<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Purism</title>
	<atom:link href="https://puri.sm/feed/" rel="self" type="application/rss+xml" />
	<link>https://puri.sm/</link>
	<description>High-quality computers that protect your freedom and privacy</description>
	<lastBuildDate>Sun, 29 Mar 2026 13:43:31 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=4.9.29</generator>

<image>
	<url>https://puri.sm/wp-content/uploads/2020/04/cropped-purism-logo-rectangle-1-32x32.png</url>
	<title>Purism</title>
	<link>https://puri.sm/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Wired Confirmed iPhone’s Worst-Kept Secret: Closed Systems Fail at Scale</title>
		<link>https://puri.sm/posts/wired-confirmed-iphones-worst-kept-secret-closed-systems-fail-at-scale/</link>
		<pubDate>Mon, 23 Mar 2026 16:28:47 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Industry News]]></category>
		<category><![CDATA[Librem 5]]></category>
		<category><![CDATA[Mobile Ecosystem]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[PureOS]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Consumer Privacy]]></category>
		<category><![CDATA[Consumer Protection]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[most secure phone]]></category>
		<category><![CDATA[Software freedom]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=85307</guid>
		<description><![CDATA[<p>For years, Apple has sold the myth of the “unhackable iPhone.” A walled garden. A fortress. A device so locked down that only nation-states could dream of breaking in. Wired’s latest reporting just blew that narrative apart.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/wired-confirmed-iphones-worst-kept-secret-closed-systems-fail-at-scale/">Wired Confirmed iPhone’s Worst-Kept Secret: Closed Systems Fail at Scale</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>PureOS Crimson Development Report: January and February 2026 &#8211; Beta Released</title>
		<link>https://puri.sm/posts/pureos-crimson-development-report-january-and-february-2026-beta-released/</link>
		<pubDate>Mon, 16 Mar 2026 20:30:40 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[PureOS]]></category>
		<category><![CDATA[Advanced readers]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=85268</guid>
		<description><![CDATA[<p>We are very pleased to announce that the PureOS Crimson beta is released!  This means that we have a new set of install images for all devices - Librem 5, Librem 11, servers, and PCs - and we have a path to upgrade existing installations from Byzantium.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/pureos-crimson-development-report-january-and-february-2026-beta-released/">PureOS Crimson Development Report: January and February 2026 &#8211; Beta Released</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Privacy Under Siege</title>
		<link>https://puri.sm/posts/privacy-under-siege/</link>
		<pubDate>Wed, 18 Feb 2026 16:55:58 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Librem 14]]></category>
		<category><![CDATA[Librem 5]]></category>
		<category><![CDATA[Most Secure Tablet]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[PureOS]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Apps]]></category>
		<category><![CDATA[Consumer Privacy]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Laptops]]></category>
		<category><![CDATA[Liberty Phone]]></category>
		<category><![CDATA[librem 5]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=85191</guid>
		<description><![CDATA[<p>Surveillance, Breaches, and Gaps in the Law It has become clear that privacy risks are not isolated incidents. They are part of a larger pattern.  Major organizations continue to experience large scale data breaches. Brightspeed recently suffered a breach affecting around one million customers. Brightspeed opened an internal cybersecurity investigation in early January this year, after Crimson [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/privacy-under-siege/">Privacy Under Siege</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Sim Swap Attacks Surging</title>
		<link>https://puri.sm/posts/sim-swap-attacks-surging/</link>
		<pubDate>Wed, 04 Feb 2026 18:26:59 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[AweSIM]]></category>
		<category><![CDATA[Librem 14]]></category>
		<category><![CDATA[Librem 5]]></category>
		<category><![CDATA[Librem 5 USA]]></category>
		<category><![CDATA[PureOS]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Apps]]></category>
		<category><![CDATA[Consumer Privacy]]></category>
		<category><![CDATA[Consumer Protection]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Laptops]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84947</guid>
		<description><![CDATA[<p>SIM swap attacks are skyrocketing. A SIM Swap attack is when cybercriminals hijack mobile numbers by convincing carriers to transfer a victim’s phone number to a SIM card they control. Once successful, attackers intercept text-based authentication codes, unlocking access to cryptocurrency wallets, banking apps, and social media accounts.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/sim-swap-attacks-surging/">Sim Swap Attacks Surging</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>PureOS Crimson Development Report: December 2025</title>
