<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>End-to-End Encryption</title>
	<atom:link href="https://axisofeasy.com/tag/end-to-end-encryption/feed/" rel="self" type="application/rss+xml" />
	<link>https://axisofeasy.com</link>
	<description>Rapid Coverage of a World Gone Full Cyberpunk</description>
	<lastBuildDate>Fri, 20 Mar 2026 16:14:29 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://axisofeasy.com/wp-content/uploads/2018/07/cropped-easydns-big-bolt-512x512-32x32.png</url>
	<title>End-to-End Encryption</title>
	<link>https://axisofeasy.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>#AxisOfEasy 442: Canada Introduces Bill C-22 For Mandatory Metadata Retention</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-442-canada-introduces-bill-c-22-for-mandatory-metadata-retention/?pk_campaign=feed&#038;pk_kwd=axisofeasy-442-canada-introduces-bill-c-22-for-mandatory-metadata-retention&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-442-canada-introduces-bill-c-22-for-mandatory-metadata-retention</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-442-canada-introduces-bill-c-22-for-mandatory-metadata-retention/?pk_campaign=feed&#038;pk_kwd=axisofeasy-442-canada-introduces-bill-c-22-for-mandatory-metadata-retention#respond</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 20 Mar 2026 22:00:54 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[AI music]]></category>
		<category><![CDATA[Anthropic]]></category>
		<category><![CDATA[automation]]></category>
		<category><![CDATA[Bill C-22]]></category>
		<category><![CDATA[C2 framework]]></category>
		<category><![CDATA[Canada]]></category>
		<category><![CDATA[ChatGPT]]></category>
		<category><![CDATA[Cisco]]></category>
		<category><![CDATA[Claude AI]]></category>
		<category><![CDATA[credential theft]]></category>
		<category><![CDATA[Crypto Wallets]]></category>
		<category><![CDATA[CSIS]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[DarkSword]]></category>
		<category><![CDATA[data brokers]]></category>
		<category><![CDATA[data exfiltration]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[End-to-End Encryption]]></category>
		<category><![CDATA[espionage]]></category>
		<category><![CDATA[evasion]]></category>
		<category><![CDATA[exploit kit]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[Fourth Amendment]]></category>
		<category><![CDATA[geolocation tracking]]></category>
		<category><![CDATA[GitHub]]></category>
		<category><![CDATA[Glassworm]]></category>
		<category><![CDATA[government surveillance]]></category>
		<category><![CDATA[Handala hackers]]></category>
		<category><![CDATA[Instagram]]></category>
		<category><![CDATA[Interlock]]></category>
		<category><![CDATA[iOS vulnerabilities]]></category>
		<category><![CDATA[Lawful Access]]></category>
		<category><![CDATA[Linux security]]></category>
		<category><![CDATA[location data]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[meta]]></category>
		<category><![CDATA[metadata retention]]></category>
		<category><![CDATA[Npm]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[privilege escalation]]></category>
		<category><![CDATA[prompt injection]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[RCMP]]></category>
		<category><![CDATA[real estate]]></category>
		<category><![CDATA[root access]]></category>
		<category><![CDATA[snapd]]></category>
		<category><![CDATA[SnappyClient]]></category>
		<category><![CDATA[Social Media]]></category>
		<category><![CDATA[stolen credentials]]></category>
		<category><![CDATA[Stryker breach]]></category>
		<category><![CDATA[supply chain attack]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[systemd]]></category>
		<category><![CDATA[telecom]]></category>
		<category><![CDATA[Ubuntu]]></category>
		<category><![CDATA[Unicode obfuscation]]></category>
		<category><![CDATA[virtual band]]></category>
		<category><![CDATA[warrants]]></category>
		<category><![CDATA[zero-day]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=33472</guid>

					<description><![CDATA[Canada Introduces Bill C-22 For Mandatory Metadata Retention
Meta is Ending Instagram Direct Message End-to-End Encryption
