<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>http://sixlines.org/2010/03/20/another-horrible-plan-for-national-identification.html</loc>
<lastmod>2010-03-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2010/03/20/introducing-six-lines.html</loc>
<lastmod>2010-03-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2010/03/21/harper-on-schumer-and-graham.html</loc>
<lastmod>2010-03-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2010/03/21/mac-os-x-zero-day-threats.html</loc>
<lastmod>2010-03-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2010/03/21/open-government-the-privacy-imperative.html</loc>
<lastmod>2010-03-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2010/03/23/netflix-privacy-research.html</loc>
<lastmod>2010-03-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2010/03/24/danah-boyd-on-chatroulette.html</loc>
<lastmod>2010-03-24T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2010/03/25/the-cybersecurity-act.html</loc>
<lastmod>2010-03-25T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2010/04/02/breaking-ssl-encryption.html</loc>
<lastmod>2010-04-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2010/04/02/eff-panel-on-desigining-security-and-privacy.html</loc>
<lastmod>2010-04-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2010/04/04/warrantless-wiretapping-is-illegal.html</loc>
<lastmod>2010-04-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2010/04/05/schneiers-fifth-annual-movie-plot-threat-contest.html</loc>
<lastmod>2010-04-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2010/05/13/digital-copiers-as-time-bombs.html</loc>
<lastmod>2010-05-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2010/05/15/the-government-cloud.html</loc>
<lastmod>2010-05-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2010/05/25/one-nation-under-cctv-no-longer.html</loc>
<lastmod>2010-05-25T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2010/05/29/opt-out-for-google-analytics.html</loc>
<lastmod>2010-05-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2010/06/02/carl-malamud-at-gov2-0.html</loc>
<lastmod>2010-06-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2010/06/11/permanent-deletion.html</loc>
<lastmod>2010-06-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2010/06/15/fifth-annual-movie-plot-threat-contest-winner.html</loc>
<lastmod>2010-06-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2010/06/23/the-cyberwar-threat.html</loc>
<lastmod>2010-06-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2010/06/24/last-lakota-code-talker-dies.html</loc>
<lastmod>2010-06-24T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2010/06/28/point-counterpoint-hiring-hackers.html</loc>
<lastmod>2010-06-28T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2010/07/01/privacy-and-celebrity.html</loc>
<lastmod>2010-07-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2010/07/06/nprs-end-of-privacy-series.html</loc>
<lastmod>2010-07-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2010/07/07/cyber-command-logo-challenge.html</loc>
<lastmod>2010-07-07T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2010/07/07/schneier-on-cyberwar-hype.html</loc>
<lastmod>2010-07-07T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2010/07/08/cyber-command-logo-challenge-disappointment.html</loc>
<lastmod>2010-07-08T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2010/07/16/facebook-and-protecting-children.html</loc>
<lastmod>2010-07-16T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2010/07/16/geolocation-privacy.html</loc>
<lastmod>2010-07-16T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2010/07/20/ecpa-reform-videos.html</loc>
<lastmod>2010-07-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2010/07/20/rush-introduces-privacy-bill.html</loc>
<lastmod>2010-07-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2010/07/21/cyberwar-rhetoric.html</loc>
<lastmod>2010-07-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2010/08/02/e-books-and-privacy.html</loc>
<lastmod>2010-08-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2010/08/02/internet-explorer-privacy.html</loc>
<lastmod>2010-08-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2010/08/27/stephen-colbert-on-privacy.html</loc>
<lastmod>2010-08-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2010/09/12/rubins-privacy-fallacies.html</loc>
<lastmod>2010-09-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2010/09/20/the-inevitable-dislike-button.html</loc>
<lastmod>2010-09-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2010/09/23/the-market-for-credit-cards.html</loc>
<lastmod>2010-09-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2010/09/25/indestructible-cookies.html</loc>
<lastmod>2010-09-25T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2010/09/27/wiretapping-the-internet.html</loc>
<lastmod>2010-09-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2010/09/28/all-about-stuxnet.html</loc>
<lastmod>2010-09-28T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2010/10/04/supreme-court-to-hear-employee-privacy-case.html</loc>
<lastmod>2010-10-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2010/10/04/u-s-customs-and-border-protection.html</loc>
<lastmod>2010-10-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2010/10/06/problems-with-internet-voting.html</loc>
<lastmod>2010-10-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2010/10/07/intro-to-smart-grid-privacy.html</loc>
