><![CDATA[Hardware]]></category>
		<category><![CDATA[Librem PQC Encryptor]]></category>
		<category><![CDATA[Post Quantum Cryptography]]></category>
		<category><![CDATA[Press Releases]]></category>
		<category><![CDATA[Quantum Safe]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[CISO]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[infosec]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[Press]]></category>
		<category><![CDATA[press release]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=83982</guid>
		<description><![CDATA[<p>SF, CA, US – Purism is excited to announce its <a href="https://puri.sm/products/librem-pqc-encryptor/">Librem PQC Encryptor</a>, encrypting data-in-transit with post-quantum cryptography (PQC) according to the <a href="https://csrc.nist.gov/pubs/fips/203/final">NIST FIPS 203</a> standard.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/introducing-the-librem-pqc-encryptor/">Introducing the Librem PQC Encryptor</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Ethics over Exploits &#8211; Use PureOS over Android/iOS</title>
		<link>https://puri.sm/posts/ethics-over-exploits-use-pureos-over-android-ios/</link>
		<pubDate>Wed, 06 Aug 2025 22:07:12 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Mobile Ecosystem]]></category>
		<category><![CDATA[Product Design]]></category>
		<category><![CDATA[PureOS]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Consumer Protection]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Phones]]></category>
		<category><![CDATA[Privacy]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=83951</guid>
		<description><![CDATA[<p>As Purism has been saying for years, the battleground for digital privacy has shifted squarely into our pockets in the form of smartphones. Mobile devices are now (more than ever) the prime targets for sophisticated cyber threats, having a duopoly with centralized control from two vendors; Apple and Google; the problem gets exacerbated.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/ethics-over-exploits-use-pureos-over-android-ios/">Ethics over Exploits &#8211; Use PureOS over Android/iOS</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>The 2025 Most Secure Phone in The World Reviews Are In: Efani, Analytics Insight, Navi, and Cashify</title>
		<link>https://puri.sm/posts/the-2025-most-secure-phone-in-the-world-reviews-are-in-efani-analytics-insight-navi-and-cashify/</link>
		<pubDate>Fri, 27 Jun 2025 09:16:22 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Liberty Phone]]></category>
		<category><![CDATA[Librem 5]]></category>
		<category><![CDATA[Made in USA Electronics]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[PureOS]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Critical Infrastructure]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[infosec]]></category>
		<category><![CDATA[librem 5]]></category>
		<category><![CDATA[most secure phone]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=83592</guid>
		<description><![CDATA[<p>Purism’s Librem 5 and Liberty Phones Named the Most Secure Smartphones in the World Top cybersecurity and tech publications agree—Purism leads the industry in mobile security for 2025.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/the-2025-most-secure-phone-in-the-world-reviews-are-in-efani-analytics-insight-navi-and-cashify/">The 2025 Most Secure Phone in The World Reviews Are In: Efani, Analytics Insight, Navi, and Cashify</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Hidden Operating Systems in Chips vs. Secure, Auditable OSes: A Cybersecurity Comparison</title>
		<link>https://puri.sm/posts/hidden-operating-systems-in-chips-vs-secure-auditable-oses-a-cybersecurity-comparison/</link>
		<pubDate>Tue, 10 Jun 2025 15:18:36 +0000</pubDate>
		<dc:creator><![CDATA[Rex M. Lee]]></dc:creator>
				<category><![CDATA[Hardware]]></category>
		<category><![CDATA[Hardware Encryption (HWE)]]></category>
		<category><![CDATA[Manufacturing Operations and Logistics]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Product Design]]></category>
		<category><![CDATA[PureOS]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Boot and BIOS]]></category>
		<category><![CDATA[Consumer Privacy]]></category>
		<category><![CDATA[Consumer Protection]]></category>
		<category><![CDATA[Critical Infrastructure]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[infosec]]></category>
		<category><![CDATA[Linux kernel]]></category>
		<category><![CDATA[most secure computer]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[secure computing]]></category>
		<category><![CDATA[Secure Supply Chain]]></category>
		<category><![CDATA[Supply chain]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=83347</guid>
		<description><![CDATA[<p>The Threat Beneath: The Invisible Operating Systems Inside Your Devices Beneath the surface of nearly every modern computer lies a hidden threat—one most users never see or control. Today’s Intel and AMD processors ship with embedded subsystems like the Intel Management Engine (ME) and AMD’s Platform Security Processor (PSP)—proprietary, low-level firmware environments that operate outside and below your main operating system.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/hidden-operating-systems-in-chips-vs-secure-auditable-oses-a-cybersecurity-comparison/">Hidden Operating Systems in Chips vs. Secure, Auditable OSes: A Cybersecurity Comparison</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>What Is PureOS? A Beginner’s Guide for iOS, Android, and Windows Users</title>
