<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://blog.randomoracle.io/2026/02/01/fully-reversible-stablecoins-and-asset-seizure-on-chain/</loc><lastmod>2026-02-01T23:24:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2026/01/10/the-unbounded-development-team-promise-and-perils-of-ai-coding-assistants/</loc><lastmod>2026-01-10T19:06:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2026/01/02/on-the-limits-of-binary-interoperability/</loc><lastmod>2026-01-02T17:45:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2024/08/19/qcc-quining-c-compiler/</loc><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2024/08/image-4.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2024/08/image-3.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2024/08/image-2.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2024/08/image-1.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2024/08/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-09-09T05:33:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2025/09/09/coinbase-and-the-limits-of-dlp/</loc><lastmod>2025-09-09T05:29:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2025/06/26/screenconnect-unauthenticated-attributes-are-not-authenticated/</loc><lastmod>2025-08-01T01:08:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2025/07/31/the-mystery-network-interface-unexpected-exfiltration-paths/</loc><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2025/07/screenshot-from-2025-07-31-17-38-13.png</image:loc><image:title>Screenshot from 2025-07-31 17-38-13</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2025/07/screenshot-from-2025-07-31-17-29-39.png</image:loc><image:title>Screenshot from 2025-07-31 17-29-39</image:title></image:image><lastmod>2025-08-01T01:02:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2025/06/16/the-story-behind-screenconnect-certificate-revocation/</loc><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2025/06/osslsigncode_verify_output.png</image:loc><image:title>osslsigncode_verify_output</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2025/06/image-3.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2025/06/image-2.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2025/06/image-1.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2025/06/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-06-16T17:10:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2025/02/28/the-case-for-keyed-password-hashing/</loc><lastmod>2025-02-28T16:42:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2019/07/14/ethereum-mixing-with-rsa-getting-by-without-zero-knowledge-proofs/</loc><lastmod>2025-02-15T16:40:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2022/12/01/immutable-nfts-with-plain-http/</loc><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2022/12/screenshot-2022-12-01-at-4.30.01-pm.png</image:loc><image:title>screenshot-2022-12-01-at-4.30.01-pm</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2022/12/screenshot-2022-12-01-at-4.29.28-pm.png</image:loc><image:title>screenshot-2022-12-01-at-4.29.28-pm</image:title></image:image><lastmod>2025-02-15T16:25:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2024/09/17/saved-by-third-cookies-when-phishing-campaigns-make-mistakes/</loc><lastmod>2025-02-14T17:06:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2025/02/09/aws-cloudhsm-key-attestations-trust-but-verify/</loc><lastmod>2025-02-10T01:13:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2025/01/26/spot-the-fed-cac-piv-card-edition/</loc><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2025/01/image-2.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2025/01/image-1.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2025/01/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-01-26T18:44:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2024/12/28/password-management-quirks-at-fidelity/</loc><lastmod>2024-12-28T21:18:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/about/</loc><lastmod>2024-07-12T20:58:40+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://blog.randomoracle.io/2024/07/07/from-tpm-quotes-to-qr-codes-surfacing-boot-measurements/</loc><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2024/07/ubuntu_lock_screen_qr.png</image:loc><image:title>Ubuntu_lock_screen_QR</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2024/07/tpm2_quote_fb_capture.png</image:loc><image:title>TPM2_quote_FB_capture</image:title></image:image><lastmod>2024-07-07T05:44:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2024/06/08/evading-safe-links-with-s-mime-when-security-features-collide/</loc><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2024/06/incoming_recipient_view-1.png</image:loc><image:title>incoming_recipient_view-1</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2024/06/incoming_recipient_view.png</image:loc><image:title>incoming_recipient_view</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2024/06/screenshot-2024-06-05-at-12.14.37e280afpm.png</image:loc><image:title>screenshot-2024-06-05-at-12.14.37e280afpm</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2024/06/image-6.png</image:loc><image:title>image-6</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2024/06/image-5.png</image:loc><image:title>image-5</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2024/06/image-4.png</image:loc><image:title>image-4</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2024/06/image-3.png</image:loc><image:title>image-3</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2024/06/image-2.png</image:loc><image:title>image-2</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2024/06/image-1.png</image:loc><image:title>image-1</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2024/06/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2024-06-08T21:54:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2024/05/28/understanding-tornado-cash-code-as-speech-vs-code-in-action/</loc><lastmod>2024-06-07T18:00:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2024/05/03/behavioral-economics-on-ethereum-stress-testing-censorship-resistance/</loc><lastmod>2024-05-05T02:49:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2024/03/19/browser-in-the-middle-25-years-after-the-msft-antitrust-trial/</loc><lastmod>2024-03-19T18:27:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2024/03/01/the-elusive-nature-of-ownership-in-web3/</loc><lastmod>2024-03-01T17:52:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2024/02/26/we-can-bill-you-antagonistic-gadgets-and-dystopian-visions-of-philip-k-dick/</loc><lastmod>2024-02-27T20:51:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2024/02/15/the-missing-identity-layer-for-defi/</loc><lastmod>2024-02-15T19:38:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2023/01/10/blockchain-thefts-retroactive-bug-bounties-and-socially-responsible-crime/</loc><lastmod>2023-01-11T01:56:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2023/01/03/the-myth-of-tainted-blockchain-addresses-part-ii/</loc><lastmod>2023-01-03T05:06:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2022/12/28/the-myth-of-tainted-blockchain-addresses-part-i/</loc><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2022/12/bitcoinwiki_tx_graph_example.jpeg</image:loc><image:title>bitcoinwiki_tx_graph_example</image:title></image:image><lastmod>2023-01-03T05:02:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2022/12/11/remote-attestation-from-security-feature-to-anticompetitive-lock-in/</loc><lastmod>2022-12-11T19:03:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2022/12/04/an-exchange-is-a-mixer-or-why-few-people-need-tornado-cash/</loc><lastmod>2022-12-05T01:00:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2022/08/22/notes-on-the-grayscale-etf-rejection/</loc><lastmod>2022-08-22T17:37:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2022/07/24/address-%e2%89%a0-person-the-elusive-gini-coefficient-of-cryptocurrencies/</loc><lastmod>2022-07-25T03:01:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2022/07/18/of-twitter-bots-sybil-attacks-and-verified-identities/</loc><lastmod>2022-07-18T17:56:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2021/12/31/logic-of-physical-access-and-data-sovereignty-security-theater/</loc><lastmod>2021-12-31T21:48:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2021/12/16/flash-loans-and-the-democratization-of-market-manipulation/</loc><lastmod>2021-12-16T05:31:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2021/09/06/pre-theft-attacks-on-ethereum-stealing-from-the-future/</loc><lastmod>2021-09-06T16:02:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2021/07/18/tricky-accounting-cyptocurrency-mining-energy-use/</loc><lastmod>2021-07-18T15:49:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2021/06/12/designing-a-duress-pin-covert-channels-with-rsa-part-iv/</loc><lastmod>2021-07-05T18:16:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2021/06/05/designing-a-duress-pin-solving-for-symmetric-cryptography-part-iii/</loc><lastmod>2021-07-05T18:15:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2021/07/05/designing-a-duress-pin-covert-channels-for-ssh-part-v/</loc><lastmod>2021-07-05T18:15:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2021/05/29/designing-a-duress-pin-plausible-deniability-part-ii/</loc><lastmod>2021-06-12T16:18:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2021/05/28/design-considerations-for-a-duress-pin-part-i/</loc><lastmod>2021-06-12T16:17:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2020/06/24/on-captchas-and-accessibility-part-i/</loc><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2020/06/screen-shot-2020-06-24-at-10.17.29-am-e1593020343211.png</image:loc><image:title>Screen Shot 2020-06-24 at 10.17.29 AM</image:title></image:image><lastmod>2021-05-29T17:50:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2021/05/25/blame-it-on-bitcoin-ransomware-and-regulation-part-i/</loc><lastmod>2021-05-28T15:48:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2021/05/26/blame-it-on-bitcoin-ransomware-and-regulation-part-ii/</loc><lastmod>2025-01-27T16:35:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2021/05/24/matching-gifts-with-cryptocurrency-the-fine-print-in-contracts-part-ii/</loc><lastmod>2021-05-25T16:28:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2021/05/23/matching-gifts-with-cryptocurrency-scripting-for-a-good-cause-part-i/</loc><lastmod>2021-05-25T16:24:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2021/05/09/marathon-clean-mining-and-bitcoin-censorhip/</loc><lastmod>2021-05-23T18:15:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2020/05/30/smart-cards-vs-usb-tokens-when-form-factor-matters/</loc><lastmod>2020-07-10T22:05:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2020/06/30/on-captchas-and-accessibility-part-ii/</loc><lastmod>2020-06-30T17:35:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2019/12/10/filecoin-storj-and-the-problem-with-decentralized-storage-part-ii/</loc><lastmod>2022-01-23T12:18:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2020/06/02/smart-cards-vs-usb-tokens-physical-and-logical-access-part-ii/</loc><lastmod>2020-06-22T20:31:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2020/06/22/smart-cards-vs-usb-tokens-esoteric-form-factors-part-iii/</loc><lastmod>2020-06-22T20:27:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2020/06/18/the-righteous-exploit-facebook-the-ethics-of-attacking-your-own-customers/</loc><lastmod>2020-06-18T20:05:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2020/02/29/using-intel-sgx-for-ssh-keys-part-ii/</loc><lastmod>2020-02-29T17:21:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2020/02/21/using-intel-sgx-for-ssh-keys-part-i/</loc><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2020/02/sgx_pkcs11_bitcoin_usecase.png</image:loc><image:title>SGX_pkcs11_bitcoin_usecase</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2020/02/sgx_pkcs11_ssh_ecdsa.png</image:loc><image:title>SGX_pkcs11_SSH_ECDSA</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2020/02/sgx_pkcs11_p256_keygen.png</image:loc><image:title>SGX_pkcs11_P256_keygen</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2020/02/sgx_pkcs11_token_mechanisms-1.png</image:loc><image:title>SGX_pkcs11_token_mechanisms</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2020/02/sgx_pkcs11_ssh_github.png</image:loc><image:title>SGX_pkcs11_SSH_github</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2020/02/sgx_pkcs11_view_keys.png</image:loc><image:title>SGX_pkcs11_view_keys</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2020/02/sgx_pkcs11_rsa_keypairgen.png</image:loc><image:title>SGX_pkcs11_RSA_keypairgen</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2020/02/sgx_pkcs11_init_pin.png</image:loc><image:title>SGX_pkcs11_Init_PIN</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2020/02/sgx_pkcs11_token_mechanisms.png</image:loc><image:title>SGX_pkcs11_token_mechanisms</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2020/02/sgx_pkcs11_sample_app.png</image:loc><image:title>SGX_pkcs11_sample_app</image:title></image:image><lastmod>2020-02-29T17:18:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2020/02/11/helpful-deceptions-location-privacy-on-mobile-devices/</loc><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2020/02/screenshot_20200208-103127_maps.jpg</image:loc><image:title>Screenshot_20200208-103127_Maps</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2020/02/screenshot_20200211-150017_location-changer.jpg</image:loc><image:title>Screenshot_20200211-150017_Location Changer</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2020/02/screenshot_20200208-102751_settings-e1581462168808.jpg</image:loc><image:title>Screenshot_20200208-102751_Settings</image:title></image:image><lastmod>2020-02-11T23:35:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2020/01/26/a-clear-view-into-ai-risks-watching-the-watchers/</loc><lastmod>2020-01-26T21:18:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2019/12/07/filecoin-storj-and-the-problem-with-decentralized-storage/</loc><lastmod>2019-12-10T19:17:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2019/12/04/off-by-one-the-curious-case-of-2047-bit-rsa-keys/</loc><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2019/12/screen-shot-2019-12-04-at-10.09.50-am.png</image:loc><image:title>Screen