Invisible Unicode Supply-Chain Attack Hits GitHub Ecosystem... this and more in AofE  #442<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-442-canada-introduces-bill-c-22-for-mandatory-metadata-retention%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-442-canada-introduces-bill-c-22-for-mandatory-metadata-retention&amp;action_name=%23AxisOfEasy%20442%3A%20Canada%20Introduces%20Bill%20C-22%20For%20Mandatory%20Metadata%20Retention&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-442-canada-introduces-bill-c-22-for-mandatory-metadata-retention/?pk_campaign=feed&#038;pk_kwd=axisofeasy-442-canada-introduces-bill-c-22-for-mandatory-metadata-retention/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The Prophet of Hypertext: Ted Nelson&#8217;s War Against the Digital Priesthood</title>
		<link>https://axisofeasy.com/cybersecurity/the-prophet-of-hypertext-ted-nelsons-war-against-the-digital-priesthood/?pk_campaign=feed&#038;pk_kwd=the-prophet-of-hypertext-ted-nelsons-war-against-the-digital-priesthood&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-prophet-of-hypertext-ted-nelsons-war-against-the-digital-priesthood</link>
					<comments>https://axisofeasy.com/cybersecurity/the-prophet-of-hypertext-ted-nelsons-war-against-the-digital-priesthood/?pk_campaign=feed&#038;pk_kwd=the-prophet-of-hypertext-ted-nelsons-war-against-the-digital-priesthood#respond</comments>
		
		<dc:creator><![CDATA[AxisofEasy Team]]></dc:creator>
		<pubDate>Fri, 25 Jul 2025 00:41:58 +0000</pubDate>
				<category><![CDATA[Alt-Ctrl History]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[FreedomTech]]></category>
		<category><![CDATA[FreeSpeech]]></category>
		<category><![CDATA[Big Tech]]></category>
		<category><![CDATA[Blockchain philosophy]]></category>
		<category><![CDATA[Computer Lib]]></category>
		<category><![CDATA[Crypto Rebellion]]></category>
		<category><![CDATA[Cypherpunks]]></category>
		<category><![CDATA[decentralized]]></category>
		<category><![CDATA[Decentralized internet]]></category>
		<category><![CDATA[Digital Age]]></category>
		<category><![CDATA[Digital dystopia]]></category>
		<category><![CDATA[Digital Priesthood]]></category>
		<category><![CDATA[Digital sovereignty]]></category>
		<category><![CDATA[Early Warnings]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[End-to-End Encryption]]></category>
		<category><![CDATA[Hypertext]]></category>
		<category><![CDATA[Hypertext History]]></category>
		<category><![CDATA[Information Freedom]]></category>
		<category><![CDATA[Internet]]></category>
		<category><![CDATA[Internet Pioneers]]></category>
		<category><![CDATA[Platform Monopolies]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Project Xanadu]]></category>
		<category><![CDATA[Sovereignty]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[tech philosophy]]></category>
		<category><![CDATA[Ted Nelson]]></category>
		<category><![CDATA[Transclusion]]></category>
		<category><![CDATA[Web3]]></category>
		<category><![CDATA[Web3 Decentralization]]></category>
		<category><![CDATA[Xanadu]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=31940</guid>

					<description><![CDATA[The Prophet of Hypertext: Ted Nelson&#8217;s War Against the Digital Priesthood &#160; How a Hollywood insider&#8217;s son called out Big Tech&#8217;s power grab fifty years before it happened and why his warnings hit different when you&#8217;re living in the dystopia &#160; It&#8217;s 1974. Nixon just rage-quit the presidency, everyone&#8217;s wearing bell-bottoms and some guy with [&#8230;]<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Fcybersecurity%2Fthe-prophet-of-hypertext-ted-nelsons-war-against-the-digital-priesthood%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Dthe-prophet-of-hypertext-ted-nelsons-war-against-the-digital-priesthood&amp;action_name=The%20Prophet%20of%20Hypertext%3A%20Ted%20Nelson%26%238217%3Bs%20War%20Against%20the%20Digital%20Priesthood&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/cybersecurity/the-prophet-of-hypertext-ted-nelsons-war-against-the-digital-priesthood/?pk_campaign=feed&#038;pk_kwd=the-prophet-of-hypertext-ted-nelsons-war-against-the-digital-priesthood/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The Cypherpunk Prophecy: How Early Internet Visionaries Predicted Our Digital Dystopia</title>
