<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Privacy, Power, &amp; Protection In The Cyber Century</title>
    <link>https://blog.eutopian.io/</link>
    <description>Recent content on Privacy, Power, &amp; Protection In The Cyber Century</description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en-gb</language>
    <copyright>All rights reserved - 2017</copyright>
    <lastBuildDate>Thu, 27 May 2021 21:39:30 +0000</lastBuildDate><atom:link href="https://blog.eutopian.io/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Rating Cyber Security Practitioners</title>
      <link>https://blog.eutopian.io/rating-cyber-security-practitioners/</link>
      <pubDate>Thu, 27 May 2021 21:39:30 +0000</pubDate>
      
      <guid>https://blog.eutopian.io/rating-cyber-security-practitioners/</guid>
      <description>1330 words, 5 minutes.
Jean-Léon Gérôme, The Gladiators (Bronze, c.1878).
Do you like hyper-masculine, gladiatorial confrontations where losers suffer not just the ignominy of defeat but significant even permanent loss of status in a rigid hierarchical system? You do, do you? Well then you&amp;rsquo;ll like this.
Or do you think that sounds detestable? If so you&amp;rsquo;ll want to defeat this barbarous idea before it takes hold. Keep reading.
The World As It Is The number of security qualifications has exploded.</description>
    </item>
    
    <item>
      <title>Huawei 5G, The UK Gets A Lesson In Go</title>
      <link>https://blog.eutopian.io/huawei-5g-the-uk-gets-a-lesson-in-go/</link>
      <pubDate>Sun, 28 Feb 2021 18:00:30 +0000</pubDate>
      
      <guid>https://blog.eutopian.io/huawei-5g-the-uk-gets-a-lesson-in-go/</guid>
      <description>4300 words, 14 minutes.
 This post was circulated privately in April 2020. Three months later the government announced that Huawei 5G equipment will be removed from the UK by 2027, a reversal of their previous position. I&amp;rsquo;ve updated the timeline with that development. Otherwise, the text is almost unchanged from the original. Keep that in mind. It follows my July 2019post on the consideration the UK and its allies are giving to Huawei as a supplier of 5G mobile equipment.</description>
    </item>
    
    <item>
      <title>Huawei 5G</title>
      <link>https://blog.eutopian.io/huawei-5g/</link>
      <pubDate>Mon, 29 Jul 2019 18:00:30 +0000</pubDate>
      
      <guid>https://blog.eutopian.io/huawei-5g/</guid>
      <description>4095 words, 16 minutes. A Diplomatic (Chinese) Design Presented to the U.S. – 12th February 1881 by Thomas Nast, for Harper’s Weekly.
 I rarely mention vendors here, so this post is an exception. It&amp;rsquo;s the second in my &amp;ldquo;Projectionist&amp;rdquo;series. The series is ultimately about power and the great forces and constraints shaping our world. I&amp;rsquo;m going to talk about 5G, Huawei, China and the consideration the UK and her allies are giving to the use of Huawei&amp;rsquo;s products in national mobile networks.</description>
    </item>
    
    <item>
      <title>Comment on FT/NSO/Cloud Article July 19th 2019</title>
      <link>https://blog.eutopian.io/comment-on-ft/nso/cloud-article-july-19th-2019/</link>
      <pubDate>Sat, 20 Jul 2019 00:00:30 +0000</pubDate>
      
      <guid>https://blog.eutopian.io/comment-on-ft/nso/cloud-article-july-19th-2019/</guid>
      <description>650 words, 2 1/2 minutes.
Article Financial Times article &amp;ldquo;Israeli group’s spyware ‘offers keys to Big Tech’s cloud’&amp;rdquo;, Mehul Srivastava in Tel Aviv and Tim Bradshaw in London, July 19th 2019.
https://www.ft.com/content/95b91412-a946-11e9-b6ee-3cdf3174eb89
Comment This comment is provided on the basis that the article is factually correct and the details within are technically accurate.
The article claims to describe a recent product demonstration of the Pegasus Malware software by NSO Group:</description>
    </item>
    
    <item>
      <title>APT34 Tools Leak</title>
      <link>https://blog.eutopian.io/apt34-tools-leak/</link>
      <pubDate>Sun, 16 Jun 2019 11:00:30 +0000</pubDate>
      
      <guid>https://blog.eutopian.io/apt34-tools-leak/</guid>
      <description>4300 words, 17 minutes (full). 1500 words, 6 minutes (short). The seven great monarchies of the ancient eastern world. Rawlinson, George. Pub. Lovell 1862. Sketched from North Palace, Koyunjik (Nineveh).`
Leak Summary APT34 is an Advanced Persistent Threat group associated with the Islamic Republic of Iran. Its source code and tools were recently leaked via a Telegram channel. In addition to those tools, information was divulged about the group&amp;rsquo;s targets which included companies and governments in the United Arab Emirates, Kingdom of Saudi Arabia, China, Qatar, and Turkey among others.</description>
    </item>
    
    <item>
      <title>The Projectionist</title>
      <link>https://blog.eutopian.io/the-projectionist/</link>
      <pubDate>Tue, 07 May 2019 11:00:30 +0000</pubDate>
      
      <guid>https://blog.eutopian.io/the-projectionist/</guid>
      <description>750 words, 3 minutes. The reason I don’t post on Cyber Security current affairs?
It&amp;rsquo;s a scramble to be first.
 If I&amp;rsquo;m to write something, what should it be? What&amp;rsquo;s my angle? Which lens do I use on the microscope, or since this is a mass medium, the projector? What film can I show you that you haven&amp;rsquo;t already seen a dozen times? I&amp;rsquo;ll attempt to answer these questions here, and in so doing introduce what may become a new thread of posts.</description>
    </item>
    
    <item>
      <title>Documenting Breaches With H Diagrams</title>
      <link>https://blog.eutopian.io/documenting-breaches-with-h-diagrams/</link>
      <pubDate>Wed, 17 Apr 2019 12:00:30 +0000</pubDate>
      
      <guid>https://blog.eutopian.io/documenting-breaches-with-h-diagrams/</guid>
      <description>1500 words, 6 minutes. “For the sake of brevity, we will always represent this number by the letter e” - Leonhard Euler, Mechanica. 1736. Illustration Pub. 1881.
What if you could understand and explain any breach 10x faster? Security breaches are a staple of mainstream news. In the past, details only emerged through technical analysis, research papers, and the forensic review of press releases. Occasionally we’d be gifted with a customer letter or the suspicious timing of a patch or update.</description>
    </item>
    
    <item>
      <title>Attack Surface Reduction By Dynamic Compilation</title>
      <link>https://blog.eutopian.io/attack-surface-reduction-by-dynamic-compilation/</link>
      <pubDate>Thu, 21 Mar 2019 12:00:30 +0000</pubDate>
      
