<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>telecom</title>
	<atom:link href="https://axisofeasy.com/tag/telecom/feed/" rel="self" type="application/rss+xml" />
	<link>https://axisofeasy.com</link>
	<description>Rapid Coverage of a World Gone Full Cyberpunk</description>
	<lastBuildDate>Fri, 20 Mar 2026 16:14:29 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://axisofeasy.com/wp-content/uploads/2018/07/cropped-easydns-big-bolt-512x512-32x32.png</url>
	<title>telecom</title>
	<link>https://axisofeasy.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>#AxisOfEasy 442: Canada Introduces Bill C-22 For Mandatory Metadata Retention</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-442-canada-introduces-bill-c-22-for-mandatory-metadata-retention/?pk_campaign=feed&#038;pk_kwd=axisofeasy-442-canada-introduces-bill-c-22-for-mandatory-metadata-retention&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-442-canada-introduces-bill-c-22-for-mandatory-metadata-retention</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-442-canada-introduces-bill-c-22-for-mandatory-metadata-retention/?pk_campaign=feed&#038;pk_kwd=axisofeasy-442-canada-introduces-bill-c-22-for-mandatory-metadata-retention#respond</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 20 Mar 2026 22:00:54 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[AI music]]></category>
		<category><![CDATA[Anthropic]]></category>
		<category><![CDATA[automation]]></category>
		<category><![CDATA[Bill C-22]]></category>
		<category><![CDATA[C2 framework]]></category>
		<category><![CDATA[Canada]]></category>
		<category><![CDATA[ChatGPT]]></category>
		<category><![CDATA[Cisco]]></category>
		<category><![CDATA[Claude AI]]></category>
		<category><![CDATA[credential theft]]></category>
		<category><![CDATA[Crypto Wallets]]></category>
		<category><![CDATA[CSIS]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[DarkSword]]></category>
		<category><![CDATA[data brokers]]></category>
		<category><![CDATA[data exfiltration]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[End-to-End Encryption]]></category>
		<category><![CDATA[espionage]]></category>
		<category><![CDATA[evasion]]></category>
		<category><![CDATA[exploit kit]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[Fourth Amendment]]></category>
		<category><![CDATA[geolocation tracking]]></category>
		<category><![CDATA[GitHub]]></category>
		<category><![CDATA[Glassworm]]></category>
		<category><![CDATA[government surveillance]]></category>
		<category><![CDATA[Handala hackers]]></category>
		<category><![CDATA[Instagram]]></category>
		<category><![CDATA[Interlock]]></category>
		<category><![CDATA[iOS vulnerabilities]]></category>
		<category><![CDATA[Lawful Access]]></category>
		<category><![CDATA[Linux security]]></category>
		<category><![CDATA[location data]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[meta]]></category>
		<category><![CDATA[metadata retention]]></category>
		<category><![CDATA[Npm]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[privilege escalation]]></category>
		<category><![CDATA[prompt injection]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[RCMP]]></category>
		<category><![CDATA[real estate]]></category>
		<category><![CDATA[root access]]></category>
		<category><![CDATA[snapd]]></category>
		<category><![CDATA[SnappyClient]]></category>
		<category><![CDATA[Social Media]]></category>
		<category><![CDATA[stolen credentials]]></category>
		<category><![CDATA[Stryker breach]]></category>
		<category><![CDATA[supply chain attack]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[systemd]]></category>
		<category><![CDATA[telecom]]></category>
		<category><![CDATA[Ubuntu]]></category>
		<category><![CDATA[Unicode obfuscation]]></category>
		<category><![CDATA[virtual band]]></category>
		<category><![CDATA[warrants]]></category>
		<category><![CDATA[zero-day]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=33472</guid>

					<description><![CDATA[Canada Introduces Bill C-22 For Mandatory Metadata Retention
Meta is Ending Instagram Direct Message End-to-End Encryption