<lastmod>2010-10-07T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2010/10/18/lower-merion-webcam-privacy-case-resolved.html</loc>
<lastmod>2010-10-18T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2010/10/19/more-proposals-for-wiretapping-the-internet.html</loc>
<lastmod>2010-10-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2010/10/21/facetime-security-hole.html</loc>
<lastmod>2010-10-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2010/10/22/apple-deprecates-java-for-security.html</loc>
<lastmod>2010-10-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2010/10/26/firesheep.html</loc>
<lastmod>2010-10-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2010/10/27/280000-missing-medical-records.html</loc>
<lastmod>2010-10-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2010/10/27/cnn-covers-voting-hacks.html</loc>
<lastmod>2010-10-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2010/10/28/destroying-the-indestructible-cookie.html</loc>
<lastmod>2010-10-28T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2010/10/28/protection-from-firesheep.html</loc>
<lastmod>2010-10-28T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2010/10/30/the-problems-of-government-cryptographic-policy.html</loc>
<lastmod>2010-10-30T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2010/11/04/federal-cloud-computing-security-requirements.html</loc>
<lastmod>2010-11-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2010/11/05/felten-named-ftc-chief-technologist.html</loc>
<lastmod>2010-11-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2010/11/08/the-ethics-of-firesheep.html</loc>
<lastmod>2010-11-08T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2010/11/15/bruce-schneier-on-reconceptualizing-security.html</loc>
<lastmod>2010-11-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2010/11/19/data-mining-for-life-insurance.html</loc>
<lastmod>2010-11-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2010/11/24/https-everywhere-updated-for-firesheep.html</loc>
<lastmod>2010-11-24T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2011/01/18/facebook-allows-api-access-to-phone-numbers-and-addresses.html</loc>
<lastmod>2011-01-18T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2011/01/20/facebook-reconsiders-address-and-mobile-number-sharing.html</loc>
<lastmod>2011-01-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2011/01/25/the-difference-between-cryptography-and-security.html</loc>
<lastmod>2011-01-25T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2011/02/02/facebook-and-https.html</loc>
<lastmod>2011-02-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2011/02/02/location-privacy.html</loc>
<lastmod>2011-02-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2011/03/03/security-state-of-the-union.html</loc>
<lastmod>2011-03-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2011/03/09/password-management.html</loc>
<lastmod>2011-03-09T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2011/03/15/facebook-logins-and-job-interviews.html</loc>
<lastmod>2011-03-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2011/03/17/obama-administration-backs-privacy-law.html</loc>
<lastmod>2011-03-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2011/03/21/https-tradeoffs.html</loc>
<lastmod>2011-03-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2011/03/31/stuxnet-ted-talk.html</loc>
<lastmod>2011-03-31T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2011/04/02/the-only-secure-password.html</loc>
<lastmod>2011-04-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2011/04/04/asymmetry-and-security.html</loc>
<lastmod>2011-04-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2011/04/09/email-and-the-fourth-amendment.html</loc>
<lastmod>2011-04-09T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2011/04/13/dropbox-encryption.html</loc>
<lastmod>2011-04-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2011/04/15/schneiers-law.html</loc>
<lastmod>2011-04-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2011/04/17/dilbert-on-privacy.html</loc>
<lastmod>2011-04-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2011/04/17/relying-on-regulation.html</loc>
<lastmod>2011-04-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2011/04/25/hard-drive-steganography.html</loc>
<lastmod>2011-04-25T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2011/04/26/apple-and-location-data.html</loc>
<lastmod>2011-04-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2011/04/27/apple-responds-to-location-data-concerns.html</loc>
<lastmod>2011-04-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2011/05/02/creepy-location-tool.html</loc>
<lastmod>2011-05-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2011/05/10/google-location-data-lawsuit.html</loc>
<lastmod>2011-05-10T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2011/05/11/facebook-apps-security-hole.html</loc>
<lastmod>2011-05-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2011/05/12/smartphones-and-social-networks.html</loc>
<lastmod>2011-05-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2011/05/13/connecting-the-dots.html</loc>
<lastmod>2011-05-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2011/05/16/why-privacy-mattered.html</loc>
<lastmod>2011-05-16T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2011/05/17/complaint-to-ftc-about-dropbox.html</loc>
<lastmod>2011-05-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2011/05/24/the-nothing-to-hide-argument.html</loc>
<lastmod>2011-05-24T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2011/05/27/texas-vs-the-tsa.html</loc>