      <guid>https://blog.eutopian.io/attack-surface-reduction-by-dynamic-compilation/</guid>
      <description>1850 words, 7 minutes.
&amp;hellip;or, how the cave fish lost his eyes. Iranocypris typhlops - 1944, By B.Coad for Bruun &amp;amp; Kaiser.
This post follows directly from the last. In that post, we learned that everyone could do something to reduce their attack surface and decrease the likelihood of a breach. I&amp;rsquo;m going to show you what that winning system looks like when taken to its ultimate logical conclusion. The logic goes something like this:</description>
    </item>
    
    <item>
      <title>Winning Systems &amp; Security Practitioners 7. Attack Surface Reduction</title>
      <link>https://blog.eutopian.io/winning-systems-security-practitioners-7.-attack-surface-reduction/</link>
      <pubDate>Sun, 17 Feb 2019 14:00:30 +0000</pubDate>
      
      <guid>https://blog.eutopian.io/winning-systems-security-practitioners-7.-attack-surface-reduction/</guid>
      <description>2000 words, 7 1/2 minutes.
Attack Surface Reduction Illustrerad verldshistoria utgifven av E. Wallis. volume I. 1875-9.
“Out of every hundred men, ten shouldn&amp;rsquo;t be there, eighty are just targets”
Heraclitus 535 - 475 BC.
 My posts on Winning Systems for Cyber Security Practitioners are my most popular. In them, I attempt to change your perspective on the relative importance of products and skills in securing what&amp;rsquo;s precious to you.</description>
    </item>
    
    <item>
      <title>Work In Progress</title>
      <link>https://blog.eutopian.io/work-in-progress/</link>
      <pubDate>Wed, 30 Jan 2019 10:00:30 +0000</pubDate>
      
      <guid>https://blog.eutopian.io/work-in-progress/</guid>
      <description>650 words, 2 1/2 minutes. A Metapost This is a post about posting. Expect changes, deletions, corrections and improvements.
From my first post in July 2017:
 I expect much of the content here to be around the subject of what we now call Cyber Security, since this is a field I began researching around 1990 and have worked professionally within for years in both an offensive and defensive capacity. Cyber Security (or just security as we used to call it) now intersects with several of my other interests including geopolitics, propaganda, public policy, and privacy.</description>
    </item>
    
    <item>
      <title>Geopolitics For Fun &amp; Profit</title>
      <link>https://blog.eutopian.io/geopolitics-for-fun-profit/</link>
      <pubDate>Thu, 25 Oct 2018 08:38:04 +0100</pubDate>
      
      <guid>https://blog.eutopian.io/geopolitics-for-fun-profit/</guid>
      <description>1750 words, 7 minutes. Sketch by Sir William Rothenstein, 1933.
&amp;ldquo;Who rules East Europe commands the Heartland. Who rules the Heartland commands the World-Island. Who rules the World-Island commands the world.&amp;quot;
- Sir Halford Mackinder, Democratic Ideals and Reality. 1919.
 Do you work in technology, are you building a company? You should think about how your product or service fits with the wider world because aligning with large movements is a winning system.</description>
    </item>
    
    <item>
      <title>A Universal Lemma For Compliance</title>
      <link>https://blog.eutopian.io/a-universal-lemma-for-compliance/</link>
      <pubDate>Mon, 27 Aug 2018 19:38:04 +0100</pubDate>
      
      <guid>https://blog.eutopian.io/a-universal-lemma-for-compliance/</guid>
      <description>2500 words, 9 1/2 minutes. Matthew Hopkins, Witchfinder General. 1647 Engraving.
Here I describe a lemma1 or helping theorem for technical compliance of IT with a focus on Information Security.
It&amp;rsquo;s an approach for all compliance regimes whether regulatory or corporate. It doesn&amp;rsquo;t date, nor is it predicated on a technology or platform. It isn&amp;rsquo;t a trick. It doesn&amp;rsquo;t provide cover for inadequate security or incompetent staff. If you&amp;rsquo;re looking to evade compliance, disguise incompetence, or shirk accountability then you&amp;rsquo;re in the wrong article.</description>
    </item>
    
    <item>
      <title>The Largest Open Goal In Cyber Security</title>
      <link>https://blog.eutopian.io/the-largest-open-goal-in-cyber-security/</link>
      <pubDate>Wed, 01 Aug 2018 10:00:30 +0000</pubDate>
      
      <guid>https://blog.eutopian.io/the-largest-open-goal-in-cyber-security/</guid>
      <description>1000 words, 4 minutes. &amp;ldquo;But how was one to explain repeated instances of derisive laughter at melodramas and films that hardly set out to be funny?&amp;quot; - Prof. Eric Rentschler1
 Out of place laughter is an anarchist in the dark. Someone who refuses to let the film cast its spell.
 Imagery is important. Moving or still. Whether it be religious iconography, depictions of national myth, a coat of arms, a rallying military standard, your company&amp;rsquo;s brand, or something as incidental as clip art.</description>
    </item>
    
    <item>
      <title>NSA PRISM&#39;s Commercial Cousin</title>
      <link>https://blog.eutopian.io/nsa-prisms-commercial-cousin/</link>
      <pubDate>Thu, 24 May 2018 14:40:04 +0100</pubDate>
      
      <guid>https://blog.eutopian.io/nsa-prisms-commercial-cousin/</guid>
      <description>2200 words, 11 minutes.
 Engineering, Vol. 62, December 18 1896.
&amp;ldquo;In 1882 I was in Vienna, where I met an American whom I had known in the States. He said: &amp;lsquo;Hang your chemistry and electricity! If you want to make a pile of money, invent something that will enable these Europeans to cut each others&amp;rsquo; throats with greater facility.’” - Hiram Maxim.
Selling arms during an arms race is such an interesting topic it warrants its own post.</description>
    </item>
    
    <item>
      <title>Avoiding The Infosec Extinction Part 2. </title>
      <link>https://blog.eutopian.io/avoiding-the-infosec-extinction-part-2./</link>
      <pubDate>Tue, 24 Apr 2018 19:38:04 +0100</pubDate>
      
      <guid>https://blog.eutopian.io/avoiding-the-infosec-extinction-part-2./</guid>
      <description>1600 words, 8 minutes.
Turning Up The Magnification  Three lens microscope for simultaneous observations. 1882
This is the second of a short series of posts about the Cyber Security market. This market is interesting now because I believe it&amp;rsquo;s at a juncture where we can choose one of two possible futures. We being the product builders, investors, and customers. In the previous postI presented you with a choice. A choice between a beautiful fantasy, and practical reality.</description>
    </item>
    
    <item>
      <title>The Next Big Thing? Go Back To The Future.</title>
      <link>https://blog.eutopian.io/the-next-big-thing-go-back-to-the-future./</link>
      <pubDate>Thu, 05 Apr 2018 14:00:00 +0100</pubDate>
      
