<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:xhtml="http://www.w3.org/1999/xhtml">
  <url>
    <loc>https://theprivacyblog.com/blog</loc>
    <changefreq>daily</changefreq>
    <priority>1.0</priority>
    <lastmod>2020-01-03</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/censorship/iraq-blocking-social-media-as-a-defense-against-isis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-06-13</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/anonymity/anonymity-is-only-as-stong-as-the-group-you-are-hiding-in</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-08-22</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/legal/law-enforcement-cant-keep-your-seized-files-forever-anymore</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-06-19</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/facebook-2/facebook-messenger-alarmism-is-distracting-from-real-internet-privacy-issues</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-08-11</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/anonymity/the-importance-of-privacy-the-power-of-anonymizers-a-talk-with-lance-cottrell-from-ntrepid-the-social-network-station</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-06-30</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/online-privacy/the-social-network-show-on-kdwn-presents-lance-cottrell-the-social-network-station</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-07-22</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/censorship/specifics-on-recent-iraq-censorship-orders</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-06-16</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/national-security/video-hacker-war-drives-san-francisco-cloning-rfid-passports-engadget</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2009-02-08</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tracking-2/canvas-fingerprinting-a-reality-check</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-07-31</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/anonymity/canadian-supreme-court-ruling-protects-on-line-anonymity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-06-16</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/identity-theft/how-genealogy-data-can-lead-to-identity-theft</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-07-21</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/anonymity/data-anonymization-is-hard-this-time-shown-with-nyc-taxi-data</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-06-23</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/censorship/iran-criminalizes-facebook</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-06-16</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/anonymity/in-defense-of-extreme-unmoderated-anonymity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2009-04-18</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/anonymity/why-private-browsing-doesnt-exist-and-how-to-fix-it</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-07-08</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/cellular/chicago-to-track-cell-phones-with-streetlight-poles</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-06-23</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/apple/2-apple-security-fumbles-random-mac-and-password-prediction</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-09-30</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/computer-security/protect-new-darkhotel-type-attacks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-11-12</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/cellular/supreme-court-requires-warrent-for-cell-phone-searches</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-06-26</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/apple/protect-mac-rootpipe</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-11-05</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/vulnerability/superfish-worst-case-certificate-abuse</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2015-02-19</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/vulnerability/use-vpn-avoid-gogo-man-middle-vulnerability</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2015-01-06</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/uncategorized/sony-hack-shows-hard-stay-anonymous</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2015-01-08</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/security-breaches/you-might-be-hacked-through-your-lightbulbs</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-07-07</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/podcasts/the-privacy-blog-podcast-ep-22</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-08-03</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/uncategorized/social-networkers-risk-more-than-privacy-privacy-digest</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2009-08-28</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/podcasts/snipers-watering-hole</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2015-02-13</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/apple/a-tale-of-bad-passwords-and-nude-photos</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-09-02</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/censorship/russia-accelerates-requirment-for-local-internet-control</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-09-26</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/apple/holder-is-wrong-backdoors-and-security-can-not-coexist</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-10-01</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/anonymity/google-thinks-you-dont-need-privacy</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2009-12-15</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/legal/swcaas-secret-warrant-compliance-as-a-service</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-09-05</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/anonymity/the-privacy-blog-podcast-ep-23</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-09-05</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/blogging/50-best-blogs-for-privacy-nuts-by-e-justice-blog</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2009-06-17</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/anonymizer/chaos-computer-club-censored</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-12-08</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/anonymity/are-free-proxies-hurting-your-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2015-01-05</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/online-privacy/dropbox-demonstrates-importance-good-password-hygiene</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-10-14</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/cellular/protect-security-isps-stripping-email-encryption</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-11-14</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/international/security-of-offshore-servers-becoming-even-more-illusory</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-09-22</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/china/new-rules-in-china-upset-western-tech-companies-nytimes-com</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2015-02-01</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/anonymity/can-trust-privacy</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-10-22</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/anonymity/security-implications-lizard-squad-attack-tor</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2015-01-05</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/uncategorized/the-privacy-blog-podcast-ep-21</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-07-01</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/russia-2/russia-has-put-a-bounty-on-tors-head</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-07-29</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/eu/showdown-us-search-warrants-vs-eu-privacy-laws</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-07-31</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/interview-2/the-big-hack-or-maybe-not-the-social-network-station</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-08-11</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/anonymity/attacks-on-anonymity-conflate-anonymous-speech-with-trollish-behavior-techdirt</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-08-26</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/anonymity/cosplay-for-privacy</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-09-02</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/personal-privacy/false-sense-of-security-exposes-escort-service-customers</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-09-09</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/apple/apple-cant-decrypt-your-phone</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-09-26</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/internet/a-demonstration-of-a-vulnerability-of-cloud-computing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2009-03-08</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/internet/more-proof-that-the-web-security-model-is-totaly-broken</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-07-09</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/censorship/google-unblocked-in-china-after-tiananmen-anniversary-has-passed</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-07-11</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/uncategorized/the-proxy-fight-for-iranian-democracy-renesys-blog</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2009-06-22</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/location/uber-abusing-trust-tracking-reporters</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-11-19</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/podcasts/badusb-security-vulnerability-with-no-fix-coming-any-time-soon</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-10-03</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/cryptography/if-you-dont-admit-you-wont-decrypt</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-06-26</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/internet/new-russian-law-requires-data-to-be-stored-inside-russia</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-07-09</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/anonymity/attack-on-tor-may-have-exposed-hidden-services-and-more</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-07-30</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/anonymity/google-stands-up-to-korean-push-against-anonymity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2009-04-19</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/anonymity/brazil-enforcing-ban-on-anonymity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-08-20</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/cellular/mysterious-phony-cell-towers-could-be-intercepting-your-calls-popular-science</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-09-16</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/anonymity/two-new-attacks-tor</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-10-25</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/anonymity/121</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2009-09-27</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/anonymity/canadian-privacy-services-insecure-by-law</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2015-01-05</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/security-breaches/lessons-of-the-ashley-madison-hack-and-data-dump</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2015-08-20</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/presentation/targeting-trend-protect</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-03-09</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/anonymity/once-again-google-is-in-a-tricky-spot-with-censorship-this-time-in-india</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2010-01-04</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/anonymizer/the-privacy-blog-podcast-ep-12-the-court-ruling-against-googles-wi-fi-snooping-vulnerabilities-in-the-iphone-fingerprint-scanner-and-security-tips-for-ios-7</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2013-09-27</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/uncategorized/downloading-files-dangerous-tips-can-keep-safe</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-07-01</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/physical-security/us-apologizes-to-billionaire-added-to-terror-no-fly-list-abc-news</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2010-05-28</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/censorship/google-human-rights-accounts-attacked-from-china</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2010-01-12</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/censorship/india-censorship-on-then-off-again</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2015-08-06</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/uncategorized/dutch-isps-no-longer-required-to-retain-data</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2015-03-12</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/uncategorized/unauthorized-ssl-certificates-put-everyone-at-risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2015-03-24</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/announcements/anonymous-ipad-anyone</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2010-04-03</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/announcements/anonymizer-universal-product-suite-launched</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2010-02-23</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/security-breaches/pos-breaches-threaten-holiday-buying-season</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2015-11-30</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/musings/fighting-cybercrime-vs-protecting-citizens</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-05-09</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/podcasts/what-hand-sanitizer-can-teach-us-about-cybersecurity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2015-04-29</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/personal-privacy/why-the-fbi-apple-hack-is-a-good-thing-for-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-03-29</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/free-speech/the-privacy-blog-podcast-ep-7-blacklisted-ssl-certificates-social-media-hacking-and-the-right-to-be-forgotten-online</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2013-04-26</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/malware/macs-not-safe-bears</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-09-27</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/internet/uk-insurer-raises-rates-on-social-network-users</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2010-03-10</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/anonymity/pseudonyms-the-natural-state-of-online-identity-privacy-digest</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2010-04-06</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/internet/new-privacy-settings-for-facebook</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2010-05-31</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/anonymity/tor-may-actually-reduce-your-privacy</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2010-06-02</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/physical-security/schneier-on-security-disabling-cars-by-remote-control</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2010-03-18</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/anonymity/saving-internet-anonymity-the-struggle-is-joined</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2010-04-18</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/internet/google-doubleclick-merger-concerns</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2007-04-20</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/announcements/declaration29-eu-plan-to-retain-data-on-all-internet-searches</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2010-06-28</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/censorship/china-may-have-temporarily-disabled-access-to-google</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2010-03-31</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/internet/the-library-of-congress-will-publicly-archive-every-tweet-ever-posted</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2010-04-20</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/announcements/privacy-and-corporations-at-cfp-conference</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2010-05-26</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/internet/april-2-2007-fortify-software-documents-pervasive-and-critical-vulnerability-in-web-20</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2007-04-17</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/announcements/facebook-session-hijack-video</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2010-07-02</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/financial-institutions/report-irs-bungles-may-imperil-data-newsblog-cnet-newscom</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2007-04-07</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/international/uk-isp-talktalk-monitoring-its-customers-online-activity-without-consent</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2010-07-29</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/uncategorized/gary-mcgraw-interviews-silver-bullet-security-podcast</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-07-28</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/stupidity/so-many-reasons-to-never-buy-a-d-link-router</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-10-03</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/anonymity/intelfusion-use-a-proxy-server-feed-an-intel-service</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2010-04-29</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/computer-security/google-street-view-vans-intercepted-sensitive-data</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2010-06-21</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/internet/lawmakers-to-introduce-new-internet-privacy-bill-npr</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2010-06-28</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/geolocation/google-opt-out-feature-lets-users-protect-privacy-by-moving-to-remote-village-the-onion-americas-finest-news-source-onion-news-network</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2010-06-29</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/free-speech/mixed-feelings-about-whitehouse-use-of-outside-email-accounts</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2007-04-20</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/security-breaches/hola-vpn-service-security-train-wreck</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2015-06-03</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/location/security-lessons-pokemon-go-catch</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-07-12</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/security-breaches/more-news-on-wireless-insecurity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2007-04-05</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/hacking/how-was-the-internet-of-things-able-to-take-down-the-internet</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-10-24</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/surveillance/your-android-phone-may-be-passing-your-texts-to-china</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-11-15</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/passwords-2/do-you-use-any-of-the-worst-passwords-of-2016</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-01-25</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/uncategorized/the-looming-end-of-network-neutrality-and-how-to-protect-yourself</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-12-13</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/internet/twitter-privacy-risks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2007-04-05</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/legislation/louisiana-use-a-map-go-to-jail-law</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2010-05-31</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/announcements/update-on-new-products</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2010-01-04</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/cryptography/huge-vulnerability-in-encrypted-usb-drives</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2010-01-05</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/stupidity/seriously-tinder-cleartext-in-2018</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-01-24</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/internet/white-house-proposes-warrantless-access-to-internet-activity-records</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2010-07-29</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/anonymity/tor-partially-blocked-in-china</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2010-01-26</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/computer-security/collection-of-location-info-on-iphones-and-others</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2010-06-22</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/announcements/new-anonymizer-knowledge-center</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2010-07-02</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/financial-institutions/filing-your-taxes-online</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2007-04-05</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/computer-security/copy-paste-intercept-snoop</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2010-05-31</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/anonymity/isps-will-attach-your-zip-to-all-web-requests</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2010-06-23</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/announcements/the-end-of-an-era</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-11-21</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5bf312d73917ee59c6a6ef5b/1542662331724-C47B2CYY5U123WL7IH02/Anonymizer-2017-02.jpg</image:loc>
