<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="FeedCreator 1.8" -->
<?xml-stylesheet href="http://13.113.164.222/lib/exe/css.php?s=feed" type="text/css"?>
<rdf:RDF
    xmlns="http://purl.org/rss/1.0/"
    xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
    xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
    xmlns:dc="http://purl.org/dc/elements/1.1/">
    <channel rdf:about="http://13.113.164.222/feed.php">
        <title>Freewiki blog:201703</title>
        <description></description>
        <link>http://13.113.164.222/</link>
        <image rdf:resource="http://13.113.164.222/lib/tpl/bootstrap3/images/favicon.ico" />
       <dc:date>2026-04-05T19:18:45+0000</dc:date>
        <items>
            <rdf:Seq>
                <rdf:li rdf:resource="http://13.113.164.222/doku.php?id=blog:201703:29%EB%82%98%EB%8A%94_%EB%82%B4%EA%B0%80_%EB%B3%B4%ED%98%B8%ED%95%9C%EB%8B%A4_%EC%9D%B8%ED%84%B0%EB%84%B7_%ED%99%9C%EB%8F%99_%EC%B6%94%EC%A0%81%EC%9D%84_%EB%A7%89%EA%B8%B0_%EC%9C%84%ED%95%9C_3%EA%B0%80%EC%A7%80_%EB%B0%A9%EB%B2%95&amp;rev=1508423986&amp;do=diff"/>
                <rdf:li rdf:resource="http://13.113.164.222/doku.php?id=blog:201703:29%EC%9A%B0%EB%B2%84%EC%9D%98_%EA%B7%B8%EB%A0%88%EC%9D%B4%EB%B3%BC_%ED%94%84%EB%A1%9C%EA%B7%B8%EB%9E%A8&amp;rev=1508423986&amp;do=diff"/>
                <rdf:li rdf:resource="http://13.113.164.222/doku.php?id=blog:201703:29%EC%9D%B8%ED%84%B0%EB%84%B7%ED%86%B5%EC%A0%9C_%EA%B3%A0%EC%82%90%EC%A3%84%EB%8A%94_%EC%A4%91%EA%B5%AD_vpn%EB%8F%84_%EB%B6%88%EB%B2%95%ED%99%94_14%EA%B0%9C%EC%9B%94_%EC%9D%BC%EC%A0%9C%EB%8B%A8%EC%86%8D&amp;rev=1508423984&amp;do=diff"/>
                <rdf:li rdf:resource="http://13.113.164.222/doku.php?id=blog:201703:29%ED%8E%98%EC%9D%B4%EC%8A%A4%EB%B6%81%EC%9D%80_%EB%8B%B9%EC%8B%A0%EC%9D%B4_%ED%98%84%EC%9E%AC_%EC%97%B0%EC%95%A0_%EC%A4%91%EC%9D%B8%EC%A7%80_%EC%95%84%EB%8B%8C%EC%A7%80_%EC%95%8C%EA%B3%A0_%EC%9E%88%EB%8B%A4&amp;rev=1508423987&amp;do=diff"/>
                <rdf:li rdf:resource="http://13.113.164.222/doku.php?id=blog:201703:29after_internet_it_s_blockchain_internet_2.0&amp;rev=1508423987&amp;do=diff"/>
                <rdf:li rdf:resource="http://13.113.164.222/doku.php?id=blog:201703:29bid_for_access_to_amazon_echo_audio_in_murder_case_raises_privacy_concerns&amp;rev=1508423988&amp;do=diff"/>
                <rdf:li rdf:resource="http://13.113.164.222/doku.php?id=blog:201703:29clearing_out_the_app_stores_government_censorship_made_easier&amp;rev=1508423983&amp;do=diff"/>
                <rdf:li rdf:resource="http://13.113.164.222/doku.php?id=blog:201703:29cyberwar_for_sale&amp;rev=1508423987&amp;do=diff"/>
                <rdf:li rdf:resource="http://13.113.164.222/doku.php?id=blog:201703:29data_could_be_the_next_tech_hot_button_for_regulators&amp;rev=1508423985&amp;do=diff"/>
                <rdf:li rdf:resource="http://13.113.164.222/doku.php?id=blog:201703:29detroit_auto_show_reveals_a_google-designed_van_that_could_steer_the_industry&amp;rev=1508423987&amp;do=diff"/>