      <guid>https://blog.eutopian.io/the-next-big-thing-go-back-to-the-future./</guid>
      <description>1500 words, 7 minutes. Man, embracing his origin, &amp;hellip; civilization, &amp;hellip; mental and moral faculties. &amp;hellip; Illustrated. Lind, G. Dallas, 1884.
I&amp;rsquo;m interested in the history of technology, especially those moments which gave rise to great advances or failures. I&amp;rsquo;m interested to know the conditions, the growth medium, the organisational structures, the management strategy which helped or hindered. I&amp;rsquo;m interested in whether (and to what degree) Government has a role to play in the stimulation or sterilisation of research, development, and commercialisation.</description>
    </item>
    
    <item>
      <title>Don&#39;t help the CSO out. Build him up!</title>
      <link>https://blog.eutopian.io/dont-help-the-cso-out.-build-him-up/</link>
      <pubDate>Mon, 19 Feb 2018 16:00:00 +0100</pubDate>
      
      <guid>https://blog.eutopian.io/dont-help-the-cso-out.-build-him-up/</guid>
      <description>950 words, 4 1/2 minutes. One of the reasons why organisations ultimately fail at Cyber Security, is because the office of the CSO lacks power. In this post I’ll explain why that is and what we can do about it.
Why The CSO Lacks Power The Cyber Security industry constantly strives to produce better products and services. Engineers work tirelessly to improve deployment practices. There are dozens of courses and certifications designed to improve skills.</description>
    </item>
    
    <item>
      <title>Avoiding The Infosec Extinction Part 1.</title>
      <link>https://blog.eutopian.io/avoiding-the-infosec-extinction-part-1./</link>
      <pubDate>Tue, 21 Nov 2017 14:00:00 +0100</pubDate>
      
      <guid>https://blog.eutopian.io/avoiding-the-infosec-extinction-part-1./</guid>
      <description>800 words, 3 1/2 minutes.
Making Your 1st Decision This is the first of a short series of posts about the Cyber Security market. This market is interesting now because I believe it&amp;rsquo;s at a juncture where we can choose one of two possible futures. We being the product builders, investors, and customers. The choice being whether to align ourselves with reality or fantasy.
Plenty of markets perpetuate a degree of fantasy.</description>
    </item>
    
    <item>
      <title>Breach Handling &amp; The High Ground</title>
      <link>https://blog.eutopian.io/breach-handling-the-high-ground/</link>
      <pubDate>Thu, 12 Oct 2017 19:38:04 +0100</pubDate>
      
      <guid>https://blog.eutopian.io/breach-handling-the-high-ground/</guid>
      <description>1600 words, 8 minutes.
You&amp;rsquo;ve suffered a breach. Your security was circumvented. Data was lost and the public, shareholders, media, and perhaps regulator must soon be informed. A chain of events has begun. What you do next will determine in large part where that chain leads. In this post I&amp;rsquo;m going to talk about a tactic I&amp;rsquo;ve seen used to successfully re-frame a bad situation and nudge the narrative in your favour.</description>
    </item>
    
    <item>
      <title>AI &amp; The Great Reorientation</title>
      <link>https://blog.eutopian.io/ai-the-great-reorientation/</link>
      <pubDate>Mon, 21 Aug 2017 19:38:04 +0100</pubDate>
      
      <guid>https://blog.eutopian.io/ai-the-great-reorientation/</guid>
      <description>600 words, 3 minutes. Photograph of UK&amp;rsquo;s first cash machine installation 1967. Martins Bank Archive.
In this bite-sized post I&amp;rsquo;m going to talk about the lag between initial adoption of transformative technology and the increase in productivity it&amp;rsquo;s supposed to bring. I&amp;rsquo;m going to talk about the disappointment felt when such technology meets established, dogmatic structures in business (or government), and what executives can do about it. Not all new technologies have the potential to transform business but those that do demand special care, because they are a pill that you swallow not a topical cream.</description>
    </item>
    
    <item>
      <title>An Idea Whose Time Has Come</title>
      <link>https://blog.eutopian.io/an-idea-whose-time-has-come/</link>
      <pubDate>Thu, 17 Aug 2017 10:00:30 +0000</pubDate>
      
      <guid>https://blog.eutopian.io/an-idea-whose-time-has-come/</guid>
      <description>950 words, 4 1/2 minutes. Hugo by Étienne Carjat, 1876
&amp;ldquo;Nothing is as powerful as an idea whose time has come.&amp;quot; - Victor Hugo.
This is the second of two posts on strategic software. The first explained what it is, what it does, and where to find it. Now I&amp;rsquo;ll tell you why it&amp;rsquo;s an idea whose time has come. I&amp;rsquo;ll tell you why it will be more powerful in some respects than traditional politics and how it will come to shape the world.</description>
    </item>
    
    <item>
      <title>The Age Of Strategic Software</title>
      <link>https://blog.eutopian.io/the-age-of-strategic-software/</link>
      <pubDate>Tue, 15 Aug 2017 10:00:30 +0000</pubDate>
      
      <guid>https://blog.eutopian.io/the-age-of-strategic-software/</guid>
      <description>1300 words, 5 minutes.
Belloc by E. O. Hoppé, 1915.
&amp;ldquo;Whatever happens, we have got the Maxim gun, they have not.&amp;quot; - Hilaire Belloc.
Once upon a time software was just for counting beans. It counted more beans faster and cheaper than anything else. Then computers became personal, then portable, then pocketable. All sorts of different kinds of software were created to serve the people and help them do their jobs better.</description>
    </item>
    
    <item>
      <title>Better Odds For VCs &amp; Founders</title>
      <link>https://blog.eutopian.io/better-odds-for-vcs-founders/</link>
      <pubDate>Tue, 08 Aug 2017 19:38:04 +0100</pubDate>
      
      <guid>https://blog.eutopian.io/better-odds-for-vcs-founders/</guid>
      <description>1500 words, 7 minutes. Fishing Through Ice, Bain News Service. c.1910.
This post is written from the perspective of a VC screening for success factors. In it, I drill deeper into successful operational characteristics. If you&amp;rsquo;re an entrepreneur or founder, you should give consideration to adopting some of the systems I talk about here. I&amp;rsquo;ll even suggest prioritising them over features and fixes to your product because getting imperfect product adopted by many is a better predictor of success than putting perfection in the hands of a few.</description>
    </item>
    
    <item>
      <title>Beating The Samson Option</title>
      <link>https://blog.eutopian.io/beating-the-samson-option/</link>
      <pubDate>Thu, 27 Jul 2017 10:00:30 +0000</pubDate>
      