Invisible Unicode Supply-Chain Attack Hits GitHub Ecosystem... this and more in AofE  #442<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-442-canada-introduces-bill-c-22-for-mandatory-metadata-retention%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-442-canada-introduces-bill-c-22-for-mandatory-metadata-retention&amp;action_name=%23AxisOfEasy%20442%3A%20Canada%20Introduces%20Bill%20C-22%20For%20Mandatory%20Metadata%20Retention&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-442-canada-introduces-bill-c-22-for-mandatory-metadata-retention/?pk_campaign=feed&#038;pk_kwd=axisofeasy-442-canada-introduces-bill-c-22-for-mandatory-metadata-retention/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 422: Why Treating AI As A Tool Is A Dangerous Illusion</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-422-why-treating-ai-as-a-tool-is-a-dangerous-illusion/?pk_campaign=feed&#038;pk_kwd=axisofeasy-422-why-treating-ai-as-a-tool-is-a-dangerous-illusion&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-422-why-treating-ai-as-a-tool-is-a-dangerous-illusion</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-422-why-treating-ai-as-a-tool-is-a-dangerous-illusion/?pk_campaign=feed&#038;pk_kwd=axisofeasy-422-why-treating-ai-as-a-tool-is-a-dangerous-illusion#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 17 Oct 2025 22:00:38 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[alignment]]></category>
		<category><![CDATA[Android flaw]]></category>
		<category><![CDATA[Anthropic]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[Astaroth Trojan]]></category>
		<category><![CDATA[automation]]></category>
		<category><![CDATA[Axis Of Easy]]></category>
		<category><![CDATA[Bill C-8]]></category>
		<category><![CDATA[BYOVD]]></category>
		<category><![CDATA[Canada]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[civil liberties]]></category>
		<category><![CDATA[Claude Sonnet 4.5]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[credential dumping]]></category>
		<category><![CDATA[credentials]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Disinformation]]></category>
		<category><![CDATA[Dufresne]]></category>
		<category><![CDATA[Earth Alux]]></category>
		<category><![CDATA[ECHOAC]]></category>
		<category><![CDATA[economic impact]]></category>
		<category><![CDATA[email rules]]></category>
		<category><![CDATA[emergent behavior]]></category>
		<category><![CDATA[espionage]]></category>
		<category><![CDATA[ethical AI]]></category>
		<category><![CDATA[exfiltration]]></category>
		<category><![CDATA[existential risk]]></category>
		<category><![CDATA[Federal Reserve]]></category>
		<category><![CDATA[FIDO]]></category>
		<category><![CDATA[Gelsemium]]></category>
		<category><![CDATA[GitHub]]></category>
		<category><![CDATA[governance]]></category>
		<category><![CDATA[Harvard University]]></category>
		<category><![CDATA[House of Commons]]></category>
		<category><![CDATA[HR systems]]></category>
		<category><![CDATA[initial access]]></category>
		<category><![CDATA[Italy]]></category>
		<category><![CDATA[Jack Clark]]></category>
		<category><![CDATA[Jewelbug]]></category>
		<category><![CDATA[Lucky Mouse]]></category>
		<category><![CDATA[machine learning]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[McAfee]]></category>
		<category><![CDATA[Mechanize]]></category>
		<category><![CDATA[MFA]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Mimikatz]]></category>
		<category><![CDATA[misaligned optimization]]></category>
		<category><![CDATA[national security]]></category>
		<category><![CDATA[OpenAI]]></category>
		<category><![CDATA[Oracle EBS]]></category>
		<category><![CDATA[Paragon]]></category>
		<category><![CDATA[passkeys]]></category>
		<category><![CDATA[Payroll Pirate]]></category>
		<category><![CDATA[persistence]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Pixnapping]]></category>
		<category><![CDATA[policy]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Privacy Commissioner]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[Reclaim The Net]]></category>