		<link>https://puri.sm/posts/what-is-pureos-a-beginners-guide-for-ios-android-and-windows-users/</link>
		<pubDate>Wed, 07 May 2025 15:21:44 +0000</pubDate>
		<dc:creator><![CDATA[Rex M. Lee]]></dc:creator>
				<category><![CDATA[Miscellaneous]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Product Design]]></category>
		<category><![CDATA[PureOS]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[debian]]></category>
		<category><![CDATA[Liberty Phone]]></category>
		<category><![CDATA[librem 5]]></category>
		<category><![CDATA[Made In USA]]></category>
		<category><![CDATA[Made in USA Electronics]]></category>
		<category><![CDATA[most secure phone]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=83018</guid>
		<description><![CDATA[<p>&#160; In today’s world, privacy and control over your digital life have become rare luxuries. Every tap, swipe, and click on most smartphones and PCs is tracked, analyzed, and monetized—usually without your explicit consent. That’s where PureOS comes in. So What Is PureOS? PureOS is a privacy-focused, secure, and open-source operating system developed by Purism. [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/what-is-pureos-a-beginners-guide-for-ios-android-and-windows-users/">What Is PureOS? A Beginner’s Guide for iOS, Android, and Windows Users</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>The Signal Noise: A Wake-Up Call for Secure Communications</title>
		<link>https://puri.sm/posts/the-signal-noise-a-wake-up-call-for-secure-communications/</link>
		<pubDate>Mon, 31 Mar 2025 21:09:18 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Government Mobility]]></category>
		<category><![CDATA[Liberty Phone]]></category>
		<category><![CDATA[Made in USA Electronics]]></category>
		<category><![CDATA[Mobile Ecosystem]]></category>
		<category><![CDATA[Post Quantum Cryptography]]></category>
		<category><![CDATA[Private Cellular Networking]]></category>
		<category><![CDATA[Quantum Safe]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[CISO]]></category>
		<category><![CDATA[Critical Infrastructure]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[infosec]]></category>
		<category><![CDATA[most secure phone]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[Secure Supply Chain]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=82871</guid>
		<description><![CDATA[<p>When all the control is handled in-house and all communication is quantum-safe as well as on private networks you have the strongest possible security story and the most convenient offering for the toughest of security needs; including national security.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/the-signal-noise-a-wake-up-call-for-secure-communications/">The Signal Noise: A Wake-Up Call for Secure Communications</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>The Importance of Software Bill of Materials (SBOM)</title>
		<link>https://puri.sm/posts/the-importance-of-software-bill-of-materials-sbom/</link>
		<pubDate>Fri, 21 Mar 2025 14:02:56 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Civil Liberties]]></category>
		<category><![CDATA[Government Mobility]]></category>
		<category><![CDATA[PureOS]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Social Purpose]]></category>
		<category><![CDATA[Consumer Privacy]]></category>
		<category><![CDATA[Consumer Protection]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[FLOSS applications]]></category>
		<category><![CDATA[Linux kernel]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Secure Supply Chain]]></category>
		<category><![CDATA[Software freedom]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=82807</guid>
		<description><![CDATA[<p>The Department of Homeland Security (DHS) has been at the forefront of enhancing software supply chain security through its Software Bill of Materials (SBOM) initiatives. The SBOM is a comprehensive inventory of all components, libraries, and dependencies used in software development. This transparency is crucial for identifying potential vulnerabilities and mitigating risks associated with software supply chains.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/the-importance-of-software-bill-of-materials-sbom/">The Importance of Software Bill of Materials (SBOM)</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Why the Salt Typhoon Hacks Make Our Public Networks Vulnerable</title>
		<link>https://puri.sm/posts/why-the-salt-typhoon-hacks-make-our-public-networks-vulnerable/</link>
		<pubDate>Sat, 18 Jan 2025 18:39:34 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Liberty Phone]]></category>
		<category><![CDATA[Made in USA Electronics]]></category>
		<category><![CDATA[N79]]></category>
		<category><![CDATA[Post Quantum Cryptography]]></category>
		<category><![CDATA[PureOS]]></category>
		<category><![CDATA[Quantum Safe]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[CISO]]></category>
		<category><![CDATA[Communications infrastructure]]></category>