Shot 2019-12-04 at 10.09.50 AM</image:title></image:image><lastmod>2019-12-08T03:01:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2019/11/10/airbnb-reviews-and-the-prisoners-dilemma/</loc><lastmod>2019-11-10T17:57:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2019/07/20/cloud-storage-with-end-to-end-encryption-aws-storage-gateway-part-ii/</loc><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2019/07/screen-shot-2019-07-20-at-10.12.33-am.png</image:loc><image:title>Screen Shot 2019-07-20 at 10.12.33 AM</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2019/07/aws_gateway_jar_files.png</image:loc><image:title>AWS_gateway_JAR_files</image:title></image:image><lastmod>2019-07-21T16:08:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2019/07/21/cloud-storage-with-end-to-end-encryption-aws-storage-gateway-part-iii/</loc><lastmod>2019-07-21T16:06:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2019/07/16/cloud-storage-with-end-to-end-encryption-aws-storage-gateway-part-i/</loc><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2019/07/screen-shot-2019-07-15-at-7.27.15-am.png</image:loc><image:title>Screen Shot 2019-07-15 at 7.27.15 AM</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2019/07/aws_volume_as_local_disk.png</image:loc><image:title>AWS_volume_as_local_disk</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2019/07/local_vm_for_aws_storage.001-1.png</image:loc><image:title>Local_VM_for_AWS_storage.001</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2019/07/local_vm_for_aws_storage.001.png</image:loc><image:title>Local_VM_for_AWS_storage.001</image:title></image:image><lastmod>2019-07-20T17:16:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2019/07/17/revocation-is-hard-the-code-signing-edition-part-i/</loc><lastmod>2019-07-17T15:57:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2019/04/07/diy-vpn-part-ii/</loc><lastmod>2019-04-07T16:36:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2019/04/03/diy-vpn-part-i/</loc><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2019/04/adcs_2012_management_gui.png</image:loc><image:title>ADCS_2012_management_GUI</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2019/04/adcs_server2019_gui.png</image:loc><image:title>ADCS_Server2019_gui</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2019/04/openvpn_on_ipad.png</image:loc><image:title>OpenVPN_on_iPad</image:title><image:caption>OpenVPN on iPad</image:caption></image:image><lastmod>2019-04-03T15:36:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2019/03/23/voting-with-other-peoples-wallets-plutocracy-blockchain-style/</loc><lastmod>2019-03-23T16:11:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2019/03/01/quadrigacx-and-the-case-for-regulation/</loc><lastmod>2019-03-01T17:23:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2019/02/23/proof-of-funds-for-cryptocurrency-custody-getting-by-with-limited-trust-part-vi/</loc><lastmod>2019-02-23T17:12:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2019/02/19/proof-of-funds-for-cryptocurrency-custody-revisiting-trust-assumptions-part-v/</loc><lastmod>2019-02-19T19:13:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2019/02/14/proof-of-funds-for-cryptocurrency-custody-public-verifiability-part-iv/</loc><lastmod>2019-02-18T07:16:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2019/02/03/where-are-the-coins-proof-of-funds-for-cryptocurrency-custodians-part-i/</loc><lastmod>2019-02-14T16:32:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2019/02/05/where-are-the-coins-proof-of-funds-for-cryptocurrency-custody-part-ii/</loc><lastmod>2019-02-14T16:32:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2019/02/11/proof-of-funds-for-cryptocurrency-custody-third-party-attestations-part-iii/</loc><lastmod>2019-02-14T16:30:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2019/01/25/the-economic-security-of-blockchains-lessons-from-ethereum-classic-part-ii/</loc><lastmod>2019-02-11T22:43:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2019/02/06/quadrigacx-and-hanlons-razor-for-cryptocurrency-custodians/</loc><lastmod>2019-02-06T16:44:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2019/01/29/the-economic-security-of-blockchains-lessons-from-ethereum-classic-part-iii/</loc><lastmod>2019-01-29T18:45:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2019/01/22/the-economic-security-of-blockchains-lessons-from-ethereum-classic-attack-part-i/</loc><lastmod>2019-01-26T01:49:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2019/01/18/proof-of-nothing-why-the-january-proof-of-keys-ritual-missed-the-mark/</loc><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2019/01/screen-shot-2019-01-17-at-10.57.22-pm.png</image:loc><image:title>screen shot 2019-01-17 at 10.57.22 pm</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2019/01/screen-shot-2019-01-03-at-6.18.53-pm.png</image:loc><image:title>screen shot 2019-01-03 at 6.18.53 pm</image:title></image:image><lastmod>2019-01-18T07:22:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2018/09/03/payment-networks-subset-sums-and-tracking-consumer-spending/</loc><lastmod>2018-09-03T16:44:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2018/08/28/on-the-limits-of-decentralized-exchanges/</loc><lastmod>2018-08-28T21:38:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2018/07/22/threshold-ecdsa-key-sharding-and-multi-signature-a-comparison/</loc><lastmod>2018-07-22T15:06:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2018/07/03/on-ramps-off-ramps-impact-of-bitcoin-payments-on-the-regulatory-landscape/</loc><lastmod>2018-07-03T05:20:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2018/06/09/we-can-decrypt-it-for-you-smart-contracts-for-outsourced-encryption/</loc><lastmod>2018-06-10T02:12:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2018/05/27/what-is-the-value-of-half-a-secret/</loc><lastmod>2018-05-27T14:09:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2018/04/27/ethereum-solidity-and-integer-overflows-programming-blockchains-like-1970/</loc><lastmod>2018-04-28T02:12:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2017/09/17/money-for-nothing-bitcoin-cash-the-economics-of-hard-forks-part-ii/</loc><lastmod>2017-09-17T07:17:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2017/09/16/money-for-nothing-bitcoin-cash-the-economics-of-hard-forks-part-i/</loc><lastmod>2017-09-16T05:46:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2017/06/18/designing-honest-ransomware-with-ethereum-smart-contracts-part-ii/</loc><lastmod>2017-09-11T05:06:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2017/09/11/chain-switching-attacks-and-bitcoin-cash-improving-the-odds/</loc><lastmod>2017-09-11T04:56:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2017/09/02/tabs-spaces-and-the-straitjacket-of-coding-conventions/</loc><lastmod>2017-09-02T14:49:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2017/07/28/the-optimal-ethereum-heist-attacking-the-parity-wallet-part-ii/</loc><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2017/07/screen-shot-2017-07-26-at-23-34-14.png</image:loc><image:title>Screen Shot 2017-07-26 at 23.34.14</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2017/07/screen-shot-2017-07-26-at-16-29-291.png</image:loc><image:title>Screen Shot 2017-07-26 at 16.29.29</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2017/07/screen-shot-2017-07-26-at-16-29-29.png</image:loc><image:title>Screen Shot 2017-07-26 at 16.29.29</image:title></image:image><lastmod>2017-08-08T18:17:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2017/08/03/the-optimal-ethereum-heist-attacking-the-parity-wallet-part-iii/</loc><lastmod>2017-08-04T03:36:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2015/03/25/second-guessing-satoshi-ecdsa-and-bitcoin-part-ii/</loc><lastmod>2017-07-28T19:44:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2017/07/25/the-optimal-ethereum-heist-attacking-the-parity-wallet-part-i/</loc><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2017/07/screen-shot-2017-07-19-at-13-50-07.png</image:loc><image:title>Screen Shot 2017-07-19 at 13.50.07</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2017/07/screen-shot-2017-07-19-at-16-49-59.png</image:loc><image:title>Screen Shot 2017-07-19 at 16.49.59</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2017/07/screen-shot-2017-07-19-at-13-38-39.png</image:loc><image:title>Screen Shot 2017-07-19 at 13.38.39</image:title></image:image><lastmod>2017-07-28T05:04:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2017/07/06/bitcoin-for-the-unbanked-receding-possibilities/</loc><lastmod>2017-07-06T20:22:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2017/06/27/wannacry-ransomware-as-diversionary-tactic/</loc><lastmod>2017-06-27T20:07:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2017/06/22/designing-honest-ransomware-with-ethereum-smart-contracts-postscript-part-iii/</loc><lastmod>2017-06-22T04:03:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2017/06/17/designing-honest-ransomware-with-ethereum-smart-contracts-part-i/</loc><lastmod>2017-06-18T00:28:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2017/06/08/two-factor-authentication-a-matter-of-time/</loc><lastmod>2017-06-08T06:47:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2017/05/20/bitcoin-and-the-ship-of-theseus/</loc><lastmod>2017-05-21T03:41:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2017/05/01/trading-cryptocurrency-without-trusted-third-parties-part-ii/</loc><lastmod>2017-05-20T18:50:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2017/05/06/trading-cryptocurrency-without-trusted-third-parties-part-iii/</loc><lastmod>2017-05-07T03:51:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2017/04/27/trustless-exchange-of-crypto-currency-across-blockchains-part-i/</loc><lastmod>2020-07-18T01:13:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2017/02/15/extracting-otp-seeds-from-authy/</loc><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2017/02/screen-shot-2017-02-01-at-10-25-23.png</image:loc><image:title>screen-shot-2017-02-01-at-10-25-23</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2017/02/paused_in_debugger.png</image:loc><image:title>paused_in_debugger</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2017/02/breakpoint_hit1.png</image:loc><image:title>breakpoint_hit</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2017/02/breakpoint_set1.png</image:loc><image:title>breakpoint_set</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2017/02/breakpoint_hit.png</image:loc><image:title>breakpoint_hit</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2017/02/breakpoint_set.png</image:loc><image:title>breakpoint_set</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2017/02/formatted_js_totp_function.png</image:loc><image:title>formatted_js_totp_function</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2017/02/main_html_application_js.png</image:loc><image:title>main_html_application_js</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2017/02/authy_app_launched.png</image:loc><image:title>authy_app_launched</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2017/02/chrome_extensions_view.png</image:loc><image:title>chrome_extensions_view</image:title></image:image><lastmod>2020-04-08T03:35:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2017/03/23/bitcoin-and-the-c-programmers-disease/</loc><lastmod>2017-03-24T01:31:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2017/01/09/principle-of-least-privilege-looking-beyond-the-insider-risk/</loc><lastmod>2017-01-09T08:57:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2016/12/13/still-one-click-away-lessons-from-yahoo-on-lock-in-competition/</loc><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2016/12/screen-shot-2016-12-12-at-22-10-10.png</image:loc><image:title>screen-shot-2016-12-12-at-22-10-10</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2016/12/browserchoice_image.gif</image:loc><image:title>Browser ballot in IE</image:title><image:caption>Random ordering of search engines in IE</image:caption></image:image><lastmod>2016-12-13T07:37:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2016/11/05/code-is-law-is-not-a-law/</loc><lastmod>2016-11-06T23:17:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2016/10/19/use-and-misuse-of-code-signing-part-i/</loc><lastmod>2016-10-23T23:38:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2016/10/23/use-and-misuse-of-code-signing-part-ii/</loc><lastmod>2016-10-23T23:20:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2016/06/15/getting-by-without-passwords-web-authentication-part-i/</loc><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2016/06/safari_client_auth_prompt.png</image:loc><image:title>Safari_client_auth_prompt</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2016/06/chrome_pin_entry.png</image:loc><image:title>Chrome_PIN_entry</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2016/06/chrome_3certs.png</image:loc><image:title>Chrome_3certs</image:title></image:image><lastmod>2016-10-20T16:41:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2016/09/07/the-problem-with-devops-secret-management-patterns/</loc><lastmod>2016-09-25T03:56:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2016/08/31/multi-signature-and-correlated-risks-the-case-of-bitfinex/</loc><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2016/08/gate_multiple_padlocks.jpg</image:loc><image:title>gate_multiple_padlocks</image:title></image:image><lastmod>2016-08-31T05:10:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2012/12/04/smartphone-as-smart-card-android-meets-windows/</loc><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2012/12/driverinstalldetails.png</image:loc><image:title>DriverInstallDetails</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2012/12/devicedrivernotinstalled.png</image:loc><image:title>DeviceDriverNotInstalled</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2012/12/driverinstallinprogress.png</image:loc><image:title>DriverInstallInProgress</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2012/12/unknownsmartcard_androidse.png</image:loc><image:title>UnknownSmartcard_AndroidSE</image:title></image:image><lastmod>2016-08-22T17:40:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2016/07/15/getting-by-without-passwords-web-authentication-part-ii/</loc><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2016/07/screen-shot-2016-07-14-at-22-00-27.png</image:loc><image:title>Screen