		<link>https://puri.sm/posts/pureos-crimson-development-report-december-2025/</link>
		<pubDate>Tue, 13 Jan 2026 22:11:09 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Librem 5]]></category>
		<category><![CDATA[PureOS]]></category>
		<category><![CDATA[Advanced readers]]></category>
		<category><![CDATA[librem 5]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=85160</guid>
		<description><![CDATA[<p>"Fit and finish" appears in many industries.  For much of the software industry, it refers to features that complete a fit for a target audience, ensuring that audience can use the product for their needs.  At a frame shop, it means literally fitting the mounted artwork into a frame, then finishing the back of the frame.</p>
<p>At Purism, fit takes on another meaning - making apps fit on screens the size of the Librem 5.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/pureos-crimson-development-report-december-2025/">PureOS Crimson Development Report: December 2025</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
<enclosure url="https://puri.sm/wp-content/uploads/2026/01/pureosupgrade-1.webm" length="613289" type="video/webm" />
		</item>
		<item>
		<title>A Quarter Century After Cyberselfish, Big Tech Proves Borsook Right</title>
		<link>https://puri.sm/posts/a-quarter-century-after-cyberselfish-big-tech-proves-borsook-right/</link>
		<pubDate>Sat, 20 Dec 2025 05:10:23 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Civil Liberties]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Social Purpose]]></category>
		<category><![CDATA[Consumer Privacy]]></category>
		<category><![CDATA[Consumer Protection]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[PureOS]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84958</guid>
		<description><![CDATA[<p>In her book Cyberselfish: A Critical Romp Through the Terribly Libertarian Culture of Silicon Valley, published in 2000, Borsook who is based in Palo Alto, California and has previously written for Wired and a host of other industry publications, took aim at what she saw as disturbing trends among the tech industry.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/a-quarter-century-after-cyberselfish-big-tech-proves-borsook-right/">A Quarter Century After Cyberselfish, Big Tech Proves Borsook Right</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>PureOS Crimson Development Report: November 2025</title>
		<link>https://puri.sm/posts/pureos-crimson-development-report-november-2025/</link>
		<pubDate>Mon, 15 Dec 2025 20:59:57 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Librem 5]]></category>
		<category><![CDATA[PureOS]]></category>
		<category><![CDATA[Advanced readers]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=85008</guid>
		<description><![CDATA[<p>With our sights set on the beta release milestone, one key component still remains: a way to upgrade from Byzantium to Crimson.</p>
<p>If you're a Linux expert, you might already know how Debian handles release upgrades.  Some eager individuals have already upgraded from Byzantium to the Crimson alpha this way.  However, we need an easy, graphical upgrade procedure, so everyone with a Librem 5 can get the improvements coming in Crimson.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/pureos-crimson-development-report-november-2025/">PureOS Crimson Development Report: November 2025</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Purism Liberty Phone Exists vs. Delayed T1 Phone</title>
		<link>https://puri.sm/posts/purism-liberty-phone-exists-vs-delayed-t1-phone/</link>
		<pubDate>Wed, 10 Dec 2025 15:36:37 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Additional Press Information]]></category>
		<category><![CDATA[Government Mobility]]></category>
		<category><![CDATA[Liberty Phone]]></category>
		<category><![CDATA[Librem 5 USA]]></category>
		<category><![CDATA[Made in USA Electronics]]></category>
		<category><![CDATA[Consumer Privacy]]></category>
		<category><![CDATA[Consumer Protection]]></category>
		<category><![CDATA[Hardware Kill Switches]]></category>
		<category><![CDATA[Made In USA]]></category>
		<category><![CDATA[most secure phone]]></category>
		<category><![CDATA[Phones]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84989</guid>
		<description><![CDATA[<p>NBC News reports that Trump Mobile customers have been waiting months for a promised ‘Made in the USA’ smartphone, originally announced for August delivery. The T1 phone was marketed as domestically produced, but delays and vague updates have raised skepticism. References to ‘Made in the USA’ have been removed from the company’s site, and leaked images suggest the device resembles existing Chinese-made models. This situation underscores the complexity of building smartphones in America without established infrastructure.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/purism-liberty-phone-exists-vs-delayed-t1-phone/">Purism Liberty Phone Exists vs. Delayed T1 Phone</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>PureOS Crimson Development Report: October 2025</title>