                <rdf:li rdf:resource="http://13.113.164.222/doku.php?id=blog:201703:29encrypted_messaging_platform_whatsapp_denies_backdoor_claim&amp;rev=1508423987&amp;do=diff"/>
                <rdf:li rdf:resource="http://13.113.164.222/doku.php?id=blog:201703:29if_you_want_privacy_you_need_to_run_linux&amp;rev=1508423986&amp;do=diff"/>
                <rdf:li rdf:resource="http://13.113.164.222/doku.php?id=blog:201703:29microsoft_hololens_could_help_you_find_your_keys_and_also_stalk_your_every_move&amp;rev=1508423984&amp;do=diff"/>
                <rdf:li rdf:resource="http://13.113.164.222/doku.php?id=blog:201703:29mit_uber_lyft_vital_in_reducing_congestion&amp;rev=1508423985&amp;do=diff"/>
                <rdf:li rdf:resource="http://13.113.164.222/doku.php?id=blog:201703:29peace_sign_selfies_could_let_hackers_copy_your_fingerprints&amp;rev=1508423984&amp;do=diff"/>
                <rdf:li rdf:resource="http://13.113.164.222/doku.php?id=blog:201703:29protect_your_privacy_with_anti-surveillance_clothing&amp;rev=1508423986&amp;do=diff"/>
                <rdf:li rdf:resource="http://13.113.164.222/doku.php?id=blog:201703:29vault_7_cia_hacking_tools_revealed&amp;rev=1508423985&amp;do=diff"/>
                <rdf:li rdf:resource="http://13.113.164.222/doku.php?id=blog:201703:29what_s_your_public_credit_score_the_shanghai_government_can_tell_you&amp;rev=1508423985&amp;do=diff"/>
                <rdf:li rdf:resource="http://13.113.164.222/doku.php?id=blog:201703:29what_the_cia_wikileaks_dump_tells_us_encryption_works&amp;rev=1508423984&amp;do=diff"/>
                <rdf:li rdf:resource="http://13.113.164.222/doku.php?id=blog:201703:29wikileaks_will_help_tech_companies_fix_security_flaws_assange_says&amp;rev=1508423985&amp;do=diff"/>
                <rdf:li rdf:resource="http://13.113.164.222/doku.php?id=blog:201703:31wanna_protect_your_online_privacy_open_a_tab_and_make_some_noise&amp;rev=1508423983&amp;do=diff"/>
            </rdf:Seq>
        </items>
    </channel>
    <image rdf:about="http://13.113.164.222/lib/tpl/bootstrap3/images/favicon.ico">
        <title>Freewiki</title>
        <link>http://13.113.164.222/</link>
        <url>http://13.113.164.222/lib/tpl/bootstrap3/images/favicon.ico</url>
    </image>
    <item rdf:about="http://13.113.164.222/doku.php?id=blog:201703:29%EB%82%98%EB%8A%94_%EB%82%B4%EA%B0%80_%EB%B3%B4%ED%98%B8%ED%95%9C%EB%8B%A4_%EC%9D%B8%ED%84%B0%EB%84%B7_%ED%99%9C%EB%8F%99_%EC%B6%94%EC%A0%81%EC%9D%84_%EB%A7%89%EA%B8%B0_%EC%9C%84%ED%95%9C_3%EA%B0%80%EC%A7%80_%EB%B0%A9%EB%B2%95&amp;rev=1508423986&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2017-10-19T14:39:46+0000</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>“나는 내가 보호한다” 인터넷 활동 추적을 막기 위한 3가지 방법</title>
        <link>http://13.113.164.222/doku.php?id=blog:201703:29%EB%82%98%EB%8A%94_%EB%82%B4%EA%B0%80_%EB%B3%B4%ED%98%B8%ED%95%9C%EB%8B%A4_%EC%9D%B8%ED%84%B0%EB%84%B7_%ED%99%9C%EB%8F%99_%EC%B6%94%EC%A0%81%EC%9D%84_%EB%A7%89%EA%B8%B0_%EC%9C%84%ED%95%9C_3%EA%B0%80%EC%A7%80_%EB%B0%A9%EB%B2%95&amp;rev=1508423986&amp;do=diff</link>
        <description>“나는 내가 보호한다” 인터넷 활동 추적을 막기 위한 3가지 방법