Shot 2016-07-14 at 22.00.27</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2016/07/screen-shot-2016-07-14-at-22-05-34.png</image:loc><image:title>Firefox smart-card PIN prompt</image:title><image:caption>Firefox smart-card PIN prompt</image:caption></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2016/06/screen-shot-2016-06-30-at-12-59-45.png</image:loc><image:title>Firefox certificate authentication prompt</image:title><image:caption>Firefox certificate authentication prompt</image:caption></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2016/06/screen-shot-2016-06-30-at-12-21-11.png</image:loc><image:title>Screen Shot 2016-06-30 at 12.21.11</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2016/06/screen-shot-2016-06-27-at-00-48-51.png</image:loc><image:title>Screen Shot 2016-06-27 at 00.48.51</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2016/06/screen-shot-2016-06-27-at-00-48-29.png</image:loc><image:title>Screen Shot 2016-06-27 at 00.48.29</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2016/06/screen-shot-2016-06-27-at-00-48-101.png</image:loc><image:title>Screen Shot 2016-06-27 at 00.48.10</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2016/06/screen-shot-2016-06-27-at-00-48-10.png</image:loc><image:title>Screen Shot 2016-06-27 at 00.48.10</image:title><image:caption>Firefox advanced settings</image:caption></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2016/06/screen-shot-2016-06-27-at-00-47-511.png</image:loc><image:title>Screen Shot 2016-06-27 at 00.47.51</image:title><image:caption>Firefox hamburger menu</image:caption></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2016/06/screen-shot-2016-06-27-at-00-47-51.png</image:loc><image:title>Screen Shot 2016-06-27 at 00.47.51</image:title><image:caption>Firefox hamburger menu</image:caption></image:image><lastmod>2016-07-15T05:26:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2016/05/04/bitcoins-meta-problem-governance-part-i/</loc><lastmod>2016-06-30T06:53:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2016/06/30/bitcoins-meta-problem-governance-part-ii/</loc><lastmod>2016-06-30T06:51:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2016/06/23/making-usb-even-more-dicey-encrypted-drives/</loc><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2016/06/kingston_signed_osx_update.png</image:loc><image:title>Kingston_signed_OSX_update</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2016/06/kingston_windows_signature.jpg</image:loc><image:title>Kingston_Windows_signature</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2016/06/kingston_codesign_fail.jpg</image:loc><image:title>Kingston_codesign_fail</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2016/06/screen-shot-2016-06-20-at-21-05-59.png</image:loc><image:title>Screen Shot 2016-06-20 at 21.05.59</image:title></image:image><lastmod>2016-06-27T13:44:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2009/09/29/unlinkable-identifiers-on-the-web-rearanging-deck-chairs-23/</loc><lastmod>2016-06-21T00:45:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2009/09/24/pairwise-identifiers-and-linkability-online-13/</loc><lastmod>2016-06-21T00:45:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2016/06/20/how-to-wreck-a-decentralized-crypto-currencies/</loc><lastmod>2016-06-21T00:33:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2016/05/13/looking-back-on-the-google-wallet-plastic-card/</loc><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2016/05/gw_card_design_c.png</image:loc><image:title>GW_card_design_C</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2016/05/gw_card_design_b.png</image:loc><image:title>GW_card_design_B</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2016/05/gw_card_design_a.png</image:loc><image:title>GW_card_design_A</image:title></image:image><lastmod>2016-06-02T05:36:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2016/06/02/box-enterprise-key-management-in-cloud-we-still-trust/</loc><lastmod>2016-06-02T05:19:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2015/09/02/getting-by-without-passwords-the-case-for-hardware-tokens-part-i/</loc><lastmod>2016-05-14T16:09:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2015/12/21/getting-by-without-passwords-disk-encryption-part-iii/</loc><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2015/10/luks_unlock_sc_prompt.png</image:loc><image:title>LUKS unlock with card</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2015/10/screen-shot-2015-12-22-at-19-23-03.png</image:loc><image:title>Screen Shot 2015-12-22 at 19.23.03</image:title></image:image><lastmod>2016-10-07T14:21:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2016/04/01/future-proofing-software-updates-global-platform-and-lessons-from-fbios-part-ii/</loc><lastmod>2016-04-20T17:24:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2013/08/18/using-cloud-services-as-glorified-drive-virtual-iscsi-targets-part-vi/</loc><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2013/08/iscsi_target_done.png</image:loc><image:title>iSCSI_target_done</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2013/08/servermanager_iscsi_status.png</image:loc><image:title>ServerManager_iSCSI_status</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2013/08/iscsi_name_initiator.png</image:loc><image:title>iSCSI_name_initiator</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2013/08/iscsi_target_disk_setup.png</image:loc><image:title>iSCSI_target_disk_setup</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2013/08/uninitializeddisk.png</image:loc><image:title>UninitializedDisk</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2013/08/initiator_configuration.png</image:loc><image:title>Initiator_Configuration</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2013/08/initiator_foundtarget.png</image:loc><image:title>Initiator_FoundTarget</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2013/08/connecttotarget.png</image:loc><image:title>ConnectToTarget</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2013/08/initiator_discoverytab.png</image:loc><image:title>Initiator_DiscoveryTab</image:title></image:image><lastmod>2016-04-20T01:53:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2013/08/09/using-cloud-services-as-glorified-drive-iscsi-targets-part-v/</loc><lastmod>2016-04-19T23:58:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2014/08/11/ssh-with-goldkey-tokens-on-os-x-part-ii/</loc><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2014/08/screen-shot-2014-08-11-at-11-51-24-am.png</image:loc><image:title>Screen Shot 2014-08-11 at 11.51.24 AM</image:title><image:caption>GoldKey personalization dialog</image:caption></image:image><lastmod>2016-04-13T20:29:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2016/04/11/future-proofing-software-updates-global-platform-and-lessons-from-fbios-part-iii/</loc><lastmod>2016-04-11T05:10:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2016/03/25/future-proofing-updates-global-platform-and-lessons-from-fbios-part-i/</loc><lastmod>2016-04-01T05:22:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2016/03/05/getting-by-without-passwords-encrypted-email-part-v/</loc><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2016/03/screen-shot-2016-03-05-at-12-56-30.png</image:loc><image:title>OSX MacPGP PIN collection UI</image:title><image:caption>OSX MacPGP PIN collection UI</image:caption></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2016/03/outlook_pgp_decrypt_selection.png</image:loc><image:title>Outlook_PGP_decrypt_selection</image:title><image:caption>Decrypt highlighted text in web mail</image:caption></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2016/02/screen-shot-2016-02-21-at-08-42-26.png</image:loc><image:title>Screen Shot 2016-02-21 at 08.42.26</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2016/02/screen-shot-2016-02-21-at-08-34-55.png</image:loc><image:title>Screen Shot 2016-02-21 at 08.34.55</image:title></image:image><lastmod>2016-03-25T12:24:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2016/01/21/getting-by-without-passwords-luks-with-smart-cards-part-iv/</loc><lastmod>2016-03-05T22:04:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2015/09/16/getting-by-without-passwords-local-login-part-ii/</loc><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2015/09/eid-controlpanel1.png</image:loc><image:title>Control panel</image:title><image:caption>eIDAuthenticate entry</image:caption></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2015/09/eid-checksettings.png</image:loc><image:title>Verifying settings</image:title><image:caption>eIDAuthenticate setup— trial run</image:caption></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2015/09/eid-loginscreen.png</image:loc><image:title>Windows login screen</image:title><image:caption>Using smart-card for local logon</image:caption></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2015/09/eid-selectcertificate.png</image:loc><image:title>eIDAuthenticate setup</image:title><image:caption>Choosing a certificate from attached card</image:caption></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2015/09/ubuntu-sc-loginscreen.png</image:loc><image:title>Ubuntu login screen</image:title><image:caption>UI after detecting smart-card</image:caption></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2015/09/ubuntu-sc-sudo.png</image:loc><image:title>sudo on Ubuntu</image:title></image:image><lastmod>2016-03-05T22:03:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2016/02/17/relics-from-the-p2p-file-sharing-wars/</loc><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2016/02/p2p_false_positive.png</image:loc><image:title>P2P_false_positive</image:title></image:image><lastmod>2016-02-17T05:59:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2015/10/22/who-actually-pays-for-credit-card-fraud-part-ii/</loc><lastmod>2016-02-08T17:59:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2016/01/20/second-guessing-satoshi-ecdsa-vs-rsa-part-iii/</loc><lastmod>2016-02-08T17:56:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2016/02/08/scaling-bitcoin-vs-keeping-up-with-visa/</loc><lastmod>2016-02-08T17:53:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2016/01/25/observations-on-bitcoins-scaling-challenge/</loc><lastmod>2016-01-26T02:33:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2015/09/29/android-pay-proxy-no-more/</loc><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2015/09/screenshot_2015-09-19-00-34-222.jpg</image:loc><image:title>Android Pay error</image:title><image:caption>Not all cards are welcome</image:caption></image:image><lastmod>2015-12-23T04:08:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2015/11/04/who-actually-pays-for-credit-card-fraud-part-iii/</loc><lastmod>2015-12-23T04:07:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2015/11/10/sprints-and-marathons-why-developer-interviews-miss-the-mark/</loc><lastmod>2015-12-23T04:05:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2015/10/20/who-actually-pays-for-credit-card-fraud-part-i/</loc><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2015/10/paymentnetwork_ilustration.png</image:loc><image:title>Roles in payment network</image:title><image:caption>Roles in payment network</image:caption></image:image><lastmod>2021-04-07T13:12:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2015/08/27/downside-to-security-standards-when-vulnerable-is-better-than-uncertified/</loc><lastmod>2015-08-27T05:46:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2015/08/19/software-auto-updates-revisiting-the-trade-offs/</loc><lastmod>2015-08-20T01:54:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2014/12/26/emv-end-of-the-road-for-dynamic-mag-stripes/</loc><lastmod>2015-08-18T02:35:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2015/06/07/private-cloud-computing-and-the-emperors-new-key-management-part-i/</loc><lastmod>2015-08-18T02:32:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2015/06/27/nfc-hotel-keys-choosing-a-tag-type-wisely/</loc><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2015/06/screenshot_2015-06-16-22-01-5121.jpg</image:loc><image:title>NFC tag information</image:title><image:caption>Ultralight hotel key</image:caption></image:image><lastmod>2018-07-26T06:44:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2015/08/13/safenet-hsm-key-extraction-vulnerability-part-i/</loc><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2015/07/originalkeyproperties.png</image:loc><image:title>Original Key</image:title><image:caption>PKCS #11 attributes of original AES key</image:caption></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2015/07/hmac_chosen_message.png</image:loc><image:title>Using the derived key</image:title><image:caption>HMAC chosen message using derived key</image:caption></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2015/07/extractkeyfromkey.png</image:loc><image:title>Key derivation</image:title><image:caption>Using extract-key-from-key derivation</image:caption></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2015/07/derivedkeyproperties.png</image:loc><image:title>Derived key properties</image:title><image:caption>PKCS #11 attributes of derived key</image:caption></image:image><lastmod>2016-07-01T14:53:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2015/08/13/safenet-part-2/</loc><lastmod>2015-08-13T16:54:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2015/06/21/dual-ec-bitlocker-disk-encryption-and-conspiracy-theories/</loc><lastmod>2015-06-21T19:35:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2015/06/10/private-cloud-computing-and-the-emperors-new-key-management-part-ii/</loc><lastmod>2015-06-10T15:08:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2014/09/09/lessons-from-google-wallet-how-wireless-carriers-undermined-mobile-security/</loc><lastmod>2015-06-07T16:54:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2015/02/09/smart-card-logon-for-os-x-part-iii/</loc><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2015/02/screen-shot-2015-02-08-at-20-17-11.png</image:loc><image:title>Screen Shot 2015-02-08 at 20.17.11</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2015/02/unlockwithsc.png</image:loc><image:title>Unlock