      <guid>https://blog.eutopian.io/beating-the-samson-option/</guid>
      <description>1300-1600 words, 6 1/2 to 8 1/2 minutes.
An Etching of Samson by Julius Schnorr von Carolsfeld, from an 1882 German Bible.
&amp;ldquo;He grasped two pillars of the temple and bowed himself with all his might&amp;rdquo; - Judges 16:30.
Introduction This post is about online services which rely partly, or wholly, on user-contributed content. It&amp;rsquo;s about what happens to that content if those services close.
I&amp;rsquo;ll examine the constraints and motivations of the parties involved.</description>
    </item>
    
    <item>
      <title>Building A Better LinkedIn</title>
      <link>https://blog.eutopian.io/building-a-better-linkedin/</link>
      <pubDate>Sat, 01 Jul 2017 19:38:04 +0100</pubDate>
      
      <guid>https://blog.eutopian.io/building-a-better-linkedin/</guid>
      <description>1300 words, 4 and a half minutes. This will probably be the first and last time I write about social networking.
I&amp;rsquo;m an antisocial social networker. I had an expectation that part of the job of a networking platform (professional or social) would be to filter content or updates, both in terms of who was posting them and the individual significance or quality of the posts. Boy was I wrong. One person re-posts every single article they see, another &amp;ldquo;motivational&amp;rdquo; poster repeats blithe optimism without context at the end of every day (tellingly never the beginning).</description>
    </item>
    
    <item>
      <title>Winning Systems &amp; Security Practitioners 6. Final Remarks</title>
      <link>https://blog.eutopian.io/winning-systems-security-practitioners-6.-final-remarks/</link>
      <pubDate>Fri, 30 Jun 2017 15:00:30 +0000</pubDate>
      
      <guid>https://blog.eutopian.io/winning-systems-security-practitioners-6.-final-remarks/</guid>
      <description>550 words, 2 minutes.
Final Remarks &amp;ldquo;All men can see the tactics whereby I conquer, but what none can see is the strategy out of which victory is evolved&amp;rdquo; - Sun Tzu.
This is the 6th and final post in a short series on winning systems for security practitioners. The first postfeels like a while ago already, about 6000 words or 25 minutes. Those minutes haven&amp;rsquo;t been wasted.
The Inevitable Car Analogy If you&amp;rsquo;ve come this far then you&amp;rsquo;ve already completed one whole lap around the circuit of winning systems.</description>
    </item>
    
    <item>
      <title>Winning Systems &amp; Security Practitioners 5. Resilience</title>
      <link>https://blog.eutopian.io/winning-systems-security-practitioners-5.-resilience/</link>
      <pubDate>Fri, 30 Jun 2017 14:00:30 +0000</pubDate>
      
      <guid>https://blog.eutopian.io/winning-systems-security-practitioners-5.-resilience/</guid>
      <description>1450 words, 5 1/2 minutes.
Resilience &amp;ldquo;In defeat: Defiance&amp;rdquo; - Winston S. Churchill.
This is part 5 of 6 in a short series of posts on winning systems for Information Security practitioners. It aims to plug the gap between policy and products and put you, the practitioner, back in the driving seat. After all if you don&amp;rsquo;t know what system you&amp;rsquo;re implementing, how can you decide what products or features are important to you?</description>
    </item>
    
    <item>
      <title>Winning Systems &amp; Security Practitioners 4. Robustness</title>
      <link>https://blog.eutopian.io/winning-systems-security-practitioners-4.-robustness/</link>
      <pubDate>Fri, 30 Jun 2017 13:00:30 +0000</pubDate>
      
      <guid>https://blog.eutopian.io/winning-systems-security-practitioners-4.-robustness/</guid>
      <description>1200 words, 5 minutes.
Robustness &amp;ldquo;The first virtue in a soldier is endurance of fatigue.&amp;quot; - Napoleon Bonaparte.
This is part 4 of 6 in a short series of posts on winning systems for Information Security practitioners. It aims to plug the gap between policy and products and put you, the practitioner, back in the driving seat. After all if you don&amp;rsquo;t know what system you&amp;rsquo;re implementing, how can you decide what products or features are important to you?</description>
    </item>
    
    <item>
      <title>Winning Systems &amp; Security Practitioners 3. Responsiveness</title>
      <link>https://blog.eutopian.io/winning-systems-security-practitioners-3.-responsiveness/</link>
      <pubDate>Fri, 30 Jun 2017 12:00:30 +0000</pubDate>
      
      <guid>https://blog.eutopian.io/winning-systems-security-practitioners-3.-responsiveness/</guid>
      <description>1100 words, 4 1/2 minutes.
Responsiveness &amp;ldquo;No battle plan ever survives contact with the enemy&amp;rdquo; - Helmuth von Moltke.
This is part 3 of 6 in a short series of posts on winning systems for Information Security practitioners. It aims to plug the gap between policy and products and put you, the practitioner, back in the driving seat. After all if you don&amp;rsquo;t know what system you&amp;rsquo;re implementing, how can you possibly decide what products or features are important to you?</description>
    </item>
    
    <item>
      <title>Winning Systems &amp; Security Practitioners 2. Preparation</title>
      <link>https://blog.eutopian.io/winning-systems-security-practitioners-2.-preparation/</link>
      <pubDate>Fri, 30 Jun 2017 11:00:30 +0000</pubDate>
      
      <guid>https://blog.eutopian.io/winning-systems-security-practitioners-2.-preparation/</guid>
      <description>1100 words, 4 1/2 minutes.
Preparation &amp;ldquo;One of the best ways to keep peace is to be prepared for war&amp;rdquo; - Plato &amp;amp; others.
Today attacks come thick and fast. The chances are that all public IPv4 address space is regularly scanned. Time-to-compromise of an unpatched, non-firewalled, Microsoft Windows host is about 5 minutes. Systems are attacked not because they are valuable, but because they are vulnerable. Even an old cable-modem is a useful addition to a botnet.</description>
    </item>
    
    <item>
      <title>Winning Systems &amp; Security Practitioners 1. Introduction</title>
      <link>https://blog.eutopian.io/winning-systems-security-practitioners-1.-introduction/</link>
      <pubDate>Fri, 30 Jun 2017 10:00:30 +0000</pubDate>
      
      <guid>https://blog.eutopian.io/winning-systems-security-practitioners-1.-introduction/</guid>
      <description>1100 words, 4 1/2 minutes.
Introduction &amp;ldquo;Never tell people how to do things. Tell them what to do and they will surprise you with their ingenuity.&amp;quot; - George S. Patton
If you&amp;rsquo;ve read my previous postyou&amp;rsquo;ll know that to get beneficial, long lasting, low-maintenance results in Information Security, you need winning systems. Not skills. If you like grinding monotony punctuated by periods of extreme stress and being able to tell people how busy you constantly are, you can safely return to your to-do list.</description>
    </item>
    
    <item>
      <title>Forget Solving The Cyber Security Skills Shortage</title>
      <link>https://blog.eutopian.io/forget-solving-the-cyber-security-skills-shortage/</link>
      <pubDate>Fri, 30 Jun 2017 09:00:30 +0000</pubDate>
      