	*  Ian Paul, 나는 내가 보호한다- 인터넷 활동 추적을 막기 위한 3가지 방법,  PCWorld, 2017. 3. 27.
		*  인터넷 서비스 제공업체가 사용자의 활동 데이터를 가져가는 것을 방지하기 위해 쉽게 시작할 수 있는 3가지 방법을 알아보도록 하겠다.</description>
    </item>
    <item rdf:about="http://13.113.164.222/doku.php?id=blog:201703:29%EC%9A%B0%EB%B2%84%EC%9D%98_%EA%B7%B8%EB%A0%88%EC%9D%B4%EB%B3%BC_%ED%94%84%EB%A1%9C%EA%B7%B8%EB%9E%A8&amp;rev=1508423986&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2017-10-19T14:39:46+0000</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>우버의 그레이볼 프로그램</title>
        <link>http://13.113.164.222/doku.php?id=blog:201703:29%EC%9A%B0%EB%B2%84%EC%9D%98_%EA%B7%B8%EB%A0%88%EC%9D%B4%EB%B3%BC_%ED%94%84%EB%A1%9C%EA%B7%B8%EB%9E%A8&amp;rev=1508423986&amp;do=diff</link>
        <description>우버의 그레이볼 프로그램

우버가 한국 등 우버 서비스를 합법으로 인정하지 않은 나라에서 법 집행 당국의 추적을 피하기 위해 그레이볼 프로그램을 운영해 왔다고 합니다. 법 집행 당국의 우버 호출을 가려내되, 들키지 않으려고 가짜 우버 택시가 호출되어 움직이는 척하다가 호출을 취소하고 태우지 않았다고 합니다. 그런데 어떻게 그 호출이 법집행 당국의 것(예를 들면 그 호출이 서울시 공무원의 것)임을 알 수 있었을까요?…</description>
    </item>
    <item rdf:about="http://13.113.164.222/doku.php?id=blog:201703:29%EC%9D%B8%ED%84%B0%EB%84%B7%ED%86%B5%EC%A0%9C_%EA%B3%A0%EC%82%90%EC%A3%84%EB%8A%94_%EC%A4%91%EA%B5%AD_vpn%EB%8F%84_%EB%B6%88%EB%B2%95%ED%99%94_14%EA%B0%9C%EC%9B%94_%EC%9D%BC%EC%A0%9C%EB%8B%A8%EC%86%8D&amp;rev=1508423984&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2017-10-19T14:39:44+0000</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>인터넷통제 고삐죄는 중국, VPN도 불법화…14개월 일제단속</title>
        <link>http://13.113.164.222/doku.php?id=blog:201703:29%EC%9D%B8%ED%84%B0%EB%84%B7%ED%86%B5%EC%A0%9C_%EA%B3%A0%EC%82%90%EC%A3%84%EB%8A%94_%EC%A4%91%EA%B5%AD_vpn%EB%8F%84_%EB%B6%88%EB%B2%95%ED%99%94_14%EA%B0%9C%EC%9B%94_%EC%9D%BC%EC%A0%9C%EB%8B%A8%EC%86%8D&amp;rev=1508423984&amp;do=diff</link>
        <description>인터넷통제 고삐죄는 중국, VPN도 불법화…14개월 일제단속