      <image:title>The Privacy Blog - The End of an Era</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/announcements/cypherpunk-retrospective-at-20th-anniversary-cfp-conference</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2010-05-26</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/anonymity/privacy-network-tor-suffers-breach-privacy-digest</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2010-01-26</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/censorship/google-stops-censoring-in-china</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2010-03-22</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/online-privacy/privacy-survey</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2010-07-18</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/internet/sidejacking</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2007-08-04</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/computer-security/revenge-of-the-clipper-chip</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2010-09-29</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/international/cyberterrorism-trends</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2007-07-11</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/internet/our-facebook-hack-has-been-automated</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2010-10-25</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/musings/the-fear-tax</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2010-08-20</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/uncategorized/india-continues-move-towards-surveillance-state</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2010-09-02</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/legal/debate-on-recording-on-duty-police</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2010-08-20</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/uncategorized/google-shareholders-push-back-on-censorship</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2007-05-03</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/internet/cio-china-makes-viruses-for-cyberwar-first-strike</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2007-06-12</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/geolocation/photo-location-risk-and-some-good-news</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2011-05-09</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/geolocation/facebook-introduces-places-location-services</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2010-08-20</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/geolocation/looks-like-i-was-right-about-apple-building-a-wifi-location-database</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2010-07-29</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/first-amendment/countries-continue-to-try-to-tighten-their-grip-on-the-internet</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2007-05-02</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/anonymity/google-president-opposes-anonymity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2010-08-06</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/uncategorized/wsjcom-articles-on-internet-profiling-and-targeting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2010-08-04</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/announcements/rim-averts-blackberry-ban-in-uae-security-cnet-news</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2010-10-08</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/computer-security/a-very-nice-analysis-of-the-lockheed-martin-network-breach</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2011-05-31</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/international/hacks-hit-embassy-government-e-mail-accounts-worldwide</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2007-08-31</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/anonymizer/recent-interview-i-gave-on-the-need-for-anonymity-in-business</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2011-06-29</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/cryptography/matt-blaze-wiretapping-and-cryptography-today</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2011-07-28</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/location/micosofts-google-and-skyhook-enable-tracking-of-mobile-devices</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2011-08-03</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/anonymity/facebook-says-anonymity-on-the-internet-has-to-go-away</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2011-08-03</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/internet/the-trial-of-fake-steve-jobs-how-the-anonymous-author-was-identified</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2007-08-06</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/anonymity/debate-about-activist-need-for-anonymity-on-facebook</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2011-02-23</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/national-security/germany-wants-to-spy-on-suspects-via-web</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2007-08-31</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/computer-security/breach-in-the-trust-of-the-global-public-key-infrastructure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2010-08-16</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/internet/tor-hack-proposed-to-catch-criminals</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2007-06-12</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/internet/testing-if-opt-out-really-lets-you-opt-out</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2007-07-25</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/india/more-evidence-that-rim-can-let-governments-monitor-blackberrys</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2010-08-30</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/censorship/jillian-c-york-haystack-and-media-irresponsibility</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2010-09-21</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/google/google-vans-captured-emails-and-passwords</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2010-10-25</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/financial-institutions/loan-rates-based-on-your-browser</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2010-11-05</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/free-speech/yahoo-seeks-to-dismiss-china-case-yahoo-news</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2007-09-04</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/announcements/anonymizer-nevercookie-tool-is-now-available</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2010-11-23</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/stupidity/schneier-on-security-full-body-scanners-whats-next</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2010-12-03</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/internet/rogue-nodes-turn-tor-anonymizer-into-eavesdroppers-paradise</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2007-09-10</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/internet/facebook-violates-privacy-policy</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2010-10-18</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/internet/ftc-endorses-do-not-track-concept</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2010-12-03</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/personal-privacy/e-voting-predicament-not-so-secret-ballots-cnet-newscom</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2007-08-20</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/cellular/amazing-power-and-danger-of-data-retention</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2011-02-25</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/internet/house-panel-votes-to-mandate-massive-user-tracking</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2011-07-30</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/internet/how-search-engines-rate-on-privacy-cnet-newscom</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2007-08-15</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/hacking/war-texting-attack-hacks-car-alarm-system-dark-reading</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2011-07-29</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/anonymity/eric-schmidt-against-anonymity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2010-08-11</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/free-speech/google-wants-shareholders-to-permit-censorship</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2007-05-04</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/anonymity/seeking-address-why-cyber-attacks-are-so-difficult-to-trace-back-to-hackers-scientific-american</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2011-06-16</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/online-privacy/big-public-email-database-with-some-interesting-efforts-at-privacy-launched-this-month</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2011-06-21</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/anonymizer/forbes-picks-up-the-tech-review-article</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2011-06-29</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/internet/technology-firms-like-self-regulation-for-privacy-protection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2010-10-07</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/anonymity/using-language-patterns-to-pierce-anonymity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2011-03-15</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/internet/lawsuit-filed-to-stop-history-sniffing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2010-12-06</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/uncategorized/specter-of-mandatory-data-retention</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2011-01-25</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/personal-privacy/five-false-security-vs-privacy-arguments-from-salon-com</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2011-06-07</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/innovation/wikipedia-spin-doctors-revealed-yahoo-news</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2007-08-15</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/geolocation/facebook-automatically-tagging-your-face-in-pictures</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2011-06-08</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/cryptography/security-of-blackberry-in-question</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2010-08-09</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/computer-security/hack-exploits-google-street-view-to-find-victims-the-new-new-internet</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2010-08-12</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/announcements/anonymizer-survey-finds-most-consumers-confused-about-online-safety-measures</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2010-10-20</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/anonymity/reader-question-on-privacy-software</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2011-01-11</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/internet/bbc-news-details-of-100m-facebook-users-collected-and-published</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2010-07-29</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/anonymity/browser-privacy-modes-not-so-private-after-all-pcworld</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2010-08-09</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/announcements/slashdot-web-based-anonymizer-discontinued</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2007-07-31</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/computer-security/excellent-eff-post-on-failures-of-cryptography-regulation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2010-10-21</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/internet/some-internet-trackers-to-start-transparency-and-opt-out-program</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2010-12-03</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/computer-security/stolen-credit-card-website-hacked</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2011-08-15</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/fiction/from-the-magazine-radar-online-cory-doctorow-imagines-a-world-in-which-google-is-evil</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2007-09-21</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/cryptography/nokia-does-a-man-in-the-middle-attack-on-your-secure-mobile-browsing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2013-01-14</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/internet/online-privacy-for-young-people-thats-old-school-usatodaycom</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2007-10-24</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/free-speech/a-question-of-identity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2008-01-15</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/free-speech/pm-david-cameron-on-censorship-bad-when-you-do-it-ok-when-i-do-it</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2011-08-13</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/internet/private-youtube-videos-expose-thumbnail-images</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2011-10-03</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/google/turn-off-google-search-history-before-the-new-privacy-policy-takes-effect</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2012-02-28</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/internet/amazon-wishlist-can-expose-your-address-to-strangers</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2011-08-16</