<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>government surveillance</title>
	<atom:link href="https://axisofeasy.com/tag/government-surveillance/feed/" rel="self" type="application/rss+xml" />
	<link>https://axisofeasy.com</link>
	<description>Rapid Coverage of a World Gone Full Cyberpunk</description>
	<lastBuildDate>Fri, 20 Mar 2026 16:14:29 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://axisofeasy.com/wp-content/uploads/2018/07/cropped-easydns-big-bolt-512x512-32x32.png</url>
	<title>government surveillance</title>
	<link>https://axisofeasy.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>#AxisOfEasy 442: Canada Introduces Bill C-22 For Mandatory Metadata Retention</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-442-canada-introduces-bill-c-22-for-mandatory-metadata-retention/?pk_campaign=feed&#038;pk_kwd=axisofeasy-442-canada-introduces-bill-c-22-for-mandatory-metadata-retention&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-442-canada-introduces-bill-c-22-for-mandatory-metadata-retention</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-442-canada-introduces-bill-c-22-for-mandatory-metadata-retention/?pk_campaign=feed&#038;pk_kwd=axisofeasy-442-canada-introduces-bill-c-22-for-mandatory-metadata-retention#respond</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 20 Mar 2026 22:00:54 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[AI music]]></category>
		<category><![CDATA[Anthropic]]></category>
		<category><![CDATA[automation]]></category>
		<category><![CDATA[Bill C-22]]></category>
		<category><![CDATA[C2 framework]]></category>
		<category><![CDATA[Canada]]></category>
		<category><![CDATA[ChatGPT]]></category>
		<category><![CDATA[Cisco]]></category>
		<category><![CDATA[Claude AI]]></category>
		<category><![CDATA[credential theft]]></category>
		<category><![CDATA[Crypto Wallets]]></category>
		<category><![CDATA[CSIS]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[DarkSword]]></category>
		<category><![CDATA[data brokers]]></category>
		<category><![CDATA[data exfiltration]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[End-to-End Encryption]]></category>
		<category><![CDATA[espionage]]></category>
		<category><![CDATA[evasion]]></category>
		<category><![CDATA[exploit kit]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[Fourth Amendment]]></category>
		<category><![CDATA[geolocation tracking]]></category>
		<category><![CDATA[GitHub]]></category>
		<category><![CDATA[Glassworm]]></category>
		<category><![CDATA[government surveillance]]></category>
		<category><![CDATA[Handala hackers]]></category>
		<category><![CDATA[Instagram]]></category>
		<category><![CDATA[Interlock]]></category>
		<category><![CDATA[iOS vulnerabilities]]></category>
		<category><![CDATA[Lawful Access]]></category>
		<category><![CDATA[Linux security]]></category>
		<category><![CDATA[location data]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[meta]]></category>
		<category><![CDATA[metadata retention]]></category>
		<category><![CDATA[Npm]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[privilege escalation]]></category>
		<category><![CDATA[prompt injection]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[RCMP]]></category>
		<category><![CDATA[real estate]]></category>
		<category><![CDATA[root access]]></category>
		<category><![CDATA[snapd]]></category>
		<category><![CDATA[SnappyClient]]></category>
		<category><![CDATA[Social Media]]></category>
		<category><![CDATA[stolen credentials]]></category>
		<category><![CDATA[Stryker breach]]></category>
		<category><![CDATA[supply chain attack]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[systemd]]></category>
		<category><![CDATA[telecom]]></category>
		<category><![CDATA[Ubuntu]]></category>
		<category><![CDATA[Unicode obfuscation]]></category>
		<category><![CDATA[virtual band]]></category>
		<category><![CDATA[warrants]]></category>
		<category><![CDATA[zero-day]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=33472</guid>

					<description><![CDATA[Canada Introduces Bill C-22 For Mandatory Metadata Retention
Meta is Ending Instagram Direct Message End-to-End Encryption