	*  정주호, 인터넷통제 고삐죄는 중국, VPN도 불법화…14개월 일제단속, 연합뉴스, 2017/01/24
		*  VPN을 포함해 중국내 모든 독자, 또는 임대 전용선 사업자는 통신주관 부처의 승인을 얻지 않고는 해외 인터넷 접속 서비스를 할 수 없도록 했다.</description>
    </item>
    <item rdf:about="http://13.113.164.222/doku.php?id=blog:201703:29%ED%8E%98%EC%9D%B4%EC%8A%A4%EB%B6%81%EC%9D%80_%EB%8B%B9%EC%8B%A0%EC%9D%B4_%ED%98%84%EC%9E%AC_%EC%97%B0%EC%95%A0_%EC%A4%91%EC%9D%B8%EC%A7%80_%EC%95%84%EB%8B%8C%EC%A7%80_%EC%95%8C%EA%B3%A0_%EC%9E%88%EB%8B%A4&amp;rev=1508423987&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2017-10-19T14:39:47+0000</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>페이스북은 당신이 현재 연애 중인지 아닌지 알고 있다</title>
        <link>http://13.113.164.222/doku.php?id=blog:201703:29%ED%8E%98%EC%9D%B4%EC%8A%A4%EB%B6%81%EC%9D%80_%EB%8B%B9%EC%8B%A0%EC%9D%B4_%ED%98%84%EC%9E%AC_%EC%97%B0%EC%95%A0_%EC%A4%91%EC%9D%B8%EC%A7%80_%EC%95%84%EB%8B%8C%EC%A7%80_%EC%95%8C%EA%B3%A0_%EC%9E%88%EB%8B%A4&amp;rev=1508423987&amp;do=diff</link>
        <description>페이스북은 당신이 현재 연애 중인지 아닌지 알고 있다

	*  안하늘, 페이스북은 당신이 현재 연애 중인지 아닌지 알고 있다, 아시아경제, 2017.01.03
		*  페이스북은 빅데이터 분석을 통해 이 모든 사실을 추론









뉴스</description>
    </item>
    <item rdf:about="http://13.113.164.222/doku.php?id=blog:201703:29after_internet_it_s_blockchain_internet_2.0&amp;rev=1508423987&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2017-10-19T14:39:47+0000</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>After Internet, it's Blockchain Internet 2.0</title>
        <link>http://13.113.164.222/doku.php?id=blog:201703:29after_internet_it_s_blockchain_internet_2.0&amp;rev=1508423987&amp;do=diff</link>
        <description>After Internet, it's Blockchain Internet 2.0

	*  Sandeep Soni, After Internet, it's Blockchain Internet 2.0, Entrepreneur India, February 5, 2017
		*  What makes blockchain so acutely disruptive is the data that every transaction, every comment, every click, every website visit, every Google search that we as consumers generate remains under our control stored in the blocks, secured via cryptography and timestamped, and traceable.</description>
    </item>
    <item rdf:about="http://13.113.164.222/doku.php?id=blog:201703:29bid_for_access_to_amazon_echo_audio_in_murder_case_raises_privacy_concerns&amp;rev=1508423988&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2017-10-19T14:39:48+0000</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>Bid for Access to Amazon Echo Audio in Murder Case Raises Privacy Concerns</title>
        <link>http://13.113.164.222/doku.php?id=blog:201703:29bid_for_access_to_amazon_echo_audio_in_murder_case_raises_privacy_concerns&amp;rev=1508423988&amp;do=diff</link>
        <description>Bid for Access to Amazon Echo Audio in Murder Case Raises Privacy Concerns

	*  CHRISTOPHER MELE, Bid for Access to Amazon Echo Audio in Murder Case Raises Privacy Concerns, The New York Times, DEC. 28, 2016 
		* Once it detects the wake word, according to Amazon, the Echo starts streaming audio to the cloud, where it is secured until the customer permanently deletes it.</description>
    </item>
    <item rdf:about="http://13.113.164.222/doku.php?id=blog:201703:29clearing_out_the_app_stores_government_censorship_made_easier&amp;rev=1508423983&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2017-10-19T14:39:43+0000</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>Clearing Out the App Stores: Government Censorship Made Easier</title>
        <link>http://13.113.164.222/doku.php?id=blog:201703:29clearing_out_the_app_stores_government_censorship_made_easier&amp;rev=1508423983&amp;do=diff</link>
        <description>Clearing Out the App Stores: Government Censorship Made Easier

	*  Farhad Manjoo, Clearing Out the App Stores: Government Censorship Made Easier, The New York Times, JAN. 18, 2017
		*  China didn’t have to build a Great Firewall to do this. You all offered them an opportunity to piggyback onto your disrespect for the privacy and integrity and autonomy of your readers and users.</description>
    </item>
    <item rdf:about="http://13.113.164.222/doku.php?id=blog:201703:29cyberwar_for_sale&amp;rev=1508423987&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2017-10-19T14:39:47+0000</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>Cyberwar for Sale</title>
        <link>http://13.113.164.222/doku.php?id=blog:201703:29cyberwar_for_sale&amp;rev=1508423987&amp;do=diff</link>
        <description>Cyberwar for Sale