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/online-privacy/the-anonymity-experiment-popular-science</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2008-02-13</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/internet/sneaky-tracking-code-finally-purged-from-microsoft-sites-•-the-register</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2011-08-24</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/censorship/interesting-study-of-message-deletion-censorship</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2012-03-29</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/biometrics/the-real-fbi-facial-recognition-project</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2012-09-11</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/internet/features-radar-online-i-spy</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2007-09-21</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/anonymity/anonymizer-survey-anti-virus-and-firewall-popular-but-ineffective-privacy-protectors</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2011-10-24</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/email-security/yahoo-scolded-for-helping-china-imprison-dissident-msn-money</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2007-11-09</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/internet/researchers-show-about-a-dozen-us-isps-redirecting-search-requests</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2011-08-05</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/anonymity/fbi-anonymity-implies-terrorist</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2012-02-08</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/personal-privacy/how-to-physically-take-a-computer-without-interrupting-the-power</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2008-02-22</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/international/consumer-privacy-bill-of-rights-will-be-hard-to-enforce</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2012-02-23</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/internet/us-drafting-plan-to-allow-government-access-to-any-email-or-web-search</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2008-01-15</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/free-speech/india-asks-social-network-sites-to-manually-screen-all-posts</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2011-12-06</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/fair-use-and-drm/automation-and-content-blocking-dont-mix</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2012-09-05</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/censorship/it-looks-like-syria-is-back</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2012-12-01</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/facebook-2/facebook-like-not-protected-speech-in-virginia</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2012-05-04</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/anonymity/a-new-modest-proposal-for-the-internet</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2012-09-06</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/email-security/facebook-tries-to-force-you-to-use-their-email</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2012-06-26</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/online-privacy/fragile-anonymity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2008-01-15</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/uncategorized/yahoo-to-ignore-ie-10-do-not-track</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2012-10-30</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/national-security/an-example-of-the-power-of-social-engineering</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2008-02-21</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/email-security/steroid-bust-shows-feds-can-still-get-at-private-and-secure-e-mail</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2007-11-09</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/censorship/google-gets-55-more-government-information-requests-in-2012-than-2010</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2012-11-14</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/uncategorized/internet-explorer-vulnerability-allows-mouse-tracking</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2012-12-12</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/email-security/schneier-on-security-domain-in-the-middle-attacks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2011-09-19</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/anonymity/privacy-logging-policies-and-trackrecord</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2011-09-27</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/anonymizer/google-tricks-ios-safari-into-tracking-you</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2012-02-17</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/anonymity/printers-watermark-your-documents</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2012-05-25</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/uncategorized/disparate-national-laws-trample-privacy-expectations</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2008-01-15</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/uncategorized/picking-powerful-pins</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2012-09-19</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/computer-security/social-engineering-the-oldest-and-best-trick-in-the-book</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2012-09-27</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/cellular/app-accuses-you-of-piracy-using-your-own-twitter-account</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2012-11-14</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/censorship/china-launches-mitm-attack-on-github</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2013-01-31</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/anonymity/my-philosophy-on-privacy-and-anonymity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2012-08-20</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/hacking/anonymous-antisec-lied-about-ios-udid-leak</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2012-09-11</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/online-privacy/script-attack-for-capturing-your-browser-history</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2008-02-10</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/internet/looks-like-java-is-still-vulnerable-broken</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2013-01-18</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/internet/comcast-really-does-block-bittorrent-traffic-after-all-the-iconoclast-politics-law-and-technology-cnet-newscom</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2007-10-28</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/free-speech/ireland-to-start-broad-data-retention</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2008-02-02</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/anonymizer/the-privacy-podcast-ep-2-website-pricing-tactics-and-the-dangers-of-using-wi-fi-while-traveling</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2012-11-16</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/censorship/syria-switches-tactics-and-kills-their-internet</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2012-11-30</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/cryptography/does-the-fifth-amendment-protect-the-refusal-to-reveal-computer-passwords-in-a-dubious-ruling-a-vermont-magistrate-judge-says-yes</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2008-02-20</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/cryptography/whole-disk-encryption-highly-vulnerable-to-physical-attack</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2008-02-21</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/announcements/new-look-for-the-blog</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2012-07-06</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/internet/consumer-advocates-seek-a-do-not-track-list-new-york-times</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2007-11-15</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/uncategorized/free-secure-email-certificates-secure-email-certificate-email-security-digital-email-signatures</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2008-01-15</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/podcasts/the-privacy-blog-podcast-ep-3-the-top-privacy-and-security-events-of-2012</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2012-12-24</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/computer-security/the-ios-udid-leak</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2012-09-04</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/email-security/the-privacy-podcast-ep-1-security-of-online-accounts-and-nyms-user-tips</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2012-10-15</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/online-privacy/australians-should-use-us-ip-addresses-to-save-money</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2012-10-25</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/malware/dark-alleys-of-the-internet-not-actually-the-dangerous-parts</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2013-01-31</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/hacking/more-evidence-of-the-danger-of-hotel-internet</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2012-11-08</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/computer-security/a-peak-at-the-cybercrime-economy</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2013-01-21</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/podcasts/the-privacy-blog-podcast-ep-4-data-privacy-day-privacy-legislation-social-media-and-corporate-data-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2013-01-22</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/anonymity/have-you-seen-your-digital-footprint-lately</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2013-01-28</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/computer-security/signed-mac-malware-discovered-on-activists-laptop</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2013-05-17</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/censorship/finnish-government-blacklists-free-speech-site</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2008-02-22</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/cryptography/google-upgrades-ssl-certs-to-2048-bit</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2013-05-24</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/national-security/law-enforcement-back-doors</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2013-06-04</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/internet/security-by-obscurity-and-personality-shards</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2013-02-19</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/email-security/will-a-warrent-be-required-to-access-your-email</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2013-03-19</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/china/devastatingly-effective-spear-phishing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2013-03-04</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/censorship/swiss-bank-in-wikileaks-case-abruptly-abandons-lawsuit-the-iconoclast-politics-law-and-technology-cnet-newscom</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2008-03-09</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/anonymity/david-brin-rebuts-schneier-in-defense-of-a-transparent-society</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2008-03-15</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/anonymity/security-and-privacy-arent-opposites</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2008-02-24</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/anonymity/wikileaks-domain-name-yanked-in-spat-over-leaked-documents-the-iconoclast-politics-law-and-technology-cnet-newscom</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