<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>AI</title>
	<atom:link href="https://axisofeasy.com/tag/ai/feed/" rel="self" type="application/rss+xml" />
	<link>https://axisofeasy.com</link>
	<description>Rapid Coverage of a World Gone Full Cyberpunk</description>
	<lastBuildDate>Fri, 24 Apr 2026 21:07:51 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://axisofeasy.com/wp-content/uploads/2018/07/cropped-easydns-big-bolt-512x512-32x32.png</url>
	<title>AI</title>
	<link>https://axisofeasy.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>#AxisOfEasy 447: Unauthorized Group Accesses Anthropic’s Mythos Security Tool</title>
		<link>https://axisofeasy.com/podcast/axisofeasy-447-unauthorized-group-accesses-anthropics-mythos-security-tool/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-447-unauthorized-group-accesses-anthropics-mythos-security-tool</link>
					<comments>https://axisofeasy.com/podcast/axisofeasy-447-unauthorized-group-accesses-anthropics-mythos-security-tool/#respond</comments>
		
		<dc:creator><![CDATA[Joey Tweets]]></dc:creator>
		<pubDate>Fri, 24 Apr 2026 22:00:30 +0000</pubDate>
				<category><![CDATA[agi]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[ai breach]]></category>
		<category><![CDATA[AI safety]]></category>
		<category><![CDATA[Anthropic]]></category>
		<category><![CDATA[anthropic ai]]></category>
		<category><![CDATA[anthropic ceo]]></category>
		<category><![CDATA[anthropic falling]]></category>
		<category><![CDATA[anthropic hack]]></category>
		<category><![CDATA[anthropic losing]]></category>
		<category><![CDATA[anthropic mythos]]></category>
		<category><![CDATA[anthropic vs openai]]></category>
		<category><![CDATA[AoE podcast]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[Axis Of Easy]]></category>
		<category><![CDATA[ChatGPT]]></category>
		<category><![CDATA[Claude]]></category>
		<category><![CDATA[Claude AI]]></category>
		<category><![CDATA[Claude Code]]></category>
		<category><![CDATA[claude leak]]></category>
		<category><![CDATA[claude mythos]]></category>
		<category><![CDATA[claude vs chatgpt]]></category>
		<category><![CDATA[claude vs gpt-5]]></category>
		<category><![CDATA[Dario Amodei]]></category>
		<category><![CDATA[generative AI]]></category>
		<category><![CDATA[gpt-5]]></category>
		<category><![CDATA[mythos breach]]></category>
		<category><![CDATA[OpenAI]]></category>
		<category><![CDATA[openai beats anthropic]]></category>
		<category><![CDATA[Project Glasswing]]></category>
		<category><![CDATA[sam altman]]></category>
		<category><![CDATA[tech news]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?post_type=podcast&#038;p=33790</guid>

