<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>ShadowPad</title>
	<atom:link href="https://axisofeasy.com/tag/shadowpad/feed/" rel="self" type="application/rss+xml" />
	<link>https://axisofeasy.com</link>
	<description>Rapid Coverage of a World Gone Full Cyberpunk</description>
	<lastBuildDate>Fri, 17 Oct 2025 16:18:36 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://axisofeasy.com/wp-content/uploads/2018/07/cropped-easydns-big-bolt-512x512-32x32.png</url>
	<title>ShadowPad</title>
	<link>https://axisofeasy.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>#AxisOfEasy 422: Why Treating AI As A Tool Is A Dangerous Illusion</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-422-why-treating-ai-as-a-tool-is-a-dangerous-illusion/?pk_campaign=feed&#038;pk_kwd=axisofeasy-422-why-treating-ai-as-a-tool-is-a-dangerous-illusion&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-422-why-treating-ai-as-a-tool-is-a-dangerous-illusion</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-422-why-treating-ai-as-a-tool-is-a-dangerous-illusion/?pk_campaign=feed&#038;pk_kwd=axisofeasy-422-why-treating-ai-as-a-tool-is-a-dangerous-illusion#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 17 Oct 2025 22:00:38 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[alignment]]></category>
		<category><![CDATA[Android flaw]]></category>
		<category><![CDATA[Anthropic]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[Astaroth Trojan]]></category>
		<category><![CDATA[automation]]></category>
		<category><![CDATA[Axis Of Easy]]></category>
		<category><![CDATA[Bill C-8]]></category>
		<category><![CDATA[BYOVD]]></category>
		<category><![CDATA[Canada]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[civil liberties]]></category>
		<category><![CDATA[Claude Sonnet 4.5]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[credential dumping]]></category>
		<category><![CDATA[credentials]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Disinformation]]></category>
		<category><![CDATA[Dufresne]]></category>
		<category><![CDATA[Earth Alux]]></category>
		<category><![CDATA[ECHOAC]]></category>
		<category><![CDATA[economic impact]]></category>
		<category><![CDATA[email rules]]></category>
		<category><![CDATA[emergent behavior]]></category>
		<category><![CDATA[espionage]]></category>
		<category><![CDATA[ethical AI]]></category>
		<category><![CDATA[exfiltration]]></category>
		<category><![CDATA[existential risk]]></category>
		<category><![CDATA[Federal Reserve]]></category>
		<category><![CDATA[FIDO]]></category>
		<category><![CDATA[Gelsemium]]></category>
		<category><![CDATA[GitHub]]></category>
		<category><![CDATA[governance]]></category>
		<category><![CDATA[Harvard University]]></category>
		<category><![CDATA[House of Commons]]></category>
		<category><![CDATA[HR systems]]></category>
		<category><![CDATA[initial access]]></category>
		<category><![CDATA[Italy]]></category>
		<category><![CDATA[Jack Clark]]></category>
		<category><![CDATA[Jewelbug]]></category>
		<category><![CDATA[Lucky Mouse]]></category>
		<category><![CDATA[machine learning]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[McAfee]]></category>
		<category><![CDATA[Mechanize]]></category>
		<category><![CDATA[MFA]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Mimikatz]]></category>
		<category><![CDATA[misaligned optimization]]></category>
		<category><![CDATA[national security]]></category>
		<category><![CDATA[OpenAI]]></category>
		<category><![CDATA[Oracle EBS]]></category>
		<category><![CDATA[Paragon]]></category>
		<category><![CDATA[passkeys]]></category>
		<category><![CDATA[Payroll Pirate]]></category>
		<category><![CDATA[persistence]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Pixnapping]]></category>
		<category><![CDATA[policy]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Privacy Commissioner]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[Reclaim The Net]]></category>
		<category><![CDATA[REF7707]]></category>
		<category><![CDATA[Regulation]]></category>
		<category><![CDATA[reward hacking]]></category>
		<category><![CDATA[RMM]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[safety data]]></category>
		<category><![CDATA[ScreenConnect]]></category>
		<category><![CDATA[ShadowPad]]></category>
		<category><![CDATA[situational awareness]]></category>