		<category><![CDATA[Critical Infrastructure]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[infosec]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[Physical robustness]]></category>
		<category><![CDATA[Secure Supply Chain]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=82719</guid>
		<description><![CDATA[<p>The recent Salt Typhoon hacks by the People's Republic of China (PRC) have exposed significant vulnerabilities in our public networks. These hacks, which targeted major telecommunications providers like Verizon, AT&#038;T, Lumen Technologies, Charter Communications, Consolidated Communications, Windstream, and T-Mobile (although the later says that they prevented access to PII data) have shown just how susceptible our public communication systems are to sophisticated cyber threats. The hackers exploited weaknesses in unencrypted messages and phone calls, allowing them to gain access to sensitive data and even geolocate individuals. The compromise to the public networks may indeed have follow-on repercussions such as muti-factor authentication (MFA) via SMS texts but that is a subject for a future post.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/why-the-salt-typhoon-hacks-make-our-public-networks-vulnerable/">Why the Salt Typhoon Hacks Make Our Public Networks Vulnerable</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>RIP RSA AES: The Immediate Need of Quantum-Resistant Cryptography</title>
		<link>https://puri.sm/posts/rip-rsa-aes-the-immediate-need-of-quantum-resistant-cryptography/</link>
		<pubDate>Tue, 22 Oct 2024 20:01:30 +0000</pubDate>
		<dc:creator><![CDATA[Randy Siegel]]></dc:creator>
				<category><![CDATA[Government Mobility]]></category>
		<category><![CDATA[Post Quantum Cryptography]]></category>
		<category><![CDATA[Quantum Safe]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[CISO]]></category>
		<category><![CDATA[cybersecurity]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=82543</guid>
		<description><![CDATA[<p>The recent announcement from Chinese scientists about their successful use of a quantum computer to crack military-grade encryption has sent shockwaves through the cybersecurity community. This breakthrough, utilizing a D-Wave Advantage quantum computer, marks a significant milestone in the field of quantum computing. The implications of this development are profound, particularly for industries reliant on classical cryptographic systems like RSA and AES.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/rip-rsa-aes-the-immediate-need-of-quantum-resistant-cryptography/">RIP RSA AES: The Immediate Need of Quantum-Resistant Cryptography</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>The Imperative of NIST-Approved Post-Quantum Resistant Algorithms for Securing Mobile Devices</title>
		<link>https://puri.sm/posts/the-imperative-of-nist-approved-post-quantum-resistant-algorithms-for-securing-mobile-devices/</link>
		<pubDate>Mon, 30 Sep 2024 15:47:44 +0000</pubDate>
		<dc:creator><![CDATA[Randy Siegel]]></dc:creator>
				<category><![CDATA[Government Mobility]]></category>
		<category><![CDATA[Mobile Ecosystem]]></category>
		<category><![CDATA[Post Quantum Cryptography]]></category>
		<category><![CDATA[Quantum Safe]]></category>
		<category><![CDATA[Regulatory]]></category>
		<category><![CDATA[CISO]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[PureOS]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=82475</guid>
		<description><![CDATA[<p>In the rapidly evolving landscape of cybersecurity, the advent of quantum computing presents both unprecedented opportunities and significant threats. As we stand on the brink of a quantum revolution, the need for robust, quantum-resistant cryptographic solutions has never been more urgent.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/the-imperative-of-nist-approved-post-quantum-resistant-algorithms-for-securing-mobile-devices/">The Imperative of NIST-Approved Post-Quantum Resistant Algorithms for Securing Mobile Devices</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Quantum Safe Communication with Purism</title>
		<link>https://puri.sm/posts/quantum-safe-communication-with-purism/</link>
		<pubDate>Mon, 23 Sep 2024 03:00:32 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Made in USA Electronics]]></category>
		<category><![CDATA[Mobile Ecosystem]]></category>
		<category><![CDATA[Post Quantum Cryptography]]></category>
		<category><![CDATA[Quantum Safe]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[CISO]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[infosec]]></category>
		<category><![CDATA[Liberty Phone]]></category>
		<category><![CDATA[Made In USA]]></category>
		<category><![CDATA[most secure phone]]></category>
		<category><![CDATA[Secure Supply Chain]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=82438</guid>
		<description><![CDATA[<p>Post Quantum Cryptography (PQC) is a critical advancement in securing data and communication, the threat of compromise is even greater than normal due to the fact that anything stored with pre-quantum resistant cryptography will be immediately available to view as soon as the qubits of quantum computing increase, which is a matter of when not if.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/quantum-safe-communication-with-purism/">Quantum Safe Communication with Purism</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