					<description><![CDATA[In this issue: Unauthorized Group Accesses Anthropic’s Mythos Security Tool Vercel Breached via Compromised Google Workspace OAuth App Canada&#8217;s Liberals Move to Revive Online Speech Legislation Crypto Scam Targets Shipping Chaos in Strait of Hormuz Mastodon and Bluesky Hit by DDoS Attacks in Rapid Succession Ethereum gateway domain hijacked on our watch In this issue: [&#8230;]<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Fpodcast%2Faxisofeasy-447-unauthorized-group-accesses-anthropics-mythos-security-tool%2F&amp;action_name=%23AxisOfEasy%20447%3A%20Unauthorized%20Group%20Accesses%20Anthropic%E2%80%99s%20Mythos%20Security%20Tool&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/podcast/axisofeasy-447-unauthorized-group-accesses-anthropics-mythos-security-tool/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 442: Canada Introduces Bill C-22 For Mandatory Metadata Retention</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-442-canada-introduces-bill-c-22-for-mandatory-metadata-retention/?pk_campaign=feed&#038;pk_kwd=axisofeasy-442-canada-introduces-bill-c-22-for-mandatory-metadata-retention&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-442-canada-introduces-bill-c-22-for-mandatory-metadata-retention</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-442-canada-introduces-bill-c-22-for-mandatory-metadata-retention/?pk_campaign=feed&#038;pk_kwd=axisofeasy-442-canada-introduces-bill-c-22-for-mandatory-metadata-retention#respond</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 20 Mar 2026 22:00:54 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[AI music]]></category>
		<category><![CDATA[Anthropic]]></category>
		<category><![CDATA[automation]]></category>
		<category><![CDATA[Bill C-22]]></category>
		<category><![CDATA[C2 framework]]></category>
		<category><![CDATA[Canada]]></category>
		<category><![CDATA[ChatGPT]]></category>
		<category><![CDATA[Cisco]]></category>
		<category><![CDATA[Claude AI]]></category>
		<category><![CDATA[credential theft]]></category>
		<category><![CDATA[Crypto Wallets]]></category>
		<category><![CDATA[CSIS]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[DarkSword]]></category>
		<category><![CDATA[data brokers]]></category>
		<category><![CDATA[data exfiltration]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[End-to-End Encryption]]></category>
		<category><![CDATA[espionage]]></category>
		<category><![CDATA[evasion]]></category>
		<category><![CDATA[exploit kit]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[Fourth Amendment]]></category>
		<category><![CDATA[geolocation tracking]]></category>
		<category><![CDATA[GitHub]]></category>
		<category><![CDATA[Glassworm]]></category>
		<category><![CDATA[government surveillance]]></category>
		<category><![CDATA[Handala hackers]]></category>
		<category><![CDATA[Instagram]]></category>
		<category><![CDATA[Interlock]]></category>
		<category><![CDATA[iOS vulnerabilities]]></category>
		<category><![CDATA[Lawful Access]]></category>
		<category><![CDATA[Linux security]]></category>
		<category><![CDATA[location data]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[meta]]></category>
		<category><![CDATA[metadata retention]]></category>
		<category><![CDATA[Npm]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[privilege escalation]]></category>
		<category><![CDATA[prompt injection]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[RCMP]]></category>
		<category><![CDATA[real estate]]></category>
		<category><![CDATA[root access]]></category>
		<category><![CDATA[snapd]]></category>
		<category><![CDATA[SnappyClient]]></category>
		<category><![CDATA[Social Media]]></category>
		<category><![CDATA[stolen credentials]]></category>
		<category><![CDATA[Stryker breach]]></category>
		<category><![CDATA[supply chain attack]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[systemd]]></category>
		<category><![CDATA[telecom]]></category>
		<category><![CDATA[Ubuntu]]></category>
		<category><![CDATA[Unicode obfuscation]]></category>
		<category><![CDATA[virtual band]]></category>
		<category><![CDATA[warrants]]></category>
		<category><![CDATA[zero-day]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=33472</guid>

