<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>mastodon</title>
	<atom:link href="https://axisofeasy.com/tag/mastodon/feed/" rel="self" type="application/rss+xml" />
	<link>https://axisofeasy.com</link>
	<description>Rapid Coverage of a World Gone Full Cyberpunk</description>
	<lastBuildDate>Mon, 07 Jul 2025 22:48:50 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://axisofeasy.com/wp-content/uploads/2018/07/cropped-easydns-big-bolt-512x512-32x32.png</url>
	<title>mastodon</title>
	<link>https://axisofeasy.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>The Cypherpunk Prophecy: How Early Internet Visionaries Predicted Our Digital Dystopia</title>
		<link>https://axisofeasy.com/alt-ctrl-history/the-cypherpunk-prophecy-how-early-internet-visionaries-predicted-our-digital-dystopia/?pk_campaign=feed&#038;pk_kwd=the-cypherpunk-prophecy-how-early-internet-visionaries-predicted-our-digital-dystopia&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-cypherpunk-prophecy-how-early-internet-visionaries-predicted-our-digital-dystopia</link>
					<comments>https://axisofeasy.com/alt-ctrl-history/the-cypherpunk-prophecy-how-early-internet-visionaries-predicted-our-digital-dystopia/?pk_campaign=feed&#038;pk_kwd=the-cypherpunk-prophecy-how-early-internet-visionaries-predicted-our-digital-dystopia#respond</comments>
		
		<dc:creator><![CDATA[AxisofEasy Team]]></dc:creator>
		<pubDate>Mon, 07 Jul 2025 22:23:24 +0000</pubDate>
				<category><![CDATA[Alt-Ctrl History]]></category>
		<category><![CDATA[algorithmic control]]></category>
		<category><![CDATA[Algorithmic manipulation]]></category>
		<category><![CDATA[Anonymous communication]]></category>
		<category><![CDATA[Big Tech critique]]></category>
		<category><![CDATA[Blockchain philosophy]]></category>
		<category><![CDATA[Computer Lib]]></category>
		<category><![CDATA[Crypto Wars]]></category>
		<category><![CDATA[Cryptographic privacy]]></category>
		<category><![CDATA[Cryptographic resistancem]]></category>
		<category><![CDATA[Cyberpunk culture]]></category>
		<category><![CDATA[Cypherpunk movement]]></category>
		<category><![CDATA[Cypherpunk prophecy]]></category>
		<category><![CDATA[Data collection abuse]]></category>
		<category><![CDATA[Decentralized identifiers]]></category>
		<category><![CDATA[Decentralized internet]]></category>
		<category><![CDATA[Decentralized systems]]></category>
		<category><![CDATA[Design is political]]></category>
		<category><![CDATA[DIDs]]></category>
		<category><![CDATA[Digital authoritarianism]]></category>
		<category><![CDATA[Digital cash]]></category>
		<category><![CDATA[Digital dystopia]]></category>
		<category><![CDATA[Digital privacy tools]]></category>
		<category><![CDATA[Digital sovereignty]]></category>
		<category><![CDATA[Distributed architecture]]></category>
		<category><![CDATA[Early internet visionaries]]></category>
		<category><![CDATA[EFF]]></category>
		<category><![CDATA[Electronic Frontier Foundation]]></category>
		<category><![CDATA[Encryption activism]]></category>
		<category><![CDATA[End-to-End Encryption]]></category>
		<category><![CDATA[Fight for the Future]]></category>
		<category><![CDATA[Governance tokens]]></category>
		<category><![CDATA[government surveillance]]></category>
		<category><![CDATA[Hacker ethics]]></category>
		<category><![CDATA[Homelab culture]]></category>
		<category><![CDATA[Internet architecture]]></category>
		<category><![CDATA[Internet history]]></category>
		<category><![CDATA[Mass surveillance]]></category>
		<category><![CDATA[mastodon]]></category>
		<category><![CDATA[Mesh networks]]></category>
		<category><![CDATA[Nostr]]></category>
		<category><![CDATA[NYC Mesh]]></category>
		<category><![CDATA[Open systems thinking]]></category>
		<category><![CDATA[Peer-to-peer networks]]></category>
		<category><![CDATA[PGP encryption]]></category>
		<category><![CDATA[Platform censorship Surveillance capitalism]]></category>
		<category><![CDATA[Privacy by design]]></category>
		<category><![CDATA[Privacy technology]]></category>
		<category><![CDATA[Privacy-first platforms]]></category>
		<category><![CDATA[Project Xanadu]]></category>
		<category><![CDATA[Self-hosting solutions]]></category>
		<category><![CDATA[Signal app]]></category>
		<category><![CDATA[Signal Messenger]]></category>
		<category><![CDATA[smart contracts]]></category>
		<category><![CDATA[Sovereign computing]]></category>
		<category><![CDATA[surveillance capitalism]]></category>
		<category><![CDATA[surveillance state]]></category>
		<category><![CDATA[Surveillance Technology]]></category>
		<category><![CDATA[Tech prophecy]]></category>
		<category><![CDATA[Technical architecture as politics]]></category>
		<category><![CDATA[Techno-philosophy]]></category>
		<category><![CDATA[Technocratic control]]></category>
		<category><![CDATA[Ted Nelson]]></category>
		<category><![CDATA[Tor Project PGP (Pretty Good Privacy)]]></category>
		<category><![CDATA[Transclusion]]></category>
		<category><![CDATA[Web3 movement]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=31813</guid>