with smart-card</image:title><image:caption>Screen-saver prompting for card PIN</image:caption></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2015/02/standardunlock.png</image:loc><image:title>Standard screen unlock</image:title><image:caption>Screen-saver prompting for password</image:caption></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2015/02/standardlogin.png</image:loc><image:title>OS X login screen</image:title><image:caption>Standard login screen</image:caption></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2015/02/loginwithsc.png</image:loc><image:title>Login with smart-card</image:title><image:caption>OS X login UI after detecting card presence</image:caption></image:image><lastmod>2019-04-18T18:42:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2015/03/27/what-is-wrong-with-apple-pay-nfc-and-cross-channel-fraud-12/</loc><lastmod>2015-06-04T13:56:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2015/05/30/interactive-services-detection-and-crypto-hardware-when-security-features-collide/</loc><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2015/05/interactive_services_detection.png</image:loc><image:title>Interactive services detection</image:title><image:caption>Interactive services detection dialog on main desktop</image:caption></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2015/05/shell_notification.png</image:loc><image:title>Shell notification</image:title><image:caption>Taskbar notification for interactive service</image:caption></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2015/05/adcs_setup.png</image:loc><image:title>Active Directory Certificate Services setup</image:title><image:caption>Screenshot from ADCS configuration UI</image:caption></image:image><lastmod>2015-05-30T17:22:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2015/05/02/from-stock-options-to-predatory-lending-for-tech-employees/</loc><lastmod>2015-05-02T21:10:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2015/04/15/what-is-wrong-with-apple-pay-nfc-and-cross-channel-fraud-22/</loc><lastmod>2015-04-16T03:39:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2015/02/25/second-guessing-satoshi-ecdsa-and-bitcoin-part-i/</loc><lastmod>2015-04-15T04:32:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2014/12/30/cloud-storage-and-encryption-revisited-bitlocker-attacks-part-i/</loc><lastmod>2015-02-16T15:51:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2015/02/16/smart-card-logon-for-os-x-part-iv/</loc><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2015/02/screen-shot-2015-02-15-at-22-04-50.png</image:loc><image:title>Osascript elevation with smart-card</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2015/02/screen-shot-2015-02-08-at-21-20-53.png</image:loc><image:title>"sudo" mode with smart-cards</image:title></image:image><lastmod>2016-12-13T07:53:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2015/01/16/smart-card-logon-for-os-x-part-i/</loc><lastmod>2016-10-19T20:21:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2015/01/23/smart-card-logon-for-os-x-part-ii/</loc><lastmod>2015-02-09T05:46:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2015/01/05/cloud-storage-and-encryption-revisited-bitlocker-attacks-part-ii/</loc><lastmod>2015-01-06T02:10:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2014/12/24/bitcoin-transaction-fees-beyond-the-1-barrier/</loc><lastmod>2014-12-24T15:46:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2014/12/17/how-to-fail-at-code-signing-the-sony-edition/</loc><lastmod>2014-12-17T05:34:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2014/12/08/nfc-payments-and-powered-by-the-field-mode-part-ii/</loc><lastmod>2014-12-09T01:07:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2014/12/04/when-wallets-runs-out-of-juice-nfc-with-external-power/</loc><lastmod>2014-12-09T01:05:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2014/11/25/one-time-use-credit-cards-and-google-wallet/</loc><lastmod>2014-11-26T03:33:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2014/11/09/the-challenge-of-cryptographic-agility/</loc><lastmod>2014-11-10T03:53:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2014/10/29/privacy-in-nfc-payments-mobile-wallets-and-prying-eyes/</loc><lastmod>2015-01-29T10:29:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2014/10/22/piv-provisioning-on-linux-and-mac-getting-certificates-part-iii/</loc><lastmod>2014-10-22T15:46:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2014/10/20/they-know-what-you-bought-last-summer-privacy-in-nfc-payments/</loc><lastmod>2014-10-30T17:53:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2014/10/13/piv-provisioning-on-linux-and-mac-part-i/</loc><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2014/10/screen-shot-2014-10-04-at-6-43-10-pm.png</image:loc><image:title>PIV settings</image:title><image:caption>Accessing PIV settings from GoldKey client</image:caption></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2014/10/screen-shot-2014-10-04-at-6-41-37-pm.png</image:loc><image:title>GoldKey PIV management</image:title><image:caption>Configuring the PIV card-administration key</image:caption></image:image><lastmod>2014-10-15T04:58:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2014/10/15/piv-provisioning-on-linux-and-mac-key-generation-part-ii/</loc><lastmod>2014-10-15T05:06:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2014/10/02/nsa-panopticon-and-paradox-of-surveillance-exposed/</loc><lastmod>2014-10-02T14:14:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2014/07/16/dual-interface-smart-cards-and-problem-of-user-intent-part-i/</loc><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2014/07/drawing_smartcard_hostile_pc.png</image:loc><image:title>Smartcard-hostile-PC</image:title><image:caption>Smart-card meets hostile PC</image:caption></image:image><lastmod>2014-09-25T08:32:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2014/09/24/cloudflare-and-keyless-ssl-far-from-nsl-proof-part-i/</loc><lastmod>2014-09-25T08:25:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2014/09/24/cloudflare-and-keyless-ssl-far-from-nsl-proof-part-ii/</loc><lastmod>2014-09-25T03:44:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2014/09/05/mobile-devices-and-nfc-in-public-transit-part-i/</loc><lastmod>2014-09-09T05:14:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2014/09/08/mobile-devices-and-nfc-in-public-transit-part-ii/</loc><lastmod>2014-09-08T06:40:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2014/09/02/ssh-with-goldkey-tokens-on-os-x-provisioning-iv/</loc><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2014/09/screen-shot-2014-09-01-at-6-25-57-pm.png</image:loc><image:title>GoldKey smart-card management</image:title><image:caption>UI for managing certificates</image:caption></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2014/09/screen-shot-2014-09-01-at-6-10-43-pm.png</image:loc><image:title>Token management options</image:title><image:caption>Dialog for managing GoldKey</image:caption></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2014/09/screen-shot-2014-09-01-at-6-10-56-pm.png</image:loc><image:title>GoldKey management</image:title><image:caption>Accessing token management features</image:caption></image:image><lastmod>2014-09-02T16:19:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2014/08/16/fakeid-android-nfc-stack-and-google-wallet-part-iii/</loc><lastmod>2014-09-01T05:00:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2014/08/23/fakeid-android-nfc-stack-and-google-wallet-part-iv/</loc><lastmod>2014-09-01T05:07:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2014/08/13/fakeid-android-nfc-stack-and-google-wallet-part-ii/</loc><lastmod>2014-08-17T02:23:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2014/08/14/ssh-with-goldkey-tokens-on-os-x-fine-print-part-iii/</loc><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2014/08/sequel_pro_piv_prompt.png</image:loc><image:title>ssh-agent prompt</image:title><image:caption>PIN prompt from Sequel Pro on OS X</image:caption></image:image><lastmod>2014-08-14T04:36:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2014/08/12/fakeid-android-nfc-stack-and-google-wallet-part-i/</loc><lastmod>2014-08-13T05:48:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2014/06/14/coin-vs-google-wallet-comparing-card-aggregation-designs-part-ii/</loc><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2014/06/googlewallet_virtual_cards1-e1402778571314.png</image:loc><image:title>Google Wallet proxy model</image:title><image:caption>Proxying NFC transactions with a virtual card</image:caption></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2014/06/googlewallet_virtual_cards-e1402461402612.png</image:loc><image:title>GoogleWallet_virtual_cards</image:title></image:image><lastmod>2014-08-12T04:41:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2014/08/10/ssh-with-goldkey-tokens-on-os-x-part-i/</loc><lastmod>2014-08-12T01:11:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2013/01/09/using-the-secure-element-on-an-android-device-13/</loc><lastmod>2014-08-11T07:09:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2013/05/30/using-a-goldkey-token-as-piv-card-part-i/</loc><lastmod>2014-08-10T19:33:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2014/06/29/coin-vs-google-wallet-security-improvements-over-plastic-part-iii/</loc><lastmod>2014-07-30T23:08:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2014/07/28/dual-interface-smart-cards-and-problem-of-user-intent-part-ii/</loc><lastmod>2014-07-28T20:44:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2014/07/07/is-nfc-host-card-emulation-safe-for-payments-part-i/</loc><lastmod>2014-07-13T18:09:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2014/07/09/is-nfc-host-card-emulation-safe-for-payments-part-ii/</loc><lastmod>2019-07-12T07:34:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2014/04/21/hce-vs-embedded-secure-element-taking-android-out-of-tcb-part-iv/</loc><lastmod>2015-02-27T14:48:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2014/04/03/hce-vs-embedded-secure-element-attack-surface-part-iii/</loc><lastmod>2014-07-07T04:48:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2014/03/18/hce-vs-embedded-secure-element-tamper-resistance-part-ii/</loc><lastmod>2014-07-07T04:48:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2014/03/08/hce-vs-embedded-secure-element-comparing-risks-part-i/</loc><lastmod>2014-07-07T04:46:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2013/06/03/piv-cards-provisioning-according-to-fips-part-ii/</loc><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2013/06/piv_provisioningattempt.png</image:loc><image:title>PIV_ProvisioningAttempt</image:title><image:caption>Error when attempting to provision to standard PIV card</image:caption></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2013/06/goldkey_device_manager.png</image:loc><image:title>GoldKey_device_manager</image:title><image:caption>GoldKey token detected as PIV card</image:caption></image:image><lastmod>2015-10-05T03:22:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2014/06/25/host-card-emulation-and-interop-with-multiple-nfc-wallets/</loc><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2014/06/screenshot_2014-06-24-23-26-45.png</image:loc><image:title>Android Tap &amp; Pay settings</image:title><image:caption>Tap &amp; Pay settings from Kitkat</image:caption></image:image><lastmod>2014-07-02T19:47:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2014/06/08/coin-vs-google-wallet-comparing-card-aggregation-technologies-part-i/</loc><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2014/06/coin_internal_design.png</image:loc><image:title>coin_internal_design</image:title></image:image><lastmod>2014-07-02T19:45:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2014/05/01/hce-vs-embedded-secure-element-relay-attacks-part-v/</loc><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2014/04/relay_attack_drawing.png</image:loc><image:title>relay_attack_drawing</image:title></image:image><lastmod>2014-05-21T19:03:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2014/05/20/hce-vs-embedded-secure-element-interface-detection-part-vi/</loc><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2014/05/se_architecture_nfc_controller.png</image:loc><image:title>se_architecture_nfc_controller</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2014/05/se_architecture_naive_view.png</image:loc><image:title>se_architecture_naive_view</image:title><image:caption>Naive view of NFC and secure element connection.