Invisible Unicode Supply-Chain Attack Hits GitHub Ecosystem... this and more in AofE  #442<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-442-canada-introduces-bill-c-22-for-mandatory-metadata-retention%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-442-canada-introduces-bill-c-22-for-mandatory-metadata-retention&amp;action_name=%23AxisOfEasy%20442%3A%20Canada%20Introduces%20Bill%20C-22%20For%20Mandatory%20Metadata%20Retention&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-442-canada-introduces-bill-c-22-for-mandatory-metadata-retention/?pk_campaign=feed&#038;pk_kwd=axisofeasy-442-canada-introduces-bill-c-22-for-mandatory-metadata-retention/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 435: FBI Accesses Microsoft BitLocker Keys In Guam Fraud Case</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-435-fbi-accesses-microsoft-bitlocker-keys-in-guam-fraud-case/?pk_campaign=feed&#038;pk_kwd=axisofeasy-435-fbi-accesses-microsoft-bitlocker-keys-in-guam-fraud-case&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-435-fbi-accesses-microsoft-bitlocker-keys-in-guam-fraud-case</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-435-fbi-accesses-microsoft-bitlocker-keys-in-guam-fraud-case/?pk_campaign=feed&#038;pk_kwd=axisofeasy-435-fbi-accesses-microsoft-bitlocker-keys-in-guam-fraud-case#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 30 Jan 2026 23:00:30 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[AI prompt collection]]></category>
		<category><![CDATA[AI-assisted attacks]]></category>
		<category><![CDATA[BitLocker encryption]]></category>
		<category><![CDATA[CI/CD pipeline compromise]]></category>
		<category><![CDATA[cloud key escrow]]></category>
		<category><![CDATA[container image risk]]></category>
		<category><![CDATA[credential theft]]></category>
		<category><![CDATA[critical infrastructure attacks]]></category>
		<category><![CDATA[CVE exposure]]></category>
		<category><![CDATA[cybercrime forums]]></category>
		<category><![CDATA[dark web seizures]]></category>
		<category><![CDATA[data localization]]></category>
		<category><![CDATA[device encryption backdoors]]></category>
		<category><![CDATA[DOJ cybercrime enforcement]]></category>
		<category><![CDATA[energy grid cyberattacks]]></category>
		<category><![CDATA[enterprise data breaches]]></category>
		<category><![CDATA[extortion groups]]></category>
		<category><![CDATA[FBI takedowns]]></category>
		<category><![CDATA[FBI warrant]]></category>
		<category><![CDATA[Fortinet exploits]]></category>
		<category><![CDATA[fraud investigation]]></category>
		<category><![CDATA[government surveillance]]></category>
		<category><![CDATA[Guam unemployment fraud]]></category>
		<category><![CDATA[high-severity vulnerabilities]]></category>
		<category><![CDATA[initial access brokers]]></category>
		<category><![CDATA[JavaScript supply chain flaws]]></category>
		<category><![CDATA[joint venture governance]]></category>
		<category><![CDATA[Lapsus$ affiliates]]></category>
		<category><![CDATA[law enforcement access]]></category>
		<category><![CDATA[malicious packages]]></category>
		<category><![CDATA[Maven Central]]></category>
		<category><![CDATA[MFA fatigue]]></category>
		<category><![CDATA[Microsoft cloud keys]]></category>
		<category><![CDATA[namespace confusion]]></category>
		<category><![CDATA[nation-state hacking]]></category>
		<category><![CDATA[network device compromise]]></category>
		<category><![CDATA[Nike data theft]]></category>
		<category><![CDATA[npm ecosystem]]></category>
		<category><![CDATA[NuGet vulnerabilities]]></category>
		<category><![CDATA[Okta impersonation]]></category>
		<category><![CDATA[open source supply chain attacks]]></category>
		<category><![CDATA[operational disruption]]></category>
		<category><![CDATA[Oracle cloud hosting]]></category>
		<category><![CDATA[PackageGate]]></category>
		<category><![CDATA[platform surveillance]]></category>
		<category><![CDATA[precise location tracking]]></category>
		<category><![CDATA[Privacy Risks]]></category>
		<category><![CDATA[PyPI threats]]></category>
		<category><![CDATA[RAMP marketplace]]></category>
		<category><![CDATA[ransomware extortion]]></category>