	*  MATTATHIAS SCHWARTZ, Cyberwar for Sale, The New York Times, JAN. 4, 2017 
		*  with the rise of private firms like Hacking Team, penetrating the email accounts of political opponents does not require the kind of money and expertise available to major powers.</description>
    </item>
    <item rdf:about="http://13.113.164.222/doku.php?id=blog:201703:29data_could_be_the_next_tech_hot_button_for_regulators&amp;rev=1508423985&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2017-10-19T14:39:45+0000</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>Data Could Be the Next Tech Hot Button for Regulators</title>
        <link>http://13.113.164.222/doku.php?id=blog:201703:29data_could_be_the_next_tech_hot_button_for_regulators&amp;rev=1508423985&amp;do=diff</link>
        <description>Data Could Be the Next Tech Hot Button for Regulators

	*  STEVE LOHR, Data Could Be the Next Tech Hot Button for Regulators, The New York Times, JAN . 8, 2017 
		*  IBM estimates that 70 percent of the world’s data is not out on the public web, but in private databases, often to protect privacy or trade secrets.</description>
    </item>
    <item rdf:about="http://13.113.164.222/doku.php?id=blog:201703:29detroit_auto_show_reveals_a_google-designed_van_that_could_steer_the_industry&amp;rev=1508423987&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2017-10-19T14:39:47+0000</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>Detroit Auto Show Reveals a Google-Designed Van That Could Steer the Industry</title>
        <link>http://13.113.164.222/doku.php?id=blog:201703:29detroit_auto_show_reveals_a_google-designed_van_that_could_steer_the_industry&amp;rev=1508423987&amp;do=diff</link>
        <description>Detroit Auto Show Reveals a Google-Designed Van That Could Steer the Industry

구글이 자율주행차에 관한 비즈니스 모델을 선보였습니다. 자율주행 차를 개발할 여력이 없는 회사(크라이슬러)와 협조하여 자율주행 모듈을 소개했는데요. 모든 모듈을 자체 생산하여 원가를 75,000달러에서 90%를 절약했다고 하니, 10,000달러 미만에 보통 차를 자율주행차로 변경시킬 수 있다고 보입니다. 다른 자동차 회사 입장에서 거금을 들여 자체적으로 자율주행연구를 할 이유가 없어 보이는데요. 구글이 하였다면 다른 회사도 하드웨어 원가절감을 할 수 있을 것이구요. 결국 자율주행차 비즈니스의 가장 중요한 경쟁요소는 하드웨어가 아니라 아마 데이터일 것입니다. 지리정보, 다른 차량의 위치, 그리고 가장 중요한 탑승객의 위치와 선호도 정보 등을 가진 기업과 그렇지 못한 기업은 경쟁이 되지 않을 것입니다. 이 부분에서 구글을 대적할 기업이 있을까요. …</description>
    </item>
    <item rdf:about="http://13.113.164.222/doku.php?id=blog:201703:29encrypted_messaging_platform_whatsapp_denies_backdoor_claim&amp;rev=1508423987&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2017-10-19T14:39:47+0000</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>Encrypted messaging platform WhatsApp denies “backdoor” claim</title>
        <link>http://13.113.164.222/doku.php?id=blog:201703:29encrypted_messaging_platform_whatsapp_denies_backdoor_claim&amp;rev=1508423987&amp;do=diff</link>
        <description>Encrypted messaging platform WhatsApp denies “backdoor” claim

	*  Natasha Lomas, Encrypted messaging platform WhatsApp denies “backdoor” claim, TechCrunch, 2017/01/13
		*  arguably the platform’s biggest security flaw remains not open sourcing its code to allow for external audits  not least given that its parent company, Facebook, has a business model based on monetizing the personal information of users via profiling their preferences and targeting them with ads.</description>
    </item>
    <item rdf:about="http://13.113.164.222/doku.php?id=blog:201703:29if_you_want_privacy_you_need_to_run_linux&amp;rev=1508423986&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2017-10-19T14:39:46+0000</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>If you want privacy you need to run Linux</title>
        <link>http://13.113.164.222/doku.php?id=blog:201703:29if_you_want_privacy_you_need_to_run_linux&amp;rev=1508423986&amp;do=diff</link>
        <description>If you want privacy you need to run Linux