</image:caption></image:image><lastmod>2016-09-19T15:40:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2014/05/05/how-to-fail-at-authenticating-downloads-the-microsoft-edition/</loc><lastmod>2014-05-16T01:38:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2014/05/10/how-to-fail-at-code-signing-the-open-source-edition-part-i/</loc><lastmod>2014-06-13T20:24:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2014/05/14/how-to-fail-at-code-signing-the-open-source-edition-part-ii/</loc><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2014/05/screen-shot-2014-05-14-at-10-06-47-am.png</image:loc><image:title>Authenticode-based UI from Windows 8</image:title></image:image><lastmod>2014-05-14T17:20:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2014/04/27/when-defense-in-depth-failed-heartbleed/</loc><lastmod>2014-04-28T02:06:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2014/04/14/lessons-from-linkedin-intro-for-product-security-teams/</loc><lastmod>2014-04-14T08:48:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2014/03/10/goto-fail-and-more-subtle-ways-to-mismanage-vulnerability-response/</loc><lastmod>2014-03-10T06:53:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2013/12/12/nfc-card-emulation-and-android-4-4-part-iii/</loc><lastmod>2014-03-08T19:32:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2014/02/22/chip-pin-liability-shift-and-the-game-of-chicken-part-ii/</loc><lastmod>2014-02-22T21:00:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2014/02/18/chip-pin-liability-shift-and-the-game-of-chicken-part-i/</loc><lastmod>2014-02-22T20:59:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2014/02/17/target-breach-credit-card-security-and-nfc-part-v/</loc><lastmod>2014-02-17T05:15:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2014/02/09/target-breach-credit-card-security-and-nfc-part-iv/</loc><lastmod>2014-02-10T03:43:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2014/02/03/target-breach-credit-card-security-and-nfc-part-iii/</loc><lastmod>2014-02-04T21:59:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2014/01/28/target-breach-credit-card-security-and-nfc-part-ii/</loc><lastmod>2014-01-28T21:38:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2014/01/27/target-breach-credit-card-security-and-nfc-part-i/</loc><lastmod>2014-03-21T14:56:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2014/01/22/meaningful-choice-appops-android-permissions-and-clashing-interests-part-iv/</loc><lastmod>2014-01-22T06:02:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2014/01/13/meaningful-choice-appops-android-permissions-and-clashing-interests-part-iii/</loc><lastmod>2014-01-13T20:06:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2013/12/31/meaningful-choice-appops-android-permissions-and-clashing-interests-part-i/</loc><lastmod>2014-01-08T06:45:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2014/01/08/meaningful-choice-appops-android-permissions-and-clashing-interests-part-ii/</loc><lastmod>2014-01-08T06:45:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2013/12/17/nfc-card-emulation-and-android-4-4-part-iv/</loc><lastmod>2014-07-05T13:21:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2012/08/25/cvv1-cvv2-cvv3-demystifying-credit-card-data-12/</loc><lastmod>2017-04-23T06:02:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2013/09/18/reminder-oauth-tokens-and-application-passwords-give-attackers-persistence-part-i/</loc><lastmod>2013-12-17T17:03:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2013/12/02/nfc-card-emulation-and-android-4-4-part-i/</loc><lastmod>2013-12-14T03:13:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2013/12/07/nfc-card-emulation-and-android-4-4-part-ii/</loc><lastmod>2013-12-14T03:12:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2013/11/23/privacy-and-http-referer-header-12/</loc><lastmod>2013-11-26T05:49:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2013/11/25/privacy-and-http-referer-header-22/</loc><lastmod>2013-11-26T05:48:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2012/11/13/programmable-magnetic-stripes-in-search-of-a-problem/</loc><lastmod>2014-07-21T11:29:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2013/11/14/nfc-payments-on-personal-machines-pci-versus-innovation-part-iii/</loc><lastmod>2013-11-14T23:26:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2013/11/04/intro-to-trouble-linkedin-and-trusting-the-cloud/</loc><lastmod>2013-11-09T06:28:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2013/11/08/intro-to-trouble-linkedin-and-trusting-the-cloud-part-ii/</loc><lastmod>2013-11-09T06:27:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2013/03/05/ironkey-verses-bitlocker-to-go-with-smart-cards-part-2/</loc><lastmod>2013-11-04T22:07:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2013/03/02/ironkey-verses-bitlocker-to-go-with-smart-cards-part-1/</loc><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2013/03/promptforcardpin.png</image:loc><image:title>Unlock with smart card</image:title><image:caption>PIN dialog during private key operation</image:caption></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2013/02/usemysmartcard.png</image:loc><image:title>BL2G configuration</image:title><image:caption>Choosing between passphrase and smart card</image:caption></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2013/02/turnonbitlocker.png</image:loc><image:title>Turning on BitLocker</image:title><image:caption>Screenshot of the context menu on a removable drive</image:caption></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2013/02/readytoencrypt_w7_warning.png</image:loc><image:title>ReadyToEncrypt_W7_warning</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2013/02/printrecoverykey.png</image:loc><image:title>PrintRecoveryKey</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2013/02/encryptionprogress.png</image:loc><image:title>EncryptionProgress</image:title></image:image><lastmod>2013-11-04T22:06:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2013/10/30/nfc-payments-on-personal-machines-pci-versus-innovation-part-ii/</loc><lastmod>2013-10-30T07:31:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2013/10/22/nfc-payments-on-personal-machines-pci-versus-innovation-part-i/</loc><lastmod>2013-10-23T05:41:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2013/10/21/fine-grained-control-over-framing-22/</loc><lastmod>2013-10-22T05:16:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2013/10/14/forward-secrecy-and-tls-limits-of-pfs-ciphersuites-part-i/</loc><lastmod>2013-10-15T20:48:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2013/10/15/forward-secrecy-and-tls-detecting-active-attacks-part-ii/</loc><lastmod>2013-10-15T20:47:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2013/09/27/reminder-oauth-tokens-and-application-passwords-function-as-backdoors-part-ii/</loc><lastmod>2013-10-11T01:30:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2013/10/10/physical-access-with-piv-card-untapped-potential/</loc><lastmod>2013-10-11T01:26:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2013/10/06/using-cloud-services-as-glorified-drive-a-wishlist-part-viii/</loc><lastmod>2014-01-13T08:49:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2012/12/24/inspecting-communications-from-a-smart-card-12/</loc><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2012/12/smartcard_data_flow.png</image:loc><image:title>Data flow to smart cards</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2012/12/smartcard_communication.png</image:loc><image:title>Communication flow to a smart card</image:title></image:image><lastmod>2013-09-28T17:55:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2013/09/16/all-your-keys-are-belong-to-us-windows-8-1-bitlocker-and-key-escrow/</loc><lastmod>2014-05-31T03:17:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2013/09/06/using-cloud-services-as-glorified-drive-iscsi-caveats-part-vii/</loc><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2013/09/netmon_traffic_capture.png</image:loc><image:title>Netmon trace</image:title><image:caption>iSCSI traffic between initiator and target</image:caption></image:image><lastmod>2013-09-13T09:21:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2013/09/13/samsung-tectiles-nfc-standards-and-compatibility/</loc><lastmod>2013-09-13T07:54:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2013/08/26/nfc-and-screen-unlocking-for-mobile-devices-part-ii/</loc><lastmod>2013-09-05T15:57:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2013/08/21/nfc-and-screen-unlocking-for-mobile-devices-part-i/</loc><lastmod>2014-10-29T18:15:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2013/09/04/android-rng-vulnerability-distorted-incentives-and-platform-ownership-part-ii/</loc><lastmod>2013-09-04T20:21:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2012/09/07/nfc-in-us-passports-verifying-the-random-id/</loc><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2012/09/random_uid_2.png</image:loc><image:title>Random_UID_2</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2012/09/random_uid_1.png</image:loc><image:title>Random_UID_1</image:title></image:image><lastmod>2013-09-01T03:34:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2013/08/31/android-rng-vulnerability-when-the-platform-fails/</loc><lastmod>2013-09-01T03:26:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2013/08/27/nfc-ring-and-screen-unlock-part-iii/</loc><lastmod>2014-05-29T16:47:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2013/08/12/lavabit-silent-circle-and-the-myth-of-self-reliance/</loc><lastmod>2013-08-13T18:17:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2013/08/04/using-cloud-services-as-glorified-drive-roaming-fine-print-part-iv/</loc><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2013/08/win8_bl2g_pin_entry.png</image:loc><image:title>Win8_BL2G_PIN_entry</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2013/08/win8_bl2g_options.png</image:loc><image:title>Win8_BL2G_options</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2013/08/win8_notification.png</image:loc><image:title>Win8_notification</image:title></image:image><lastmod>2013-08-04T21:24:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2013/07/29/using-cloud-services-as-glorified-drive-bitlocker-to-go-part-iii/</loc><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2013/07/readytoencrypt.png</image:loc><image:title>ReadyToEncrypt</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2013/07/backuprecoverykey.png</image:loc><image:title>BackupRecoveryKey</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2013/07/enablebitlocker.png</image:loc><image:title>EnableBitlocker</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2013/07/afterencryption.png</image:loc><image:title>AfterEncryption</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2013/07/manage_bitlocker_menu.png</image:loc><image:title>Manage_Bitlocker_menu</image:title></image:image><lastmod>2013-07-30T04:43:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2013/07/15/using-cloud-services-as-glorified-drive-virtual-disks-part-ii/</loc><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2013/07/createvirtualdisk_details.png</image:loc><image:title>CreateVirtualDisk_details</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2013/07/createvhd_computermanagement.png</image:loc><image:title>CreateVHD_ComputerManagement</image:title></image:image><lastmod>2013-07-30T04:40:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2013/07/11/using-cloud-storage-as-glorified-drive-dead-ends-part-i/</loc><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2013/07/efs_advancedproperties.png</image:loc><image:title>EFS_AdvancedProperties</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2013/07/skydrive_properties.png</image:loc><image:title>SkyDrive_properties</image:title></image:image><lastmod>2013-07-30T04:38:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2013/07/23/javacard-global-platform-and-sim-vulnerabilities/</loc><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2013/07/javacard_model.jpg</image:loc><image:title>JavaCard development</image:title><image:caption>From Oracle, http://www.oracle.com/technetwork/java/javacard/javacard2-138597.html</image:caption></image:image><lastmod>2013-08-01T19:56:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2013/07/07/cloud-backup-and-privacy-the-problem-with-spideroak-part-i/</loc><lastmod>2013-07-14T19:42:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2013/07/09/cloud-backup-and-privacy-the-problem-with-spideroak-part-ii/</loc><lastmod>2013-12-04T18:02:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2013/06/24/cloud-computing-and-privacy-misaligned-incentives/</loc><lastmod>2013-06-25T16:40:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2013/06/21/t-mobile-jailbreaking-devices-and-security-updates-economics-of-mobile-part-ii/</loc><lastmod>2013-06-21T18:43:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2013/06/15/t-mobile-jailbreaking-devices-and-security-updates-economics-of-mobile-part-i/</loc><lastmod>2013-06-15T15:15:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2013/06/09/goldkey-tokens-installing-smart-card-driver-for-piv-part-iii/</loc><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2013/06/goldkey_after_driver_install.png</image:loc><image:title>GoldKey_after_driver_install</image:title><image:caption>Smart cards and readers, after GoldKey driver installation</image:caption></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2013/06/goldkey_registry_mapping.png</image:loc><image:title>GoldKey_registry_mapping</image:title><image:caption>Registry key corresponding to GoldKey</image:caption></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2013/06/device_details_id.png</image:loc><image:title>Device_details_ID</image:title><image:caption>Device details for GoldKey token detected as smart card</image:caption></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2013/06/goldkey_device_properties.png</image:loc><image:title>GoldKey_device_properties</image:title><image:caption>Viewing device properties in Computer Management / MMC</image:caption></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2013/06/goldkey_device_id.png</image:loc><image:title>GoldKey_device_ID</image:title></image:image><lastmod>2013-06-10T03:05:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2013/05/22/trustzone-tee-and-the-delusion-of-security-indicators-part-ii/</loc><lastmod>2013-05-23T06:16:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2013/05/20/trustzone-tee-and-the-delusion-of-security-indicators-part-i/</loc><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2013/05/trustzone_pin_entry.png</image:loc><image:title>TrustZone_PIN_entry</image:title></image:image><lastmod>2013-05-21T01:41:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2013/05/13/certificate-pinning-translating-chrome-settings-into-emet/</loc><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2013/05/emet_sites_afterimport.png</image:loc><image:title>EMET_Sites_AfterImport</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2013/05/emet_rules_afterimport.png</image:loc><image:title>EMET_Rules_AfterImport</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2013/05/emet_msft_rule.png</image:loc><image:title>EMET_MSFT_rule</image:title><image:caption>Microsoft certificate pin rules in EMET</image:caption></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2013/05/emet_ruledetails.png</image:loc><image:title>EMET_RuleDetails</image:title><image:caption>Details for MSFT trusted roots</image:caption></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2013/05/emet_pinrules.png</image:loc><image:title>EMET_PinRules</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2013/05/emet_registry_location.png</image:loc><image:title>EMET_Registry_Location</image:title></image:image><lastmod>2013-05-13T17:12:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2013/05/08/twitter-two-factor-authentication-and-phishing-myths-part-ii/</loc><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2013/05/windows_pin_dialog.png</image:loc><image:title>Windows