<lastmod>2011-05-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2011/06/12/pinboard-vs-urchin.html</loc>
<lastmod>2011-06-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2011/06/21/the-continuing-saga-of-dropbox.html</loc>
<lastmod>2011-06-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2011/06/24/best-practices-for-a-secure-cloud.html</loc>
<lastmod>2011-06-24T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2011/06/27/communications-privacy-in-tennessee.html</loc>
<lastmod>2011-06-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2011/06/29/a-detailed-guide-to-creating-passwords.html</loc>
<lastmod>2011-06-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2011/07/03/liability-and-software-security.html</loc>
<lastmod>2011-07-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2011/07/08/software-security-rating-systems.html</loc>
<lastmod>2011-07-08T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2011/07/11/banks-as-groupon-competitors.html</loc>
<lastmod>2011-07-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2011/07/28/googles-page-speed-service.html</loc>
<lastmod>2011-07-28T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2011/09/07/joel-stein-on-passwords.html</loc>
<lastmod>2011-09-07T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2011/09/12/danah-boyd-on-teen-privacy.html</loc>
<lastmod>2011-09-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2011/09/22/barnes-noble-purchasing-borders-customer-data.html</loc>
<lastmod>2011-09-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2011/09/27/paper-based-violation-of-hipaa.html</loc>
<lastmod>2011-09-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2011/10/01/the-privacy-implications-of-amazons-silk-browser.html</loc>
<lastmod>2011-10-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2011/10/11/air-travel-absurdity.html</loc>
<lastmod>2011-10-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2011/10/19/eff-satisfied-with-amazon-silk.html</loc>
<lastmod>2011-10-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2011/10/25/adobe-flash-security.html</loc>
<lastmod>2011-10-25T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2011/10/28/cloud-computing-privacy.html</loc>
<lastmod>2011-10-28T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2011/11/05/software-security-on-mac-os-x.html</loc>
<lastmod>2011-11-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2011/11/08/code-signing-flaw-in-ios.html</loc>
<lastmod>2011-11-08T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2011/12/05/eff-on-public-key-infrastructure.html</loc>
<lastmod>2011-12-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2012/03/26/enigma-machine-in-excel.html</loc>
<lastmod>2012-03-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2012/04/11/facebooks-business-model.html</loc>
<lastmod>2012-04-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2012/04/14/kip-hawley-on-airport-security.html</loc>
<lastmod>2012-04-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2013/03/15/ethical-user-interface-design.html</loc>
<lastmod>2013-03-15T14:18:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2013/06/13/two-clever-approaches-to-revealing-government-secrets.html</loc>
<lastmod>2013-06-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2013/08/08/on-meeting-with-foreign-leaders.html</loc>
<lastmod>2013-08-08T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2013/08/14/encryption-alone-doesnt-protect-privacy.html</loc>
<lastmod>2013-08-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2013/08/19/policiestxt.html</loc>
<lastmod>2013-08-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2013/08/25/teaching-software-engineering-ethics.html</loc>
<lastmod>2013-08-25T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2013/09/17/we-need-the-rest-of-the-story.html</loc>
<lastmod>2013-09-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2013/09/26/xkcd-on-privacy.html</loc>
<lastmod>2013-09-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2013/10/22/acquisti-on-why-privacy-matters.html</loc>
<lastmod>2013-10-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2013/11/15/the-google-books-settlement-and-the-nsa.html</loc>
<lastmod>2013-11-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2013/12/05/book-review-jim-henson.html</loc>
<lastmod>2013-12-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2013/12/14/will-teaching-people-to-code-improve-privacy.html</loc>
<lastmod>2013-12-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2013/12/16/expectations-and-education.html</loc>
<lastmod>2013-12-16T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2014/01/05/security-and-privacy-in-2014.html</loc>
<lastmod>2014-01-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2014/01/16/point-of-sale-terminals-and-open-source-software.html</loc>
<lastmod>2014-01-16T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2014/02/05/ted-radio-hour-on-privacy.html</loc>
<lastmod>2014-02-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2014/02/27/apples-ssl-failure.html</loc>
<lastmod>2014-02-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2014/03/14/simple-introduction-to-1password.html</loc>
<lastmod>2014-03-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2014/04/10/heartbleed.html</loc>
<lastmod>2014-04-10T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2014/05/31/the-internet-with-a-regulatory-face.html</loc>
<lastmod>2014-05-31T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2014/07/16/on-our-supposedly-dystopian-future.html</loc>