		<category><![CDATA[ransomware gangs]]></category>
		<category><![CDATA[RCE vulnerabilities]]></category>
		<category><![CDATA[recommendation algorithms]]></category>
		<category><![CDATA[repository abuse]]></category>
		<category><![CDATA[Russian intelligence operations]]></category>
		<category><![CDATA[ShinyHunters]]></category>
		<category><![CDATA[Slack impersonation]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[software supply chain security]]></category>
		<category><![CDATA[SSO bypass]]></category>
		<category><![CDATA[Teams abuse]]></category>
		<category><![CDATA[threat actor migration]]></category>
		<category><![CDATA[TikTok US data collection]]></category>
		<category><![CDATA[typosquatting attacks]]></category>
		<category><![CDATA[US-China tech tensions]]></category>
		<category><![CDATA[vishing attacks]]></category>
		<category><![CDATA[voice phishing]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=33045</guid>

					<description><![CDATA[FBI Accesses Microsoft BitLocker Keys in Guam Fraud Case,
Open Source Supply Chains Under Attack: Malicious Packages Surge,
Cybercrime Alliance Hits 100+ Global Organisations with Vishing Attacks ... this and more in AofE  #435<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-435-fbi-accesses-microsoft-bitlocker-keys-in-guam-fraud-case%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-435-fbi-accesses-microsoft-bitlocker-keys-in-guam-fraud-case&amp;action_name=%23AxisOfEasy%20435%3A%20FBI%20Accesses%20Microsoft%20BitLocker%20Keys%20In%20Guam%20Fraud%20Case&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-435-fbi-accesses-microsoft-bitlocker-keys-in-guam-fraud-case/?pk_campaign=feed&#038;pk_kwd=axisofeasy-435-fbi-accesses-microsoft-bitlocker-keys-in-guam-fraud-case/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisofEasy 434: Ireland Moves To Expand Digital Surveillance Powers</title>
		<link>https://axisofeasy.com/podcast/axisofeasy-434-ireland-moves-to-expand-digital-surveillance-powers/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-434-ireland-moves-to-expand-digital-surveillance-powers</link>
					<comments>https://axisofeasy.com/podcast/axisofeasy-434-ireland-moves-to-expand-digital-surveillance-powers/#respond</comments>
		
		<dc:creator><![CDATA[Joey Tweets]]></dc:creator>
		<pubDate>Fri, 23 Jan 2026 23:00:52 +0000</pubDate>
				<category><![CDATA[AI malware]]></category>
		<category><![CDATA[Biometric Verification]]></category>
		<category><![CDATA[calendar vulnerability]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[cybersecurity news]]></category>
		<category><![CDATA[cybersecurity update]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data security]]></category>
		<category><![CDATA[digital ID]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[Google Gemini]]></category>
		<category><![CDATA[government data breach]]></category>
		<category><![CDATA[government surveillance]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[Ireland surveillance bill]]></category>
		<category><![CDATA[KOSMA bill]]></category>
		<category><![CDATA[Linux malware]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Privacy Concerns]]></category>
		<category><![CDATA[prompt injection]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[security threats]]></category>
		<category><![CDATA[social media age verification]]></category>
		<category><![CDATA[Supreme Court hack]]></category>
		<category><![CDATA[tech news]]></category>
		<category><![CDATA[VoidLink]]></category>
		<category><![CDATA[weekly security news]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?post_type=podcast&#038;p=33022</guid>

					<description><![CDATA[Ireland ramps up surveillance powers while AI builds malware in days. KOSMA demands digital ID age checks. Google Gemini flaw exposes calendars. Supreme Court hacked. Your privacy under attack.<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Fpodcast%2Faxisofeasy-434-ireland-moves-to-expand-digital-surveillance-powers%2F&amp;action_name=%23AxisofEasy%20434%3A%20Ireland%20Moves%20To%20Expand%20Digital%20Surveillance%20Powers&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/podcast/axisofeasy-434-ireland-moves-to-expand-digital-surveillance-powers/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The Cypherpunk Prophecy: How Early Internet Visionaries Predicted Our Digital Dystopia</title>