PIN dialog</image:title></image:image><lastmod>2013-05-12T00:30:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2013/05/10/tls-client-authentication-and-phishing-part-iii/</loc><lastmod>2013-05-10T19:17:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2013/01/19/using-the-secure-element-on-an-android-device-23/</loc><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2013/01/nfc_certificate_details.png</image:loc><image:title>Certificate details</image:title><image:caption>Certificate details</image:caption></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2013/01/nfc_certificate_general.png</image:loc><image:title>Certificate trust path</image:title><image:caption>Trust path</image:caption></image:image><lastmod>2013-05-08T20:42:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2013/05/05/twitter-two-factor-authentication-and-phishing-myths-part-i/</loc><lastmod>2013-05-07T17:22:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2013/05/02/microsoft-2-factor-authentication-application-passwords-part-ii/</loc><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2013/05/remove_ap_msft.png</image:loc><image:title>Remove all application passwords</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2013/05/msft_account_passwords.png</image:loc><image:title>Authenticator and application passwords</image:title></image:image><lastmod>2013-05-02T19:42:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2013/04/25/certificate-pinning-in-internet-explorer-with-emet/</loc><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2013/04/windowseventlog_pin_warning.png</image:loc><image:title>WindowsEventLog_Pin_warning</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2013/04/emet_certsettings.png</image:loc><image:title>EMET_CertSettings</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2013/04/emet_certificateerror.png</image:loc><image:title>EMET_CertificateError</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2013/04/emet_overview.png</image:loc><image:title>EMET_Overview</image:title></image:image><lastmod>2013-05-10T01:31:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2013/04/29/microsoft-2-factor-authentication-following-familiar-paths-part-i/</loc><lastmod>2013-04-30T05:41:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2013/04/16/do-not-track-and-p3p-a-matter-of-regulation/</loc><lastmod>2013-04-17T03:06:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2013/04/13/do-not-track-and-p3p-new-privacy-standard-weaker-approach/</loc><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2013/04/ie10_donottrack.png</image:loc><image:title>Do Not Track in IE10</image:title><image:caption>Advanced settings dialog, with DNT checkbox</image:caption></image:image><lastmod>2013-04-30T09:37:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2013/04/11/default-preferences-there-is-no-way-to-avoid-decisions/</loc><lastmod>2013-04-11T17:01:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2013/04/07/supply-chain-security-bogus-smart-cards-and-global-platform/</loc><lastmod>2013-04-08T01:26:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2013/04/04/piv-gids-home-brew-choosing-a-smart-card-standard-22/</loc><lastmod>2018-09-21T15:50:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2013/03/31/piv-gids-home-brew-choosing-a-smart-card-standard-12/</loc><lastmod>2013-04-01T01:46:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2013/03/20/not-the-ideal-poster-child-for-cfaa-reform/</loc><lastmod>2013-03-21T05:57:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2013/03/18/sacrificial-first-login-or-coping-with-sites-who-fail-at-ssl/</loc><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2013/03/wordpress_signin_error.png</image:loc><image:title>WordPress_signin_error</image:title><image:caption>Sign-in error with login form, returned over secure connection.</image:caption></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2013/03/wordpress_login_screen.png</image:loc><image:title>WordPress_login_screen</image:title><image:caption>WordPress home page, with login form</image:caption></image:image><lastmod>2013-03-19T00:59:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2013/03/14/jailbreaking-and-the-distorted-economics-of-phone-subsidies/</loc><lastmod>2013-03-14T08:10:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2013/03/10/cnet-nfc-wishlist-and-status-quo/</loc><lastmod>2013-03-10T22:35:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2013/02/05/can-nfc-avoid-the-privacy-scares-of-rfid-part-i/</loc><lastmod>2013-03-02T16:32:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2013/02/24/windows-smartcard-logon-with-android-secure-element-and-nfc/</loc><lastmod>2023-09-09T07:18:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2012/09/16/credit-card-authorization-compatibility-of-cvv1-and-cvv3/</loc><lastmod>2013-02-20T01:40:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2013/02/17/hashing-does-not-magically-anonymize-data/</loc><lastmod>2013-02-18T02:06:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2013/02/13/the-rfid-boogeyman-part-ii-passports/</loc><lastmod>2013-02-14T00:57:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2013/02/08/piv-card-and-mobile-devices-nfc-as-missing-link/</loc><lastmod>2013-02-08T07:13:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2013/02/04/t-mobile-interfering-with-traffic-from-mobile-wireless-hot-spots/</loc><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2013/02/android_datausage.png</image:loc><image:title>Android data usage</image:title><image:caption>Mobile data usage statistics</image:caption></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2013/02/random_tmobile_redirection.png</image:loc><image:title>T-Mobile redirection</image:title><image:caption>IE screenshot showing T-Mobile man-in-the-middle</image:caption></image:image><lastmod>2015-06-04T04:49:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2012/08/27/reading-the-us-passport-using-an-android-phone-overview/</loc><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2012/08/screenshot_2012-08-24-23-30-391.png</image:loc><image:title>Screenshot_2012-08-24-23-30-39</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2012/08/screenshot_2012-08-24-23-30-39.png</image:loc><image:title>Basic Access Control error</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2012/08/screenshot_2012-08-24-23-27-57.png</image:loc><image:title>Initial scan result</image:title></image:image><lastmod>2019-10-03T10:55:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2013/01/28/using-the-secure-element-on-android-devices-33/</loc><lastmod>2013-05-14T19:02:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2013/01/30/time-to-revisit-x509-name-and-path-length-constraints/</loc><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2013/01/editcertproperties.png</image:loc><image:title>Edit certificate properties</image:title><image:caption>Using the management console</image:caption></image:image><lastmod>2013-01-30T14:26:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2013/01/13/inspecting-communications-from-a-smart-card-22/</loc><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2013/01/apdu_logging_folder.png</image:loc><image:title>Results of APDU logging</image:title><image:caption>Files with APDU logs from different processes</image:caption></image:image><lastmod>2014-07-09T08:45:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2013/01/22/knight-capital-state-sponsored-attacks-and-vulnerability-of-markets/</loc><lastmod>2013-01-23T03:48:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2013/01/18/fine-grained-control-over-framing-12/</loc><lastmod>2013-01-18T23:27:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2013/01/15/arduino-tpms-and-smart-cards-redefining-hardware-security-module/</loc><lastmod>2013-01-15T20:04:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2013/01/10/strict-p3p-validation-in-internet-explorer-10/</loc><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2013/01/ie_strictp3p_options.png</image:loc><image:title>Internet Explorer advanced options</image:title><image:caption>Strict P3P validation setting</image:caption></image:image><lastmod>2013-10-16T18:46:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2013/01/03/smart-card-logon-without-active-directory/</loc><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2013/01/controlpanel_smartcardlogon.png</image:loc><image:title>ControlPanel_SmartCardLogon</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2013/01/smartcardcheckcomplete.png</image:loc><image:title>SmartCardCheckComplete</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2013/01/eid_checkcertificate.png</image:loc><image:title>eID_CheckCertificate</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2013/01/eid_configuresmartcard.png</image:loc><image:title>Configure smart-card</image:title></image:image><lastmod>2015-09-17T04:16:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2013/01/05/smart-card-logon-with-eidauthenticate-under-the-hood/</loc><lastmod>2014-08-23T11:45:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2012/12/20/nfc-tags-and-authenticating-wine/</loc><lastmod>2012-12-20T20:35:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2012/12/17/observing-windows-smart-card-discovery-in-action/</loc><lastmod>2012-12-17T17:51:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2012/12/14/quick-primer-on-the-windows-smart-card-stack-33/</loc><lastmod>2012-12-15T04:22:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2012/12/12/quick-primer-on-the-windows-smart-card-stack-23/</loc><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2012/12/windows7_smartcard_model.png</image:loc><image:title>Windows7 smart-card model</image:title><image:caption>Simplified model of smart-cards and CAPI for Vista and above</image:caption></image:image><lastmod>2012-12-12T07:07:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2012/12/09/quick-primer-on-the-windows-smart-card-stack-13/</loc><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2012/12/smartcardblog_drawings.png</image:loc><image:title>SmartCardBlog_drawings</image:title><image:caption>Original Windows CAPI architecture for smart-cards</image:caption></image:image><lastmod>2012-12-09T06:54:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2012/12/06/login-with-facebook-as-net-passport-v2-essentially/</loc><lastmod>2012-12-06T08:33:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2009/10/07/unlinkable-identifiers-and-web-architecture-connecting-the-dots/</loc><lastmod>2016-06-20T21:00:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2011/08/04/rsa-breach-redux-a-well-deserved-pwnie/</loc><lastmod>2012-12-02T05:01:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2012/12/01/hp-envy-spectre-and-nfc-features-missing-in-action/</loc><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2012/12/hp_touch_to_share.png</image:loc><image:title>HP_touch_to_share</image:title></image:image><lastmod>2012-12-02T05:00:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2012/11/30/hp-spectre-and-the-case-of-hidden-nfc/</loc><lastmod>2012-11-30T18:59:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2012/11/28/downgrading-cookies-functional-bit-rot-and-privacy/</loc><lastmod>2012-11-28T08:13:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2012/11/25/your-android-phone-is-also-a-smartcard/</loc><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2012/11/nocertificatesfound.png</image:loc><image:title>NoCertificatesFound</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2012/11/insertsmartcard.png</image:loc><image:title>InsertSmartCard</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2012/11/logonwitheitheroption1.png</image:loc><image:title>LogonWithEitherOption</image:title></image:image><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2012/11/logonwitheitheroption.png</image:loc><image:title>LogonWithEitherOption</image:title></image:image><lastmod>2014-08-10T23:31:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2012/11/14/general-petraeus-fbi-and-privacy-in-the-cloud/</loc><lastmod>2012-11-20T06:12:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2012/11/20/why-encryption-would-not-have-saved-general-petraeus-part-ii/</loc><lastmod>2012-11-20T06:12:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2012/11/17/why-encryption-would-not-have-saved-general-petraeus-part-i/</loc><lastmod>2012-11-20T06:11:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2012/11/06/clipper-cards-and-transit-privacy-in-the-bay-area/</loc><lastmod>2012-11-06T15:54:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2012/10/22/about-those-strange-p3p-compact-policies-22/</loc><lastmod>2012-10-23T03:12:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2012/10/22/about-those-strange-p3p-compact-policies-12/</loc><lastmod>2012-10-23T02:03:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2012/10/16/secure-elements-and-mobile-devices/</loc><lastmod>2012-10-17T05:05:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2012/10/11/android-and-nfc-modes/</loc><lastmod>2012-10-11T06:06:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2012/10/03/godaddy-outage-and-lessons-for-certificate-revocation-22/</loc><lastmod>2012-10-04T02:44:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2012/10/01/godaddy-outage-and-lessons-for-certificate-revocation/</loc><lastmod>2012-10-04T02:02:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2012/09/24/bringing-cloud-identity-to-the-pc-22/</loc><lastmod>2012-10-02T05:03:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2012/09/30/going-walletless-and-the-nfc-convergence/</loc><lastmod>2012-10-02T05:03:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2012/09/29/digital-river-microsoft-and-code-signing-failures/</loc><lastmod>2012-10-02T05:02:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2012/09/11/cvv3-demystifying-credit-card-verification-part-2/</loc><lastmod>2015-07-02T09:33:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2012/08/29/reading-the-us-passport-with-android-basic-access-control/</loc><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2012/08/screenshot_2012-08-24-23-32-50.png</image:loc><image:title>BAC