		<link>https://puri.sm/posts/pureos-crimson-development-report-october-2025/</link>
		<pubDate>Fri, 14 Nov 2025 18:58:48 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Librem 5]]></category>
		<category><![CDATA[PureOS]]></category>
		<category><![CDATA[Advanced readers]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84869</guid>
		<description><![CDATA[<p>In September, we prioritized fixes for the out-of-box experience on PureOS Crimson.  For the rest of the beta milestone, we are prioritizing work that benefits the most from user feedback.  That includes functionality that must account for device-to-device variations and that is strongly influenced by users' individual preferences.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/pureos-crimson-development-report-october-2025/">PureOS Crimson Development Report: October 2025</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Landfall: A Case Study in Commercial Spyware</title>
		<link>https://puri.sm/posts/landfall-a-case-study-in-commercial-spyware/</link>
		<pubDate>Fri, 14 Nov 2025 17:19:08 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Applications]]></category>
		<category><![CDATA[GNU/Linux]]></category>
		<category><![CDATA[Industry News]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Social Purpose]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Apps]]></category>
		<category><![CDATA[Consumer Privacy]]></category>
		<category><![CDATA[Consumer Protection]]></category>
		<category><![CDATA[Critical Infrastructure]]></category>
		<category><![CDATA[Hardware Kill Switches]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[private computing]]></category>
		<category><![CDATA[secure computing]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84907</guid>
		<description><![CDATA[<p>The recently uncovered Landfall spyware campaign is more than another example of commercial-grade surveillance malware, it’s a clear demonstration of why transparency, verifiability, and user sovereignty are no longer optional in modern computing.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/landfall-a-case-study-in-commercial-spyware/">Landfall: A Case Study in Commercial Spyware</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>EvilAI Malware Exploits AI Targets Organizations Worldwide</title>
		<link>https://puri.sm/posts/evilai-malware-exploits-ai-targets-organizations-worldwide/</link>
		<pubDate>Fri, 14 Nov 2025 01:16:21 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[Applications]]></category>
		<category><![CDATA[Industry News]]></category>
		<category><![CDATA[Apps]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84688</guid>
		<description><![CDATA[<p>A sophisticated malware campaign, dubbed “EvilAI” by cybersecurity firm Trend Micro, is leveraging AI-enhanced software to infiltrate organizations across the globe. By posing as legitimate productivity tools, this malware evades traditional security measures and exploits user trust.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/evilai-malware-exploits-ai-targets-organizations-worldwide/">EvilAI Malware Exploits AI Targets Organizations Worldwide</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Librem PQC Encryptor: Future‑Proofing Against Both SS7 and Quantum</title>
		<link>https://puri.sm/posts/librem-pqc-encryptor-future-proofing-against-both-ss7-and-quantum/</link>
		<pubDate>Thu, 13 Nov 2025 11:15:44 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Hardware Encryption (HWE)]]></category>
		<category><![CDATA[Librem PQC Comms Server]]></category>
		<category><![CDATA[Librem PQC Encryptor]]></category>
		<category><![CDATA[Miscellaneous]]></category>
		<category><![CDATA[Post Quantum Cryptography]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Communications infrastructure]]></category>
		<category><![CDATA[Critical Infrastructure]]></category>
		<category><![CDATA[cybersecurity]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84444</guid>
		<description><![CDATA[<p>Signaling System 7 (SS7) was designed in the 1970s to let telecom carriers route calls, deliver SMS, and enable roaming. It was never built with authentication or encryption in mind. Security wasn’t part of the plan.  The assumption was simple:  All carriers are trusted.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/librem-pqc-encryptor-future-proofing-against-both-ss7-and-quantum/">Librem PQC Encryptor: Future‑Proofing Against Both SS7 and Quantum</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Sound Recorder App Now Available</title>
		<link>https://puri.sm/posts/sound-recorder-app-now-available/</link>
		<pubDate>Thu, 30 Oct 2025 15:09:40 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Applications]]></category>
		<category><![CDATA[LibremOS]]></category>
		<category><![CDATA[Mobile Ecosystem]]></category>
