<?xml version="1.0" encoding="UTF-8" standalone="yes"?><oembed><version><![CDATA[1.0]]></version><provider_name><![CDATA[paidContent]]></provider_name><provider_url><![CDATA[http://paidcontent.org]]></provider_url><author_name><![CDATA[Jeff John Roberts]]></author_name><author_url><![CDATA[http://paidcontent.org/author/jeffjohnroberts/]]></author_url><title><![CDATA[Five Solutions To The Privacy Problem: Why They Work And Why They Don&#039;t]]></title><type><![CDATA[link]]></type><html><![CDATA[Last week brought alarming accounts about how a firm called Carrier IQ may have used key logging technology to record millions of phone mess&hellip;]]></html><thumbnail_url><![CDATA[http://i1.wp.com/gigaompaidcontent.files.wordpress.com/2012/02/online-privacy-illustration-o.jpg?fit=440%2C330]]></thumbnail_url><thumbnail_height><![CDATA[330]]></thumbnail_height><thumbnail_width><![CDATA[397]]></thumbnail_width></oembed>