		<category><![CDATA[REF7707]]></category>
		<category><![CDATA[Regulation]]></category>
		<category><![CDATA[reward hacking]]></category>
		<category><![CDATA[RMM]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[safety data]]></category>
		<category><![CDATA[ScreenConnect]]></category>
		<category><![CDATA[ShadowPad]]></category>
		<category><![CDATA[situational awareness]]></category>
		<category><![CDATA[Spyware]]></category>
		<category><![CDATA[supply chain attack]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[Symantec]]></category>
		<category><![CDATA[Taiwan]]></category>
		<category><![CDATA[TechCrunch]]></category>
		<category><![CDATA[telecom]]></category>
		<category><![CDATA[The Hacker News]]></category>
		<category><![CDATA[threat actors]]></category>
		<category><![CDATA[transparency]]></category>
		<category><![CDATA[universities]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<category><![CDATA[warrantless access]]></category>
		<category><![CDATA[Workday]]></category>
		<category><![CDATA[Yandex Cloud]]></category>
		<category><![CDATA[zero-day]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=32461</guid>

					<description><![CDATA[Why Treating AI as a Tool Is a Dangerous Illusion,
Chinese Espionage Group Expands Into Russia Through Jewelbug Cyber Campaign,
Cabinet Push for Secret Telecom Cutoffs Raises Privacy Concerns... this and more in AofE  #422<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-422-why-treating-ai-as-a-tool-is-a-dangerous-illusion%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-422-why-treating-ai-as-a-tool-is-a-dangerous-illusion&amp;action_name=%23AxisOfEasy%20422%3A%20Why%20Treating%20AI%20As%20A%20Tool%20Is%20A%20Dangerous%20Illusion&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-422-why-treating-ai-as-a-tool-is-a-dangerous-illusion/?pk_campaign=feed&#038;pk_kwd=axisofeasy-422-why-treating-ai-as-a-tool-is-a-dangerous-illusion/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 411: RBC Debanks Toronto Lawyer Representing Freedom Convoy Defendants</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-411-rbc-debanks-toronto-lawyer-representing-freedom-convoy-defendants/?pk_campaign=feed&#038;pk_kwd=axisofeasy-411-rbc-debanks-toronto-lawyer-representing-freedom-convoy-defendants&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-411-rbc-debanks-toronto-lawyer-representing-freedom-convoy-defendants</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-411-rbc-debanks-toronto-lawyer-representing-freedom-convoy-defendants/?pk_campaign=feed&#038;pk_kwd=axisofeasy-411-rbc-debanks-toronto-lawyer-representing-freedom-convoy-defendants#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 01 Aug 2025 22:00:34 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[4Chan]]></category>
		<category><![CDATA[Allianz]]></category>
		<category><![CDATA[AnyDesk]]></category>
		<category><![CDATA[Bill C-2]]></category>
		<category><![CDATA[bitcoin]]></category>
		<category><![CDATA[BlackSuit]]></category>
		<category><![CDATA[Canada]]></category>
		<category><![CDATA[Chaos ransomware]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Cisco Talos]]></category>
		<category><![CDATA[civil liberties]]></category>
		<category><![CDATA[civil rights]]></category>
		<category><![CDATA[Clorox]]></category>
		<category><![CDATA[CLOUD Act]]></category>
		<category><![CDATA[Cognizant]]></category>
		<category><![CDATA[crypto ransom]]></category>
		<category><![CDATA[CSIS]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data sharing]]></category>
		<category><![CDATA[debanking]]></category>
		<category><![CDATA[Elasticsearch]]></category>
		<category><![CDATA[Emergencies Act]]></category>
		<category><![CDATA[Eva Chipiuk]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[France]]></category>
		<category><![CDATA[Freedom Convoy]]></category>
		<category><![CDATA[government IDs]]></category>
		<category><![CDATA[hacker forum]]></category>
		<category><![CDATA[identity theft]]></category>
		<category><![CDATA[lawsuit]]></category>
