<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Decentralized systems</title>
	<atom:link href="https://axisofeasy.com/tag/decentralized-systems/feed/" rel="self" type="application/rss+xml" />
	<link>https://axisofeasy.com</link>
	<description>Rapid Coverage of a World Gone Full Cyberpunk</description>
	<lastBuildDate>Thu, 24 Jul 2025 15:39:19 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://axisofeasy.com/wp-content/uploads/2018/07/cropped-easydns-big-bolt-512x512-32x32.png</url>
	<title>Decentralized systems</title>
	<link>https://axisofeasy.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>#AxisOfEasy 409: Adoption Data Breach Exposes Sensitive Records From Texas Nonprofit</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-409-adoption-data-breach-exposes-sensitive-records-from-texas-nonprofit/?pk_campaign=feed&#038;pk_kwd=axisofeasy-409-adoption-data-breach-exposes-sensitive-records-from-texas-nonprofit&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-409-adoption-data-breach-exposes-sensitive-records-from-texas-nonprofit</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-409-adoption-data-breach-exposes-sensitive-records-from-texas-nonprofit/?pk_campaign=feed&#038;pk_kwd=axisofeasy-409-adoption-data-breach-exposes-sensitive-records-from-texas-nonprofit#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 18 Jul 2025 22:00:04 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[access brokers]]></category>
		<category><![CDATA[Adoption]]></category>
		<category><![CDATA[age verification]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[AxisOfEasy]]></category>
		<category><![CDATA[bitcoin]]></category>
		<category><![CDATA[Black Basta]]></category>
		<category><![CDATA[blockchain]]></category>
		<category><![CDATA[Bluesky]]></category>
		<category><![CDATA[ByteDance]]></category>
		<category><![CDATA[C2 infrastructure]]></category>
		<category><![CDATA[Chatbot]]></category>
		<category><![CDATA[child protection]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[cloud misconfiguration]]></category>
		<category><![CDATA[CRM migration]]></category>
		<category><![CDATA[cryptocurrency]]></category>
		<category><![CDATA[customer data]]></category>
		<category><![CDATA[cyber espionage]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Cypherpunk]]></category>
		<category><![CDATA[Cypherpunk movement]]></category>
		<category><![CDATA[Dark Reading]]></category>
		<category><![CDATA[data access]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data sovereignty]]></category>
		<category><![CDATA[data storage]]></category>
		<category><![CDATA[decentralization]]></category>
		<category><![CDATA[Decentralized systems]]></category>
		<category><![CDATA[deep learning]]></category>
		<category><![CDATA[Developing Countries]]></category>
		<category><![CDATA[Digital dystopia]]></category>
		<category><![CDATA[digital economy]]></category>
		<category><![CDATA[digital identity]]></category>
		<category><![CDATA[digital resilience]]></category>
		<category><![CDATA[digital rights]]></category>
		<category><![CDATA[documentation]]></category>
		<category><![CDATA[easydns]]></category>
		<category><![CDATA[ECC]]></category>
		<category><![CDATA[emerging markets]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[Episource]]></category>
		<category><![CDATA[existential risk]]></category>
		<category><![CDATA[facial scanning]]></category>
		<category><![CDATA[financial innovation]]></category>
		<category><![CDATA[Fintech]]></category>
		<category><![CDATA[free speech]]></category>
		<category><![CDATA[GDDR6]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[GPUhammer]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[hardware security]]></category>
		<category><![CDATA[health data]]></category>
		<category><![CDATA[Healthcare]]></category>
		<category><![CDATA[HexEval]]></category>
		<category><![CDATA[in-memory execution]]></category>
		<category><![CDATA[internal tooling]]></category>
		<category><![CDATA[Internet freedom]]></category>
		<category><![CDATA[Irish DPC]]></category>
		<category><![CDATA[Kid Web Services]]></category>
		<category><![CDATA[leapfrogging]]></category>
		<category><![CDATA[LOLBin]]></category>
		<category><![CDATA[long-form content]]></category>