	*  Steven J. Vaughan-Nichols, If you want privacy you need to run Linux, Computerworld, Jan 31, 2017
		*  As for Chrome OS, Android and iOS, come on! They’re all built around cloud services; by design, they share everything you do with third-party services. What’s the answer? Desktop Linux.</description>
    </item>
    <item rdf:about="http://13.113.164.222/doku.php?id=blog:201703:29microsoft_hololens_could_help_you_find_your_keys_and_also_stalk_your_every_move&amp;rev=1508423984&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2017-10-19T14:39:44+0000</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>Microsoft HoloLens could help you find your keys, and also stalk your every move</title>
        <link>http://13.113.164.222/doku.php?id=blog:201703:29microsoft_hololens_could_help_you_find_your_keys_and_also_stalk_your_every_move&amp;rev=1508423984&amp;do=diff</link>
        <description>Microsoft HoloLens could help you find your keys, and also stalk your every move

	*  Adi Robertson, Microsoft HoloLens could help you find your keys, and also stalk your every move, The Verge, Dec 30, 2016
		*  what’s really interesting isn’t the idea of HoloLens tracking an object. It’s HoloLens learning what items matter to you and choosing what to follow, before you ever worry about losing something.</description>
    </item>
    <item rdf:about="http://13.113.164.222/doku.php?id=blog:201703:29mit_uber_lyft_vital_in_reducing_congestion&amp;rev=1508423985&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2017-10-19T14:39:45+0000</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>MIT: Uber, Lyft Vital in Reducing Congestion</title>
        <link>http://13.113.164.222/doku.php?id=blog:201703:29mit_uber_lyft_vital_in_reducing_congestion&amp;rev=1508423985&amp;do=diff</link>
        <description>MIT: Uber, Lyft Vital in Reducing Congestion

	*  Stephanie Mlot, MIT: Uber, Lyft Vital in Reducing Congestion, PCMagazine, January 4, 2017 
		*  A new MIT study suggests ride-sharing services could eliminate 75 percent of the vehicles on public roads, without significantly impacting travel time.</description>
    </item>
    <item rdf:about="http://13.113.164.222/doku.php?id=blog:201703:29peace_sign_selfies_could_let_hackers_copy_your_fingerprints&amp;rev=1508423984&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2017-10-19T14:39:44+0000</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>Peace sign selfies could let hackers copy your fingerprints</title>
        <link>http://13.113.164.222/doku.php?id=blog:201703:29peace_sign_selfies_could_let_hackers_copy_your_fingerprints&amp;rev=1508423984&amp;do=diff</link>
        <description>Peace sign selfies could let hackers copy your fingerprints

	*  Cara McGoogan Danielle Demetriou, Peace sign selfies could let hackers copy your fingerprints ,  Telegraph, 12 January 2017
		*  fingerprints can be easily recreated from photos taken up to three metres away without the need for advanced technology</description>
    </item>
    <item rdf:about="http://13.113.164.222/doku.php?id=blog:201703:29protect_your_privacy_with_anti-surveillance_clothing&amp;rev=1508423986&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2017-10-19T14:39:46+0000</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>Protect your privacy with anti-surveillance clothing</title>
        <link>http://13.113.164.222/doku.php?id=blog:201703:29protect_your_privacy_with_anti-surveillance_clothing&amp;rev=1508423986&amp;do=diff</link>
        <description>Protect your privacy with anti-surveillance clothing

	*  Amelia Heathman, Protect your privacy with anti-surveillance clothing, Wired, 4 January 2017 
		*  artist and technologist Adam Harvey wants to create clothing that overwhelms and confuses facial recognition systems so they can’t tell the difference between clothes and their wearer.</description>
    </item>
    <item rdf:about="http://13.113.164.222/doku.php?id=blog:201703:29vault_7_cia_hacking_tools_revealed&amp;rev=1508423985&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2017-10-19T14:39:45+0000</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>Vault 7: CIA Hacking Tools Revealed</title>
        <link>http://13.113.164.222/doku.php?id=blog:201703:29vault_7_cia_hacking_tools_revealed&amp;rev=1508423985&amp;do=diff</link>
        <description>Vault 7: CIA Hacking Tools Revealed