		<link>https://axisofeasy.com/alt-ctrl-history/the-cypherpunk-prophecy-how-early-internet-visionaries-predicted-our-digital-dystopia/?pk_campaign=feed&#038;pk_kwd=the-cypherpunk-prophecy-how-early-internet-visionaries-predicted-our-digital-dystopia&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-cypherpunk-prophecy-how-early-internet-visionaries-predicted-our-digital-dystopia</link>
					<comments>https://axisofeasy.com/alt-ctrl-history/the-cypherpunk-prophecy-how-early-internet-visionaries-predicted-our-digital-dystopia/?pk_campaign=feed&#038;pk_kwd=the-cypherpunk-prophecy-how-early-internet-visionaries-predicted-our-digital-dystopia#respond</comments>
		
		<dc:creator><![CDATA[AxisofEasy Team]]></dc:creator>
		<pubDate>Mon, 07 Jul 2025 22:23:24 +0000</pubDate>
				<category><![CDATA[Alt-Ctrl History]]></category>
		<category><![CDATA[algorithmic control]]></category>
		<category><![CDATA[Algorithmic manipulation]]></category>
		<category><![CDATA[Anonymous communication]]></category>
		<category><![CDATA[Big Tech critique]]></category>
		<category><![CDATA[Blockchain philosophy]]></category>
		<category><![CDATA[Computer Lib]]></category>
		<category><![CDATA[Crypto Wars]]></category>
		<category><![CDATA[Cryptographic privacy]]></category>
		<category><![CDATA[Cryptographic resistancem]]></category>
		<category><![CDATA[Cyberpunk culture]]></category>
		<category><![CDATA[Cypherpunk movement]]></category>
		<category><![CDATA[Cypherpunk prophecy]]></category>
		<category><![CDATA[Data collection abuse]]></category>
		<category><![CDATA[Decentralized identifiers]]></category>
		<category><![CDATA[Decentralized internet]]></category>
		<category><![CDATA[Decentralized systems]]></category>
		<category><![CDATA[Design is political]]></category>
		<category><![CDATA[DIDs]]></category>
		<category><![CDATA[Digital authoritarianism]]></category>
		<category><![CDATA[Digital cash]]></category>
		<category><![CDATA[Digital dystopia]]></category>
		<category><![CDATA[Digital privacy tools]]></category>
		<category><![CDATA[Digital sovereignty]]></category>
		<category><![CDATA[Distributed architecture]]></category>
		<category><![CDATA[Early internet visionaries]]></category>
		<category><![CDATA[EFF]]></category>
		<category><![CDATA[Electronic Frontier Foundation]]></category>
		<category><![CDATA[Encryption activism]]></category>
		<category><![CDATA[End-to-End Encryption]]></category>
		<category><![CDATA[Fight for the Future]]></category>
		<category><![CDATA[Governance tokens]]></category>
		<category><![CDATA[government surveillance]]></category>
		<category><![CDATA[Hacker ethics]]></category>
		<category><![CDATA[Homelab culture]]></category>
		<category><![CDATA[Internet architecture]]></category>
		<category><![CDATA[Internet history]]></category>
		<category><![CDATA[Mass surveillance]]></category>
		<category><![CDATA[mastodon]]></category>
		<category><![CDATA[Mesh networks]]></category>
		<category><![CDATA[Nostr]]></category>
		<category><![CDATA[NYC Mesh]]></category>
		<category><![CDATA[Open systems thinking]]></category>
		<category><![CDATA[Peer-to-peer networks]]></category>
		<category><![CDATA[PGP encryption]]></category>
		<category><![CDATA[Platform censorship Surveillance capitalism]]></category>
		<category><![CDATA[Privacy by design]]></category>
		<category><![CDATA[Privacy technology]]></category>
		<category><![CDATA[Privacy-first platforms]]></category>
		<category><![CDATA[Project Xanadu]]></category>
		<category><![CDATA[Self-hosting solutions]]></category>
		<category><![CDATA[Signal app]]></category>
		<category><![CDATA[Signal Messenger]]></category>
		<category><![CDATA[smart contracts]]></category>
		<category><![CDATA[Sovereign computing]]></category>
		<category><![CDATA[surveillance capitalism]]></category>
		<category><![CDATA[surveillance state]]></category>
		<category><![CDATA[Surveillance Technology]]></category>
		<category><![CDATA[Tech prophecy]]></category>
		<category><![CDATA[Technical architecture as politics]]></category>
		<category><![CDATA[Techno-philosophy]]></category>
		<category><![CDATA[Technocratic control]]></category>
		<category><![CDATA[Ted Nelson]]></category>
		<category><![CDATA[Tor Project PGP (Pretty Good Privacy)]]></category>
