<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>child protection</title>
	<atom:link href="https://axisofeasy.com/tag/child-protection/feed/" rel="self" type="application/rss+xml" />
	<link>https://axisofeasy.com</link>
	<description>Rapid Coverage of a World Gone Full Cyberpunk</description>
	<lastBuildDate>Fri, 13 Feb 2026 22:21:08 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://axisofeasy.com/wp-content/uploads/2018/07/cropped-easydns-big-bolt-512x512-32x32.png</url>
	<title>child protection</title>
	<link>https://axisofeasy.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>#AxisOfEasy 437: Discord Is Asking For Your ID</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-437-discord-is-asking-for-your-id/?pk_campaign=feed&#038;pk_kwd=axisofeasy-437-discord-is-asking-for-your-id&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-437-discord-is-asking-for-your-id</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-437-discord-is-asking-for-your-id/?pk_campaign=feed&#038;pk_kwd=axisofeasy-437-discord-is-asking-for-your-id#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 13 Feb 2026 23:00:01 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[age verification]]></category>
		<category><![CDATA[algorithmic limits]]></category>
		<category><![CDATA[Android malware]]></category>
		<category><![CDATA[biometric authentication]]></category>
		<category><![CDATA[biometric data]]></category>
		<category><![CDATA[botnet activity]]></category>
		<category><![CDATA[Business Email Compromise]]></category>
		<category><![CDATA[camera surveillance]]></category>
		<category><![CDATA[child protection]]></category>
		<category><![CDATA[corporate accountability]]></category>
		<category><![CDATA[credential theft]]></category>
		<category><![CDATA[cryptocurrency theft]]></category>
		<category><![CDATA[cybercrime tactics]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[dependency auditing]]></category>
		<category><![CDATA[device fingerprinting]]></category>
		<category><![CDATA[digital identity]]></category>
		<category><![CDATA[direct deposit fraud]]></category>
		<category><![CDATA[dns hijacking]]></category>
		<category><![CDATA[employee data exposure]]></category>
		<category><![CDATA[exposed emails]]></category>
		<category><![CDATA[facial recognition]]></category>
		<category><![CDATA[FTC enforcement]]></category>
		<category><![CDATA[GPS tracking]]></category>
		<category><![CDATA[healthcare breach]]></category>
		<category><![CDATA[ID upload]]></category>
		<category><![CDATA[identity perimeter]]></category>
		<category><![CDATA[internal systems]]></category>
		<category><![CDATA[iOS spyware]]></category>
		<category><![CDATA[IRC command and control]]></category>
		<category><![CDATA[keystroke logging]]></category>
		<category><![CDATA[Kids Off Social Media Act]]></category>
		<category><![CDATA[metadata exposure]]></category>
		<category><![CDATA[MFA bypass]]></category>
		<category><![CDATA[microphone access]]></category>
		<category><![CDATA[NPM compromise]]></category>
		<category><![CDATA[online safety]]></category>
		<category><![CDATA[payroll fraud]]></category>
		<category><![CDATA[phishing campaigns]]></category>
		<category><![CDATA[phone numbers]]></category>
		<category><![CDATA[privacy backlash]]></category>
		<category><![CDATA[pseudonymity]]></category>
		<category><![CDATA[PyPI malware]]></category>
		<category><![CDATA[ransomware groups]]></category>
		<category><![CDATA[remote access trojan]]></category>
		<category><![CDATA[shared mailboxes]]></category>
		<category><![CDATA[smishing attacks]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[Social Media Regulation]]></category>
		<category><![CDATA[spyware toolkit]]></category>
		<category><![CDATA[supply chain attack]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[teen accounts]]></category>
		<category><![CDATA[trojanized apps]]></category>
		<category><![CDATA[unauthorized access]]></category>
		<category><![CDATA[vendor breach]]></category>
		<category><![CDATA[wallet seed phrases]]></category>
		<category><![CDATA[Workday compromise]]></category>
		<category><![CDATA[zero-day exploits]]></category>
		<category><![CDATA[ZeroDayRAT]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=33140</guid>

					<description><![CDATA[Discord Is Asking For Your ID. The Backlash Is About More Than Privacy,
Hackers Hijack Physician’s Paycheck in Social Engineering Payroll Scam,
Substack Confirms Data Breach Exposing User Contact Information ... this and more in AofE  #437<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-437-discord-is-asking-for-your-id%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-437-discord-is-asking-for-your-id&amp;action_name=%23AxisOfEasy%20437%3A%20Discord%20Is%20Asking%20For%20Your%20ID&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-437-discord-is-asking-for-your-id/?pk_campaign=feed&#038;pk_kwd=axisofeasy-437-discord-is-asking-for-your-id/feed/</wfw:commentRss>
			<slash:comments>7</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 409: Adoption Data Breach Exposes Sensitive Records From Texas Nonprofit</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-409-adoption-data-breach-exposes-sensitive-records-from-texas-nonprofit/?pk_campaign=feed&#038;pk_kwd=axisofeasy-409-adoption-data-breach-exposes-sensitive-records-from-texas-nonprofit&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-409-adoption-data-breach-exposes-sensitive-records-from-texas-nonprofit</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-409-adoption-data-breach-exposes-sensitive-records-from-texas-nonprofit/?pk_campaign=feed&#038;pk_kwd=axisofeasy-409-adoption-data-breach-exposes-sensitive-records-from-texas-nonprofit#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 18 Jul 2025 22:00:04 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[access brokers]]></category>
