<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url><loc>https://thoughtcrime.uk/</loc></url>
  <url><loc>https://thoughtcrime.uk/0-how-to-use-this-site.html</loc></url>
  <url><loc>https://thoughtcrime.uk/1-1-understanding-threats.html</loc></url>
  <url><loc>https://thoughtcrime.uk/1-2-privacy-security-and-anonymity.html</loc></url>
  <url><loc>https://thoughtcrime.uk/1-3-thoughtcrime-and-intent-inference.html</loc></url>
  <url><loc>https://thoughtcrime.uk/1-foundations-and-threat-modelling.html</loc></url>
  <url><loc>https://thoughtcrime.uk/10-borders-searches-and-coercion.html</loc></url>
  <url><loc>https://thoughtcrime.uk/11-behavioural-discipline-and-human-risk.html</loc></url>
  <url><loc>https://thoughtcrime.uk/12-living-under-surveillance-states.html</loc></url>
  <url><loc>https://thoughtcrime.uk/13-psychological-resilience-and-sustainability.html</loc></url>
  <url><loc>https://thoughtcrime.uk/14-exit-planning-and-contingency-thinking.html</loc></url>
  <url><loc>https://thoughtcrime.uk/15-practical-baselines.html</loc></url>
  <url><loc>https://thoughtcrime.uk/16-1-what-freedom-of-speech-actually-is.html</loc></url>
  <url><loc>https://thoughtcrime.uk/16-10-speech-under-surveillance-states.html</loc></url>
  <url><loc>https://thoughtcrime.uk/16-11-ethics-and-self-preservation.html</loc></url>
  <url><loc>https://thoughtcrime.uk/16-12-practical-guidance.html</loc></url>
  <url><loc>https://thoughtcrime.uk/16-2-law-jurisdiction-and-reality.html</loc></url>
  <url><loc>https://thoughtcrime.uk/16-3-platforms-as-speech-gatekeepers.html</loc></url>
  <url><loc>https://thoughtcrime.uk/16-4-surveillance-and-the-chilling-effect.html</loc></url>
  <url><loc>https://thoughtcrime.uk/16-5-thoughtcrime-and-intent-enforcement.html</loc></url>
  <url><loc>https://thoughtcrime.uk/16-6-deplatforming-and-digital-exile.html</loc></url>
  <url><loc>https://thoughtcrime.uk/16-7-speech-vs-identity.html</loc></url>
  <url><loc>https://thoughtcrime.uk/16-8-speaking-safely.html</loc></url>
  <url><loc>https://thoughtcrime.uk/16-9-anonymity-and-pseudonymity.html</loc></url>
  <url><loc>https://thoughtcrime.uk/16-freedom-of-speech-in-the-digital-age.html</loc></url>
  <url><loc>https://thoughtcrime.uk/2-1-passwords-done-properly.html</loc></url>
  <url><loc>https://thoughtcrime.uk/2-2-password-managers.html</loc></url>
  <url><loc>https://thoughtcrime.uk/2-3-multi-factor-authentication-mfa-strengthening-identity-without-adding-fragility.html</loc></url>
  <url><loc>https://thoughtcrime.uk/2-4-hardware-security-keys.html</loc></url>
  <url><loc>https://thoughtcrime.uk/2-5-biometrics-convenience-vs-coercion.html</loc></url>
  <url><loc>https://thoughtcrime.uk/2-identity-authentication-and-access-control.html</loc></url>
  <url><loc>https://thoughtcrime.uk/3-1-encryption-fundamentals.html</loc></url>
  <url><loc>https://thoughtcrime.uk/3-2-full-disk-encryption.html</loc></url>
  <url><loc>https://thoughtcrime.uk/3-3-plausible-deniability-and-hidden-volumes.html</loc></url>
  <url><loc>https://thoughtcrime.uk/3-4-file-level-and-container-encryption.html</loc></url>
  <url><loc>https://thoughtcrime.uk/3-encryption-and-data-at-rest-protecting-what-already-exists.html</loc></url>
  <url><loc>https://thoughtcrime.uk/4-1-desktop-and-laptop-operating-systems.html</loc></url>
  <url><loc>https://thoughtcrime.uk/4-2-mobile-operating-systems.html</loc></url>
  <url><loc>https://thoughtcrime.uk/4-3-hardware-trust-and-firmware.html</loc></url>
  <url><loc>https://thoughtcrime.uk/4-devices-and-operating-systems-your-platform-defines-your-exposure.html</loc></url>
  <url><loc>https://thoughtcrime.uk/5-2-vpns-in-reality.html</loc></url>
  <url><loc>https://thoughtcrime.uk/5-3-safer-networking-habits.html</loc></url>
  <url><loc>https://thoughtcrime.uk/5-network-privacy-and-traffic-control-what-your-connections-reveal.html</loc></url>
  <url><loc>https://thoughtcrime.uk/6-1-browsers-and-search-engines.html</loc></url>
  <url><loc>https://thoughtcrime.uk/6-2-research-under-surveillance.html</loc></url>
  <url><loc>https://thoughtcrime.uk/6-browsing-and-information-access-observation-without-participation.html</loc></url>
  <url><loc>https://thoughtcrime.uk/7-1-messaging-applications.html</loc></url>
  <url><loc>https://thoughtcrime.uk/7-2-email-privacy.html</loc></url>
  <url><loc>https://thoughtcrime.uk/7-communications-and-messaging.html</loc></url>
  <url><loc>https://thoughtcrime.uk/8-compartmentalisation-and-identity-separation.html</loc></url>
  <url><loc>https://thoughtcrime.uk/9-social-media-and-public-presence.html</loc></url>
</urlset>