					<description><![CDATA[From Ted Nelson&#8217;s 1974 warnings to today&#8217;s surveillance state, the roadmap was there all along, we just chose the wrong fork. Picture this: It&#8217;s 1974, Nixon just resigned and some guy with Hollywood connections is publishing a manifesto about &#8220;computer priesthoods&#8221; that reads like he time-traveled from 2025. Ted Nelson, son of an Emmy-winning director [&#8230;]<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Falt-ctrl-history%2Fthe-cypherpunk-prophecy-how-early-internet-visionaries-predicted-our-digital-dystopia%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Dthe-cypherpunk-prophecy-how-early-internet-visionaries-predicted-our-digital-dystopia&amp;action_name=The%20Cypherpunk%20Prophecy%3A%20How%20Early%20Internet%20Visionaries%20Predicted%20Our%20Digital%20Dystopia&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/alt-ctrl-history/the-cypherpunk-prophecy-how-early-internet-visionaries-predicted-our-digital-dystopia/?pk_campaign=feed&#038;pk_kwd=the-cypherpunk-prophecy-how-early-internet-visionaries-predicted-our-digital-dystopia/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 282: California&#8217;s Unprecedented Data Breach Highlights Need For Privacy In Public Safety</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-282-californias-unprecedented-data-breach-highlights-need-for-privacy-in-public-safety/?pk_campaign=feed&#038;pk_kwd=axisofeasy-282-californias-unprecedented-data-breach-highlights-need-for-privacy-in-public-safety&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-282-californias-unprecedented-data-breach-highlights-need-for-privacy-in-public-safety</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-282-californias-unprecedented-data-breach-highlights-need-for-privacy-in-public-safety/?pk_campaign=feed&#038;pk_kwd=axisofeasy-282-californias-unprecedented-data-breach-highlights-need-for-privacy-in-public-safety#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Tue, 24 Jan 2023 23:00:18 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Arizona]]></category>
		<category><![CDATA[Backdoor]]></category>
		<category><![CDATA[BackdoorDiplomacy]]></category>
		<category><![CDATA[bitcoin]]></category>
		<category><![CDATA[CAlifornia]]></category>
		<category><![CDATA[Chat GPT]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[DNV]]></category>
		<category><![CDATA[easyPress]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[iPhone]]></category>
		<category><![CDATA[Iran]]></category>
		<category><![CDATA[mastodon]]></category>
		<category><![CDATA[Nostr]]></category>
		<category><![CDATA[SweepWizard]]></category>
		<category><![CDATA[twitter]]></category>
		<category><![CDATA[WordFence]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=27163</guid>