inputs</image:title></image:image><lastmod>2012-08-29T07:30:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2012/06/13/unanswered-questions-about-the-flame-certificate-forgery-22/</loc><lastmod>2012-06-13T20:59:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2012/06/13/unanswered-questions-about-the-flame-certificate-forgery-12/</loc><lastmod>2012-06-13T20:45:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2012/06/08/taking-security-seriously-while-failing-spectacularly-at-it/</loc><lastmod>2012-06-08T22:53:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2012/06/05/economics-and-incentives-terminal-services-licensing-vulnerability/</loc><lastmod>2012-06-05T09:59:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2011/10/03/all-flash-no-substance-returning-to-a-purist-web/</loc><lastmod>2011-10-07T14:18:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2011/10/07/bringing-cloud-identity-to-the-pc-12/</loc><lastmod>2011-10-07T14:17:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2011/09/11/diginotar-surveying-the-damage-with-ocsp/</loc><lastmod>2011-09-12T04:21:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2011/09/06/the-limits-of-certificate-revocation/</loc><lastmod>2011-09-07T04:18:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2011/09/01/diginotar-fail-this-time-is-different/</loc><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2011/09/untrustedcertificates.png</image:loc><image:title>UntrustedCertificates</image:title></image:image><lastmod>2011-09-01T15:18:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2011/02/16/windows-phone-7-dropping-a-generation-of-developers/</loc><lastmod>2011-02-16T07:06:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2011/02/06/hp-over-engineering-and-under-delivering-support/</loc><lastmod>2011-02-07T03:11:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2011/01/31/friendly-spam-account-hijacking-and-unintended-consequences/</loc><lastmod>2011-01-31T18:20:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2011/01/25/imperfect-censorship-making-sense-of-web-blocking-statistics/</loc><lastmod>2011-01-25T13:52:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2011/01/21/case-study-on-the-perils-of-identity-federation/</loc><lastmod>2011-01-21T10:47:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2011/01/20/temporarily-using-a-nexus-s-in-istanbul/</loc><lastmod>2011-01-20T11:25:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2011/01/19/stuxnet-and-collateral-damage/</loc><lastmod>2011-01-19T22:43:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2009/10/12/choices-and-security-when-designers-can-not-decide/</loc><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2009/10/firefox_aboutconfig.png</image:loc><image:title>Firefox_AboutConfig</image:title><image:caption>Firefox warning before switching to options display.</image:caption></image:image><lastmod>2009-10-12T15:04:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2009/09/30/incompetent-by-design-why-certificate-authorities-fail/</loc><lastmod>2009-11-23T14:02:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2009/09/24/md2-hash-collision-scare-of-the-day/</loc><lastmod>2009-09-27T16:17:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2009/09/27/md2-reply-to-comments/</loc><lastmod>2009-10-01T04:34:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2009/07/31/ocsp-this-fail-brought-to-you-by-the-number-three/</loc><lastmod>2009-07-31T23:46:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2009/07/26/goldman-sachs-theft-and-value-of-ip/</loc><lastmod>2009-07-26T10:00:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2009/07/05/electrons-are-electrons-cell-phone-accessories-and-price-discriminations/</loc><lastmod>2009-07-05T16:32:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2009/02/24/strong-authentication-talk-at-wharton/</loc><lastmod>2009-02-25T03:52:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2009/01/11/follow-up-on-clueless-cas/</loc><lastmod>2009-01-12T00:09:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2009/01/06/md5-clueless-certificate-authorities-and-pki-trust-crisis/</loc><lastmod>2009-01-06T06:24:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2008/08/19/identity-as-externality-trustbearer-cac-eid/</loc><lastmod>2008-08-20T03:12:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2008/08/14/six-and-a-half-degrees-of-seperation/</loc><lastmod>2008-08-14T15:35:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2008/08/12/new-york-times-seriously-confused-about-identity-management/</loc><lastmod>2008-08-12T18:50:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2008/08/09/blackhat-making-the-news-while-reporting-it/</loc><lastmod>2008-08-09T16:02:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2008/08/08/from-0wning-dns-to-0wning-ssl-22/</loc><lastmod>2008-08-08T20:59:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2008/08/08/from-owning-dns-to-owning-ssl-12/</loc><lastmod>2008-08-08T20:43:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2008/08/04/net-neutrality-developments-west-coast-and-east-coast/</loc><lastmod>2008-08-05T05:21:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2008/08/03/standardizing-on-a-standards-body/</loc><lastmod>2008-08-05T05:06:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2008/07/31/one-week-to-pwnie-awards/</loc><lastmod>2008-08-01T05:57:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2008/07/30/angle-brackets-are-aero-dynamic-protocol-buffers-asn1-xml/</loc><lastmod>2008-07-31T04:26:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2008/07/17/vintage-code-common-hardware-and-value-of-backwards-compatibility/</loc><lastmod>2008-07-17T23:55:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2008/07/13/nebuad-dubious-past-nebulous-future/</loc><lastmod>2008-07-13T23:09:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2008/07/11/fuel-pumps-and-the-y2k8-crisis-security-feature-gone-awry/</loc><lastmod>2008-07-18T00:50:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2008/07/09/gmail-starts-enforcing-domainkeys-for-ebay-and-paypal/</loc><lastmod>2008-07-09T19:34:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2008/07/08/customer-lock-in-and-us-mobile-market/</loc><lastmod>2008-07-08T15:18:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2008/06/30/191/</loc><lastmod>2008-07-01T04:32:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2008/06/30/isp-subscriber-privacy-one-step-forward-two-steps-back/</loc><lastmod>2008-06-30T14:51:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2008/06/28/debt-collectors-next-weak-link-for-data-security/</loc><lastmod>2008-06-28T16:02:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2008/06/27/changing-of-the-guard-at-microsoft/</loc><lastmod>2008-06-28T03:42:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2008/06/27/update-comcast-changes-traffic-management-policy/</loc><lastmod>2008-06-28T02:37:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2008/06/22/3g-iphone-and-location-privacy/</loc><lastmod>2008-06-22T15:29:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2008/06/15/charging-by-the-gigabyte-and-end-of-the-free-bandwidth-lunch/</loc><lastmod>2008-06-16T05:12:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2008/06/12/lifelock-the-plot-thickens/</loc><lastmod>2008-06-19T06:02:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2008/06/07/debianopenssl-vulnerability-subtle-and-fatal-12/</loc><lastmod>2008-06-07T19:38:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2008/06/07/unauthorized-charger-and-other-device-restrictions/</loc><lastmod>2008-06-07T18:56:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2008/06/01/suburban-sprawl-in-numbers/</loc><lastmod>2008-06-02T03:53:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2008/05/22/lifelock-proves-social-security-numbers-can-not-be-defanged/</loc><lastmod>2008-06-02T03:47:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2008/05/31/cfp2008-deep-thoughts-on-deep-packet-inspection/</loc><lastmod>2008-06-02T03:47:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2008/05/26/ford-motor-company-and-the-long-anticipated-rude-awakening/</loc><lastmod>2008-05-26T19:37:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2008/05/25/cfp-2008-network-neutrality-and-the-end-of-flat-pricing-models/</loc><lastmod>2008-05-25T19:05:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2008/05/22/website-monitoring-canary-in-the-mine-for-traffic-shaping/</loc><lastmod>2008-05-22T17:52:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2008/05/22/next-version-of-msft-office-to-support-open-document-format/</loc><lastmod>2008-05-22T14:59:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2008/05/21/blame-it-on-the-fcc/</loc><lastmod>2008-05-21T19:10:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2008/05/21/the-geography-of-traffic-blocking/</loc><lastmod>2008-05-21T17:46:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2008/05/13/laptop-theft-catching-the-incompetent-ones/</loc><lastmod>2008-05-13T06:14:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2008/05/10/credit-card-fraud-and-photo-id/</loc><lastmod>2008-05-10T16:55:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2008/05/10/game-theory-vehicle-weight-and-safety/</loc><lastmod>2008-05-10T16:00:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2008/05/09/dow-at-36000-vs-crude-oil-at-200/</loc><lastmod>2008-05-10T05:48:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2008/04/18/level-field-for-online-games-and-hidden-agendas/</loc><lastmod>2008-04-18T18:53:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2008/04/14/giga-pixel-aerial-imaging/</loc><lastmod>2008-04-15T04:38:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2008/04/13/cross-platform-vulnerabilities-revisiting-the-mono-culture-risks/</loc><lastmod>2008-04-14T02:34:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2008/04/10/clean-coal-225-and-other-delusions/</loc><lastmod>2008-04-10T14:45:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2008/04/09/the-future-of-diesel-still-cloudy/</loc><lastmod>2008-04-09T23:22:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2008/04/07/e-voting-how-not-to-save-money-with-it/</loc><lastmod>2008-04-07T23:42:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2008/04/06/making-sense-of-identity-management-statistics/</loc><lastmod>2008-04-07T05:52:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2008/03/23/changes-in-address-changes-in-risk-management/</loc><lastmod>2008-03-24T00:07:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2008/03/22/bank-of-america-and-know-your-customer/</loc><lastmod>2008-03-23T03:31:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2008/03/16/default-settings-and-ecological-impact/</loc><lastmod>2008-03-16T20:04:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2008/03/13/what-is-wrong-with-this-ui/</loc><image:image><image:loc>https://blog.randomoracle.io/wp-content/uploads/2008/03/timewarner_pwdreset.png</image:loc><image:title>Password reset flow</image:title></image:image><lastmod>2008-03-14T01:44:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2008/03/13/macbook-pro-frustrations/</loc><lastmod>2008-03-14T00:56:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2008/02/24/rip-cafe-la-fortuna-one-last-cup-of-coffee/</loc><lastmod>2008-03-06T09:27:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2008/02/28/the-conscience-of-a-mutual-fund-manager/</loc><lastmod>2008-03-06T09:27:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2008/02/29/choosing-the-wrong-side-in-a-format-war/</loc><lastmod>2008-03-06T09:27:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2008/03/06/credit-rating-system-and-meaningful-choice/</loc><lastmod>2008-03-06T06:27:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2008/02/22/rumors-of-windows-server-platform-failure-slightly-exaggerated/</loc><lastmod>2008-02-22T19:35:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2008/02/20/email-storage-and-a-lump-of-coal/</loc><lastmod>2008-02-21T00:57:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2008/02/18/old-school-voting-machines/</loc><lastmod>2008-02-18T18:27:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2008/02/18/ndss-final-day-minding-the-gap/</loc><lastmod>2008-02-18T07:24:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2008/02/13/ndss-day-ii-virtualization-and-security-panel/</loc><lastmod>2008-02-13T20:21:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2008/02/12/dispatches-from-ndss-day-i-breaking-online-games/</loc><lastmod>2008-02-12T16:42:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2008/02/11/time-warner-cable-and-the-value-of-reliability/</loc><lastmod>2008-02-11T16:23:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2008/02/04/security-excuses-and-hidden-agendas/</loc><lastmod>2008-02-05T05:59:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2008/02/02/blogging-from-an-xo/</loc><lastmod>2008-02-02T20:37:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2008/01/31/penny-slots-and-dre-voting-machines/</loc><lastmod>2008-01-31T20:09:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2008/01/24/self-negating-advice/</loc><lastmod>2008-01-24T08:29:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2008/01/20/nyt-on-shoulder-surfing-at-grand-central-atms/</loc><lastmod>2008-01-20T18:05:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2008/01/20/netflix-apple-and-movie-distribution-over-the-internet/</loc><lastmod>2008-01-20T17:42:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2008/01/13/msft-and-one-laptop-per-child/</loc><lastmod>2008-01-14T05:54:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/12/21/is-comcast-throttling-all-upstream-bandwidth/</loc><lastmod>2008-01-10T05:20:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2008/01/09/from-the-digital-media-front/</loc><lastmod>2008-01-10T04:54:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2008/01/05/comcast-350-is-the-magic-number/</loc><lastmod>2008-01-06T02:58:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2008/01/03/2007-in-retrospect-bone-headed-business-moments/</loc><lastmod>2008-01-03T06:31:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/12/27/scraping-or-how-to-weaken-authentication-systems/</loc><lastmod>2007-12-28T05:24:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/12/25/2007-is-the-tide-turning-for-green-technologies/</loc><lastmod>2007-12-25T20:30:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/12/23/reflections-on-comcast-vs-slingmedia