      <guid>https://blog.eutopian.io/forget-solving-the-cyber-security-skills-shortage/</guid>
      <description>1100 words, 4 minutes. This post is one of a short series on structural and systemic things the Information Security industry does wrong, and what we might do about them.
Disclaimer: I advocate lifelong learning, that includes professional training, product training, workshops, online or in-person courses, and academic study. The professional trainers I know who author and deliver their own material are among the most mentally agile people I&amp;rsquo;ve ever met.</description>
    </item>
    
    <item>
      <title>The Age Of Invisible Disasters</title>
      <link>https://blog.eutopian.io/the-age-of-invisible-disasters/</link>
      <pubDate>Sat, 17 Jun 2017 21:23:30 +0000</pubDate>
      
      <guid>https://blog.eutopian.io/the-age-of-invisible-disasters/</guid>
      <description>1400 words, 5 minutes. The Tay Bridge disaster occurred during a violent storm on 28th December 1879 when the first Tay Rail Bridge collapsed while a train was passing over it from Wormit to Dundee, killing all 70 people aboard.
It is widely accepted by engineers that disasters teach us more than successes. Said another way, we don&amp;rsquo;t learn from the bridge that stays standing. After the Tay Bridge disaster there was an investigation.</description>
    </item>
    
    <item>
      <title>Elephant Proofing Your Web Servers</title>
      <link>https://blog.eutopian.io/elephant-proofing-your-web-servers/</link>
      <pubDate>Wed, 31 May 2017 21:23:30 +0000</pubDate>
      
      <guid>https://blog.eutopian.io/elephant-proofing-your-web-servers/</guid>
      <description>750 words, 3 minutes. The Case For Default Deny What&amp;rsquo;s free, permanently reduces your exposure to a range of potential vulnerabilities, requires no maintenance, and takes only a few minutes to implement?
Most web servers are installed to serve content to unauthenticated users on the Internet. Most only have a finite list of URLs or a specific number of web apps. I&amp;rsquo;ve always thought it strange that they install in a default-permit mode.</description>
    </item>
    
    <item>
      <title>About me</title>
      <link>https://blog.eutopian.io/about/</link>
      <pubDate>Mon, 01 May 2017 21:23:30 +0000</pubDate>
      
      <guid>https://blog.eutopian.io/about/</guid>
      <description>900 words, 3 minutes.
Arno Breker&amp;rsquo;s Dionysos. 1936.
20+ years as CTO, Founder, Investor, Product Manager, Consultant, Engineer &amp;amp; advisor to corporations, law enforcement, government, &amp;amp; NGOs. Cyber Security Éminence Grise.
Still a work in progress. This is how I got here:
From Internet Start-Up To Global Telecommunications Giant In 5 Years
I started researching computer and network security in the early 1990s and began my professional career in 1995 with one of the UK&amp;rsquo;s first Internet Service Providers.</description>
    </item>
    
    <item>
      <title>Arrival</title>
      <link>https://blog.eutopian.io/arrival/</link>
      <pubDate>Mon, 01 May 2017 21:23:30 +0000</pubDate>
      
      <guid>https://blog.eutopian.io/arrival/</guid>
      <description>1200 words, 4 1/2 minutes. Welcome to the first post of my blog. Here I explain the why, what, and how of everything else you will see on this site. If you want to know more about the who, then read this. Most of my professional life involves winning systems or processes I&amp;rsquo;ve already established, monitoring progress or performance against targets, solving recognised problems. Here is where I introduce a few new ideas in a less formal environment, and explore them with you in an atmosphere of constructive discussion so that we might test them and learn something.</description>
    </item>
    
    <item>
      <title>Copyright</title>
      <link>https://blog.eutopian.io/copyright/</link>
      <pubDate>Mon, 01 May 2017 21:23:30 +0000</pubDate>
      
      <guid>https://blog.eutopian.io/copyright/</guid>
      <description>220 words, 1 minute.
 Attribution-ShareAlike 4.0 International (CC BY-SA 4.0)   Unless described otherwise, the contents of this site are provided under the terms of the Creative Commons CC BY-SA license.
I am the sole author of the text of the articles appearing on this site. Where direct quotations are used they are attributed to their originator. Where images are used they are:
 Original Work. Typically diagrams or sketches.</description>
    </item>
    
    <item>
      <title>The Stack</title>
      <link>https://blog.eutopian.io/the-stack/</link>
      <pubDate>Mon, 01 May 2017 21:23:30 +0000</pubDate>
      
      <guid>https://blog.eutopian.io/the-stack/</guid>
      <description>360 words, about 1 minute.
The site is built and maintained by me using Hugo, a static site generator written in Go. It&amp;rsquo;s running on a FreeBSD nginx web server. By the time you read this nginx will probably be inside a jail. The theme is a port of Ghost/Casper. My criteria was low maintenance, good security, performance, and simplicity. The content is all written in Markdown in a text editor, Hugo&amp;rsquo;d, and uploaded to the server using rsync/ssh.</description>
    </item>
    
    <item>
      <title>PGP Pub Key</title>
      <link>https://blog.eutopian.io/pgp/</link>
      <pubDate>Sat, 18 Mar 2017 21:23:30 +0000</pubDate>
      