					<description><![CDATA[California's unprecedented data breach highlights need for privacy In public safety,
Apple's scanning: Consent from current &#038; future iPhone owners required by law,
New BackdoorDiplomacy attacks on Iranian government entities....  this and more in AofE  #282<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-282-californias-unprecedented-data-breach-highlights-need-for-privacy-in-public-safety%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-282-californias-unprecedented-data-breach-highlights-need-for-privacy-in-public-safety&amp;action_name=%23AxisOfEasy%20282%3A%20California%26%238217%3Bs%20Unprecedented%20Data%20Breach%20Highlights%20Need%20For%20Privacy%20In%20Public%20Safety&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-282-californias-unprecedented-data-breach-highlights-need-for-privacy-in-public-safety/?pk_campaign=feed&#038;pk_kwd=axisofeasy-282-californias-unprecedented-data-breach-highlights-need-for-privacy-in-public-safety/feed/</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 273: Take Control Over Your Social Media Presence With Mastodon</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-273-take-control-over-your-social-media-presence-with-mastodon/?pk_campaign=feed&#038;pk_kwd=axisofeasy-273-take-control-over-your-social-media-presence-with-mastodon&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-273-take-control-over-your-social-media-presence-with-mastodon</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-273-take-control-over-your-social-media-presence-with-mastodon/?pk_campaign=feed&#038;pk_kwd=axisofeasy-273-take-control-over-your-social-media-presence-with-mastodon#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Tue, 22 Nov 2022 23:00:52 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[Andy Stone]]></category>
		<category><![CDATA[Area 51]]></category>
		<category><![CDATA[Bill C-26]]></category>
		<category><![CDATA[CCSPA]]></category>
		<category><![CDATA[CISA]]></category>
		<category><![CDATA[Cybereason]]></category>
		<category><![CDATA[DHS]]></category>
		<category><![CDATA[Directive 21-01]]></category>
		<category><![CDATA[DPH]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[FireEye]]></category>
		<category><![CDATA[FTC]]></category>
		<category><![CDATA[GitHub]]></category>
		<category><![CDATA[Massachusetts]]></category>
		<category><![CDATA[mastodon]]></category>
		<category><![CDATA[meta]]></category>
		<category><![CDATA[Microsoft ZeroDay]]></category>
		<category><![CDATA[NCLA]]></category>
		<category><![CDATA[NCSC]]></category>
		<category><![CDATA[Orion IT]]></category>
		<category><![CDATA[Peggy Little]]></category>
		<category><![CDATA[Sam Curry]]></category>
		<category><![CDATA[SolarWinds]]></category>
		<category><![CDATA[TikTok]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=26838</guid>

					<description><![CDATA[Take Control Over Your Social Media Presence with Mastodon,
A group of former Facebook employees took bribes to hijack user accounts,
SolarWinds attack threatens global government cyber-infrastructure ... this and more in AofE  #273<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-273-take-control-over-your-social-media-presence-with-mastodon%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-273-take-control-over-your-social-media-presence-with-mastodon&amp;action_name=%23AxisOfEasy%20273%3A%20Take%20Control%20Over%20Your%20Social%20Media%20Presence%20With%20Mastodon&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-273-take-control-over-your-social-media-presence-with-mastodon/?pk_campaign=feed&#038;pk_kwd=axisofeasy-273-take-control-over-your-social-media-presence-with-mastodon/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 244: Goldbackdoor Malware Is Used Against Journalists By Nation-State Hackers</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-244-goldbackdoor-malware-is-used-against-journalists-by-nation-state-hackers/?pk_campaign=feed&#038;pk_kwd=axisofeasy-244-goldbackdoor-malware-is-used-against-journalists-by-nation-state-hackers&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-244-goldbackdoor-malware-is-used-against-journalists-by-nation-state-hackers</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-244-goldbackdoor-malware-is-used-against-journalists-by-nation-state-hackers/?pk_campaign=feed&#038;pk_kwd=axisofeasy-244-goldbackdoor-malware-is-used-against-journalists-by-nation-state-hackers#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Tue, 03 May 2022 22:00:26 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[Atlassian]]></category>
		<category><![CDATA[Goldbackdoor]]></category>
		<category><![CDATA[mastodon]]></category>
		<category><![CDATA[QNAP]]></category>
		<category><![CDATA[SharePoint]]></category>
		<category><![CDATA[Sybnology]]></category>
		<category><![CDATA[TA410 Group]]></category>
		<category><![CDATA[VPN]]></category>
		<category><![CDATA[Xi Jinping]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=25692</guid>

					<description><![CDATA[Reviews of Xi Jinping's book have been removed from Amazon on Beijing orders,
Ukraine is battling against state-sponsored cyberattacks,
Goldbackdoor malware is used against journalists by nation-state hackers ...  this and more in AofE #244<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-244-goldbackdoor-malware-is-used-against-journalists-by-nation-state-hackers%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-244-goldbackdoor-malware-is-used-against-journalists-by-nation-state-hackers&amp;action_name=%23AxisOfEasy%20244%3A%20Goldbackdoor%20Malware%20Is%20Used%20Against%20Journalists%20By%20Nation-State%20Hackers&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-244-goldbackdoor-malware-is-used-against-journalists-by-nation-state-hackers/?pk_campaign=feed&#038;pk_kwd=axisofeasy-244-goldbackdoor-malware-is-used-against-journalists-by-nation-state-hackers/feed/</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
			</item>
	</channel>
</rss>