		<category><![CDATA[Transclusion]]></category>
		<category><![CDATA[Web3 movement]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=31813</guid>

					<description><![CDATA[From Ted Nelson&#8217;s 1974 warnings to today&#8217;s surveillance state, the roadmap was there all along, we just chose the wrong fork. Picture this: It&#8217;s 1974, Nixon just resigned and some guy with Hollywood connections is publishing a manifesto about &#8220;computer priesthoods&#8221; that reads like he time-traveled from 2025. Ted Nelson, son of an Emmy-winning director [&#8230;]<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Falt-ctrl-history%2Fthe-cypherpunk-prophecy-how-early-internet-visionaries-predicted-our-digital-dystopia%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Dthe-cypherpunk-prophecy-how-early-internet-visionaries-predicted-our-digital-dystopia&amp;action_name=The%20Cypherpunk%20Prophecy%3A%20How%20Early%20Internet%20Visionaries%20Predicted%20Our%20Digital%20Dystopia&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/alt-ctrl-history/the-cypherpunk-prophecy-how-early-internet-visionaries-predicted-our-digital-dystopia/?pk_campaign=feed&#038;pk_kwd=the-cypherpunk-prophecy-how-early-internet-visionaries-predicted-our-digital-dystopia/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 405: Senate Bill Could Kill Private Messaging And Put Your Privacy At Risk</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-405-senate-bill-could-kill-private-messaging-and-put-your-privacy-at-risk/?pk_campaign=feed&#038;pk_kwd=axisofeasy-405-senate-bill-could-kill-private-messaging-and-put-your-privacy-at-risk&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-405-senate-bill-could-kill-private-messaging-and-put-your-privacy-at-risk</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-405-senate-bill-could-kill-private-messaging-and-put-your-privacy-at-risk/?pk_campaign=feed&#038;pk_kwd=axisofeasy-405-senate-bill-could-kill-private-messaging-and-put-your-privacy-at-risk#respond</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 20 Jun 2025 22:00:22 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[algorithmic control]]></category>
		<category><![CDATA[Bill C-4]]></category>
		<category><![CDATA[CBDCs]]></category>
		<category><![CDATA[Child Exploitation]]></category>
		<category><![CDATA[Cloud Services]]></category>
		<category><![CDATA[CRTC]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data protection]]></category>
		<category><![CDATA[digital rights]]></category>
		<category><![CDATA[Disinformation]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[End-to-End Encryption]]></category>
		<category><![CDATA[federal privacy law]]></category>
		<category><![CDATA[Google Threat Intelligence]]></category>
		<category><![CDATA[government regulation]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[identity theft]]></category>
		<category><![CDATA[insider threat]]></category>
		<category><![CDATA[Law Enforcement]]></category>
		<category><![CDATA[legal liability]]></category>
		<category><![CDATA[Linux vulnerabilities]]></category>
		<category><![CDATA[messaging apps]]></category>
		<category><![CDATA[Metadata]]></category>
		<category><![CDATA[MFA bypass]]></category>
		<category><![CDATA[personal data]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[PIPEDA]]></category>
		<category><![CDATA[policy rollback]]></category>
		<category><![CDATA[political parties]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[scams]]></category>
		<category><![CDATA[Scattered Spider]]></category>
		<category><![CDATA[Section 230]]></category>
		<category><![CDATA[SMS spam]]></category>
		<category><![CDATA[social credit]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[spam]]></category>
		<category><![CDATA[STOP CSAM Act]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[transparency]]></category>
		<category><![CDATA[WormGPT]]></category>
		<category><![CDATA[Zoomcar]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=31714</guid>

					<description><![CDATA[Senate Bill Could Kill Private Messaging and Put Your Privacy at Risk,
Trump Just Gutted Major Cybersecurity Rules and Experts Are Sounding the Alarm,