					<description><![CDATA[Canada Introduces Bill C-22 For Mandatory Metadata Retention
Meta is Ending Instagram Direct Message End-to-End Encryption
Invisible Unicode Supply-Chain Attack Hits GitHub Ecosystem... this and more in AofE  #442<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-442-canada-introduces-bill-c-22-for-mandatory-metadata-retention%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-442-canada-introduces-bill-c-22-for-mandatory-metadata-retention&amp;action_name=%23AxisOfEasy%20442%3A%20Canada%20Introduces%20Bill%20C-22%20For%20Mandatory%20Metadata%20Retention&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-442-canada-introduces-bill-c-22-for-mandatory-metadata-retention/?pk_campaign=feed&#038;pk_kwd=axisofeasy-442-canada-introduces-bill-c-22-for-mandatory-metadata-retention/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 441: Canada Allows TikTok To Continue Operations With New Safeguards</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-441-canada-allows-tiktok-to-continue-operations-with-new-safeguards/?pk_campaign=feed&#038;pk_kwd=axisofeasy-441-canada-allows-tiktok-to-continue-operations-with-new-safeguards&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-441-canada-allows-tiktok-to-continue-operations-with-new-safeguards</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-441-canada-allows-tiktok-to-continue-operations-with-new-safeguards/?pk_campaign=feed&#038;pk_kwd=axisofeasy-441-canada-allows-tiktok-to-continue-operations-with-new-safeguards#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 13 Mar 2026 22:00:36 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[Android Trojan]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[AWS]]></category>
		<category><![CDATA[backups]]></category>
		<category><![CDATA[botnet]]></category>
		<category><![CDATA[Browser Extensions]]></category>
		<category><![CDATA[ByteDance]]></category>
		<category><![CDATA[Canada]]></category>
		<category><![CDATA[certificate automation]]></category>
		<category><![CDATA[certificates]]></category>
		<category><![CDATA[China relations]]></category>
		<category><![CDATA[Chrome]]></category>
		<category><![CDATA[cloud computing]]></category>
		<category><![CDATA[CVE-2026-0628]]></category>
		<category><![CDATA[cyber espionage]]></category>
		<category><![CDATA[Cyber Threats]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data loss]]></category>
		<category><![CDATA[data protection]]></category>
		<category><![CDATA[DevOps]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[Exploit]]></category>
		<category><![CDATA[Gemini]]></category>
		<category><![CDATA[GitHub supply chain]]></category>
		<category><![CDATA[government policy]]></category>
		<category><![CDATA[infrastructure security]]></category>
		<category><![CDATA[internet infrastructure]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[messaging apps]]></category>
		<category><![CDATA[national security]]></category>
		<category><![CDATA[open web]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[PKI]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[restore testing]]></category>
		<category><![CDATA[router malware]]></category>
		<category><![CDATA[Russian hackers]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[signal]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[SSL]]></category>
		<category><![CDATA[technology policy]]></category>
		<category><![CDATA[Terraform]]></category>
		<category><![CDATA[TikTok]]></category>
		<category><![CDATA[TLS]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<category><![CDATA[website operations]]></category>
		<category><![CDATA[WhatsApp]]></category>
		<category><![CDATA[WordPress security]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=33412</guid>

					<description><![CDATA[Canada Allows TikTok to Continue Operations with New Safeguards,
Russian government hackers targeting Signal and WhatsApp users, Dutch spies warn, 
Canadian Tire Data Breach Hits Millions... this and more in AofE  #441<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-441-canada-allows-tiktok-to-continue-operations-with-new-safeguards%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-441-canada-allows-tiktok-to-continue-operations-with-new-safeguards&amp;action_name=%23AxisOfEasy%20441%3A%20Canada%20Allows%20TikTok%20To%20Continue%20Operations%20With%20New%20Safeguards&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-441-canada-allows-tiktok-to-continue-operations-with-new-safeguards/?pk_campaign=feed&#038;pk_kwd=axisofeasy-441-canada-allows-tiktok-to-continue-operations-with-new-safeguards/feed/</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisofEasy 439: OpenAI Suppressed Warnings On Mass Shooter Months Before Spree</title>
		<link>https://axisofeasy.com/podcast/axisofeasy-439-openai-suppressed-warnings-on-mass-shooter-months-before-spree/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-439-openai-suppressed-warnings-on-mass-shooter-months-before-spree</link>
					<comments>https://axisofeasy.com/podcast/axisofeasy-439-openai-suppressed-warnings-on-mass-shooter-months-before-spree/#respond</comments>
		