		<category><![CDATA[Louis Vuitton]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[malware-as-a-service]]></category>
		<category><![CDATA[Matanbuchus]]></category>
		<category><![CDATA[medical imaging]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Microsoft Teams]]></category>
		<category><![CDATA[monetary fine]]></category>
		<category><![CDATA[monetary sovereignty]]></category>
		<category><![CDATA[nonprofit]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[NVidia]]></category>
		<category><![CDATA[online identity]]></category>
		<category><![CDATA[Online Safety Act]]></category>
		<category><![CDATA[Patch Tuesday]]></category>
		<category><![CDATA[patient data]]></category>
		<category><![CDATA[payload delivery]]></category>
		<category><![CDATA[payments infrastructure]]></category>
		<category><![CDATA[Peer-to-peer networks]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[retail]]></category>
		<category><![CDATA[reverse shell]]></category>
		<category><![CDATA[Rowhammer]]></category>
		<category><![CDATA[SMA 100]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[SonicWall]]></category>
		<category><![CDATA[supply chain attack]]></category>
		<category><![CDATA[support automation]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[tech philosophy]]></category>
		<category><![CDATA[technological foresight]]></category>
		<category><![CDATA[Texas]]></category>
		<category><![CDATA[TikTok]]></category>
		<category><![CDATA[UK regulation]]></category>
		<category><![CDATA[Usenix]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<category><![CDATA[Web3]]></category>
		<category><![CDATA[XORIndex]]></category>
		<category><![CDATA[zero-day]]></category>
		<category><![CDATA[Zero-Day Exploit]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=31883</guid>

					<description><![CDATA[ Adoption Data Breach Exposes Sensitive Records from Texas Nonprofit,
Matanbuchus 3.0 Expands Stealth Tactics with Teams Lures and Advanced Loader Features,
Bluesky Implements UK Age Checks Amid Privacy Backlash Over Online Safety Law...this and more in AofE  #409<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-409-adoption-data-breach-exposes-sensitive-records-from-texas-nonprofit%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-409-adoption-data-breach-exposes-sensitive-records-from-texas-nonprofit&amp;action_name=%23AxisOfEasy%20409%3A%20Adoption%20Data%20Breach%20Exposes%20Sensitive%20Records%20From%20Texas%20Nonprofit&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-409-adoption-data-breach-exposes-sensitive-records-from-texas-nonprofit/?pk_campaign=feed&#038;pk_kwd=axisofeasy-409-adoption-data-breach-exposes-sensitive-records-from-texas-nonprofit/feed/</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
			</item>
		<item>
		<title>The Cypherpunk Prophecy: How Early Internet Visionaries Predicted Our Digital Dystopia</title>
		<link>https://axisofeasy.com/alt-ctrl-history/the-cypherpunk-prophecy-how-early-internet-visionaries-predicted-our-digital-dystopia/?pk_campaign=feed&#038;pk_kwd=the-cypherpunk-prophecy-how-early-internet-visionaries-predicted-our-digital-dystopia&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-cypherpunk-prophecy-how-early-internet-visionaries-predicted-our-digital-dystopia</link>
					<comments>https://axisofeasy.com/alt-ctrl-history/the-cypherpunk-prophecy-how-early-internet-visionaries-predicted-our-digital-dystopia/?pk_campaign=feed&#038;pk_kwd=the-cypherpunk-prophecy-how-early-internet-visionaries-predicted-our-digital-dystopia#respond</comments>
		
		<dc:creator><![CDATA[AxisofEasy Team]]></dc:creator>
		<pubDate>Mon, 07 Jul 2025 22:23:24 +0000</pubDate>
				<category><![CDATA[Alt-Ctrl History]]></category>
		<category><![CDATA[algorithmic control]]></category>
		<category><![CDATA[Algorithmic manipulation]]></category>
		<category><![CDATA[Anonymous communication]]></category>
		<category><![CDATA[Big Tech critique]]></category>
		<category><![CDATA[Blockchain philosophy]]></category>
		<category><![CDATA[Computer Lib]]></category>
		<category><![CDATA[Crypto Wars]]></category>
		<category><![CDATA[Cryptographic privacy]]></category>
		<category><![CDATA[Cryptographic resistancem]]></category>