		<link>https://axisofeasy.com/alt-ctrl-history/the-cypherpunk-prophecy-how-early-internet-visionaries-predicted-our-digital-dystopia/?pk_campaign=feed&#038;pk_kwd=the-cypherpunk-prophecy-how-early-internet-visionaries-predicted-our-digital-dystopia&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-cypherpunk-prophecy-how-early-internet-visionaries-predicted-our-digital-dystopia</link>
					<comments>https://axisofeasy.com/alt-ctrl-history/the-cypherpunk-prophecy-how-early-internet-visionaries-predicted-our-digital-dystopia/?pk_campaign=feed&#038;pk_kwd=the-cypherpunk-prophecy-how-early-internet-visionaries-predicted-our-digital-dystopia#respond</comments>
		
		<dc:creator><![CDATA[AxisofEasy Team]]></dc:creator>
		<pubDate>Mon, 07 Jul 2025 22:23:24 +0000</pubDate>
				<category><![CDATA[Alt-Ctrl History]]></category>
		<category><![CDATA[algorithmic control]]></category>
		<category><![CDATA[Algorithmic manipulation]]></category>
		<category><![CDATA[Anonymous communication]]></category>
		<category><![CDATA[Big Tech critique]]></category>
		<category><![CDATA[Blockchain philosophy]]></category>
		<category><![CDATA[Computer Lib]]></category>
		<category><![CDATA[Crypto Wars]]></category>
		<category><![CDATA[Cryptographic privacy]]></category>
		<category><![CDATA[Cryptographic resistancem]]></category>
		<category><![CDATA[Cyberpunk culture]]></category>
		<category><![CDATA[Cypherpunk movement]]></category>
		<category><![CDATA[Cypherpunk prophecy]]></category>
		<category><![CDATA[Data collection abuse]]></category>
		<category><![CDATA[Decentralized identifiers]]></category>
		<category><![CDATA[Decentralized internet]]></category>
		<category><![CDATA[Decentralized systems]]></category>
		<category><![CDATA[Design is political]]></category>
		<category><![CDATA[DIDs]]></category>
		<category><![CDATA[Digital authoritarianism]]></category>
		<category><![CDATA[Digital cash]]></category>
		<category><![CDATA[Digital dystopia]]></category>
		<category><![CDATA[Digital privacy tools]]></category>
		<category><![CDATA[Digital sovereignty]]></category>
		<category><![CDATA[Distributed architecture]]></category>
		<category><![CDATA[Early internet visionaries]]></category>
		<category><![CDATA[EFF]]></category>
		<category><![CDATA[Electronic Frontier Foundation]]></category>
		<category><![CDATA[Encryption activism]]></category>
		<category><![CDATA[End-to-End Encryption]]></category>
		<category><![CDATA[Fight for the Future]]></category>
		<category><![CDATA[Governance tokens]]></category>
		<category><![CDATA[government surveillance]]></category>
		<category><![CDATA[Hacker ethics]]></category>
		<category><![CDATA[Homelab culture]]></category>
		<category><![CDATA[Internet architecture]]></category>
		<category><![CDATA[Internet history]]></category>
		<category><![CDATA[Mass surveillance]]></category>
		<category><![CDATA[mastodon]]></category>
		<category><![CDATA[Mesh networks]]></category>
		<category><![CDATA[Nostr]]></category>
		<category><![CDATA[NYC Mesh]]></category>
		<category><![CDATA[Open systems thinking]]></category>
		<category><![CDATA[Peer-to-peer networks]]></category>
		<category><![CDATA[PGP encryption]]></category>
		<category><![CDATA[Platform censorship Surveillance capitalism]]></category>
		<category><![CDATA[Privacy by design]]></category>
		<category><![CDATA[Privacy technology]]></category>
		<category><![CDATA[Privacy-first platforms]]></category>
		<category><![CDATA[Project Xanadu]]></category>
		<category><![CDATA[Self-hosting solutions]]></category>
		<category><![CDATA[Signal app]]></category>
		<category><![CDATA[Signal Messenger]]></category>
		<category><![CDATA[smart contracts]]></category>
		<category><![CDATA[Sovereign computing]]></category>
		<category><![CDATA[surveillance capitalism]]></category>
		<category><![CDATA[surveillance state]]></category>
		<category><![CDATA[Surveillance Technology]]></category>
		<category><![CDATA[Tech prophecy]]></category>
		<category><![CDATA[Technical architecture as politics]]></category>