		<dc:creator><![CDATA[Joey Tweets]]></dc:creator>
		<pubDate>Fri, 27 Feb 2026 23:00:56 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[canada news]]></category>
		<category><![CDATA[dji]]></category>
		<category><![CDATA[dji robot vacuum]]></category>
		<category><![CDATA[dji romo]]></category>
		<category><![CDATA[dji romo p]]></category>
		<category><![CDATA[dji romo p review]]></category>
		<category><![CDATA[dji vacuum]]></category>
		<category><![CDATA[dji vacuum cleaner]]></category>
		<category><![CDATA[how to prove your age on reddit]]></category>
		<category><![CDATA[how to verify age reddit mobile]]></category>
		<category><![CDATA[how to verify your reddit age]]></category>
		<category><![CDATA[llm safety]]></category>
		<category><![CDATA[OpenAI]]></category>
		<category><![CDATA[RCMP]]></category>
		<category><![CDATA[reddit age verification]]></category>
		<category><![CDATA[tumbler ridge]]></category>
		<category><![CDATA[tumbler ridge mass shooting]]></category>
		<category><![CDATA[tumbler ridge secondary school]]></category>
		<category><![CDATA[tumbler ridge shooting]]></category>
		<category><![CDATA[tumbler ridge victims]]></category>
		<category><![CDATA[verify age on reddit]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?post_type=podcast&#038;p=33311</guid>

					<description><![CDATA[The Tumbler Ridge shooter was flagged by OpenAI, had an expired firearms license, a documented mental health history, and repeated RCMP visits to the home. Eight people are dead. So why did every system designed to prevent this fail — and who decided to look the other way?<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Fpodcast%2Faxisofeasy-439-openai-suppressed-warnings-on-mass-shooter-months-before-spree%2F&amp;action_name=%23AxisofEasy%20439%3A%20OpenAI%20Suppressed%20Warnings%20On%20Mass%20Shooter%20Months%20Before%20Spree&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/podcast/axisofeasy-439-openai-suppressed-warnings-on-mass-shooter-months-before-spree/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 431: UK Moves Toward Mandatory Phone Surveillance</title>
		<link>https://axisofeasy.com/podcast/axisofeasy-431-uk-moves-toward-mandatory-phone-surveillance/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-431-uk-moves-toward-mandatory-phone-surveillance</link>
					<comments>https://axisofeasy.com/podcast/axisofeasy-431-uk-moves-toward-mandatory-phone-surveillance/#respond</comments>
		
		<dc:creator><![CDATA[Joey Tweets]]></dc:creator>
		<pubDate>Fri, 19 Dec 2025 23:00:04 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[Amazon]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Apple developer account disabled]]></category>
		<category><![CDATA[Apple ID bricked devices]]></category>
		<category><![CDATA[APT28 Ukraine phishing]]></category>
		<category><![CDATA[AWS]]></category>
		<category><![CDATA[Axis Of Easy]]></category>
		<category><![CDATA[AxisOfEasy]]></category>
		<category><![CDATA[Bill C-9 hate speech]]></category>
		<category><![CDATA[bitcoin]]></category>
		<category><![CDATA[Canada religious speech protections]]></category>
		<category><![CDATA[censorship]]></category>
		<category><![CDATA[Charles Hugh Smith]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[CSAM scanning bill]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[DDoS]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[facebook]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[government overreach]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[mandatory device scanning]]></category>
		<category><![CDATA[Mark E. Jeftovic]]></category>
		<category><![CDATA[meta]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[OpenAI]]></category>
		<category><![CDATA[Pegasus]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[phone security]]></category>
		<category><![CDATA[podcast]]></category>
		<category><![CDATA[PornHub data breach]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[ShinyHunters extortion]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[tech news]]></category>
		<category><![CDATA[TikTok]]></category>
		<category><![CDATA[twitter]]></category>
		<category><![CDATA[uk government]]></category>
		<category><![CDATA[UK phone surveillance]]></category>
		<category><![CDATA[Ukraine]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?post_type=podcast&#038;p=32898</guid>