		<category><![CDATA[Apps]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84846</guid>
		<description><![CDATA[<p>Sound Recorder provides a simple and modern interface that provides a straight-forward way to record and play audio. It allows you to do basic editing, and create voice memos.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/sound-recorder-app-now-available/">Sound Recorder App Now Available</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
<enclosure url="https://videos.puri.sm/librem5/apps/sound-recorder.mp4" length="4517737" type="video/mp4" />
		</item>
		<item>
		<title>AWS Outage, Purism’s Answer is clear: Decentralize, Localize, and Empower Users to Own Their Digital Lives</title>
		<link>https://puri.sm/posts/aws-outage-purisms-answer-is-clear-decentralize-localize-and-empower-users-to-own-their-digital-lives/</link>
		<pubDate>Mon, 20 Oct 2025 00:29:00 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Applications]]></category>
		<category><![CDATA[Government Mobility]]></category>
		<category><![CDATA[Industry News]]></category>
		<category><![CDATA[Mobile Ecosystem]]></category>
		<category><![CDATA[Apps]]></category>
		<category><![CDATA[Communications infrastructure]]></category>
		<category><![CDATA[Consumer Protection]]></category>
		<category><![CDATA[Critical Infrastructure]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Enterprise]]></category>
		<category><![CDATA[librem 5]]></category>
		<category><![CDATA[Network Security]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84791</guid>
		<description><![CDATA[<p>Purism’s answer is clear: decentralize, localize, and empower users to own their digital lives, just as the internet is intended.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/aws-outage-purisms-answer-is-clear-decentralize-localize-and-empower-users-to-own-their-digital-lives/">AWS Outage, Purism’s Answer is clear: Decentralize, Localize, and Empower Users to Own Their Digital Lives</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Drawing App Now Available</title>
		<link>https://puri.sm/posts/drawing-app-now-available/</link>
		<pubDate>Tue, 14 Oct 2025 22:55:18 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Applications]]></category>
		<category><![CDATA[LibremOS]]></category>
		<category><![CDATA[Mobile Ecosystem]]></category>
		<category><![CDATA[Apps]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84742</guid>
		<description><![CDATA[<p>Drawing is a basic image editor that can resize, crop, or rotate an image. You can apply simple filters, insert or censor text, and manipulate a selected portion of the picture (cut/copy/paste/drag/…)</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/drawing-app-now-available/">Drawing App Now Available</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
<enclosure url="https://videos.puri.sm/librem5/apps/drawing.mp4" length="4953733" type="video/mp4" />
		</item>
		<item>
		<title>PureOS Crimson Development Report: September 2025</title>
		<link>https://puri.sm/posts/pureos-crimson-development-report-september-2025/</link>
		<pubDate>Tue, 14 Oct 2025 18:38:21 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[LibremOS]]></category>
		<category><![CDATA[Mobile Ecosystem]]></category>
		<category><![CDATA[PureOS]]></category>
		<category><![CDATA[Advanced readers]]></category>
		<category><![CDATA[debian]]></category>
		<category><![CDATA[phosh]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84727</guid>
		<description><![CDATA[<p>Welcome back!  In our August update, we mentioned that PureOS Crimson alpha images are released.  With the alpha milestone closed, we now push on toward beta.</p>
<p>Now that Crimson alpha images are installable, we're focusing on the out-of-box experience - what happens when you turn on your device for the first time with PureOS Crimson.  Most of the fixes this month improve the out-of-box experience.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/pureos-crimson-development-report-september-2025/">PureOS Crimson Development Report: September 2025</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Consent On Everything?</title>
		<link>https://puri.sm/posts/consent-on-everything/</link>
		<pubDate>Tue, 14 Oct 2025 18:34:41 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Applications]]></category>
		<category><![CDATA[Civil Liberties]]></category>
		<category><![CDATA[Liberty Phone]]></category>
		<category><![CDATA[Librem 14]]></category>
		<category><![CDATA[Librem 5]]></category>
		<category><![CDATA[AweSIM]]></category>
		<category><![CDATA[Consumer Privacy]]></category>
		<category><![CDATA[Consumer Protection]]></category>
		<category><![CDATA[librem 5]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84770</guid>
		<description><![CDATA[<p>If you’re tired of being tricked into “Consent on Everything,” it’s time to step outside the adversary’s system.  Explore what Purism has to offer and deicide if this is a move you should take.  Equipping yourself with the Purism Ecosystem can protect you.  This is a place where your consent is real, your defaults are yours, and your digital life is finally under your control.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/consent-on-everything/">Consent On Everything?</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>60 Minutes Uncovers Hacks on America&#8217;s Infrastructure</title>