      <guid>https://blog.eutopian.io/pgp/</guid>
      <description>-----BEGIN PGP PUBLIC KEY BLOCK----- Version: SKS 1.1.5 Comment: Hostname: pgp.mit.edu mQINBFkCCS4BEAC8cC7geoSLb6xG+BM2XCCMl81KxIibgs+5UuD2slIvGBVntWg2BYQF5oHD Dbcqx3FmiRkU5L9clwYTMpR9293b4+fk64cPm1bGx0YTU6vpRmA+Cc5Q36Mny/okhWNr0Fxb UMh+EfTIjp/U0zXF/sFLcZgM0pUO0KRkaWkcLuuD0QuCx93Eo4IY169RqPwjRhw33EhDpgmC Xrfwnug31CTt+z6VNFmYv9Pm14u8ct/8wBh47J374mlRm+fTovw0qzokUYDAd4l9PHF0+K9l F0mf2suDn+1VAyTd7ZniEnwT8N+VX/6RoS3cq0TwKuGFN6tupAmFdFgq4PtrX4hiyQyeyhn1 0Dmwli8ZfQKpqQoVtKOWcKSVhll7/eWi/5eYBGYmDQe92j2OOt0+mwCPGrsaq51Pe7LAx4AW qYYbINYhdpJNL/MElRqbxWnhjNHa9L7UJg7iffh5l332Ufe2FwGGXVhbSG6UQdUH6ke7mvFU Zilt0e9h1TFtLpjuuY+9bVJfubBrO9KPvFfcurJ7cL+M69uaU1IUUk/ZsT2e3hIv7KqwZSwu qI9vWE8YMkIC5HkmuUn4Y1xlNvl5Q0G5K+cpASolxmxr6NfkZkw1BbSioaa7xTCqJTPBnckX yBxyRScDR8jz7brt1o6aupKXexsS2jn8T3D8pjUfb5bP1LxGKwARAQABtBxOaWNrIEh1dHRv biA8bmlja0AzNjBpcy5jb20+iQI9BBMBCgAnBQJZAgotAhsDBQkSzqYABQsJCAcDBRUKCQgL BRYCAwEAAh4BAheAAAoJEGQ9326ErjpXRF0P/1LFAFTHjTrA8uGoFlg4OToVqYfWSykBzmkv NJrFpHzYACV1CkiOrNh9jrtH7pL7+1gANWAtGvZ8Px4RGUxxnzUZcmdXqXYSCf9fjAZfRwVd 1ZfVz6ItnXDpgaAM/+jpp59Zq4p2Ibz2o1NrwBIkpbGgiXkUZm51VLKeuQhGHZOmWnAJ6r2x fQX201SGtRzDHPbKB9sNp7wg8eRf4IcjnImeUrwyYwhXvWuGsxrjF8ISMwTrTO5V7090kAoO DEywVtoKpg1NNDnskj6Zwfapc7O849mIFqDXJHPtv19RjiDH3ji8cxWSTMpsa7zGWsX3UJ7G M3MvMXPgBr0nMx/p4EYp8BMZzRGEgdhPfgNdFdkJ7PSwh/FjgOlgrUGmAydjHCWZ6Reiritm h7R/FitOSmNIX6axOXba/fxl7qmE9m/MkBto6ddR8AtS10i+IYSPvNoyH7gJdr9YeYQEiihN 05M0TXa7s+ShjCSjV6pYNuC8LbJpnrziVikl9T174GIsDe31oK+tIKhCXotQo3mOJL3RxM0R LWDBtKAAUBWsmPHx0RVkfV0sypaHDpbeqgD+wOoNM/O3XqjdnJWAvVq647EK6S/lbfO1W9h7 0So+SECiyX9EAV5D14F1FCzqoMUdr5FWfbucn2RajDKCR8IaDvSom+9HNHDBcpeRcrEIJjYT tB1OaWNrIEh1dHRvbiA8bmlja2hAMzYwaXMuY29tPokCPQQTAQoAJwUCWQIKPwIbAwUJEs6m AAULCQgHAwUVCgkICwUWAgMBAAIeAQIXgAAKCRBkPd9uhK46VyV+D/wJPfXZRKn0sXJqyCto kd5PACd9sfMQASFGO5of9rsISNgDEyQPR36f8w7oC5ci2ysVVWfs61S+lyWg9xOcLvbGFGPt pAIVeM6MeozJWZDnNDx/YGX3I8AIv4RLbL4Ffj2q0APgGmebQ3Gj1QMYSxd9j1no3gaYUx4P n/dSgWAsZDxb3qjkwGTG5FrXKbBa3VL2smWjIFCehO80wQjSOQGIcvJAOKCeMV00TFTYviNM SYVE0/EKfQaNsCn2uVtPnjWeC7z8vaPysLtngWYjJLqwh9US/4REgFRqyzXerkackaFNFwiG mCyI8lADG+mfQAY//AinXRRP0tkmFmDVeDCCDZTfpAV6V1ir/r4dD3doXkgmnKc5gsu4xbgh L9c3ltdI5wJTLSCvxpfKV6k2EKnptd8cmcCJXA2Gcdy7BvmDhmVGz9jhl6oS1gbS498TloR7 cs9LoU1CkINChJeVeXSrWpsqV+WsqQuSsVIRHyMTO9wVbrrJ8FlszYe+DzgyD0p63E/XcS1A 5n9JoPoYuzDA/u3Iu4RevUu1xOVsDZjd86biqKwoG+/Nbx58cen50pxhNhXhcjO5boMs2oD9 y8w7eiCQSeCoVazn2qixFkZX8OUVKkG3bFV2FZVAq4lSMAgkmxf9SDkJa3/XtM5So1bU8nso ygCwRCbWvZnQenKB9rQjTmljayBIdXR0b24gPG5pY2suaHV0dG9uQDM2MGlzLmNvbT6JAkAE EwEKACoCGwMFCRLOpgAFCwkIBwMFFQoJCAsFFgIDAQACHgECF4AFAlkCCjUCGQEACgkQZD3f boSuOldYJw/+OtKmj51BK3qi4cyE6/leK4n5u0qogdfo+9mg8wNY52MUTb4LOLn07JxFT0VO DxXCr+CPlUGHVmbGkwmmVuTTt3R98g22gK5nsH5icEDd+e5hXJ2tHOPJ9NgY17OBARtAT02a USSy3WWGu3GL5osnHZmv7ejrnnwDCizk97+zYzpIGHMzC+nT17/rpggcvDhfIVVWySJB8Zv1 rTrqJS5/B/nXXT/9p5wJZw1K6ilRvL/oh6JgcDZ2Cd4UHvdOO+sq/5reT6XwR6Q0Xt5hx20f Hj5wpD+X81Aqsm0KtpyUHvgR39K8+DzenOX00CZl1QBafJ0Ca545fDWqQOqfD6TS2H6AtCBM Lzsj/Z43r/1KW6ZvXcI2nI317+BunadVlnDb4X5vfhbGpEnuClZsGPk7f/ggF5cdO+ezKs1c FCk+U5KUSYJVXYR4gLkTSgoa0RNWyUso/O5fKSol1MqRlodttBpsGxTybnJezE7QxlbSbS4Q