Hackers Are Now Tricking IT Teams at Big Insurance Firms and Google Is Warning Everyone...this and more in AofE  #405<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-405-senate-bill-could-kill-private-messaging-and-put-your-privacy-at-risk%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-405-senate-bill-could-kill-private-messaging-and-put-your-privacy-at-risk&amp;action_name=%23AxisOfEasy%20405%3A%20Senate%20Bill%20Could%20Kill%20Private%20Messaging%20And%20Put%20Your%20Privacy%20At%20Risk&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-405-senate-bill-could-kill-private-messaging-and-put-your-privacy-at-risk/?pk_campaign=feed&#038;pk_kwd=axisofeasy-405-senate-bill-could-kill-private-messaging-and-put-your-privacy-at-risk/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 400: North Korean Hackers Infiltrate U.S. Tech Jobs With Fake Identities And Remote Access</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-400north-korean-hackers-infiltrate-u-s-tech-jobs-with-fake-identities-and-remote-access/?pk_campaign=feed&#038;pk_kwd=axisofeasy-400north-korean-hackers-infiltrate-u-s-tech-jobs-with-fake-identities-and-remote-access&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-400north-korean-hackers-infiltrate-u-s-tech-jobs-with-fake-identities-and-remote-access</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-400north-korean-hackers-infiltrate-u-s-tech-jobs-with-fake-identities-and-remote-access/?pk_campaign=feed&#038;pk_kwd=axisofeasy-400north-korean-hackers-infiltrate-u-s-tech-jobs-with-fake-identities-and-remote-access#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 16 May 2025 22:00:57 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[account compromise]]></category>
		<category><![CDATA[Albania]]></category>
		<category><![CDATA[AnyDesk]]></category>
		<category><![CDATA[Baby Box Info]]></category>
		<category><![CDATA[Belgium]]></category>
		<category><![CDATA[birthdate]]></category>
		<category><![CDATA[breach detection]]></category>
		<category><![CDATA[breach monetization]]></category>
		<category><![CDATA[call centers]]></category>
		<category><![CDATA[Co-Op]]></category>
		<category><![CDATA[compromised credentials]]></category>
		<category><![CDATA[coordinated raids]]></category>
		<category><![CDATA[crypto scams]]></category>
		<category><![CDATA[Cubix Tech US]]></category>
		<category><![CDATA[Customer Data Breach]]></category>
		<category><![CDATA[cyber fraud]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[cybercrime ring]]></category>
		<category><![CDATA[cybercrime statistics]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[cybersecurity response]]></category>
		<category><![CDATA[Cyprus]]></category>
		<category><![CDATA[Dark Web]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[decryption mandate]]></category>
		<category><![CDATA[digital rights]]></category>
		<category><![CDATA[Digital Safety]]></category>
		<category><![CDATA[DOJ indictment]]></category>
		<category><![CDATA[DPRK]]></category>
		<category><![CDATA[DragonForce]]></category>
		<category><![CDATA[Dubai]]></category>
		<category><![CDATA[Electronic Frontier Foundation]]></category>
		<category><![CDATA[electronic seizures]]></category>
		<category><![CDATA[electronics shipping]]></category>
		<category><![CDATA[encryption backdoor]]></category>
		<category><![CDATA[encryption debate]]></category>
		<category><![CDATA[End-to-End Encryption]]></category>
		<category><![CDATA[English-Korean]]></category>
		<category><![CDATA[Eurojust]]></category>
		<category><![CDATA[Europol]]></category>
		<category><![CDATA[fake identities]]></category>
		<category><![CDATA[fake investment schemes]]></category>
		<category><![CDATA[fake resumes]]></category>
		<category><![CDATA[FBI report]]></category>
		<category><![CDATA[financial fraud]]></category>
		<category><![CDATA[Flashpoint]]></category>
		<category><![CDATA[Florida bill]]></category>
		<category><![CDATA[fraud prosecution]]></category>
		<category><![CDATA[fraudulent employment]]></category>
		<category><![CDATA[Germany]]></category>
		<category><![CDATA[Google Translate]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Harrods]]></category>
		<category><![CDATA[Helix US]]></category>
		<category><![CDATA[home address]]></category>
		<category><![CDATA[HR verification scripts]]></category>