		<category><![CDATA[Cyberpunk culture]]></category>
		<category><![CDATA[Cypherpunk movement]]></category>
		<category><![CDATA[Cypherpunk prophecy]]></category>
		<category><![CDATA[Data collection abuse]]></category>
		<category><![CDATA[Decentralized identifiers]]></category>
		<category><![CDATA[Decentralized internet]]></category>
		<category><![CDATA[Decentralized systems]]></category>
		<category><![CDATA[Design is political]]></category>
		<category><![CDATA[DIDs]]></category>
		<category><![CDATA[Digital authoritarianism]]></category>
		<category><![CDATA[Digital cash]]></category>
		<category><![CDATA[Digital dystopia]]></category>
		<category><![CDATA[Digital privacy tools]]></category>
		<category><![CDATA[Digital sovereignty]]></category>
		<category><![CDATA[Distributed architecture]]></category>
		<category><![CDATA[Early internet visionaries]]></category>
		<category><![CDATA[EFF]]></category>
		<category><![CDATA[Electronic Frontier Foundation]]></category>
		<category><![CDATA[Encryption activism]]></category>
		<category><![CDATA[End-to-End Encryption]]></category>
		<category><![CDATA[Fight for the Future]]></category>
		<category><![CDATA[Governance tokens]]></category>
		<category><![CDATA[government surveillance]]></category>
		<category><![CDATA[Hacker ethics]]></category>
		<category><![CDATA[Homelab culture]]></category>
		<category><![CDATA[Internet architecture]]></category>
		<category><![CDATA[Internet history]]></category>
		<category><![CDATA[Mass surveillance]]></category>
		<category><![CDATA[mastodon]]></category>
		<category><![CDATA[Mesh networks]]></category>
		<category><![CDATA[Nostr]]></category>
		<category><![CDATA[NYC Mesh]]></category>
		<category><![CDATA[Open systems thinking]]></category>
		<category><![CDATA[Peer-to-peer networks]]></category>
		<category><![CDATA[PGP encryption]]></category>
		<category><![CDATA[Platform censorship Surveillance capitalism]]></category>
		<category><![CDATA[Privacy by design]]></category>
		<category><![CDATA[Privacy technology]]></category>
		<category><![CDATA[Privacy-first platforms]]></category>
		<category><![CDATA[Project Xanadu]]></category>
		<category><![CDATA[Self-hosting solutions]]></category>
		<category><![CDATA[Signal app]]></category>
		<category><![CDATA[Signal Messenger]]></category>
		<category><![CDATA[smart contracts]]></category>
		<category><![CDATA[Sovereign computing]]></category>
		<category><![CDATA[surveillance capitalism]]></category>
		<category><![CDATA[surveillance state]]></category>
		<category><![CDATA[Surveillance Technology]]></category>
		<category><![CDATA[Tech prophecy]]></category>
		<category><![CDATA[Technical architecture as politics]]></category>
		<category><![CDATA[Techno-philosophy]]></category>
		<category><![CDATA[Technocratic control]]></category>
		<category><![CDATA[Ted Nelson]]></category>
		<category><![CDATA[Tor Project PGP (Pretty Good Privacy)]]></category>
		<category><![CDATA[Transclusion]]></category>
		<category><![CDATA[Web3 movement]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=31813</guid>

					<description><![CDATA[From Ted Nelson&#8217;s 1974 warnings to today&#8217;s surveillance state, the roadmap was there all along, we just chose the wrong fork. Picture this: It&#8217;s 1974, Nixon just resigned and some guy with Hollywood connections is publishing a manifesto about &#8220;computer priesthoods&#8221; that reads like he time-traveled from 2025. Ted Nelson, son of an Emmy-winning director [&#8230;]<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Falt-ctrl-history%2Fthe-cypherpunk-prophecy-how-early-internet-visionaries-predicted-our-digital-dystopia%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Dthe-cypherpunk-prophecy-how-early-internet-visionaries-predicted-our-digital-dystopia&amp;action_name=The%20Cypherpunk%20Prophecy%3A%20How%20Early%20Internet%20Visionaries%20Predicted%20Our%20Digital%20Dystopia&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/alt-ctrl-history/the-cypherpunk-prophecy-how-early-internet-visionaries-predicted-our-digital-dystopia/?pk_campaign=feed&#038;pk_kwd=the-cypherpunk-prophecy-how-early-internet-visionaries-predicted-our-digital-dystopia/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