		<category><![CDATA[Spyware]]></category>
		<category><![CDATA[supply chain attack]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[Symantec]]></category>
		<category><![CDATA[Taiwan]]></category>
		<category><![CDATA[TechCrunch]]></category>
		<category><![CDATA[telecom]]></category>
		<category><![CDATA[The Hacker News]]></category>
		<category><![CDATA[threat actors]]></category>
		<category><![CDATA[transparency]]></category>
		<category><![CDATA[universities]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<category><![CDATA[warrantless access]]></category>
		<category><![CDATA[Workday]]></category>
		<category><![CDATA[Yandex Cloud]]></category>
		<category><![CDATA[zero-day]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=32461</guid>

					<description><![CDATA[Why Treating AI as a Tool Is a Dangerous Illusion,
Chinese Espionage Group Expands Into Russia Through Jewelbug Cyber Campaign,
Cabinet Push for Secret Telecom Cutoffs Raises Privacy Concerns... this and more in AofE  #422<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-422-why-treating-ai-as-a-tool-is-a-dangerous-illusion%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-422-why-treating-ai-as-a-tool-is-a-dangerous-illusion&amp;action_name=%23AxisOfEasy%20422%3A%20Why%20Treating%20AI%20As%20A%20Tool%20Is%20A%20Dangerous%20Illusion&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-422-why-treating-ai-as-a-tool-is-a-dangerous-illusion/?pk_campaign=feed&#038;pk_kwd=axisofeasy-422-why-treating-ai-as-a-tool-is-a-dangerous-illusion/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 393: Leaked Docs Tie USAID, GEC, NewsGuard, And Poynter To AI-Driven Speech Censorship Network</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-393-leaked-docs-tie-usaid-gec-newsguard-and-poynter-to-ai-driven-speech-censorship-network/?pk_campaign=feed&#038;pk_kwd=axisofeasy-393-leaked-docs-tie-usaid-gec-newsguard-and-poynter-to-ai-driven-speech-censorship-network&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-393-leaked-docs-tie-usaid-gec-newsguard-and-poynter-to-ai-driven-speech-censorship-network</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-393-leaked-docs-tie-usaid-gec-newsguard-and-poynter-to-ai-driven-speech-censorship-network/?pk_campaign=feed&#038;pk_kwd=axisofeasy-393-leaked-docs-tie-usaid-gec-newsguard-and-poynter-to-ai-driven-speech-censorship-network#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 28 Mar 2025 22:00:21 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[23andMe data]]></category>
		<category><![CDATA[AGCOM]]></category>
		<category><![CDATA[AI censorship]]></category>
		<category><![CDATA[AI self-coding]]></category>
		<category><![CDATA[AI singularity]]></category>
		<category><![CDATA[Atlantic Council]]></category>
		<category><![CDATA[authoritarian internet]]></category>
		<category><![CDATA[Blacklocks]]></category>
		<category><![CDATA[Canadian election]]></category>
		<category><![CDATA[CBC funding]]></category>
		<category><![CDATA[China censorship]]></category>
		<category><![CDATA[Chinese cyberattacks]]></category>
		<category><![CDATA[cloudflare]]></category>
		<category><![CDATA[COVID-19 misinformation]]></category>
		<category><![CDATA[Cyber Command]]></category>
		<category><![CDATA[Cyberspace Administration of China]]></category>
		<category><![CDATA[Disinfo Cloud]]></category>
		<category><![CDATA[DNS poisoning]]></category>
		<category><![CDATA[Elections Canada]]></category>
		<category><![CDATA[forum shutdowns]]></category>
		<category><![CDATA[Future Shock]]></category>
		<category><![CDATA[GEC]]></category>
		<category><![CDATA[Global Disinformation Index]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[GPT-3]]></category>
		<category><![CDATA[iMessage phishing]]></category>
		<category><![CDATA[LLM monitoring]]></category>
		<category><![CDATA[Local Journalism Initiative]]></category>
		<category><![CDATA[malinformation]]></category>
		<category><![CDATA[media bias]]></category>
		<category><![CDATA[meta]]></category>
		<category><![CDATA[Moldova election]]></category>
		<category><![CDATA[NewsGuard]]></category>
		<category><![CDATA[Next.js vulnerability]]></category>
		<category><![CDATA[Ofcom]]></category>
		<category><![CDATA[Online Safety Act]]></category>
		<category><![CDATA[Oracle Cloud hack]]></category>