-2/</loc><lastmod>2007-12-23T22:58:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/12/19/windows-randomness-sky-is-not-falling-yet/</loc><lastmod>2007-12-19T07:30:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/12/17/bandwidth-asymmetry-in-us-broadband-22/</loc><lastmod>2019-11-10T10:52:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/12/16/windows-live-id-ships-identity-linking/</loc><lastmod>2007-12-17T00:00:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/12/12/bandwidth-asymmetry-in-the-us-broadband-market-12/</loc><lastmod>2007-12-12T18:03:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/12/09/real-estate-agents-deceptive-practices-even-in-strong-markets/</loc><lastmod>2007-12-10T03:14:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/12/05/crossing-the-line-on-privacy-facebook-story/</loc><lastmod>2007-12-05T06:38:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/12/04/netflix-prize-data-and-the-meaning-of-anonymity/</loc><lastmod>2007-12-04T08:04:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/12/03/buffalo-technology-is-latest-target-of-ip-litigation/</loc><lastmod>2007-12-04T00:14:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/12/01/security-theater-act48-outbound-blocking-firewalls-for-pcs/</loc><lastmod>2007-12-01T20:39:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/11/29/verizon-changes-the-tune/</loc><lastmod>2007-11-29T06:50:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/11/23/comcast-support-undoing-the-damage-33/</loc><lastmod>2007-11-24T03:08:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/10/22/comcast-support-diagnostic-rituals-23/</loc><lastmod>2007-10-23T04:21:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/10/21/comcast-support-experience-yet-another-telco-story-13/</loc><lastmod>2007-10-22T03:45:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/10/09/os-x-and-windows-are-fighting-over-my-laptop/</loc><lastmod>2007-10-09T23:57:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/10/06/throwing-fuel-on-the-fuel-economy-debate/</loc><lastmod>2007-10-07T02:50:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/10/03/firefox-ie-tab-extension/</loc><lastmod>2007-10-04T03:31:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/10/02/blodget-on-socially-responsible-investing/</loc><lastmod>2007-10-03T03:51:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/09/28/putting-the-gap-into-security-gap/</loc><lastmod>2007-09-28T19:11:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/09/27/reversing-the-flow-when-cars-power-houses/</loc><lastmod>2007-09-28T03:02:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/09/26/so-dark-the-con-of-baseball-home-run-756/</loc><lastmod>2007-09-26T16:24:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/09/25/upcoming-conference-shes-geeky/</loc><lastmod>2007-09-25T14:32:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/09/23/rip-marcel-marceau/</loc><lastmod>2007-09-23T20:29:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/09/21/auto-manufacturers-discover-vaporware/</loc><lastmod>2007-09-21T20:32:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/09/20/on-the-fence-with-nuclear-energy/</loc><lastmod>2007-09-20T21:42:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/09/18/walt-mossberg-on-ubuntu/</loc><lastmod>2007-09-19T05:40:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/09/14/commoditizing-the-exploit-iphone-saga-continues/</loc><lastmod>2007-09-15T02:59:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/09/05/reliability-in-the-cloud-hidden-dependencies/</loc><lastmod>2007-09-05T16:26:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/09/05/firefox-and-the-ie-tab-a-lesson-in-inter-operability/</loc><lastmod>2007-09-05T15:48:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/08/28/macbook-develops-short-term-memory-personality-disorder/</loc><lastmod>2007-08-29T06:37:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/08/25/electric-vehicle-rally-in-palo-alto-today/</loc><lastmod>2007-08-26T06:40:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/08/24/macbook-pro-first-impressions/</loc><lastmod>2007-09-08T04:03:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/08/23/thinkpad-t43-good-bye-and-good-riddance/</loc><lastmod>2007-08-24T14:49:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/08/22/identity-systems-and-incentives-for-openness/</loc><lastmod>2007-08-23T06:27:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/08/21/lost-and-found-music-on-the-ipod/</loc><lastmod>2007-08-22T06:04:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/08/20/smith-barney-case-study-state-of-the-art-in-authentication/</loc><lastmod>2007-08-21T07:38:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/08/19/wikiscanner-catching-the-obvious-offenders/</loc><lastmod>2007-08-20T07:20:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/08/16/new-chapter/</loc><lastmod>2007-08-17T05:08:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/07/07/website-traffic-as-proxy-for-real-estate-correction/</loc><lastmod>2007-07-08T21:08:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/07/06/on-chinese-gold-farming-operations/</loc><lastmod>2007-07-06T18:46:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/06/29/virtualization-considered-harmful/</loc><lastmod>2007-06-29T15:29:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/06/27/posting-with-windows-live-writer/</loc><lastmod>2007-06-29T15:07:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/05/28/fighting-419-scams-the-vigilante-way/</loc><lastmod>2007-05-28T16:45:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/05/24/identity-thiefs-tag-team-with-data-sellers-to-target-elderly/</loc><lastmod>2007-05-24T15:29:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/05/12/reputation-on-the-web-puzzling-persistence-of-comment-spam/</loc><lastmod>2007-05-13T04:32:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/05/08/fuel-prices-and-used-cars/</loc><lastmod>2007-05-08T06:18:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/05/03/comments-and-track-backs-disabled-after-spam-flood/</loc><lastmod>2007-05-03T13:23:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/05/03/hd-dvd-processing-key-and-internet-censorship/</loc><lastmod>2007-05-03T13:07:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/05/02/dangerous-digits-forbidden-diggs-how-not-to-deal-with-leaks/</loc><lastmod>2007-05-03T00:09:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/05/01/ubuntu-on-dell-oem-machines-the-inflection-point-for-linux/</loc><lastmod>2007-05-02T02:07:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/04/24/choosing-a-way-out-of-misery/</loc><lastmod>2007-04-24T17:38:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/04/21/equities-vs-real-estate/</loc><lastmod>2007-04-21T17:38:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/04/15/paying-tribute-to-jackie-robinson/</loc><lastmod>2007-04-16T02:32:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/04/12/hybrid-car-as-generator-on-wheels/</loc><lastmod>2007-04-12T13:53:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/04/10/schadenfreude-and-sub-prime-lending-crisis/</loc><lastmod>2007-04-10T17:17:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/04/09/renewable-energy-hits-a-home-run/</loc><lastmod>2007-04-09T22:25:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/04/08/distributed-breaking-and-entering-using-craigslist-to-control-bots/</loc><lastmod>2007-04-09T01:04:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/04/07/truth-in-spamming/</loc><lastmod>2007-04-07T15:08:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/04/06/vista-upgrade-uac-quirks-and-dell-unreliability/</loc><lastmod>2007-04-06T23:34:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/04/06/vista-upgrade-battle-stories/</loc><lastmod>2007-04-06T23:33:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/04/06/supreme-court-speaks-but-will-the-epa-listen/</loc><lastmod>2007-04-06T16:12:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/04/03/emi-announces-drm-free-music/</loc><lastmod>2007-04-06T16:11:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/03/28/starship-troopers-from-the-page-to-the-screen/</loc><lastmod>2007-03-28T16:07:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/03/26/nfl-clip-incident-act-ii/</loc><lastmod>2007-03-26T16:37:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/03/26/walt-mossberg-on-dmca/</loc><lastmod>2007-03-26T15:59:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/03/22/trying-times-for-socially-responsible-investing/</loc><lastmod>2007-03-22T17:52:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/03/19/energy-exhibit-at-the-chicago-museum-of-science-and-industry/</loc><lastmod>2007-03-19T16:42:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/03/15/claiming-the-blog-on-technorati/</loc><lastmod>2007-03-15T16:17:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/03/11/internet-jurisdiction-attempt-the-istanbul-way/</loc><lastmod>2007-03-12T04:25:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/03/06/sad-state-of-credit-card-disputes-part-ii/</loc><lastmod>2007-03-06T16:19:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/03/04/inconvenient-living-eco-wisdom-from-the-academy-awards/</loc><lastmod>2007-03-05T05:31:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/03/02/state-of-the-art-in-credit-card-antifraud/</loc><lastmod>2007-03-02T15:48:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/03/01/anoter-full-disclosure-debacle-at-black-hat/</loc><lastmod>2007-03-01T17:22:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/02/14/copyright-state-of-the-art-in-3-pictures/</loc><lastmod>2007-02-26T18:37:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/02/26/anniversary-of-congressional-hearings-us-companies-and-china/</loc><lastmod>2007-02-26T18:35:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/02/26/netflix-vs-mcdonalds-vs-itunes/</loc><lastmod>2007-02-26T18:10:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/02/26/back-in-the-usa/</loc><lastmod>2007-02-26T15:21:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/02/15/environmentally-friendly-spam/</loc><lastmod>2007-02-15T21:06:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/02/10/beyond-cfl-solid-state-lighting-crossing-the-chasm/</loc><lastmod>2007-02-14T04:45:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/02/13/voting-with-the-portfolio-fidelity-and-sudan-divestment/</loc><lastmod>2007-02-13T21:16:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/02/12/city-of-raleigh-pioneering-use-of-leds/</loc><lastmod>2007-02-12T20:28:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/02/11/conflict-diamonds-on-the-big-screen/</loc><lastmod>2007-02-12T03:28:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/02/11/when-the-us-postal-service-makes-a-mistake/</loc><lastmod>2007-02-12T02:57:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/02/09/recording-industry-full-steam-ahead-on-p2p-whack-a-mole/</loc><lastmod>2007-02-09T19:59:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/02/08/winds-of-change-for-prius-demand/</loc><lastmod>2007-02-09T17:12:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/02/08/latest-distraction-from-an-operating-system/</loc><lastmod>2007-02-09T17:11:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/02/07/kim-zetter-on-carders/</loc><lastmod>2007-02-07T19:30:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/02/06/more-bad-news-on-the-phishing-front/</loc><lastmod>2007-02-07T01:34:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/02/04/mobile-usb-computing-on-the-cheap-part-ii/</loc><lastmod>2007-02-05T19:18:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/02/05/tivo-angling-for-a-big-brother-award/</loc><lastmod>2007-02-05T19:15:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/02/04/secret-to-being-cutting-edge-in-it/</loc><lastmod>2007-02-04T17:49:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/02/03/searching-for-database-pioneer-jim-gray/</loc><lastmod>2007-02-03T21:47:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/02/02/vista-energy-and-ecological-impact-of-computers/</loc><lastmod>2007-02-02T16:05:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/02/01/150-sonys-price-for-0wning-a-computer/</loc><lastmod>2007-02-01T20:54:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/01/28/mobile-usb-computing-and-they-are-charging-what-for-this/</loc><lastmod>2007-01-29T05:54:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/01/28/livejournal-statistics/</loc><lastmod>2007-01-29T04:58:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/01/21/this-is-not-good/</loc><lastmod>2007-01-22T04:22:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2007/01/04/slingbox-and-re-defining-economics-of-subscription-services/</loc><lastmod>2007-01-04T06:19:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2006/11/20/paranoia-and-social-security-numbers/</loc><lastmod>2006-11-20T18:33:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2006/11/11/authenticating-the-music-media-connect-xbox-360-drm-and-still-no-dice/</loc><lastmod>2006-11-11T20:06:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2006/10/08/adverserial-business-models-online-ticket-scalping/</loc><lastmod>2006-10-09T04:07:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2006/09/25/plagiarism-20-battleground-internet/</loc><lastmod>2006-09-25T05:15:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2006/09/25/what-is-in-your-laptop/</loc><lastmod>2006-09-25T03:38:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2006/09/21/this-privacy-violation-is-not-yet-rated/</loc><lastmod>2006-09-21T16:32:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2006/09/18/how-to-dos-the-company-exchange-server-part-i/</loc><lastmod>2008-06-27T09:28:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2006/09/18/how-to-dos-your-exchange-server-part-ii/</loc><lastmod>2006-09-18T07:04:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2006/09/15/quasi-secrets-public-vs-private-information-at-facebook/</loc><lastmod>2006-09-15T22:07:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io/2006/09/15/inaugural-post-with-wordpress/</loc><lastmod>2006-09-15T20:31:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.randomoracle.io</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2026-02-01T23:24:46+00:00</lastmod></url></urlset>
