FTC to Big Tech: No Back Doors — Purism Was Already There Protecting against Jurisdictional Arbitrage When the Federal Trade Commission (FTC) makes a determined move like this, it’s not a casual policy tweak — it’s a line drawn in permanent ink. On August 21, FTC Chairman Andrew Ferguson sent formal notices to over a […] The post FTC Issues Letters to Big Tech: No Back Doors appeared first on Purism.| Purism
Purism makes premium phones, laptops, mini PCs and servers running free software on PureOS. Purism products respect people's privacy and freedom while protecting their security.| Purism
On September 30, 2025, The Washington Post reported a quiet trend in Washington, D.C.: the return of landline phones among officials and journalists seeking refuge from the omnipresent surveillance of smartphones. In a recent story, NBC News spotlighted parents in Maine and Seattle who are reviving landlines for their children—creating “landline pods” so kids can connect without the addictive pull of screens or the predatory reach of social media platforms. The post Dialing Back to Move...| Purism
The lawsuits now circling Apple are not just about stolen phones. They are about stolen selves—stolen data, stolen memories, stolen identities. The post Who Owns Your Digital Self? appeared first on Purism.| Purism
In September, a single misconfiguration in Life360’s Android API turned a “family safety” app into a map of human lives exposed. More than 442,000 users had their precise GPS trails, names, and phone numbers dumped online by a threat actor known as Emo. The post Safety Without Surveillance: Designing Digital Sovereignty for All Ages appeared first on Purism.| Purism
The Justice Department and a coalition of states are pursuing antitrust action against Google, accusing it of running monopolistic ad-tech systems that exploit users and lock out competition. Regulators are weighing remedies that could force structural changes to Google’s ad empire. The post Purism Approach vs. Google Model appeared first on Purism.| Purism
Three recent IT‑privacy headlines tell the same unsettling story: that consumer trust is being squandered The post Freedom by Design: Why Purism Rejects Big IT Status Quo appeared first on Purism.| Purism
Every American should be alarmed. It was recently reported that a whistleblower from inside the Social Security Administration, Chief Data Officer Charles Borges, has revealed that the Department of Government Efficiency (DOGE) copied a live, full-fidelity version of the nation’s Social Security database onto an Amazon-hosted cloud environment that allegedly lacked independent security oversight. This affects any American who’s ever filled out a Social Security form, The post When “Ef...| Purism
The New York Times recently reported that a hacker using the pseudonym “Tim” scraped publicly available data from Spotify and published it on his own website. Using automated bots, “Tim” harvested user playlists — many of them tied to identifiable names, locations, and even personal notes in titles or descriptions. The post Spotify “Panama” Leak Is a Wake-Up Call for Digital Privacy appeared first on Purism.| Purism
In her September 15, 2025, New York Times opinion piece, Elizabeth Daniel Vasquez lays bare a reality too many Americans have ignored: the New York Police Department has quietly built one of the most expansive, integrated surveillance systems in the nation’s history. The post The NYPD’s $3B “Domain Awareness System” isn’t just a New York problem—it’s a warning for every American appeared first on Purism.| Purism
Recently, the EU Data Act was officially enacted — and with it, a new era of enforceable digital rights. Where the GDPR set the policy framework, the Data Act demands proof: verifiable, auditable systems that deliver true data portability, secure interoperability, and privacy‑by‑design across sectors. The post Living in the Regulatory Future: Purism, the EU Data Act, and America’s Patchwork Privacy Laws appeared first on Purism.| Purism
When Google agreed to pay $30 million to settle a class-action lawsuit over its unauthorized collection of children’s data on YouTube, it wasn’t a revelation—it was a confirmation. A confirmation that Google’s public posture of compliance often masks a deeper, more calculated strategy: delayed monetization through long-tail data mining. The post Google Mishandling School Children’s Data appeared first on Purism.| Purism
On September 8th, Check Point Research confirmed what many of us in the privacy and security trenches have been warning about for years: the weakest link in your security posture may not be your systems at all — it may be the invisible web of third-party integrations you’ve tacitly approved, often without full visibility into their downstream dependencies. The post Invisible Dependencies, Visible Damage: The Case for Supply Chain Hygiene appeared first on Purism.| Purism
When the FBI, CISA, and NSA release joint advisories, it’s not theory — it’s reality. The latest warnings about Salt Typhoon and Volt Typhoon should be read as a weather alert: the storm isn’t “out there,” it’s already in progress. These campaigns target infrastructure, communications, and supply chains with patience and persistence. The post From Typhoon to Action: A Purism Playbook for Hardening Your Defenses appeared first on Purism.| Purism
Yesterday, Apple unveiled the latest iPhone lineup adding an iPhone Air — described by them as their thinnest, lightest yet. The headlines were predictable fanfare while missing the larger points. The post Apple’s Latest iPhone: Sleeker Walls, Same Garden appeared first on Purism.| Purism
California’s New Privacy Rules Are a National Signal The California Privacy Protection Agency’s latest regulations redraw the playing field. This is the first set of rules in the U.S. to require: Annual, independent cybersecurity audits for high-risk businesses Comprehensive risk assessments for key data processing activities Bias and privacy impact reviews for automated decision-making systems […] The post California’s New Privacy Rules Are a National Signal appeared first on Purism.| Purism
Purism AweSIM: A Privacy Shield in the Wake of AT&T Data Breaches AT&T was found liable to pay customers an estimated $177M to resolve multiple lawsuits stemming from two separate data breaches – March 30 and July 12, 2024. Both breaches exposed huge amounts of Personal Identifiable Information (PII) to the public. These two breaches […] The post A Privacy Shield in the Wake of AT&T Data Breaches appeared first on Purism.| Purism
Utah joined the list of states in 2025 that have enacted legislation regulating what information can be reported to organizations requesting background check reports. Utah Senate Bill 70 (S.B. 70) was unanimously passed by legislative votes and signed by Governor Spencer J. Cox on March 26, 2025. These amendments modify Utah Code Section 13-45-102, as last amended by Laws of Utah 2015, Chapter 191, and enact Utah Code Section 13-45-601. The provisions of this bill went into effect on May 7, 2...| Industry News
Purism makes premium phones, laptops, mini PCs and servers running free software on PureOS. Purism products respect people's privacy and freedom while protecting their security.| Purism
In Part Three of our FAQ series on Washington state’s My Health My Data (MHMD) Act, we answer questions related to the MHMD Act’s enforcement risks –| cyber/data/privacy insights