		<category><![CDATA[Adoption]]></category>
		<category><![CDATA[age verification]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[AxisOfEasy]]></category>
		<category><![CDATA[bitcoin]]></category>
		<category><![CDATA[Black Basta]]></category>
		<category><![CDATA[blockchain]]></category>
		<category><![CDATA[Bluesky]]></category>
		<category><![CDATA[ByteDance]]></category>
		<category><![CDATA[C2 infrastructure]]></category>
		<category><![CDATA[Chatbot]]></category>
		<category><![CDATA[child protection]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[cloud misconfiguration]]></category>
		<category><![CDATA[CRM migration]]></category>
		<category><![CDATA[cryptocurrency]]></category>
		<category><![CDATA[customer data]]></category>
		<category><![CDATA[cyber espionage]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Cypherpunk]]></category>
		<category><![CDATA[Cypherpunk movement]]></category>
		<category><![CDATA[Dark Reading]]></category>
		<category><![CDATA[data access]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data sovereignty]]></category>
		<category><![CDATA[data storage]]></category>
		<category><![CDATA[decentralization]]></category>
		<category><![CDATA[Decentralized systems]]></category>
		<category><![CDATA[deep learning]]></category>
		<category><![CDATA[Developing Countries]]></category>
		<category><![CDATA[Digital dystopia]]></category>
		<category><![CDATA[digital economy]]></category>
		<category><![CDATA[digital identity]]></category>
		<category><![CDATA[digital resilience]]></category>
		<category><![CDATA[digital rights]]></category>
		<category><![CDATA[documentation]]></category>
		<category><![CDATA[easydns]]></category>
		<category><![CDATA[ECC]]></category>
		<category><![CDATA[emerging markets]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[Episource]]></category>
		<category><![CDATA[existential risk]]></category>
		<category><![CDATA[facial scanning]]></category>
		<category><![CDATA[financial innovation]]></category>
		<category><![CDATA[Fintech]]></category>
		<category><![CDATA[free speech]]></category>
		<category><![CDATA[GDDR6]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[GPUhammer]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[hardware security]]></category>
		<category><![CDATA[health data]]></category>
		<category><![CDATA[Healthcare]]></category>
		<category><![CDATA[HexEval]]></category>
		<category><![CDATA[in-memory execution]]></category>
		<category><![CDATA[internal tooling]]></category>
		<category><![CDATA[Internet freedom]]></category>
		<category><![CDATA[Irish DPC]]></category>
		<category><![CDATA[Kid Web Services]]></category>
		<category><![CDATA[leapfrogging]]></category>
		<category><![CDATA[LOLBin]]></category>
		<category><![CDATA[long-form content]]></category>
		<category><![CDATA[Louis Vuitton]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[malware-as-a-service]]></category>
		<category><![CDATA[Matanbuchus]]></category>
		<category><![CDATA[medical imaging]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Microsoft Teams]]></category>
		<category><![CDATA[monetary fine]]></category>
		<category><![CDATA[monetary sovereignty]]></category>
		<category><![CDATA[nonprofit]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[NVidia]]></category>
		<category><![CDATA[online identity]]></category>
		<category><![CDATA[Online Safety Act]]></category>
		<category><![CDATA[Patch Tuesday]]></category>
		<category><![CDATA[patient data]]></category>
		<category><![CDATA[payload delivery]]></category>
		<category><![CDATA[payments infrastructure]]></category>
		<category><![CDATA[Peer-to-peer networks]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[retail]]></category>
		<category><![CDATA[reverse shell]]></category>
		<category><![CDATA[Rowhammer]]></category>
		<category><![CDATA[SMA 100]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[SonicWall]]></category>
		<category><![CDATA[supply chain attack]]></category>
		<category><![CDATA[support automation]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[tech philosophy]]></category>
		<category><![CDATA[technological foresight]]></category>
		<category><![CDATA[Texas]]></category>
		<category><![CDATA[TikTok]]></category>
		<category><![CDATA[UK regulation]]></category>
		<category><![CDATA[Usenix]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<category><![CDATA[Web3]]></category>
		<category><![CDATA[XORIndex]]></category>
		<category><![CDATA[zero-day]]></category>
		<category><![CDATA[Zero-Day Exploit]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=31883</guid>

					<description><![CDATA[ Adoption Data Breach Exposes Sensitive Records from Texas Nonprofit,
Matanbuchus 3.0 Expands Stealth Tactics with Teams Lures and Advanced Loader Features,
Bluesky Implements UK Age Checks Amid Privacy Backlash Over Online Safety Law...this and more in AofE  #409<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-409-adoption-data-breach-exposes-sensitive-records-from-texas-nonprofit%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-409-adoption-data-breach-exposes-sensitive-records-from-texas-nonprofit&amp;action_name=%23AxisOfEasy%20409%3A%20Adoption%20Data%20Breach%20Exposes%20Sensitive%20Records%20From%20Texas%20Nonprofit&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-409-adoption-data-breach-exposes-sensitive-records-from-texas-nonprofit/?pk_campaign=feed&#038;pk_kwd=axisofeasy-409-adoption-data-breach-exposes-sensitive-records-from-texas-nonprofit/feed/</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
			</item>
	</channel>
</rss>