		<category><![CDATA[identity theft]]></category>
		<category><![CDATA[incident disclosure]]></category>
		<category><![CDATA[infostealer logs]]></category>
		<category><![CDATA[internal hierarchy]]></category>
		<category><![CDATA[international operation]]></category>
		<category><![CDATA[investment fraud]]></category>
		<category><![CDATA[Israel]]></category>
		<category><![CDATA[job references]]></category>
		<category><![CDATA[jsilver617]]></category>
		<category><![CDATA[judicial oversight]]></category>
		<category><![CDATA[Lahore Pakistan]]></category>
		<category><![CDATA[Latvia]]></category>
		<category><![CDATA[law enforcement access]]></category>
		<category><![CDATA[legislative overreach]]></category>
		<category><![CDATA[London Stock Exchange update]]></category>
		<category><![CDATA[M&S]]></category>
		<category><![CDATA[Marks and Spencer]]></category>
		<category><![CDATA[minors online safety]]></category>
		<category><![CDATA[NCSC]]></category>
		<category><![CDATA[Nickel Tapestry]]></category>
		<category><![CDATA[NIgeria]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[online gaming]]></category>
		<category><![CDATA[online orders]]></category>
		<category><![CDATA[online privacy]]></category>
		<category><![CDATA[online shopping]]></category>
		<category><![CDATA[OTP codes]]></category>
		<category><![CDATA[password change]]></category>
		<category><![CDATA[password manager]]></category>
		<category><![CDATA[password reset]]></category>
		<category><![CDATA[password theft]]></category>
		<category><![CDATA[personal data]]></category>
		<category><![CDATA[phishing risk]]></category>
		<category><![CDATA[phishing risks]]></category>
		<category><![CDATA[phone number]]></category>
		<category><![CDATA[phone numbers]]></category>
		<category><![CDATA[pig butchering scam]]></category>
		<category><![CDATA[platform security]]></category>
		<category><![CDATA[platform vulnerability]]></category>
		<category><![CDATA[privacy rights]]></category>
		<category><![CDATA[professionalized hacking]]></category>
		<category><![CDATA[profit dashboard]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[ransomware-as-a-service]]></category>
		<category><![CDATA[remote access]]></category>
		<category><![CDATA[retail cybersecurity]]></category>
		<category><![CDATA[scam brokers]]></category>
		<category><![CDATA[Social Media]]></category>
		<category><![CDATA[Steam]]></category>
		<category><![CDATA[stolen identities]]></category>
		<category><![CDATA[subpoena access]]></category>
		<category><![CDATA[surveillance tools]]></category>
		<category><![CDATA[tech legislation]]></category>
		<category><![CDATA[Two-Factor Authentication]]></category>
		<category><![CDATA[U.S. infrastructure infiltration]]></category>
		<category><![CDATA[U.S. tech jobs]]></category>
		<category><![CDATA[UK retailers]]></category>
		<category><![CDATA[user accounts]]></category>
		<category><![CDATA[user privacy]]></category>
		<category><![CDATA[Valve]]></category>
		<category><![CDATA[victim grooming]]></category>
		<category><![CDATA[webcam avoidance]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=31552</guid>

					<description><![CDATA[North Korean Hackers Infiltrate U.S. Tech Jobs with Fake Identities and Remote Access,
Steam Breach Exposes 89 Million Accounts in Dark Web Data Sale, 
Marks and Spencer Cyberattack Exposes Customer Data and Halts Online Orders (update from AoE #397)... this and more in AofE  #400<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-400north-korean-hackers-infiltrate-u-s-tech-jobs-with-fake-identities-and-remote-access%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-400north-korean-hackers-infiltrate-u-s-tech-jobs-with-fake-identities-and-remote-access&amp;action_name=%23AxisOfEasy%20400%3A%20North%20Korean%20Hackers%20Infiltrate%20U.S.