		<link>https://puri.sm/posts/60-minutes-uncovers-hacks-on-americas-infrastructure/</link>
		<pubDate>Tue, 14 Oct 2025 15:03:51 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Government Mobility]]></category>
		<category><![CDATA[Librem 14]]></category>
		<category><![CDATA[Librem 5]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[AweSIM]]></category>
		<category><![CDATA[Consumer Protection]]></category>
		<category><![CDATA[Critical Infrastructure]]></category>
		<category><![CDATA[librem 5]]></category>
		<category><![CDATA[Network Security]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84732</guid>
		<description><![CDATA[<p>The recent 60 Minutes segment on Chinese hacks to America’s critical infrastructure was not new news. IT was a very powerful remainder that highlighted some of the root causes of our national cyber weaknesses.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/60-minutes-uncovers-hacks-on-americas-infrastructure/">60 Minutes Uncovers Hacks on America&#8217;s Infrastructure</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Code is Power!</title>
		<link>https://puri.sm/posts/code-is-power/</link>
		<pubDate>Mon, 13 Oct 2025 19:51:18 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Applications]]></category>
		<category><![CDATA[Civil Liberties]]></category>
		<category><![CDATA[Firmware and BIOS]]></category>
		<category><![CDATA[Hardware]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Apps]]></category>
		<category><![CDATA[AweSIM]]></category>
		<category><![CDATA[Consumer Privacy]]></category>
		<category><![CDATA[Consumer Protection]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84698</guid>
		<description><![CDATA[<p>From Code to Control: How Big Tech Claims Ownership of the User</p>
<p>September 2025 has been a brutal reminder of a truth we at Purism have been voicing for years: code is power. And when that code is closed, opaque, or controlled by Big Tech vendors who prioritize convenience or monetization over user rights, the end-user becomes the product, not the principal.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/code-is-power/">Code is Power!</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Purism Defends the Fourth Amendment in the Digital Age</title>
		<link>https://puri.sm/posts/purism-defends-the-fourth-amendment-in-the-digital-age/</link>
		<pubDate>Mon, 06 Oct 2025 12:31:00 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[AweSIM]]></category>
		<category><![CDATA[Civil Liberties]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Regulatory]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Social Purpose]]></category>
		<category><![CDATA[Consumer Privacy]]></category>
		<category><![CDATA[Consumer Protection]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[Software freedom]]></category>
		<category><![CDATA[User empowerment]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84660</guid>
		<description><![CDATA[<p>A newly revealed WIRED investigation shows that the United States Government is creating a vast social media surveillance network, one that will operate around the clock and rely heavily on private contractors. Officials insist the system targets foreign nationals—but its scope and design make it inevitable that millions of Americans’ online activity will also be swept up. This is unconstitutional.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/purism-defends-the-fourth-amendment-in-the-digital-age/">Purism Defends the Fourth Amendment in the Digital Age</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>From the Browser to the Bloodstream</title>
		<link>https://puri.sm/posts/from-the-browser-to-the-bloodstream/</link>
		<pubDate>Thu, 02 Oct 2025 15:20:18 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Applications]]></category>
		<category><![CDATA[Civil Liberties]]></category>
		<category><![CDATA[Industry News]]></category>
		<category><![CDATA[Regulatory]]></category>
		<category><![CDATA[Apps]]></category>
		<category><![CDATA[Consumer Privacy]]></category>
		<category><![CDATA[Consumer Protection]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84639</guid>
		<description><![CDATA[<p>When a company collapses, its debts and assets are tallied, auctioned, and parceled out. But what happens when the “asset” in question is your very biology? That’s the question millions of 23andMe customers now face in the wake of the company’s bankruptcy.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/from-the-browser-to-the-bloodstream/">From the Browser to the Bloodstream</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Dialing Back to Move Forward: Why the Landline Revival Signals a Future for Privacy</title>
		<link>https://puri.sm/posts/dialing-back-to-move-forward-why-the-landline-revival-signals-a-future-for-privacy/</link>