vV50NuUApznLMm9k/wjfFoTW1ScgW7vAQM75QkxVtA/71JJB7bhNuvZXQ/kOOtJddvpBlbWg /SdGcrnFBk9wWF6ENOTx6K29ny4+R7PJvt3SUsMIaQR/IP7Y3H1izi6+T0AQQVrDkBccWozz 48Xhg2nFsTYCrx3YAawSh5ARM0DeX2r20awms6gf2XisdUOJAj0EEwEKACcFAlkCCS4CGwMF CRLOpgAFCwkIBwMFFQoJCAsFFgIDAQACHgECF4AACgkQZD3fboSuOldQQQ//ciyZlwaBOx/k xfbVxmpBcld+hw/x7mRsXrLD+bbIb8Ie4ljlb2xTgeLHxkQ/5qcaxJVUJJHKO//5L1w/NofV E1CaDtuAgOUF/U7VzS1xzyNZeRFqCpGkVx0IdF47yHbKkHBcGlInapnckIKGpa3n8kWTHYeC G1vti8ljf+ivc/YN21eo99ij0wKhYErx0esD5I66E20Sb5Oi0602yPHTIh9OWYGgvo43V8pd lJPpp3X6Nu8U29UWht/RtiJ2JFHgyoTZqjKwrh4eAbsoa7+c7a9APKomvKTIQJdujGYmnIHr C0hRPvRJ0KxnhCMwhqHGnDfcAYUOOJdsIuuZfiBMUhmjhq5cKU+mdx1/aEnTi41PIRVTFM5S lyc58lCaqpq0xGdkigAjPZHmCC8eHfaLmjAZWtuO7Bh86uI+hOroK+53FJ6TQuQxIko6xl5w U2RH+3aKOAv5rn7ArsvNQlnGM1u5Q5qSNfQROUyWFJ+zdhTGF8N4x3dzXSRtIHahow19OfS9 Oqk7JaTcombO/dD1exx541fB1h/dgpocTCBmrcI+4Fh2BiEzfyXcFgY3VdFDGdPSYZX9xx2I 1wjZ0sRucWLSyllr5vy3IW7WX7RncZmgj3YIFX18UwLk59JJvpl0LxvVsT4FmPLlnQ+Ky8pf YWZaZ0hfGgH6uNXgggzaDQ7R/wAACNLIEAEQAAEBAAAAAAAAAAAAAAAA/9j/4AAQSkZJRgAB AQEASABIAAD/2wBDACAWGBwYFCAcGhwkIiAmMFA0MCwsMGJGSjpQdGZ6eHJmcG6AkLicgIiu im5woNqirr7EztDOfJri8uDI8LjKzsb/wgALCADTAKEBAREA/8QAGAAAAwEBAAAAAAAAAAAA AAAAAAECAwT/2gAIAQEAAAAB1QwmExzgtqqhoDPMcRd1nOzdDsXJlrq4yT2Ua3bHJxTJeuue c1pshthhzVA66CKNkDbc8MGl3dMZRw10seHItummOlIGPL12Ecb69BgAhLl6NGHBfU2AAkjG 9GVxvobABCSz0sKzy3bECaSM9bGLn3aGATnJWjYjOyG6pTGdFUwYh1lO7jKcdbqmNinSc5qz JaCdsEA1SkM1YjQZIDYk5WehJoM6A5baThrPVRXUBkgAaGsrIvRo1QZpkyGN6LTRtMDKaJlL NbzuyhimU1MilW9mA2knIkRKrSgCwQ0lKmHpQxtgJglMqhjomwEwCMxsbuVYCYAc0YX2FOT/ xAAkEAACAgEFAAICAwAAAAAAAAAAAQIREBIgITAxA0EyQCIzUP/aAAgBAQABBQLFFFFHBqRq RaLRxiZHrczVZzh5vEyHS3RKbliMWUzSUPF0IkuI9MnqebE1hlLKkaV0fJLfEZRRpNJ+Jae5 8Dd5o0Gg0lFFZQ+R/wAWpbZ+YiiuuawvMz8KEuOx8OH45axH3tkQ82TXMe6QvNklZHukLzZR 99WosTHvYullxOCj63NCKxKaRH5LLyyzSLiMfOhYY4piVbJC20UUV2PtXQz7yt/HdH2kUikU jTE0o0oroZeyKs0Gg0Gja/d31lkOl9FnIsLztoo0lfsfX6i/xXjgv9N/2R5H+HxN3u//xAAi EAABAwMDBQAAAAAAAAAAAAAAARExECEwMkBwQVBRYGH/2gAIAQEABj8C7Zc+UklKea32N87c rv6/KkqalNVII4InaN0FcfB//8QAIRAAAwACAgMBAQEBAAAAAAAAAAERECEgMUFRYTBxgaH/ 2gAIAQEAAT8hiIiCCCBx5Pgz4ZrboZ4GtExEIQnCiV0NujF5Nlfqjv0J+xTBOoXSPInC4pRK 0aRaEfk7UIXsv8HXmfwbTxg/4JmiC+UWpC9iFxh0fzEbmllP7Guh/BvaGzrQ6tMTnRsjFLQ1 BYjIyMpqj/RdmuCPQTDc7iVjb7dEouLJKWN4XYrEEgkFxzQlBG1I37zo0a7DxfYuKjfClkbR bRmzZsSh9iEv0PYoNoUpRDQ1sT9i1iGEJiDi7/V8lTsfuTRomKUiGkEoVil5NjQeJ1RCEIbN i7Og3DZsVELDZsNIm4/ND3xUpqOpsyJYWnSFWGPBI3sfbVYmryeAXGIiH2JFBYuPYvb7Yk/Y nhLgkNImIIIIyxb4MfCuC740vFR4mSyZ2xSlKvhr4f4F3OT3hk2JaGMWqfJHyPkfLhf24s0K CECYxoohRUVBXsf4QQT4hJyJwbo8iF9wXtl2aIiLheF417Ne0OLyNPComx0GLMUUvHvLHsjM zBPQlWJ5pRRdZYhrMyxvCQl+RYaJwY0JE/MuEINDRBLC7POEdLl55UvFK34FG3sJH00+Cw+X nm7/AJjr+DN1bumhusoef//aAAgBAQAAABBrxNa4VrMlZHPl+dc3HTNLhk96nWALjj2Yvs/I lICCw3M18thJQEBo4uXvtK6ax8WFxOBoXsYQjrSg4GVj2caGihT8+gaxOf/EACQQAQEBAAEE AgIDAQEAAAAAAAEAESEQMUFRYXEgkYGh8PHh/9oACAEBAAE/EP8Ae3+tv87f52+393+dn38f zIKCMM44/m1cxuzwv0wjCHaSgSSpp4uUCDBs2vptfTa+m4CvGXFMWaOA97Yun70tntXvtKcf 73g0S1qv3AOItguQPcNYYiGFhW9R62BLo/F5fu8CgcP5+3yt4e6Dl4vKb4J58xDsJDuHd78X IAMByaPcmyNyYfCPQJCWlpb9kiNUu6qdovgz5Z17wo7Fe79zhhvvLE5el4tTyJdhcrD3A9x4 dZ5mcOjcw0/u09v5uUDEHUCATvB3SY4dmxObN7RTnJoa7TJDQ0jLEgG84jNw6KcgIlghhhtn qO1oihafMtwDYuNmTmwckLxAdp0TmDCw6MJE7zQYeJcHM8xjGR0E5+Vp+C226IiAgiLFpPTe