%20Tech%20Jobs%20With%20Fake%20Identities%20And%20Remote%20Access&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-400north-korean-hackers-infiltrate-u-s-tech-jobs-with-fake-identities-and-remote-access/?pk_campaign=feed&#038;pk_kwd=axisofeasy-400north-korean-hackers-infiltrate-u-s-tech-jobs-with-fake-identities-and-remote-access/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 394: Famed Cryptographer Vanishes Amid FBI Raids And University Scrubbing</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-394-famed-cryptographer-vanishes-amid-fbi-raids-and-university-scrubbing/?pk_campaign=feed&#038;pk_kwd=axisofeasy-394-famed-cryptographer-vanishes-amid-fbi-raids-and-university-scrubbing&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-394-famed-cryptographer-vanishes-amid-fbi-raids-and-university-scrubbing</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-394-famed-cryptographer-vanishes-amid-fbi-raids-and-university-scrubbing/?pk_campaign=feed&#038;pk_kwd=axisofeasy-394-famed-cryptographer-vanishes-amid-fbi-raids-and-university-scrubbing#respond</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 04 Apr 2025 22:00:46 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[.NET MAUI malware]]></category>
		<category><![CDATA[23andMe]]></category>
		<category><![CDATA[AI-enhanced cyberattacks]]></category>
		<category><![CDATA[Android malware]]></category>
		<category><![CDATA[Anubis backdoor]]></category>
		<category><![CDATA[authoritarianism]]></category>
		<category><![CDATA[Bloomington Indiana]]></category>
		<category><![CDATA[Breach Forum]]></category>
		<category><![CDATA[Carmel Indiana]]></category>
		<category><![CDATA[client-side encryption]]></category>
		<category><![CDATA[court-authorized search]]></category>
		<category><![CDATA[credential leak]]></category>
		<category><![CDATA[cryptography]]></category>
		<category><![CDATA[customer PII]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data deletion]]></category>
		<category><![CDATA[data loss prevention]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[End-to-End Encryption]]></category>
		<category><![CDATA[FBI raid]]></category>
		<category><![CDATA[federal investigation]]></category>
		<category><![CDATA[FIN7]]></category>
		<category><![CDATA[genetic data]]></category>
		<category><![CDATA[genomic security]]></category>
		<category><![CDATA[GHNA]]></category>
		<category><![CDATA[Gmail encryption]]></category>
		<category><![CDATA[Google Workspace]]></category>
		<category><![CDATA[Hudson Rock]]></category>
		<category><![CDATA[Indiana University]]></category>
		<category><![CDATA[Law Enforcement]]></category>
		<category><![CDATA[Mailchimp]]></category>
		<category><![CDATA[Mimecast]]></category>
		<category><![CDATA[missing academic]]></category>
		<category><![CDATA[Nianli Ma]]></category>
		<category><![CDATA[openSNP]]></category>
		<category><![CDATA[Oracle Cloud]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Proofpoint]]></category>
		<category><![CDATA[Racoon infostealer]]></category>
		<category><![CDATA[Royal Mail]]></category>
		<category><![CDATA[S/MIME]]></category>
		<category><![CDATA[Samsung Germany]]></category>
		<category><![CDATA[SharePoint compromise]]></category>
		<category><![CDATA[Spectos]]></category>
		<category><![CDATA[Spectos GmbH]]></category>
		<category><![CDATA[SQL database]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[tenured professor]]></category>
		<category><![CDATA[TikTok]]></category>
		<category><![CDATA[university scrubbing]]></category>
		<category><![CDATA[vendor compromise]]></category>
		<category><![CDATA[Virtru]]></category>
		<category><![CDATA[Xiaofeng Wang]]></category>
		<category><![CDATA[Zoom leak]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=31349</guid>

					<description><![CDATA[Famed Cryptographer Vanishes Amid FBI Raids and University Scrubbing,
Royal Mail Breach Exposes 144GB of Data via Suspected Vendor Compromise,
OpenSNP Shuts Down Amid Privacy Fears and Political Shifts... this and more in AofE  #394<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-394-famed-cryptographer-vanishes-amid-fbi-raids-and-university-scrubbing%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-394-famed-cryptographer-vanishes-amid-fbi-raids-and-university-scrubbing&amp;action_name=%23AxisOfEasy%20394%3A%20Famed%20Cryptographer%20Vanishes%20Amid%20FBI%20Raids%20And%20University%20Scrubbing&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-394-famed-cryptographer-vanishes-amid-fbi-raids-and-university-scrubbing/?pk_campaign=feed&#038;pk_kwd=axisofeasy-394-famed-cryptographer-vanishes-amid-fbi-raids-and-university-scrubbing/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 