					<description><![CDATA[UK pushes mandatory phone surveillance on all devices—plus Apple bricks developer's $30K ecosystem, PornHub extortion, &#038; Canada strips religious speech protections. #AxisOfEasy weekly digest<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Fpodcast%2Faxisofeasy-431-uk-moves-toward-mandatory-phone-surveillance%2F&amp;action_name=%23AxisOfEasy%20431%3A%20UK%20Moves%20Toward%20Mandatory%20Phone%20Surveillance&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/podcast/axisofeasy-431-uk-moves-toward-mandatory-phone-surveillance/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 422: Why Treating AI As A Tool Is A Dangerous Illusion</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-422-why-treating-ai-as-a-tool-is-a-dangerous-illusion/?pk_campaign=feed&#038;pk_kwd=axisofeasy-422-why-treating-ai-as-a-tool-is-a-dangerous-illusion&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-422-why-treating-ai-as-a-tool-is-a-dangerous-illusion</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-422-why-treating-ai-as-a-tool-is-a-dangerous-illusion/?pk_campaign=feed&#038;pk_kwd=axisofeasy-422-why-treating-ai-as-a-tool-is-a-dangerous-illusion#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 17 Oct 2025 22:00:38 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[alignment]]></category>
		<category><![CDATA[Android flaw]]></category>
		<category><![CDATA[Anthropic]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[Astaroth Trojan]]></category>
		<category><![CDATA[automation]]></category>
		<category><![CDATA[Axis Of Easy]]></category>
		<category><![CDATA[Bill C-8]]></category>
		<category><![CDATA[BYOVD]]></category>
		<category><![CDATA[Canada]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[civil liberties]]></category>
		<category><![CDATA[Claude Sonnet 4.5]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[credential dumping]]></category>
		<category><![CDATA[credentials]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Disinformation]]></category>
		<category><![CDATA[Dufresne]]></category>
		<category><![CDATA[Earth Alux]]></category>
		<category><![CDATA[ECHOAC]]></category>
		<category><![CDATA[economic impact]]></category>
		<category><![CDATA[email rules]]></category>
		<category><![CDATA[emergent behavior]]></category>
		<category><![CDATA[espionage]]></category>
		<category><![CDATA[ethical AI]]></category>
		<category><![CDATA[exfiltration]]></category>
		<category><![CDATA[existential risk]]></category>
		<category><![CDATA[Federal Reserve]]></category>
		<category><![CDATA[FIDO]]></category>
		<category><![CDATA[Gelsemium]]></category>
		<category><![CDATA[GitHub]]></category>
		<category><![CDATA[governance]]></category>
		<category><![CDATA[Harvard University]]></category>
		<category><![CDATA[House of Commons]]></category>
		<category><![CDATA[HR systems]]></category>
		<category><![CDATA[initial access]]></category>
		<category><![CDATA[Italy]]></category>
		<category><![CDATA[Jack Clark]]></category>
		<category><![CDATA[Jewelbug]]></category>
		<category><![CDATA[Lucky Mouse]]></category>
		<category><![CDATA[machine learning]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[McAfee]]></category>
		<category><![CDATA[Mechanize]]></category>
		<category><![CDATA[MFA]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Mimikatz]]></category>
		<category><![CDATA[misaligned optimization]]></category>
		<category><![CDATA[national security]]></category>
		<category><![CDATA[OpenAI]]></category>
		<category><![CDATA[Oracle EBS]]></category>
		<category><![CDATA[Paragon]]></category>
		<category><![CDATA[passkeys]]></category>
		<category><![CDATA[Payroll Pirate]]></category>
		<category><![CDATA[persistence]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Pixnapping]]></category>
		<category><![CDATA[policy]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Privacy Commissioner]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[Reclaim The Net]]></category>
		<category><![CDATA[REF7707]]></category>
		<category><![CDATA[Regulation]]></category>
		<category><![CDATA[reward hacking]]></category>
		<category><![CDATA[RMM]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[safety data]]></category>
		<category><![CDATA[ScreenConnect]]></category>
		<category><![CDATA[ShadowPad]]></category>
		<category><![CDATA[situational awareness]]></category>
		<category><![CDATA[Spyware]]></category>
		<category><![CDATA[supply chain attack]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[Symantec]]></category>
		<category><![CDATA[Taiwan]]></category>
		<category><![CDATA[TechCrunch]]></category>
		<category><![CDATA[telecom]]></category>
		<category><![CDATA[The Hacker News]]></category>
		<category><![CDATA[threat actors]]></category>
		<category><![CDATA[transparency]]></category>
		<category><![CDATA[universities]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<category><![CDATA[warrantless access]]></category>
		<category><![CDATA[Workday]]></category>
		<category><![CDATA[Yandex Cloud]]></category>
		<category><![CDATA[zero-day]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=32461</guid>