<lastmod>2014-07-16T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2014/10/22/should-pseudonyms-be-protected.html</loc>
<lastmod>2014-10-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2014/11/17/apples-encryption-announcement.html</loc>
<lastmod>2014-11-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2015/09/22/tim-cook-on-stephen-colbert.html</loc>
<lastmod>2015-09-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2015/09/30/something-we-might-lose.html</loc>
<lastmod>2015-09-30T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2015/10/03/tim-cook-interview-on-npr.html</loc>
<lastmod>2015-10-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2015/10/28/home-address-versus-email-address.html</loc>
<lastmod>2015-10-28T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2015/11/24/net-of-insecurity.html</loc>
<lastmod>2015-11-24T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2015/11/30/an-amendment-for-privacy.html</loc>
<lastmod>2015-11-30T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2015/12/17/lifelocks-m-settlement.html</loc>
<lastmod>2015-12-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2016/01/29/peyton-manning-on-healthcare-privacy.html</loc>
<lastmod>2016-01-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2016/02/04/unfit-bits.html</loc>
<lastmod>2016-02-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2016/03/31/encryption-isnt-even-a-luxury.html</loc>
<lastmod>2016-03-31T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2016/08/08/nuclear-threats-are-still-threats.html</loc>
<lastmod>2016-08-08T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2016/08/09/science-and-screen-time.html</loc>
<lastmod>2016-08-09T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2016/08/16/ebooks-and-physical-books.html</loc>
<lastmod>2016-08-16T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2016/08/16/tim-cook-believes-privacy-is-a-civil-liberty.html</loc>
<lastmod>2016-08-16T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2016/08/19/developments-in-electronic-voting.html</loc>
<lastmod>2016-08-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2016/12/07/perfect-security-doesnt-exist.html</loc>
<lastmod>2016-12-07T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2016/12/09/responding-to-opinionoriented-questions-on-stack-exchange-sites.html</loc>
<lastmod>2016-12-09T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2017/04/02/misunderstanding-encryption.html</loc>
<lastmod>2017-04-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2017/05/11/network-neutrality-again.html</loc>
<lastmod>2017-05-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2017/05/26/why-privacy-regulation-will-happen.html</loc>
<lastmod>2017-05-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2017/08/17/on-objective-standards-for-removing-confederate-monuments.html</loc>
<lastmod>2017-08-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2018/01/24/bad-analogies-for-network-neutrality.html</loc>
<lastmod>2018-01-24T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2018/01/31/the-cabinet-files.html</loc>
<lastmod>2018-01-31T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2018/02/04/book-review-sapiens.html</loc>
<lastmod>2018-02-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2018/07/20/secret-meetings-and-deepfakes.html</loc>
<lastmod>2018-07-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2018/08/06/the-promise-and-peril-of-big-tech.html</loc>
<lastmod>2018-08-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2018/08/15/crying-wolf-and-cyber-attacks.html</loc>
<lastmod>2018-08-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2018/09/11/remembering-the-past.html</loc>
<lastmod>2018-09-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2018/10/22/sasses-thoughts-on-deepfakes.html</loc>
<lastmod>2018-10-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2019/01/10/sharing-happiness-for-the-sake-of-happiness.html</loc>
<lastmod>2019-01-10T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2019/02/22/standard-ebooks.html</loc>
<lastmod>2019-02-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2019/03/27/trust-truth-and-science.html</loc>
<lastmod>2019-03-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2019/10/25/googles-quantum-computing-breakthrough.html</loc>
<lastmod>2019-10-25T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2026/03/28/ai-taking-blame.html</loc>
<lastmod>2026-03-28T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2026/03/29/research-superpower.html</loc>
<lastmod>2026-03-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2026/03/31/john-greens-hollywood-ending.html</loc>
<lastmod>2026-03-31T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/2026/04/02/ben-thompsons-take-on-ai-and-security.html</loc>
<lastmod>2026-04-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/about</loc>
</url>
<url>
<loc>http://sixlines.org/archive</loc>
</url>
<url>
<loc>http://sixlines.org/</loc>
</url>
<url>
<loc>http://sixlines.org/search</loc>
</url>
<url>
<loc>http://sixlines.org/fonts/demo.html</loc>
<lastmod>2013-05-27T20:59:18+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/fonts/demo2.html</loc>
<lastmod>2013-05-27T20:59:18+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/fonts/demo3.html</loc>
<lastmod>2013-05-27T20:59:18+00:00</lastmod>
</url>
<url>
<loc>http://sixlines.org/fonts/demo4.html</loc>
<lastmod>2013-05-27T20:59:18+00:00</lastmod>
</url>
</urlset>