jljvIg+pjDuQetnpZ6W2+Seotn2sREH47bL0W24sZEPFxnqOsUnxYIjxsHBEWdXqz0WzLPl5 YPzB9tn3Y+mX110gx7vEFn4b1emQuOMMEbc3PSWF4iCvzBxBZ0euWSTbNxPu4j4hjoff+5KD 1N9129GGrSLLJ4gC0Z5tXC1cYb9kAA2B7bHux7b6X0sg5ch0mpij0gl2czxcEMcuEji6kMIc PnIuMITrC2vq19dPdIp3melvK7Wfkl8zXJHAM55IhyYyktn52ASfOWWdacJKDdi/ZDxDDbbf DfDc8e7mniyT57b8QZaEwJ+7nHbIjqrg6cgi4DB6sXaMR3Ig+S+ZvmbH4gbhjIS2wcwHmB4h vaDOg5nzDMuT4Rc3Nzfa+134hm/PPQOhQbOLzHTZZhjtMrkbeg6Py/tb7xEJnKSQdGyOJK2C PE/yXAhCwD76d8e+PfHn/TPpL4P7kmh2CbLL0jhzBPDYEAoGvuJMh0nUOcd/Uf8AtX/Wv+pf 9WT4t9Fj0/Vj/wArQM6BJxMvMnK8t4sRRWbmQWHwcWO4IF4L4C+L8HFyRsg6Ek9H7nPD+69N kfdl+rlFw9E91d1lHvmTSWR72IR7NsstmY6dkHu7S3iQkggDi4WUy7R52HiQ6hPBlsvR2lvy dGeheJXLkmszELO5b2ZPPQOOj1TiHHTT7uEkkkG0Z4wXkfEPEdsgs5Cw9/gy5fwYzDxIyCyN e89Yd4Tye7fx8o/BNu/MPiO3w+ni2Ykfov6dEbY77eegnrn5PZH4srZ7LmRwTRs8ZL41aGcW a2ruPMHezt09jPT/2YkCPQQTAQoAJwUCWQIR3QIbAwUJEs6mAAULCQgHAwUVCgkICwUWAgMB AAIeAQIXgAAKCRBkPd9uhK46V7/7D/9jgbf6/eySOPRsnhxNu+bzgIcd/nGgwm+h/zcBy5tb oD5LAU2vRFZgk8RuGDAQcKdJ23Phf+BQUb1CE1OEd8GCEU4F9z1MLSaA3JIOfqAdBFfUY/0H t1pAlDsXVAC7Q8Lpoi4oQi5NVrBZqlbTSAg7DxoWA2A3qllrTiYP62EcocLRpXl5Ka52UqyN f1o9qij/2AXWSk0pqcJFgn3MNOb8s6eG74wYckRBylCpkc5iiWpPjlQDzfiQglw9FtebTzYb GAmVXGQCPhV1HAy9UobVsZHu/wvervHv7SrfjOtsz/f+ZL57/KBWBVYDTUuvFgfrJOq1pdX/ ksAeheiXktjOfOYjos172MhtwE6uCJMla97Cqf5r4L4STrZK1LZB2oQAa8cqJXMoby+t2X7T e6fErB+4kkv8hBBToXtrOE7LVQ9gEcsgQ8zv3CGfW7gPVvOFy/KmRfKkVy9dwLCoVs4Gw1MK CxPgd1efK+dEp4IJL8c9VmLKV81lJK+1iIaJSJdGcnZpqZ9BR/PJNdy7KzGh9eH6sGzN3+SB axDV4O6hSBbQlh3QhW6KUh5hV1G8o2px+VKWu7Tq3duF7cCcYxqY9OnpqbnBAKhwEsrVbI/U i05geu+UEDN7DyofZ8rI9IZk6UvESQdl1L7fhuL1ndCkqVW7ODt9bWe4q2Go1JyQrrkCDQRZ AgkuARAA4OQDyvga1iSKHcir2y/gY+VvsoOesq7jxcNgeHKvz/CnPoBcermJuNbnpSmdGqTI tnCKS5gWfpP7mD3lmV9tMF5njOGuSN9CfIRIVI8syrVS35WSLvXIver8lORGIPmRBh+NfowT v6UXhejNJoRZ36C6uqFySKcONgrxPm0q3QhiLZ25IaEd0hKQYdrucZnrcoLobJuD2yGmaNWY u/4v3w5VbKRatPLDl8UiQn44gvXgTntY39A8+j5wW7AS3zQdMbPE+Wg33JhJobKCIHKag5AH oDj7RvJHCSx2ftihzaGvPbk1YmhkwPpwB40nJoQ95FGiFz9AZmPtzh15HtIuIjGeBeQl6G/k OS/yDuHRJOejyOs1HjveGkKxCM4b+n3L4B2wB5EnRmL8HeHQztYAzhZwmM0XQFGVSrlAzMuE OpDQVYuYNq9asVPLs7ntuuGEd1VnbBipFd5ouIjaCNHIl5m61k/gI9Dq80Etm3hkYAKYYv/O NCPLjyJSWbSjZeJ5RW2jbmDl9/6wudpJlvZWEy8LuXRiNYMtG6nYWXuTSTuXGnzx8HGWw/Rj iyhdj8Q5EuJEN91JZN2nuM62Bg5Uq8e8MRb5ce7xZtt/RGO5GYPtdefzRV4IGs4IsfMoPcS+ FxgJYUVNEcsyMAnuGysRb3WpthZd3es7iihksBOVFNEAEQEAAYkCJQQYAQoADwUCWQIJLgIb DAUJEs6mAAAKCRBkPd9uhK46V0eCEAC06M58vdiXgxLLZNoo7c+xffXCMUMmH2x5rDci0x2P z4j3KNEeDZugL/azN2VP65tYYTQgAwZj/0CWPohOsZhvnBlhGHMq2xjps9UfOSV2YXgPUxVz N14JFfzxomkn2psvy7Yty2I3OjOnbGrcrv4Y0Kp9hArvJu95cRH9U+Fw88wFwzv5klWN+yNO 8VkU1P/o3Kz4S5s82qD7Ssl+hXkP7iiXlWfXm+/Kwtf0h4FZOML7VYs62xMGp1zaw2wWZ3qC z8iDfm+AWMbzs3GxuRZFmAkhdhuA7k1KrKeklR4TOH5sT2WeiCOlrpsHbQKa50omF2ikYFgT oL6wy5JrtZ5UIOAa+VTi45bhOIqrTYXuI5A/njBOhHRlLFxnVmQK0ZHRcsNdIatvcjdOFEHA V/8gyGWZw5Edz/VVClYNb7VJ31g+A5L0eDQi42IFAucVwX5H+7vv7g01JJKqGWnQp99SnsDM SNrk9whCBWIE+yHXLnirG/DCir0fyeV4WWt/0DN6DB8VhbOqK8CaGTaleopYjbBFOZu2hMEs +OPZ9LmnADYyEMp21N2ZRmhg8ujrREr0Lfa04haCtH57w3ou992s/sW7ySvjZWmiJV37OCz4 KtP+mmbLIrwSPYb3G3NKY9SI5dqsSsaIiFCpD6Dj6GexZpWUkVN/RdzbthE3vtuCaA== =ZhkS -----END PGP PUBLIC KEY BLOCK----- </description>
    </item>
    
  </channel>
</rss>
