Smartphones, Software & OS
Purism Blog – 2.20.20

Since I’ve seen plenty of misconceptions flying around, let’s go through a quick sum up of what is included in PureOS, the default GNU/Linux distribution installed on the Librem 5.
Source: What is Mobile PureOS?
Company News / General Interest, Cybersafety / Cybersecurity / Privacy, Smartphones
Purism Blog – 10.17.19 (10.16.19)

Halo Privacy partners with Purism to provide best-in-class secure hardware devices to large enterprise customers in defense, aerospace, and the cryptocurrency/fintech sector.
Source: Halo Privacy partners with Purism – Purism
Cybersafety / Cybersecurity / Privacy, Smartphones
Purism Blog – 8.5.19 (8.1.19)

Now that we are in the home stretch for the Librem 5 launch, it’s a good time to start discussing some visions for the future. While the Librem 5 can operate as a traditional cellular phone today, in this post we are going to discuss its potential as a “no-carrier phone.”
Read more: What a No-Carrier Phone Could Look Like
Company News / General Interest, Cybersafety / Cybersecurity / Privacy, Laptops / Tablets / PCs / eReaders
Purism Blog – 7.29.19 (7.25.19)

In my previous post I talked about why consent matters when it comes to privacy; and yet, privacy is only one of the areas where tech companies take advantage of users without their consent. Recently, tech companies have come to a troubling consensus: that they can change your computer, remotely (and often silently) without your knowledge or permission.
Read more: Consent Matters: When Tech Takes Remote Control Without Your Permission
Cybersafety / Cybersecurity / Privacy, Laptops / Tablets / PCs / eReaders
Purism Blog – 7.18.19 (7.16.19)

There is a saying that goes around modern privacy circles that “Privacy is about Consent.” This means that the one big factor that determines whether your privacy is violated comes down to whether you consented to share the information. For instance, let’s say Alice tells Bob a secret: if Bob then tells the secret to someone else, Bob will be violating Alice’s privacy, unless he had asked Alice for permission first. If you think about it, you can come up with many examples where the same action, leading to the same result, takes on a completely different tone–depending on whether or not the actor got consent.
Read more: Consent Matters: When Tech Shares Your Secrets Without Your Permission