2008-02-22</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/internet/dea-cant-break-apple-imessage-encryption</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2013-04-04</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/hacking/the-power-we-give-to-social-media</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2013-04-26</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/announcements/the-privacy-blog-podcast-ep-6-breaking-privacy-news-facebook-likes-predict-personality-googles-wi-fi-sniffing-and-the-six-strikes-anti-piracy-policy</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2013-03-22</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/censorship/no-porn-on-uk-wifi</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2013-04-26</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/facebook-2/the-privacy-blog-podcast-ep-9-government-surveillance-programs-facebook-shadow-profiles-and-apples-weak-hotspot-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2013-06-28</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/china/yahoo-posts-pictures-of-wanted-tibetans</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2008-03-24</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/announcements/big-announcement</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2008-05-01</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/cellular/no-warrant-needed-for-cell-location-information-in-the-fifth-us-circuit</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2013-07-31</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/censorship/objectionable-material-of-any-kind-or-nature-not-allowed</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2008-03-24</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/cellular/cloud-and-telecom-needs-the-same-legal-protection-as-snail-mail</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2013-05-16</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/cryptography/security-guide-to-customs-proofing-your-laptop</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2008-03-31</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/internet/isp-admits-to-collecting-web-surfing-data</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2008-05-16</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/censorship/china-net-censorship-during-the-olympics</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2008-05-11</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/hacking/did-anyone-get-the-name-of-that-hacker-who-pwned-me</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2013-03-18</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/national-security/bruce-schneiers-security-matters-the-myth-of-the-transparent-society</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2008-03-07</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/presentations/privacy-explainer-from-zero-knowledge</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2013-04-01</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/guest-blog/why-californias-suggested-100-word-privacy-policy-is-the-best-worst-idea</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2013-05-02</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/china/government-enabled-chinese-criminal-hacking</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2013-05-21</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/announcements/the-privacy-blog-podcast-ep-10-storage-capacity-of-the-nsa-data-center-royal-baby-phishing-attacks-and-how-your-sim-card-is-putting-you-at-risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2013-07-31</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/anonymity/it-is-not-easy-to-stay-private</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2008-05-13</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/musings/google-glass-and-surveillance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2013-05-09</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/cryptography/can-you-be-forced-to-decrypt-your-files</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2013-06-04</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/android-2/easy-bypass-to-android-app-signing-discovered</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2013-08-30</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/uncategorized/apple-pulls-anticensorship-app-from-itunes-store</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2013-10-03</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/cryptography/blacklisting-ssl-certificate-authorities</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2013-04-26</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/international/do-you-have-a-right-to-be-forgotten</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2013-04-29</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/hacking/attackers-are-going-after-water-plants-and-other-infrastructure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2013-05-17</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/china/the-privacy-blog-podcast-ep-8-phishing-attacks-chinese-hackers-and-google-glass</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2013-05-28</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/censorship/shanghai-getting-more-relaxed-great-firewall</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2013-09-24</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/china/chinese-dos-attack-on-cnn-called-off</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2008-04-20</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/computer-security/prism-fears-being-used-by-scammers</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2013-09-17</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/personal-privacy/voip-who-might-be-spying-on-your-communications-hint-its-not-just-the-nsa-voip-news</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2008-03-14</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/censorship/japanese-ask-sites-to-block-abusive-tor-users</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2013-05-01</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/musings/is-anyone-here-actually-a-bad-guy</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2013-05-09</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/social-networking/postmortem-social-media-a-k-a-virtual-zombies</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2013-04-29</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/online-privacy/teens-are-not-the-no-privacy-generation-after-all</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2013-08-27</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/anonymizer/the-privacy-blog-podcast-ep-11-lavabit-silent-circle-shutdown-hoarding-bitcoins-and-spy-trash-cans-in-london</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2013-09-03</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/cryptography/analysis-of-the-bullrun-leaks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2013-09-10</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/uncategorized/maskme-is-a-good-complement-to-anonymizer</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2013-07-24</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/uncategorized/is-the-us-safer-than-the-eu-for-webmail-privacy</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2013-10-21</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/uncategorized/the-privacy-blog-podcast-ep-13</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2013-10-29</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/cryptography/firewire-enables-direct-hack-against-any-os</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2008-03-24</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/uncategorized/now-your-appliances-might-be-spying-on-you</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2013-10-29</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/anonymity/the-privacy-blog-podcast-ep-5-the-dark-alleys-of-the-internet-the-high-stakes-of-corporate-anonymity-2</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2013-02-25</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/anonymizer/lavabit-and-silent-mail-shutdowns</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2013-08-12</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/china/hacking-for-counter-surveillance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2013-05-20</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/announcements/7</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2007-03-19</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/identity-theft/every-click-you-make-washingtonpostcom</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2008-04-06</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/google/apparently-open-wifi-is-actually-private</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2013-09-11</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/mobile-2/zdnet-list-of-4-privacy-settings-to-fix-immediately-after-upgrade</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2013-09-19</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/biometrics/iphone-5s-fingerprint-scanner-tricked-by-chaos-computer-club</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2013-09-23</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/uncategorized/id-theft-service-had-access-to-3-giant-data-brokers</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2013-09-25</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/uncategorized/opt-out-of-google-ads-using-your-name</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2013-10-12</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/android-2/the-privacy-blog-podcast-ep-14-mobile-device-privacy-and-the-anti-surveillance-tent</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2013-11-27</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/cellular/tech-companies-respond-to-reports-of-nsa-tracking-switched-off-mobile-phones-privacy-international</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2013-11-12</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/computer-security/nsas-tao-leaked-catalog-of-tools-and-techniques</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2013-12-31</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/cellular/the-second-operating-system-hiding-in-every-mobile-phone</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2013-11-13</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/anonymity/high-resolution-tracking-through-cell-phones</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2008-05-20</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/podcasts/the-privacy-blog-podcast-ep-18-zombies-encryption-bitcoins-and-turkish-censorship</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-04-03</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/legislation/third-time-a-charm-for-anti-spyware</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2007-03-20</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/scam/mcafee-12-scams-of-the-holidays</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2013-12-05</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/censorship/turkey-passes-new-laws-to-enable-rapid-internet-censorship</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-02-06</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/blogging/the-strength-and-weakness-of-internet-activism</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2008-05-20</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/censorship/do-sanctions-prevent-dissidents-from-accessing-secure-communications-tools</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-02-10</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/podcasts/the-privacy-blog-podcast-ep-15-bitcoin-theft-identity-theft-anonymous-bombers-isight-cameras-and-more</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2013-12-19</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/surveillance/advice-from-the-usg-on-securing-yourself-from-surveillance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