					<description><![CDATA[Why Treating AI as a Tool Is a Dangerous Illusion,
Chinese Espionage Group Expands Into Russia Through Jewelbug Cyber Campaign,
Cabinet Push for Secret Telecom Cutoffs Raises Privacy Concerns... this and more in AofE  #422<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-422-why-treating-ai-as-a-tool-is-a-dangerous-illusion%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-422-why-treating-ai-as-a-tool-is-a-dangerous-illusion&amp;action_name=%23AxisOfEasy%20422%3A%20Why%20Treating%20AI%20As%20A%20Tool%20Is%20A%20Dangerous%20Illusion&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-422-why-treating-ai-as-a-tool-is-a-dangerous-illusion/?pk_campaign=feed&#038;pk_kwd=axisofeasy-422-why-treating-ai-as-a-tool-is-a-dangerous-illusion/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 422: Why Treating AI As A Tool Is A Dangerous Illusion</title>
		<link>https://axisofeasy.com/podcast/axisofeasy-422-why-treating-ai-as-a-tool-is-a-dangerous-illusion/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-422-why-treating-ai-as-a-tool-is-a-dangerous-illusion</link>
					<comments>https://axisofeasy.com/podcast/axisofeasy-422-why-treating-ai-as-a-tool-is-a-dangerous-illusion/#respond</comments>
		
		<dc:creator><![CDATA[Joey Tweets]]></dc:creator>
		<pubDate>Fri, 17 Oct 2025 20:00:10 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[AI tools]]></category>
		<category><![CDATA[Anthropic]]></category>
		<category><![CDATA[best AI tools]]></category>
		<category><![CDATA[Canadian Privacy Laws]]></category>
		<category><![CDATA[chinese spies]]></category>
		<category><![CDATA[Cyber Crime]]></category>
		<category><![CDATA[Data SEc]]></category>
		<category><![CDATA[F5 Hack]]></category>
		<category><![CDATA[Info Sec]]></category>
		<category><![CDATA[Russia Hacking]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?post_type=podcast&#038;p=32478</guid>