		<category><![CDATA[Techno-philosophy]]></category>
		<category><![CDATA[Technocratic control]]></category>
		<category><![CDATA[Ted Nelson]]></category>
		<category><![CDATA[Tor Project PGP (Pretty Good Privacy)]]></category>
		<category><![CDATA[Transclusion]]></category>
		<category><![CDATA[Web3 movement]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=31813</guid>

					<description><![CDATA[From Ted Nelson&#8217;s 1974 warnings to today&#8217;s surveillance state, the roadmap was there all along, we just chose the wrong fork. Picture this: It&#8217;s 1974, Nixon just resigned and some guy with Hollywood connections is publishing a manifesto about &#8220;computer priesthoods&#8221; that reads like he time-traveled from 2025. Ted Nelson, son of an Emmy-winning director [&#8230;]<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Falt-ctrl-history%2Fthe-cypherpunk-prophecy-how-early-internet-visionaries-predicted-our-digital-dystopia%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Dthe-cypherpunk-prophecy-how-early-internet-visionaries-predicted-our-digital-dystopia&amp;action_name=The%20Cypherpunk%20Prophecy%3A%20How%20Early%20Internet%20Visionaries%20Predicted%20Our%20Digital%20Dystopia&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/alt-ctrl-history/the-cypherpunk-prophecy-how-early-internet-visionaries-predicted-our-digital-dystopia/?pk_campaign=feed&#038;pk_kwd=the-cypherpunk-prophecy-how-early-internet-visionaries-predicted-our-digital-dystopia/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 398: Texas Bill Could Jail People For Sharing Political Memes Without Disclaimers</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-398-texas-bill-could-jail-people-for-sharing-political-memes-without-disclaimers/?pk_campaign=feed&#038;pk_kwd=axisofeasy-398-texas-bill-could-jail-people-for-sharing-political-memes-without-disclaimers&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-398-texas-bill-could-jail-people-for-sharing-political-memes-without-disclaimers</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-398-texas-bill-could-jail-people-for-sharing-political-memes-without-disclaimers/?pk_campaign=feed&#038;pk_kwd=axisofeasy-398-texas-bill-could-jail-people-for-sharing-political-memes-without-disclaimers#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 02 May 2025 22:00:41 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[45th general election]]></category>
		<category><![CDATA[Activists]]></category>
		<category><![CDATA[altered media]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[automation]]></category>
		<category><![CDATA[Belgium]]></category>
		<category><![CDATA[bill]]></category>
		<category><![CDATA[brand abuse]]></category>
		<category><![CDATA[CA/Browser Forum]]></category>
		<category><![CDATA[certificate lifespans]]></category>
		<category><![CDATA[certificate renewal]]></category>
		<category><![CDATA[certificate reuse]]></category>
		<category><![CDATA[Ciro Pellegrino]]></category>
		<category><![CDATA[Cisco]]></category>
		<category><![CDATA[cloudflare]]></category>
		<category><![CDATA[copyright enforcement]]></category>
		<category><![CDATA[court orders]]></category>
		<category><![CDATA[CRLs]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Dade Phelan]]></category>
		<category><![CDATA[DAZN]]></category>
		<category><![CDATA[digital expression]]></category>
		<category><![CDATA[disclaimers]]></category>
		<category><![CDATA[Disinformation]]></category>
		<category><![CDATA[DKIM Replay]]></category>
		<category><![CDATA[DMARC]]></category>
		<category><![CDATA[DNS compliance]]></category>
		<category><![CDATA[DNS error]]></category>
		<category><![CDATA[DNS filtering]]></category>
		<category><![CDATA[DNS neutrality]]></category>
		<category><![CDATA[DNS records]]></category>
		<category><![CDATA[DNS Resolvers]]></category>
		<category><![CDATA[DNSSEC]]></category>
		<category><![CDATA[domain blocking]]></category>
		<category><![CDATA[domain validation]]></category>
		<category><![CDATA[Drunk Dade]]></category>
		<category><![CDATA[DV certificates]]></category>
		<category><![CDATA[EasyDMARC]]></category>