-01-08</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/apple/apple-fixes-goto-fail-ssl-bug-for-mac-os-x</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-02-25</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/online-privacy/can-the-market-drive-privacy-protections</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-01-03</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/anonymity/why-tor-failed-to-hide-the-bomb-hoaxer-at-harvard</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2013-12-19</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/musings/the-paradox-of-irresponsible-responsibility</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2013-11-19</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/apple/the-privacy-blog-podcast-ep-17-rsa-conference-wrap-up-n-bitcoin-fiasco-apple-security-and-more</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-03-07</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/internet/charters-web-monitoring-draws-intervention-from-capitol-hill-the-iconoclast-politics-law-and-technology-cnet-newscom</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2008-05-20</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/international/before-the-gunfire-cyberattacks-nytimescom</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2008-08-13</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/apple/check-your-phone-for-evil-tor-app</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-03-19</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/bitcoin-2/now-might-be-the-time-to-sue-mt-gox</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-03-21</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/anonymity/sarah-palin-email-hacker</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2008-09-24</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/censorship/argentine-judge-google-yahoo-must-censor-searches-latest-news-in-politics-and-law-cnet-news</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2008-11-13</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/anonymizer/a-novel-use-for-anonymizer-universal</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-02-07</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/anonymity/secret-apps-that-have-access-to-your-message-are-not-so-secret</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-05-15</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/surveillance/facial-recognition-apps-i-both-desire-and-fear-them</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-01-09</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/anonymity/choose-what-you-protect-because-anonymity-is-really-hard</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-05-05</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/google/how-to-be-forgotten-if-you-are-in-the-eu</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-05-30</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/censorship/the-privacy-blog-podcast-ep-16-leaking-mobile-apps-surveillance-tormail-uk-censorship-and-sha-1</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-02-05</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/email-security/gmail-plugin-enables-tracking-when-and-where-you-open-your-email</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-02-13</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/fbi-2/microsoft-successfully-challenges-national-security-letter-against-enterprise-customer</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-05-22</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/eu/7-conundrums-of-the-right-to-be-forgotten</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-05-23</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/online-privacy/would-you-sell-your-privacy-for-20-per-month</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2013-12-12</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/surveillance/government-to-launch-netra-for-internet-surveillance-the-times-of-india</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2013-12-18</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/censorship/turkey-is-preparing-to-implement-massive-new-interenet-censorship-and-surveillance-scheme</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-01-15</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/google/did-you-give-google-permission-to-track-your-every-movement</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2013-12-21</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/internet/judge-orders-youtube-to-produce-complete-log-files</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2008-07-03</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/humor/security-advise-for-travelers-to-sochi-olymic-hacking-hotzone</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-02-06</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/anonymity/privacy-in-chrome-and-ie8</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2008-09-04</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/apple/why-you-need-to-double-check-your-iphone-bluetooth-settings</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-03-13</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/google/905</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-04-03</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/cryptography/do-you-need-to-replace-truecrypt-immediately</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-05-29</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/online-privacy/would-you-take-8-month-to-expose-yourself-online</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-02-14</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/announcements/changes-at-anonymizer</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2008-09-14</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/uncategorized/australians-you-need-to-start-taking-ownership-of-your-own-encryption</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-03-17</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/online-privacy/google-changes-to-privacy-practices</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2007-03-21</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/microsoft/stop-using-internet-exploer-even-with-vpns</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-04-30</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/android-2/is-your-android-watching-you</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-05-29</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/censorship/evading-post-coup-thai-internet-censorship</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-05-29</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/bitcoin-2/mt-gox-bitcoin-exchange-appears-to-have-failed-coins-are-missing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-02-25</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/security-breaches/most-websites-may-already-be-completely-pwned-by-the-heartbleed-bug</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-04-08</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/blogging/chinese-bloggers-scale-the-great-firewall-in-riots-aftermath-wsjcom</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2008-07-02</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/censorship/turkey-twitter-censorship-goes-from-dns-to-ip-based-blocking</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-03-23</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/censorship/turkey-is-tweeting-again</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-04-03</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/censorship/surveillance-of-skype-messages-found-in-china-nytimescom</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2008-10-02</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/podcasts/the-privacy-blog-podcast-ep-19-heartbleed-ie-and-internet-sovereignty</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-05-07</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/anonymity/cash-for-anonymity-shows-serious-intent</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-05-21</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/security-breaches/the-one-thing-you-need-to-do-about-password-breaches</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-05-23</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/apple/apple-ssl-vulnerability</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-02-23</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/identity-theft/what-you-need-to-know-about-credit-protection-services</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-03-19</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/censorship/turkey-blocks-twitter-to-suppress-corruption-allegations</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-03-21</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/censorship/turkey-exends-from-twitter-to-youtube</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-03-28</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/censorship/russia-to-block-twitter-or-not-to-block-twitter</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-05-22</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/personal-privacy/what-you-never-create-cant-leak</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-05-30</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/censorship/youtube-unblocked-by-turkey</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-06-04</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/anonymity/competition-in-privacy-policies-finally-starting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2008-12-18</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/censorship/turkish-top-court-rules-blocking-of-youtube-unconstitutional</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-05-30</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/surveillance/ars-tests-internet-surveillance-by-spying-on-an-npr-reporter-ars-technica</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-06-12</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/podcasts/the-privacy-blog-podcast-ep-20-censorship-passwords-nsls-and-cash</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-06-04</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/cryptography/more-thoughts-on-truecrypt-with-archives-from-grc</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-06-03</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/international/vodafone-shows-global-scope-of-surveillance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-06-06</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/apple/a-tiny-change-in-ios-8-prevents-wifi-tracking-of-ios-devices</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-06-10</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/censorship/china-celebrates-25th-anniversary-of-tiananmen-with-censorship</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-06-03</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/cellular/law-enforcement-access-to-your-cell-tower-location-may-require-a-warrant</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-06-13</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/2018/11/26/where-to-go-from-here</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-11-27</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5bf312d73917ee59c6a6ef5b/1543283785572-HRE7E3WK2F1B2KSM9M21/Screen+Shot+2018-11-26+at+5.53.18+PM.png</image:loc>
      <image:title>The Privacy Blog - Where To Go From Here</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/2018/11/29/the-grinchbot-who-stole-christmas</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-11-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5bf312d73917ee59c6a6ef5b/1543516071948-7RK0VV983YWMEB28AIZ4/image-asset.jpeg</image:loc>
      <image:title>The Privacy Blog - The GrinchBot who Stole Christmas</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/2019/3/19/what-is-osint</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-03-19</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5bf312d73917ee59c6a6ef5b/1553018549776-ULXYV93I2VZ1C3MWGJS4/What+is+OSINT-thumb.jpg</image:loc>