					<description><![CDATA[Treating AI as a Tool is a Dangerous Illusion! Anthropic Co-Founder Warns of AI Growth and Autonomy.<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Fpodcast%2Faxisofeasy-422-why-treating-ai-as-a-tool-is-a-dangerous-illusion%2F&amp;action_name=%23AxisOfEasy%20422%3A%20Why%20Treating%20AI%20As%20A%20Tool%20Is%20A%20Dangerous%20Illusion&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/podcast/axisofeasy-422-why-treating-ai-as-a-tool-is-a-dangerous-illusion/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 419: The UK Forces Digital ID&#8217;s &#8211; What&#8217;s Next?</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-419-the-uk-forces-digital-ids-whats-next/?pk_campaign=feed&#038;pk_kwd=axisofeasy-419-the-uk-forces-digital-ids-whats-next&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-419-the-uk-forces-digital-ids-whats-next</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-419-the-uk-forces-digital-ids-whats-next/?pk_campaign=feed&#038;pk_kwd=axisofeasy-419-the-uk-forces-digital-ids-whats-next#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 26 Sep 2025 22:00:00 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[.onion]]></category>
		<category><![CDATA[$195k]]></category>
		<category><![CDATA[$56 Million]]></category>
		<category><![CDATA[Account Closures]]></category>
		<category><![CDATA[Account Freezes]]></category>
		<category><![CDATA[Africa]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[AI Adoption]]></category>
		<category><![CDATA[AI Industry Rivalry]]></category>
		<category><![CDATA[algorithms]]></category>
		<category><![CDATA[Altcoins]]></category>
		<category><![CDATA[AML]]></category>
		<category><![CDATA[Anti-Money Laundering]]></category>
		<category><![CDATA[Anysphere]]></category>
		<category><![CDATA[Asia]]></category>
		<category><![CDATA[Automated Systems]]></category>
		<category><![CDATA[automation]]></category>
		<category><![CDATA[Bank Accounts]]></category>
		<category><![CDATA[Banking Crisis]]></category>
		<category><![CDATA[Biometric Verification]]></category>
		<category><![CDATA[bitcoin]]></category>
		<category><![CDATA[Canada]]></category>
		<category><![CDATA[Canadian Content]]></category>
		<category><![CDATA[Cashless Future]]></category>
		<category><![CDATA[Citizens]]></category>
		<category><![CDATA[Coding Tools]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[confidentiality]]></category>
		<category><![CDATA[connectivity]]></category>
		<category><![CDATA[CRTC]]></category>
		<category><![CDATA[Crypto Exchange]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Elon Musk]]></category>
		<category><![CDATA[Enterprise Costs]]></category>
		<category><![CDATA[Europol]]></category>
		<category><![CDATA[Financial Inclusion]]></category>
		<category><![CDATA[Financial Policy]]></category>
		<category><![CDATA[Fraud Prevention]]></category>
		<category><![CDATA[Global Internet]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[Google Initiatives]]></category>
		<category><![CDATA[Grok]]></category>
		<category><![CDATA[Hype]]></category>
		<category><![CDATA[Infrastructure]]></category>
		<category><![CDATA[innovation]]></category>
		<category><![CDATA[Intellectual Property]]></category>
		<category><![CDATA[Internet Disruption]]></category>
		<category><![CDATA[Job Market]]></category>
		<category><![CDATA[KYC]]></category>
		<category><![CDATA[lawsuit]]></category>
		<category><![CDATA[Legal Precedent]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Middle East]]></category>
		<category><![CDATA[MLIT]]></category>
		<category><![CDATA[Money Laundering]]></category>
		<category><![CDATA[Music Streamers]]></category>
		<category><![CDATA[OpenAI]]></category>
		<category><![CDATA[Price Increase]]></category>
		<category><![CDATA[Proof-of-Work]]></category>
		<category><![CDATA[RCMP]]></category>
		<category><![CDATA[red sea]]></category>
		<category><![CDATA[Regulation]]></category>
		<category><![CDATA[Replit]]></category>
		<category><![CDATA[Seizure]]></category>
		<category><![CDATA[Slack]]></category>
		<category><![CDATA[Small Businesses]]></category>
		<category><![CDATA[Software Development]]></category>
		<category><![CDATA[State Bank of Vietnam]]></category>
		<category><![CDATA[Talent Mobility]]></category>
		<category><![CDATA[Tech Workers]]></category>
		<category><![CDATA[Thailand]]></category>
		<category><![CDATA[Tor]]></category>
		<category><![CDATA[Trade Secrets]]></category>
		<category><![CDATA[TradeOgre]]></category>
		<category><![CDATA[Undersea Cables]]></category>
		<category><![CDATA[Vietnam]]></category>
		<category><![CDATA[Workforce Disruption]]></category>
		<category><![CDATA[xAI]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=32330</guid>