<enclosure url="https://videos.puri.sm/librem5/post-quantum-chat.mp4" length="19305062" type="video/mp4" />
		</item>
		<item>
		<title>A Secure Foundry for Government Mobile Computing Needs</title>
		<link>https://puri.sm/posts/a-secure-foundry-for-government-mobile-computing-needs/</link>
		<pubDate>Thu, 12 Sep 2024 15:28:51 +0000</pubDate>
		<dc:creator><![CDATA[Randy Siegel]]></dc:creator>
				<category><![CDATA[Government Mobility]]></category>
		<category><![CDATA[Hardware]]></category>
		<category><![CDATA[Liberty Phone]]></category>
		<category><![CDATA[Made in USA Electronics]]></category>
		<category><![CDATA[Mobile Ecosystem]]></category>
		<category><![CDATA[PureOS]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[infosec]]></category>
		<category><![CDATA[Made In USA]]></category>
		<category><![CDATA[most secure phone]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=82388</guid>
		<description><![CDATA[<p>Purism offers a comprehensive solution for those seeking to protect their digital lives. As threats to digital security continue to evolve, Purism’s dedication to privacy and security positions it as a leader in the field, providing a solid foundation for secure mobile computing.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/a-secure-foundry-for-government-mobile-computing-needs/">A Secure Foundry for Government Mobile Computing Needs</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Flipping the Script: Exploring New Paradigms in Secure Mobile Computing</title>
		<link>https://puri.sm/posts/flipping-the-script-exploring-new-paradigms-in-secure-mobile-computing/</link>
		<pubDate>Thu, 22 Aug 2024 00:53:20 +0000</pubDate>
		<dc:creator><![CDATA[Randy Siegel]]></dc:creator>
				<category><![CDATA[Government Mobility]]></category>
		<category><![CDATA[Hardware]]></category>
		<category><![CDATA[Industry News]]></category>
		<category><![CDATA[Liberty Phone]]></category>
		<category><![CDATA[Made in USA Electronics]]></category>
		<category><![CDATA[Manufacturing Operations and Logistics]]></category>
		<category><![CDATA[N79]]></category>
		<category><![CDATA[Partnerships]]></category>
		<category><![CDATA[Private Cellular Networking]]></category>
		<category><![CDATA[Regulatory]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[CISO]]></category>
		<category><![CDATA[Communications infrastructure]]></category>
		<category><![CDATA[Critical Infrastructure]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Hardware Kill Switches]]></category>
		<category><![CDATA[Made in America]]></category>
		<category><![CDATA[most secure phone]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[Secure Supply Chain]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=82344</guid>
		<description><![CDATA[<p>This solution leverages private cellular networks (PCNs) owned and operated by government entities rather than the traditional dependence on Public Switched Network Providers (PSNs) such as AT&#038;T, Verizon, Vodafone, Orange and others around the world.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/flipping-the-script-exploring-new-paradigms-in-secure-mobile-computing/">Flipping the Script: Exploring New Paradigms in Secure Mobile Computing</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>The Evolution of Smartphone Security</title>
		<link>https://puri.sm/posts/the-evolution-of-smartphone-security/</link>
		<pubDate>Wed, 07 Aug 2024 17:41:49 +0000</pubDate>
		<dc:creator><![CDATA[Randy Siegel]]></dc:creator>
				<category><![CDATA[Government Mobility]]></category>
		<category><![CDATA[Hardware Encryption (HWE)]]></category>
		<category><![CDATA[Made in USA Electronics]]></category>
		<category><![CDATA[Mobile Ecosystem]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[infosec]]></category>
		<category><![CDATA[Liberty Phone]]></category>
		<category><![CDATA[most secure phone]]></category>
		<category><![CDATA[Secure Supply Chain]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=82318</guid>
		<description><![CDATA[<p>When smartphones first emerged in the early 2000s, the attack surface was relatively small. Devices were primarily used for Personal Information Management (PIM) such as calls, texts, email, calendaring, and basic internet browsing. However, the landscape changed dramatically with the introduction of the iPhone and Android platforms in 2007. These devices brought about a revolution [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/the-evolution-of-smartphone-security/">The Evolution of Smartphone Security</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
<enclosure url="https://videos.puri.sm/promo/CNBC_USA.mp4" length="20914889" type="video/mp4" />
		</item>
		<item>
		<title>Abside and Purism Partner to Deliver Secure Mobile Solution for U.S. Government and NATO Countries</title>
		<link>https://puri.sm/posts/abside-and-purism-partner-to-deliver-secure-mobile-solution-for-u-s-government-and-nato-countries/</link>
		<pubDate>Fri, 19 Jul 2024 00:09:34 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Additional Press Information]]></category>
		<category><![CDATA[Partnerships]]></category>