379: China Hacks US Telecom Giants In Massive Espionage Operation</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-379-china-hacks-us-telecom-giants-in-massive-espionage-operation/?pk_campaign=feed&#038;pk_kwd=axisofeasy-379-china-hacks-us-telecom-giants-in-massive-espionage-operation&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-379-china-hacks-us-telecom-giants-in-massive-espionage-operation</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-379-china-hacks-us-telecom-giants-in-massive-espionage-operation/?pk_campaign=feed&#038;pk_kwd=axisofeasy-379-china-hacks-us-telecom-giants-in-massive-espionage-operation#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 06 Dec 2024 23:00:36 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[ASIC]]></category>
		<category><![CDATA[AT&T]]></category>
		<category><![CDATA[Bluesky]]></category>
		<category><![CDATA[breach]]></category>
		<category><![CDATA[CALEA]]></category>
		<category><![CDATA[Campaign]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[CISA]]></category>
		<category><![CDATA[Computational Power]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[cyberattacks]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[Cybercriminals]]></category>
		<category><![CDATA[cyberespionage]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Digital Services Act]]></category>
		<category><![CDATA[dns]]></category>
		<category><![CDATA[Elon Musk]]></category>
		<category><![CDATA[Encrypted Apps]]></category>
		<category><![CDATA[Encrypted Platforms]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[End-to-End Encryption]]></category>
		<category><![CDATA[espionage]]></category>
		<category><![CDATA[EU]]></category>
		<category><![CDATA[Europol]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[Future Ventures]]></category>
		<category><![CDATA[GPU]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[Hacks]]></category>
		<category><![CDATA[Infrastructure]]></category>
		<category><![CDATA[innovation]]></category>
		<category><![CDATA[Intel]]></category>
		<category><![CDATA[Intelligence]]></category>
		<category><![CDATA[Jeff Greene]]></category>
		<category><![CDATA[Law Enforcement]]></category>
		<category><![CDATA[Lumen Technologies]]></category>
		<category><![CDATA[Matrix]]></category>
		<category><![CDATA[Metadata]]></category>
		<category><![CDATA[Moore’s Law]]></category>
		<category><![CDATA[multi-factor authentication]]></category>
		<category><![CDATA[NVidia]]></category>
		<category><![CDATA[Operation]]></category>
		<category><![CDATA[Pegasus]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Regulatory Compliance]]></category>
		<category><![CDATA[Salt Typhoon]]></category>
		<category><![CDATA[Senator Ron Wyden]]></category>
		<category><![CDATA[signal]]></category>
		<category><![CDATA[Spyware]]></category>
		<category><![CDATA[Stephen Jurvetson]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[Tech Regulation]]></category>
		<category><![CDATA[technology]]></category>
		<category><![CDATA[telecom]]></category>
		<category><![CDATA[US]]></category>
		<category><![CDATA[Verizon]]></category>
		<category><![CDATA[VLOP]]></category>
		<category><![CDATA[Washington D.C.]]></category>
		<category><![CDATA[WhatsApp]]></category>
		<category><![CDATA[X]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=30703</guid>

					<description><![CDATA[China Hacks US Telecom Giants in Massive Espionage Operation,
Bluesky Gains Traction Amid Political Shifts,
Matrix Exposed in Europol’s Operation Against Encrypted Platforms ... this and more in AofE  #379<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-379-china-hacks-us-telecom-giants-in-massive-espionage-operation%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-379-china-hacks-us-telecom-giants-in-massive-espionage-operation&amp;action_name=%23AxisOfEasy%20379%3A%20China%20Hacks%20US%20Telecom%20Giants%20In%20Massive%20Espionage%20Operation&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-379-china-hacks-us-telecom-giants-in-massive-espionage-operation/?pk_campaign=feed&#038;pk_kwd=axisofeasy-379-china-hacks-us-telecom-giants-in-massive-espionage-operation/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
	</channel>
</rss>