		<category><![CDATA[Park Advisors]]></category>
		<category><![CDATA[Peter Menzies]]></category>
		<category><![CDATA[Piracy Shield]]></category>
		<category><![CDATA[Poynter]]></category>
		<category><![CDATA[protest suppression]]></category>
		<category><![CDATA[RCS phishing]]></category>
		<category><![CDATA[ShadowPad]]></category>
		<category><![CDATA[site blocking]]></category>
		<category><![CDATA[software automation]]></category>
		<category><![CDATA[SparrowDoor]]></category>
		<category><![CDATA[speech control]]></category>
		<category><![CDATA[The Hub]]></category>
		<category><![CDATA[TikTok]]></category>
		<category><![CDATA[UK censorship]]></category>
		<category><![CDATA[USAID]]></category>
		<category><![CDATA[VPN use]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=31311</guid>

					<description><![CDATA[Leaked Docs Tie USAID, GEC, NewsGuard, and Poynter to AI-Driven Speech Censorship Network,
Italy Orders Google to Block Pirate Streams via DNS Poisoning in Landmark Piracy Shield Ruling,
UK’s Online Safety Act Forces Forum Shutdowns, Spurs Digital Isolation Fears... this and more in AofE  #393<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-393-leaked-docs-tie-usaid-gec-newsguard-and-poynter-to-ai-driven-speech-censorship-network%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-393-leaked-docs-tie-usaid-gec-newsguard-and-poynter-to-ai-driven-speech-censorship-network&amp;action_name=%23AxisOfEasy%20393%3A%20Leaked%20Docs%20Tie%20USAID%2C%20GEC%2C%20NewsGuard%2C%20And%20Poynter%20To%20AI-Driven%20Speech%20Censorship%20Network&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-393-leaked-docs-tie-usaid-gec-newsguard-and-poynter-to-ai-driven-speech-censorship-network/?pk_campaign=feed&#038;pk_kwd=axisofeasy-393-leaked-docs-tie-usaid-gec-newsguard-and-poynter-to-ai-driven-speech-censorship-network/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 286: Do The Secrecy Provisions Of The Cybersecurity Bill Go Too Far?</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-286-do-the-secrecy-provisions-of-the-cybersecurity-bill-go-too-far/?pk_campaign=feed&#038;pk_kwd=axisofeasy-286-do-the-secrecy-provisions-of-the-cybersecurity-bill-go-too-far&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-286-do-the-secrecy-provisions-of-the-cybersecurity-bill-go-too-far</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-286-do-the-secrecy-provisions-of-the-cybersecurity-bill-go-too-far/?pk_campaign=feed&#038;pk_kwd=axisofeasy-286-do-the-secrecy-provisions-of-the-cybersecurity-bill-go-too-far#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Wed, 22 Feb 2023 23:00:35 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[Bill C-26]]></category>
		<category><![CDATA[bitcoin]]></category>
		<category><![CDATA[Crypto-Mixer Sinbad]]></category>
		<category><![CDATA[CVE-2023-23529]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[Cybersecurity Bill]]></category>
		<category><![CDATA[DEV-0147]]></category>
		<category><![CDATA[ESR patches]]></category>
		<category><![CDATA[iOS 16.3.1]]></category>
		<category><![CDATA[Killnet]]></category>
		<category><![CDATA[Lazarus Group]]></category>
		<category><![CDATA[NATO]]></category>
		<category><![CDATA[OFAC]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[ShadowPad]]></category>
		<category><![CDATA[Tesla]]></category>
		<category><![CDATA[TikTok]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=27310</guid>

					<description><![CDATA[Do the Secrecy Provisions of the Cybersecurity Bill Go Too Far?
TikTok "Focused View" Promises Emotion Tracking to Advertisers,
Apple Releases iOS 16.3.1 Update to Fix Critical Security Flaws ...  this and more in AofE  #286<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-286-do-the-secrecy-provisions-of-the-cybersecurity-bill-go-too-far%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-286-do-the-secrecy-provisions-of-the-cybersecurity-bill-go-too-far&amp;action_name=%23AxisOfEasy%20286%3A%20Do%20The%20Secrecy%20Provisions%20Of%20The%20Cybersecurity%20Bill%20Go%20Too%20Far%3F&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-286-do-the-secrecy-provisions-of-the-cybersecurity-bill-go-too-far/?pk_campaign=feed&#038;pk_kwd=axisofeasy-286-do-the-secrecy-provisions-of-the-cybersecurity-bill-go-too-far/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
	</channel>
</rss>