					<description><![CDATA[The UK Forces Digital ID's-What's Next?
Thailand Government Unleashes AI-Driven AML System, Hilarity Ensues
Canada's RCMP Takes Down TradeOgre Crypto Exchange... this and more in AofE  #419<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-419-the-uk-forces-digital-ids-whats-next%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-419-the-uk-forces-digital-ids-whats-next&amp;action_name=%23AxisOfEasy%20419%3A%20The%20UK%20Forces%20Digital%20ID%26%238217%3Bs%20%26%238211%3B%20What%26%238217%3Bs%20Next%3F&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-419-the-uk-forces-digital-ids-whats-next/?pk_campaign=feed&#038;pk_kwd=axisofeasy-419-the-uk-forces-digital-ids-whats-next/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 417: Nepal Goes Offline, Then Up In Flames</title>
		<link>https://axisofeasy.com/podcast/axisofeasy-417-nepal-goes-offline-then-up-in-flames/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-417-nepal-goes-offline-then-up-in-flames</link>
					<comments>https://axisofeasy.com/podcast/axisofeasy-417-nepal-goes-offline-then-up-in-flames/#respond</comments>
		
		<dc:creator><![CDATA[Joey Tweets]]></dc:creator>
		<pubDate>Fri, 12 Sep 2025 22:00:49 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[Azure]]></category>
		<category><![CDATA[bitcoin]]></category>
		<category><![CDATA[censorship]]></category>
		<category><![CDATA[Charles Hugh Smith]]></category>
		<category><![CDATA[ChatGPT]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[datasec]]></category>
		<category><![CDATA[DDoS]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[healthcare breach]]></category>
		<category><![CDATA[infosec]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Mark E. Jeftovic]]></category>
		<category><![CDATA[microsfot]]></category>
		<category><![CDATA[nepal]]></category>
		<category><![CDATA[nepalese]]></category>
		<category><![CDATA[Npm]]></category>
		<category><![CDATA[NSO Group]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[red sea]]></category>
		<category><![CDATA[Salesloft]]></category>
		<category><![CDATA[Spyware]]></category>
		<category><![CDATA[supply chain]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[Wyden]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?post_type=podcast&#038;p=32278</guid>

					<description><![CDATA[Nepal Goes Offline, Then Up in Flames<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Fpodcast%2Faxisofeasy-417-nepal-goes-offline-then-up-in-flames%2F&amp;action_name=%23AxisOfEasy%20417%3A%20Nepal%20Goes%20Offline%2C%20Then%20Up%20In%20Flames&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/podcast/axisofeasy-417-nepal-goes-offline-then-up-in-flames/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 415: PromptLock Signals The Arrival Of AI Powered Ransomware</title>
		<link>https://axisofeasy.com/podcast/axisofeasy-415-promptlock-signals-the-arrival-of-ai-powered-ransomware/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-415-promptlock-signals-the-arrival-of-ai-powered-ransomware</link>
					<comments>https://axisofeasy.com/podcast/axisofeasy-415-promptlock-signals-the-arrival-of-ai-powered-ransomware/#respond</comments>
		
		<dc:creator><![CDATA[Joey Tweets]]></dc:creator>
		<pubDate>Fri, 29 Aug 2025 22:00:46 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[bitcoin]]></category>
		<category><![CDATA[C-11]]></category>
		<category><![CDATA[C-13]]></category>
		<category><![CDATA[C-2]]></category>
		<category><![CDATA[censorship]]></category>
		<category><![CDATA[ChatGPT]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[cybersecurity news]]></category>
		<category><![CDATA[daily cybersecurity news]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data security]]></category>
		<category><![CDATA[Digital Security]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Michael Geist]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[vulnerabilities]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?post_type=podcast&#038;p=32158</guid>

					<description><![CDATA[PromptLock Signals The Arrival Of AI Powered Ransomware<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Fpodcast%2Faxisofeasy-415-promptlock-signals-the-arrival-of-ai-powered-ransomware%2F&amp;action_name=%23AxisOfEasy%20415%3A%20PromptLock%20Signals%20The%20Arrival%20Of%20AI%20Powered%20Ransomware&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/podcast/axisofeasy-415-promptlock-signals-the-arrival-of-ai-powered-ransomware/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