	*  Vault 7: CIA Hacking Tools Revealed, wikileaks, 7 March 2017
		*  “Year Zero” introduces the scope and direction of the CIA's global covert hacking program, its malware arsenal and dozens of “zero day” weaponized exploits against a wide range of U.S. and European company products, include Apple's iPhone, Google's Android and Microsoft's Windows and even Samsung TVs, which are turned into covert microphones.</description>
    </item>
    <item rdf:about="http://13.113.164.222/doku.php?id=blog:201703:29what_s_your_public_credit_score_the_shanghai_government_can_tell_you&amp;rev=1508423985&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2017-10-19T14:39:45+0000</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>What's Your 'Public Credit Score'? The Shanghai Government Can Tell You</title>
        <link>http://13.113.164.222/doku.php?id=blog:201703:29what_s_your_public_credit_score_the_shanghai_government_can_tell_you&amp;rev=1508423985&amp;do=diff</link>
        <description>What's Your 'Public Credit Score'? The Shanghai Government Can Tell You

	*  Rob Schmitz, What's Your 'Public Credit Score'? The Shanghai Government Can Tell You, NPR, January 3, 2017
		*  The app uses facial recognition software to locate troves of your personal data collected by the government, and 24 hours later, you're given one of three</description>
    </item>
    <item rdf:about="http://13.113.164.222/doku.php?id=blog:201703:29what_the_cia_wikileaks_dump_tells_us_encryption_works&amp;rev=1508423984&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2017-10-19T14:39:44+0000</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>What the CIA WikiLeaks Dump Tells Us: Encryption Works</title>
        <link>http://13.113.164.222/doku.php?id=blog:201703:29what_the_cia_wikileaks_dump_tells_us_encryption_works&amp;rev=1508423984&amp;do=diff</link>
        <description>What the CIA WikiLeaks Dump Tells Us: Encryption Works

	*  THE ASSOCIATED PRESS, What the CIA WikiLeaks Dump Tells Us: Encryption Works, The New York Times, MARCH 11, 2017
		*  Seeing the CIA have to do stuff like this should reassure civil libertarians that the situation is better now than it was four years ago.</description>
    </item>
    <item rdf:about="http://13.113.164.222/doku.php?id=blog:201703:29wikileaks_will_help_tech_companies_fix_security_flaws_assange_says&amp;rev=1508423985&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2017-10-19T14:39:45+0000</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>WikiLeaks Will Help Tech Companies Fix Security Flaws, Assange Says</title>
        <link>http://13.113.164.222/doku.php?id=blog:201703:29wikileaks_will_help_tech_companies_fix_security_flaws_assange_says&amp;rev=1508423985&amp;do=diff</link>
        <description>WikiLeaks Will Help Tech Companies Fix Security Flaws, Assange Says

	*  SCOTT SHANE, DAVID E. SANGER and VINDU GOEL, WikiLeaks Will Help Tech Companies Fix Security Flaws, Assange Says, The New York Times, MARCH 9, 2017 
		*  A new RAND Corporation study concludes that these “zero day” exploits, and the vulnerabilities they are based on, last longer than most thought. It found that the average vulnerability had a “life expectancy” of 6.9 years before it became useless to hackers.</description>
    </item>
    <item rdf:about="http://13.113.164.222/doku.php?id=blog:201703:31wanna_protect_your_online_privacy_open_a_tab_and_make_some_noise&amp;rev=1508423983&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2017-10-19T14:39:43+0000</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>Wanna Protect Your Online Privacy? Open a Tab and Make Some Noise</title>
        <link>http://13.113.164.222/doku.php?id=blog:201703:31wanna_protect_your_online_privacy_open_a_tab_and_make_some_noise&amp;rev=1508423983&amp;do=diff</link>
        <description>Wanna Protect Your Online Privacy? Open a Tab and Make Some Noise

	*  Emily Dreyfuss, Wanna Protect Your Online Privacy? Open a Tab and Make Some Noise, Wired, 03.29.17.
		* This signal-jamming offers just one modest example of the larger theory of obfuscation, the idea that if you can’t disappear online at least you can hide yourself in a miasma of noise.</description>
    </item>
</rdf:RDF>