		<category><![CDATA[election night]]></category>
		<category><![CDATA[election results]]></category>
		<category><![CDATA[Elections Canada]]></category>
		<category><![CDATA[email authentication]]></category>
		<category><![CDATA[email security]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[enforcement]]></category>
		<category><![CDATA[EV certificates]]></category>
		<category><![CDATA[Eva Vlaardingerbroek]]></category>
		<category><![CDATA[Fanpage]]></category>
		<category><![CDATA[federal election]]></category>
		<category><![CDATA[First Amendment]]></category>
		<category><![CDATA[free speech]]></category>
		<category><![CDATA[garbled pages]]></category>
		<category><![CDATA[generative AI]]></category>
		<category><![CDATA[Gerasim Hovhannisyan]]></category>
		<category><![CDATA[global warning]]></category>
		<category><![CDATA[Gmail]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[Google Sites]]></category>
		<category><![CDATA[Google.com spoof]]></category>
		<category><![CDATA[government IT]]></category>
		<category><![CDATA[government surveillance]]></category>
		<category><![CDATA[grassroots speech]]></category>
		<category><![CDATA[House Bill 366]]></category>
		<category><![CDATA[human rights]]></category>
		<category><![CDATA[internet censorship]]></category>
		<category><![CDATA[internet infrastructure]]></category>
		<category><![CDATA[intimidation]]></category>
		<category><![CDATA[iOS threat detection]]></category>
		<category><![CDATA[iPhone alert]]></category>
		<category><![CDATA[IPTV]]></category>
		<category><![CDATA[ISP penalties]]></category>
		<category><![CDATA[jail]]></category>
		<category><![CDATA[Jellyfish SMTP]]></category>
		<category><![CDATA[Journalists]]></category>
		<category><![CDATA[legal concerns]]></category>
		<category><![CDATA[legal pressure]]></category>
		<category><![CDATA[legal subpoena scam]]></category>
		<category><![CDATA[memes]]></category>
		<category><![CDATA[mercenary spyware]]></category>
		<category><![CDATA[Michael Berry]]></category>
		<category><![CDATA[Microsoft Outlook]]></category>
		<category><![CDATA[misinformation]]></category>
		<category><![CDATA[OCSP]]></category>
		<category><![CDATA[online voting infrastructure]]></category>
		<category><![CDATA[opendns]]></category>
		<category><![CDATA[OV certificates]]></category>
		<category><![CDATA[parody]]></category>
		<category><![CDATA[personal security]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[piracy]]></category>
		<category><![CDATA[PKI]]></category>
		<category><![CDATA[political advertising]]></category>
		<category><![CDATA[political media]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[PrivateEmail]]></category>
		<category><![CDATA[Pro League]]></category>
		<category><![CDATA[Quad9]]></category>
		<category><![CDATA[satire]]></category>
		<category><![CDATA[selective prosecution]]></category>
		<category><![CDATA[SMS attack]]></category>
		<category><![CDATA[speech regulation]]></category>
		<category><![CDATA[spf]]></category>
		<category><![CDATA[spoofing]]></category>
		<category><![CDATA[Spyware]]></category>
		<category><![CDATA[State Affairs Committee]]></category>
		<category><![CDATA[streaming]]></category>
		<category><![CDATA[Subject Identity Information]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[targeted attacks]]></category>
		<category><![CDATA[technical failure]]></category>
		<category><![CDATA[Texas]]></category>
		<category><![CDATA[Texas Ethics Commission]]></category>
		<category><![CDATA[TLS]]></category>
		<category><![CDATA[trust exploitation]]></category>
		<category><![CDATA[unconstitutional]]></category>
		<category><![CDATA[voter access]]></category>
		<category><![CDATA[web security]]></category>
		<category><![CDATA[website crash]]></category>
		<category><![CDATA[website outage]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=31482</guid>

					<description><![CDATA[Texas bill could jail people for sharing political memes without disclaimers,
Apple Warns Targets of Global Spyware Campaign Including Journalists and Activists,