		<pubDate>Wed, 01 Oct 2025 15:55:47 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Customer Satisfaction]]></category>
		<category><![CDATA[Hardware]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Voice & Data Services]]></category>
		<category><![CDATA[Consumer Privacy]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[Phones]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84618</guid>
		<description><![CDATA[<p>On September 30, 2025, The Washington Post reported a quiet trend in Washington, D.C.: the return of landline phones among officials and journalists seeking refuge from the omnipresent surveillance of smartphones. In a recent story, NBC News spotlighted parents in Maine and Seattle who are reviving landlines for their children—creating “landline pods” so kids can connect without the addictive pull of screens or the predatory reach of social media platforms.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/dialing-back-to-move-forward-why-the-landline-revival-signals-a-future-for-privacy/">Dialing Back to Move Forward: Why the Landline Revival Signals a Future for Privacy</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Who Owns Your Digital Self?</title>
		<link>https://puri.sm/posts/who-owns-your-digital-self/</link>
		<pubDate>Wed, 01 Oct 2025 14:52:09 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Civil Liberties]]></category>
		<category><![CDATA[Customer Satisfaction]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Consumer Privacy]]></category>
		<category><![CDATA[Consumer Protection]]></category>
		<category><![CDATA[cybersecurity]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84608</guid>
		<description><![CDATA[<p>The lawsuits now circling Apple are not just about stolen phones. They are about stolen selves—stolen data, stolen memories, stolen identities.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/who-owns-your-digital-self/">Who Owns Your Digital Self?</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Quantum Safe Private Communications: Building the Future Before the Threat Arrives</title>
		<link>https://puri.sm/posts/quantum-safe-private-communications-building-the-future-before-the-threat-arrives/</link>
		<pubDate>Fri, 26 Sep 2025 20:56:28 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Applications]]></category>
		<category><![CDATA[Government Mobility]]></category>
		<category><![CDATA[Industry News]]></category>
		<category><![CDATA[Librem PQC Comms Server]]></category>
		<category><![CDATA[Librem PQC Encryptor]]></category>
		<category><![CDATA[Mobile Ecosystem]]></category>
		<category><![CDATA[N79]]></category>
		<category><![CDATA[Post Quantum Cryptography]]></category>
		<category><![CDATA[Private Cellular Networking]]></category>
		<category><![CDATA[Quantum Safe]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[CISO]]></category>
		<category><![CDATA[Communications infrastructure]]></category>
		<category><![CDATA[Critical Infrastructure]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[infosec]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[Physical robustness]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84586</guid>
		<description><![CDATA[<p>Secure mobility is not just about encryption — it’s about sovereignty. The ability to own, control, and verify every layer of your communications stack is the difference between operational assurance and strategic vulnerability.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/quantum-safe-private-communications-building-the-future-before-the-threat-arrives/">Quantum Safe Private Communications: Building the Future Before the Threat Arrives</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Safety Without Surveillance: Designing Digital Sovereignty for All Ages</title>
		<link>https://puri.sm/posts/safety-without-surveillance-designing-digital-sovereignty-for-all-ages/</link>
		<pubDate>Thu, 25 Sep 2025 14:41:11 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Applications]]></category>
		<category><![CDATA[Civil Liberties]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Social Purpose]]></category>
		<category><![CDATA[Apps]]></category>
		<category><![CDATA[Consumer Privacy]]></category>
		<category><![CDATA[Consumer Protection]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84574</guid>
		<description><![CDATA[<p>In September, a single misconfiguration in Life360’s Android API turned a “family safety” app into a map of human lives exposed. More than 442,000 users had their precise GPS trails, names, and phone numbers dumped online by a threat actor known as Emo.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/safety-without-surveillance-designing-digital-sovereignty-for-all-ages/">Safety Without Surveillance: Designing Digital Sovereignty for All Ages</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Secret Service Telecom Bust Exposes Cellular Weaknesses</title>
		<link>https://puri.sm/posts/secret-service-telecom-bust-exposes-cellular-weaknesses/</link>