      <image:title>The Privacy Blog - What is OSINT?</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/2019/7/31/i-may-be-quiet-here-but-i-am-making-a-lot-of-noise-elsewhere</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-07-31</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5bf312d73917ee59c6a6ef5b/1564605929451-II3TTAJDCS8R48Q7QSWO/LanceCottrell-54.jpeg</image:loc>
      <image:title>The Privacy Blog - I may be quiet here, but I am making a lot of noise elsewhere!</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/2020/1/3/privacy-focused-art-show-in-plano-texas</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-01-03</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/category/Fair+Use+and+DRM</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/category/Passwords</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/category/iOS</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/category/competitive+intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/category/FBI</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/category/microsoft</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/category/Presentations</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/category/Interview</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/category/Musings</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/category/Online+Privacy</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/category/hacking</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/category/Iran</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/category/UK</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/category/Guest+Blog</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/category/legal</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/category/Spyware+and+Malware</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/category/Iraq</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/category/Cryptography</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/category/Facebook</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/category/Business</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/category/Email+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/category/Google</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/category/Work+Issues</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/category/Social+Networking</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/category/Legislation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/category/Anonymity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/category/Blogging</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/category/vulnerability</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/category/India</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/category/Android</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/category/EU</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/category/Canada</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/category/Turkey</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/category/Surveillance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/category/Financial+Institutions</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/category/Tor</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/category/Video</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/category/First+Amendment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/category/cellular</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/category/Internet</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/category/GeoLocation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/category/Announcements</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/category/Fiction</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/category/Biometrics</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/category/Free+Speech</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/category/Virus+and+Trojans</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/category/National+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/category/Tracking</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/category/Phishing%2FPharming</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/category/Privacy+Policy</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/category/Intellectual+Property</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/category/scam</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/category/Twitter</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/category/Personal+Privacy</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/category/Russia</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/category/apple</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/category/Stupidity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/category/Proxy</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/category/Innovation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/category/Physical+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/category/Voting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/category/China</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/category/Ireland</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/category/Computer+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/category/Anonymizer</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/category/News</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/category/International</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/category/Social+Engineering</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/category/malware</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/category/Wi-Fi</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/category/Litigation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/category/Bitcoin</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/category/Podcast</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/category/VoIP</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/category/RFID</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/category/Censorship</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/category/Uncategorized</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/category/Guest+Post</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/category/Presentation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/category/Mobile</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/category/Humor</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/category/Cloud</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/category/Security+Breaches</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/category/Identity+Theft</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/category/Location</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/APT</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/japan</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/dichotomy</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/corporate+security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/SIM+Card</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/advertising</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/iOS</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/laptop</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/ssl</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/Syria</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/password</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/java</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/hackers</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/chicago</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/watering+hole</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/RSA</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/truecrypt</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/breaches</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/backdoors</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/taxi</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/coup</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/google</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/antisec</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/australia</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/vulnerability</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/undercover</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/airport</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/proxy</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/certificates</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/privacy+bill+of+rights</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/internet+explorer</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/cellular</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/vodefone</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/privacy+tool</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/privacy+legislation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/sochi</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/Pew+Research</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/scam</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/ddos</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/facial+recognition</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/porn</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/search</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/encryption</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/credit+cards</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/mt-+gox</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/attack</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/wiretap</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/hotel</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/privacy+policy</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/email</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/legislation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/malware</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/business</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/ISP</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/RFID</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/photo</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/services</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/marketing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/browser+fingerprinting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/censorship</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/interview</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/nyms</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/secuity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/critical+infrastructure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/dmca</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/social+networking</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/hola</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/microsoft</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/sousveillance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/online+privacy</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/d-link</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/attacks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/UK</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/yahoo</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/thailand</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/legal</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/Brazil</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/blue+on+blue</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/man-in-the-middle</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/Open+Wi-Fi</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/online+security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