<?xml version="1.0" encoding="UTF-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9"><url><loc>https://www.techunfiltered.io/p/own-your-intelligence-small-verified</loc><news:news><news:publication><news:name>Tech Unfiltered</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-19T21:01:11+00:00</news:publication_date><news:title>Own Your Intelligence: Small Verified AI on Local Hardware | Geometry of Trust | The Map Back to You - Part 1</news:title></news:news></url><url><loc>https://www.techunfiltered.io/p/what-travels-in-the-exchange-and</loc><news:news><news:publication><news:name>Tech Unfiltered</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-19T17:00:51+00:00</news:publication_date><news:title>What Travels in the Exchange, and What the Verifier Checks | Geometry of Trust | Protocol - Episode 4</news:title></news:news></url><url><loc>https://www.techunfiltered.io/p/the-exchange-when-two-ai-agents-meet</loc><news:news><news:publication><news:name>Tech Unfiltered</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-19T13:01:45+00:00</news:publication_date><news:title>The Exchange: When Two AI Agents Meet | Geometry of Trust | Protocol - Episode 3</news:title></news:news></url><url><loc>https://www.techunfiltered.io/p/chains-how-a-models-history-gets</loc><news:news><news:publication><news:name>Tech Unfiltered</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-19T09:01:26+00:00</news:publication_date><news:title>Chains: How a Model’s History Gets Tied Down | Geometry of Trust | Protocol - Episode 2</news:title></news:news></url><url><loc>https://www.techunfiltered.io/p/testimony-vs-evidence-why-we-need</loc><news:news><news:publication><news:name>Tech Unfiltered</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-18T21:00:52+00:00</news:publication_date><news:title>Testimony vs Evidence: Why We Need a Protocol, and What an Attestation Actually Is | Geometry of Trust | Protocol - Lesson 1</news:title></news:news></url><url><loc>https://www.techunfiltered.io/p/the-ruler-measures-governance-decides</loc><news:news><news:publication><news:name>Tech Unfiltered</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-18T17:01:03+00:00</news:publication_date><news:title>The Ruler Measures, Governance Decides | Geometry of Trust | Governance - Lesson 4</news:title></news:news></url><url><loc>https://www.techunfiltered.io/p/how-tight-is-tight-enough-the-numbers</loc><news:news><news:publication><news:name>Tech Unfiltered</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-18T13:02:01+00:00</news:publication_date><news:title>How Tight Is Tight Enough? The Numbers Governance Has to Set | Geometry of Trust | Governance - Lesson 3</news:title></news:news></url><url><loc>https://www.techunfiltered.io/p/exclusions-permissions-modes-what</loc><news:news><news:publication><news:name>Tech Unfiltered</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-18T09:01:26+00:00</news:publication_date><news:title>Exclusions, Permissions, Modes: What Happens Before the Cryptography | Geometry of Trust | Governance - Lesson 2</news:title></news:news></url></urlset>