		<category><![CDATA[Leak Zone]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[multithreaded encryption]]></category>
		<category><![CDATA[NAS]]></category>
		<category><![CDATA[negligence]]></category>
		<category><![CDATA[Operation Checkmate]]></category>
		<category><![CDATA[OpSec failure]]></category>
		<category><![CDATA[Orange]]></category>
		<category><![CDATA[password reset]]></category>
		<category><![CDATA[Patriot Act]]></category>
		<category><![CDATA[Pentagon]]></category>
		<category><![CDATA[plugin vulnerability]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Quick Assist]]></category>
		<category><![CDATA[RBC]]></category>
		<category><![CDATA[risk tolerance]]></category>
		<category><![CDATA[Scattered Spider]]></category>
		<category><![CDATA[selfies]]></category>
		<category><![CDATA[Shakepay]]></category>
		<category><![CDATA[Spyware]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[Tea app]]></category>
		<category><![CDATA[telecom]]></category>
		<category><![CDATA[UpGuard]]></category>
		<category><![CDATA[vendor breach]]></category>
		<category><![CDATA[VPN]]></category>
		<category><![CDATA[warrantless access]]></category>
		<category><![CDATA[WordPress]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=31973</guid>

					<description><![CDATA[RBC Debanks Toronto lawyer representing Freedom Convoy defendants,
Thousands of Women's IDs and Selfies Leaked from Viral App in Massive Hack,
Clorox Blames $380 Million Cyberattack on IT Giant After Shocking Mistake ...this and more in AofE  #411 <img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-411-rbc-debanks-toronto-lawyer-representing-freedom-convoy-defendants%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-411-rbc-debanks-toronto-lawyer-representing-freedom-convoy-defendants&amp;action_name=%23AxisOfEasy%20411%3A%20RBC%20Debanks%20Toronto%20Lawyer%20Representing%20Freedom%20Convoy%20Defendants&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-411-rbc-debanks-toronto-lawyer-representing-freedom-convoy-defendants/?pk_campaign=feed&#038;pk_kwd=axisofeasy-411-rbc-debanks-toronto-lawyer-representing-freedom-convoy-defendants/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 379: China Hacks US Telecom Giants In Massive Espionage Operation</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-379-china-hacks-us-telecom-giants-in-massive-espionage-operation/?pk_campaign=feed&#038;pk_kwd=axisofeasy-379-china-hacks-us-telecom-giants-in-massive-espionage-operation&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-379-china-hacks-us-telecom-giants-in-massive-espionage-operation</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-379-china-hacks-us-telecom-giants-in-massive-espionage-operation/?pk_campaign=feed&#038;pk_kwd=axisofeasy-379-china-hacks-us-telecom-giants-in-massive-espionage-operation#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 06 Dec 2024 23:00:36 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[ASIC]]></category>
		<category><![CDATA[AT&T]]></category>
		<category><![CDATA[Bluesky]]></category>
		<category><![CDATA[breach]]></category>
		<category><![CDATA[CALEA]]></category>
		<category><![CDATA[Campaign]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[CISA]]></category>
		<category><![CDATA[Computational Power]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[cyberattacks]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[Cybercriminals]]></category>
		<category><![CDATA[cyberespionage]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Digital Services Act]]></category>
		<category><![CDATA[dns]]></category>
		<category><![CDATA[Elon Musk]]></category>
		<category><![CDATA[Encrypted Apps]]></category>
		<category><![CDATA[Encrypted Platforms]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[End-to-End Encryption]]></category>
		<category><![CDATA[espionage]]></category>
		<category><![CDATA[EU]]></category>
		<category><![CDATA[Europol]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[Future Ventures]]></category>
		<category><![CDATA[GPU]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[Hacks]]></category>
		<category><![CDATA[Infrastructure]]></category>