/glass</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/cryptography</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/Silent+Circle</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/clipper+chip</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/article</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/EU</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/canvas+fingerprint</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/dropbox</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/internet</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/trust</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/loan</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/android</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/Geo-pricing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/video</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/india</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/personal+privacy</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/Google+Street+View</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/apple</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/VPN</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/anonymity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/surveillance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/home+address</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/data+security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/social+networks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/mobile</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/at%26amp%3Bt</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/hand+sanitizer</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/china</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/blackberry</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/RIM</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/code+signing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/location</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/bitcoin</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/identity+theft</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/tagging</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/Fingerprint+Scanner</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/copyright</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/opt+out</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/software</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/CALEA</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/congress</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/price+discrimination</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/release</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/iOS+7</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/royal+baby</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/anonymizer</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/iOS+8</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/tracking</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/Privacy</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/hack</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/sony</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/twitter</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/guest+blog</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/warrants</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/humor</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/russia</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/games</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/IE</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/NSA</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/cash</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/free+speech</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/phishing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/wifi</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/wi-fi</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/evercookie</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/watermark</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/cookie</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/do+not+track</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/NSL</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/iran</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/iraq</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/dns</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/musings</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/olympics</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/fbi</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/iphone</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/bitcoins</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/ECPA</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/Canada</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/cars</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/Turkey</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/FTC</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/social+engineering</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/phone</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/intercept</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/transparency</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/UAE</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/logging</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/vlog</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/lenovo</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/gmail</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/Data+privacy</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/account+security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/tumblr</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/trolling</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/presentations</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/tools</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/mac</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/leak</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/RSA+Conference</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/web</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/filterning</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/tor</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/identity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/security+breaches</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/iPad</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/crime</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/iSight</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/camera</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/law+enforcement</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/national+security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/product</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/stupidity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/facebook</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/computer+security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/biometrics</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/keylogger</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/security+architecture</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/firewall</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/Intemational</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/forbes</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/anonymous</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/BadUSB</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/travel</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/spam</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/lavabit</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/Policy</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/infographic</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/information+sharing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/google+glass</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/usb</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/Outlook</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/firefox</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/rootpipe</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/competitive+intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/pseudonyms</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/radio</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/hacking</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/router</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/Geo-blocking</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/passwords</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/nevercookie</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/right+to+be+forgotten</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/international</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/Archives</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/credit</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/secure+email</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/TSA</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/network+security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/history</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/cybersecurity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/activism</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/network+neutrality</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/survey</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/announcements</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/icloud</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/youtube</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/silk+road</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/OpenVPN</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/uber</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/IoT</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/disk+encryption</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/targeting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/database</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/Ireland</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/terrorism</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/browser</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/business+security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/social+media</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/beta</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/gogo</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/printers</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/eff</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/Podcast</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/regulation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/bluetooth</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/data+retention</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/flickr</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/anti-virus</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/blog/tag/geolocation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://theprivacyblog.com/about</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2018-11-21</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5bf312d73917ee59c6a6ef5b/1542827005357-OC1URS3GGMHZEELY3YM4/Lance+Headshot.jpg</image:loc>
      <image:title>About</image:title>
      <image:caption>Lance Cottrell</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://theprivacyblog.com/new-page</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2018-11-21</lastmod>
  </url>
  <url>
    <loc>https://theprivacyblog.com/privacy-policy</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2018-11-22</lastmod>
  </url>
</urlset>