		<pubDate>Tue, 23 Sep 2025 19:31:07 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Civil Liberties]]></category>
		<category><![CDATA[Government Mobility]]></category>
		<category><![CDATA[Mobile Ecosystem]]></category>
		<category><![CDATA[Communications infrastructure]]></category>
		<category><![CDATA[Consumer Protection]]></category>
		<category><![CDATA[Critical Infrastructure]]></category>
		<category><![CDATA[Liberty Phone]]></category>
		<category><![CDATA[librem 5]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84546</guid>
		<description><![CDATA[<p>The Secret Service’s disruption of a massive SIM-server network near the U.N. is proof that the threats to our communications are real, organized, and capable of overwhelming public safety systems.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/secret-service-telecom-bust-exposes-cellular-weaknesses/">Secret Service Telecom Bust Exposes Cellular Weaknesses</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Purism Approach vs. Google Model</title>
		<link>https://puri.sm/posts/purism-approach-vs-google-model/</link>
		<pubDate>Tue, 23 Sep 2025 14:24:00 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Applications]]></category>
		<category><![CDATA[Civil Liberties]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Social Purpose]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Consumer Privacy]]></category>
		<category><![CDATA[Consumer Protection]]></category>
		<category><![CDATA[PureOS]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Software freedom]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84519</guid>
		<description><![CDATA[<p>The Justice Department and a coalition of states are pursuing antitrust action against Google, accusing it of running monopolistic ad-tech systems that exploit users and lock out competition. Regulators are weighing remedies that could force structural changes to Google’s ad empire.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/purism-approach-vs-google-model/">Purism Approach vs. Google Model</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>Shortwave App Now Available</title>
		<link>https://puri.sm/posts/shortwave-app-now-available/</link>
		<pubDate>Sun, 21 Sep 2025 21:04:38 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Applications]]></category>
		<category><![CDATA[LibremOS]]></category>
		<category><![CDATA[Mobile Ecosystem]]></category>
		<category><![CDATA[Apps]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84397</guid>
		<description><![CDATA[<p>Shortwave is an internet radio player that provides access to a station database with over 50,000 stations. </p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/shortwave-app-now-available/">Shortwave App Now Available</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
<enclosure url="https://videos.puri.sm/librem5/apps/shortwave.mp4" length="5036912" type="video/mp4" />
		</item>
		<item>
		<title>Freedom by Design: Why Purism Rejects Big IT Status Quo</title>
		<link>https://puri.sm/posts/freedom-by-design-why-purism-rejects-big-it-status-quo/</link>
		<pubDate>Fri, 19 Sep 2025 17:05:52 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Consumer Privacy]]></category>
		<category><![CDATA[Consumer Protection]]></category>
		<category><![CDATA[cybersecurity]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84487</guid>
		<description><![CDATA[<p>Three recent IT‑privacy headlines tell the same unsettling story: that consumer trust is being squandered</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/freedom-by-design-why-purism-rejects-big-it-status-quo/">Freedom by Design: Why Purism Rejects Big IT Status Quo</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
		<item>
		<title>When “Efficiency” Becomes Exposure: How DOGE Put America’s Identity at Risk</title>
		<link>https://puri.sm/posts/when-efficiency-becomes-exposure-how-doge-put-americas-identity-at-risk/</link>
		<pubDate>Fri, 19 Sep 2025 17:03:10 +0000</pubDate>
		<dc:creator><![CDATA[Purism]]></dc:creator>
				<category><![CDATA[Civil Liberties]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Consumer Privacy]]></category>
		<category><![CDATA[Consumer Protection]]></category>
		<category><![CDATA[cybersecurity]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=84476</guid>
		<description><![CDATA[<p>Every American should be alarmed.  It was recently reported that a whistleblower from inside the Social Security Administration, Chief Data Officer Charles Borges, has revealed that the Department of Government Efficiency (DOGE) copied a live, full-fidelity version of the nation’s Social Security database onto an Amazon-hosted cloud environment that allegedly lacked independent security oversight. This affects any American who’s ever filled out a Social Security form,</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/when-efficiency-becomes-exposure-how-doge-put-americas-identity-at-risk/">When “Efficiency” Becomes Exposure: How DOGE Put America’s Identity at Risk</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
		</item>
	</channel>
</rss>