		<category><![CDATA[innovation]]></category>
		<category><![CDATA[Intel]]></category>
		<category><![CDATA[Intelligence]]></category>
		<category><![CDATA[Jeff Greene]]></category>
		<category><![CDATA[Law Enforcement]]></category>
		<category><![CDATA[Lumen Technologies]]></category>
		<category><![CDATA[Matrix]]></category>
		<category><![CDATA[Metadata]]></category>
		<category><![CDATA[Moore’s Law]]></category>
		<category><![CDATA[multi-factor authentication]]></category>
		<category><![CDATA[NVidia]]></category>
		<category><![CDATA[Operation]]></category>
		<category><![CDATA[Pegasus]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Regulatory Compliance]]></category>
		<category><![CDATA[Salt Typhoon]]></category>
		<category><![CDATA[Senator Ron Wyden]]></category>
		<category><![CDATA[signal]]></category>
		<category><![CDATA[Spyware]]></category>
		<category><![CDATA[Stephen Jurvetson]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[Tech Regulation]]></category>
		<category><![CDATA[technology]]></category>
		<category><![CDATA[telecom]]></category>
		<category><![CDATA[US]]></category>
		<category><![CDATA[Verizon]]></category>
		<category><![CDATA[VLOP]]></category>
		<category><![CDATA[Washington D.C.]]></category>
		<category><![CDATA[WhatsApp]]></category>
		<category><![CDATA[X]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=30703</guid>

					<description><![CDATA[China Hacks US Telecom Giants in Massive Espionage Operation,
Bluesky Gains Traction Amid Political Shifts,
Matrix Exposed in Europol’s Operation Against Encrypted Platforms ... this and more in AofE  #379<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-379-china-hacks-us-telecom-giants-in-massive-espionage-operation%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-379-china-hacks-us-telecom-giants-in-massive-espionage-operation&amp;action_name=%23AxisOfEasy%20379%3A%20China%20Hacks%20US%20Telecom%20Giants%20In%20Massive%20Espionage%20Operation&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-379-china-hacks-us-telecom-giants-in-massive-espionage-operation/?pk_campaign=feed&#038;pk_kwd=axisofeasy-379-china-hacks-us-telecom-giants-in-massive-espionage-operation/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>Future Fibre: Bernie&#039;s Broadband Break-up</title>
		<link>https://axisofeasy.com/metaviews/future-fibre-bernies-broadband-break-up/?pk_campaign=feed&#038;pk_kwd=future-fibre-bernies-broadband-break-up&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=future-fibre-bernies-broadband-break-up</link>
					<comments>https://axisofeasy.com/metaviews/future-fibre-bernies-broadband-break-up/?pk_campaign=feed&#038;pk_kwd=future-fibre-bernies-broadband-break-up#respond</comments>
		
		<dc:creator><![CDATA[Jesse Hirsh]]></dc:creator>
		<pubDate>Fri, 13 Dec 2019 13:14:19 +0000</pubDate>
				<category><![CDATA[Metaviews]]></category>
		<category><![CDATA[AT&T]]></category>
		<category><![CDATA[Bernie Sanders]]></category>
		<category><![CDATA[broadband]]></category>
		<category><![CDATA[Comcast]]></category>
		<category><![CDATA[Future Fibre]]></category>
		<category><![CDATA[telecom]]></category>
		<guid isPermaLink="false">https://easydns.com/?p=19446</guid>

					<description><![CDATA[easyDNS is pleased to sponsor Jesse Hirsh‘s “Future Fibre / Future Tools” segments of his new email list, Metaviews. Internet for all comes to the 2020 US Election Broadband populism finally seems to be having its moment. The combination of high prices and low quality service has not only provoked a growing number of people to complain, [&#8230;]<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Fmetaviews%2Ffuture-fibre-bernies-broadband-break-up%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Dfuture-fibre-bernies-broadband-break-up&amp;action_name=Future%20Fibre%3A%20Bernie%26%23039%3Bs%20Broadband%20Break-up&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/metaviews/future-fibre-bernies-broadband-break-up/?pk_campaign=feed&#038;pk_kwd=future-fibre-bernies-broadband-break-up/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