Elections Canada Website Crashes on Election Night... this and more in AofE  #398<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-398-texas-bill-could-jail-people-for-sharing-political-memes-without-disclaimers%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-398-texas-bill-could-jail-people-for-sharing-political-memes-without-disclaimers&amp;action_name=%23AxisOfEasy%20398%3A%20Texas%20Bill%20Could%20Jail%20People%20For%20Sharing%20Political%20Memes%20Without%20Disclaimers&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-398-texas-bill-could-jail-people-for-sharing-political-memes-without-disclaimers/?pk_campaign=feed&#038;pk_kwd=axisofeasy-398-texas-bill-could-jail-people-for-sharing-political-memes-without-disclaimers/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 387: UK Secretly Orders Apple To Build Global iCloud Backdoor, Sparking Privacy Battle</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-387-uk-secretly-orders-apple-to-build-global-icloud-backdoor-sparking-privacy-battle/?pk_campaign=feed&#038;pk_kwd=axisofeasy-387-uk-secretly-orders-apple-to-build-global-icloud-backdoor-sparking-privacy-battle&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-387-uk-secretly-orders-apple-to-build-global-icloud-backdoor-sparking-privacy-battle</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-387-uk-secretly-orders-apple-to-build-global-icloud-backdoor-sparking-privacy-battle/?pk_campaign=feed&#038;pk_kwd=axisofeasy-387-uk-secretly-orders-apple-to-build-global-icloud-backdoor-sparking-privacy-battle#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 14 Feb 2025 23:00:46 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Apple compliance]]></category>
		<category><![CDATA[Backdoor]]></category>
		<category><![CDATA[civil liberties]]></category>
		<category><![CDATA[Cyber Threats]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data access]]></category>
		<category><![CDATA[data protection]]></category>
		<category><![CDATA[digital rights]]></category>
		<category><![CDATA[Digital Security]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[encryption ban]]></category>
		<category><![CDATA[encryption debate]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[global implications]]></category>
		<category><![CDATA[government surveillance]]></category>
		<category><![CDATA[hacking risks]]></category>
		<category><![CDATA[iCloud]]></category>
		<category><![CDATA[intelligence agencies]]></category>
		<category><![CDATA[Investigatory Powers Act]]></category>
		<category><![CDATA[key escrow]]></category>
		<category><![CDATA[Law Enforcement]]></category>
		<category><![CDATA[national security]]></category>
		<category><![CDATA[online privacy]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[privacy battle]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Snoopers’ Charter]]></category>
		<category><![CDATA[surveillance law]]></category>
		<category><![CDATA[Tech Regulation]]></category>
		<category><![CDATA[technology policy]]></category>
		<category><![CDATA[UK]]></category>
		<category><![CDATA[Western governments]]></category>
		<category><![CDATA[whistleblowing]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=31004</guid>

					<description><![CDATA[UK Secretly Orders Apple to Build Global iCloud Backdoor, Sparking Privacy Battle,
PlayStation Network Outage Leaves Gamers Stranded: PS4, PS5, and Online Services Down with No ETA,
China-Linked Disinformation Targets Freeland in Liberal Leadership Race, SITE Warns ... this and more in AofE  #387<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-387-uk-secretly-orders-apple-to-build-global-icloud-backdoor-sparking-privacy-battle%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-387-uk-secretly-orders-apple-to-build-global-icloud-backdoor-sparking-privacy-battle&amp;action_name=%23AxisOfEasy%20387%3A%20UK%20Secretly%20Orders%20Apple%20To%20Build%20Global%20iCloud%20Backdoor%2C%20Sparking%20Privacy%20Battle&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-387-uk-secretly-orders-apple-to-build-global-icloud-backdoor-sparking-privacy-battle/?pk_campaign=feed&#038;pk_kwd=axisofeasy-387-uk-secretly-orders-apple-to-build-global-icloud-backdoor-sparking-privacy-battle/feed/</wfw:commentRss>
			<slash:comments>6</slash:comments>
		
		
			</item>
	</channel>
</rss>