		<category><![CDATA[Press Releases]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[infosec]]></category>
		<category><![CDATA[Liberty Phone]]></category>
		<category><![CDATA[Made In USA]]></category>
		<category><![CDATA[most secure phone]]></category>
		<category><![CDATA[press release]]></category>
		<category><![CDATA[Secure Supply Chain]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=81964</guid>
		<description><![CDATA[<p>Acton, MA, USA – July 19th, 2024 – Abside, a leading provider of US made secure networking solutions, and Purism, a secure computing and US phone manufacturer, today announced a collaboration to deliver a secure mobile solution for the U.S. government and NATO countries. This collaboration brings together Abside&#8217;s N79 5G private network solution, designed [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/abside-and-purism-partner-to-deliver-secure-mobile-solution-for-u-s-government-and-nato-countries/">Abside and Purism Partner to Deliver Secure Mobile Solution for U.S. Government and NATO Countries</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Purpose-Built Smartphones for Government vs. Commercial Off-The-Shelf Devices</title>
		<link>https://puri.sm/posts/purpose-built-smartphones-for-government-vs-commercial-off-the-shelf-devices/</link>
		<pubDate>Fri, 19 Jul 2024 00:03:05 +0000</pubDate>
		<dc:creator><![CDATA[Randy Siegel]]></dc:creator>
				<category><![CDATA[Government Mobility]]></category>
		<category><![CDATA[Industry News]]></category>
		<category><![CDATA[Liberty Phone]]></category>
		<category><![CDATA[Made in USA Electronics]]></category>
		<category><![CDATA[Mobile Ecosystem]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[infosec]]></category>
		<category><![CDATA[most secure phone]]></category>
		<category><![CDATA[Network Security]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=82192</guid>
		<description><![CDATA[<p>The rise of the smartphone as both an indispensable consumer electronic device and an omnipresent tool for performing tasks at work has led to an inevitable question: Should enterprise and government centralized IT organizations deploy Commercial Off-the-Shelf (COTS) devices such as the iPhone, Google Pixel, Samsung Galaxy and attempt to secure them, or should organizations [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/purpose-built-smartphones-for-government-vs-commercial-off-the-shelf-devices/">Purpose-Built Smartphones for Government vs. Commercial Off-The-Shelf Devices</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Your Phone is Giving Away More Than You Ever Bargained For</title>
		<link>https://puri.sm/posts/your-phone-is-giving-away-more-than-you-ever-bargained-for/</link>
		<pubDate>Mon, 15 Jul 2024 00:05:47 +0000</pubDate>
		<dc:creator><![CDATA[Randy Siegel]]></dc:creator>
				<category><![CDATA[Civil Liberties]]></category>
		<category><![CDATA[Hardware]]></category>
		<category><![CDATA[Industry News]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Regulatory]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[infosec]]></category>
		<category><![CDATA[Liberty Phone]]></category>
		<category><![CDATA[Linux kernel]]></category>
		<category><![CDATA[Made In USA]]></category>
		<category><![CDATA[most secure phone]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=82040</guid>
		<description><![CDATA[<p>The year 2007 represented a watershed moment for the modern smartphone industry as we know it. This was the year that Apple introduced its first iPhone device and Google announced Android via its participation in The Open Handset Alliance (which notably leveraged the Linux kernel and open-source code to create its mobile OS). Fast forward [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/your-phone-is-giving-away-more-than-you-ever-bargained-for/">Your Phone is Giving Away More Than You Ever Bargained For</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Federal Government Mobility Veteran Randy Siegel Joins Purism</title>
		<link>https://puri.sm/posts/federal-government-mobility-veteran-randy-siegel-joins-purism/</link>
		<pubDate>Mon, 15 Jul 2024 00:00:46 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Government Mobility]]></category>
		<category><![CDATA[Liberty Phone]]></category>
		<category><![CDATA[Made in USA Electronics]]></category>
		<category><![CDATA[Mobile Ecosystem]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[CISO]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[infosec]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[PureOS]]></category>
		<category><![CDATA[Secure Supply Chain]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=82035</guid>
		<description><![CDATA[<p>Purism is pleased to announce that long-time mobility industry insider Randy Siegel has joined the company to direct our strategic government business development efforts. &#8220;Adding Randy to lead our secure mobile offering is a natural fit to expand our governmental focused Liberty Phone manufactured at our facility on US Soil. We are extremely excited that [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/federal-government-mobility-veteran-randy-siegel-joins-purism/">Federal Government Mobility Veteran Randy Siegel Joins Purism</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
	</channel>
</rss>
