<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url><loc>https://getzerorisc.com/about</loc><lastmod>2026-05-07</lastmod></url>
  <url><loc>https://getzerorisc.com/company</loc><lastmod>2026-05-07</lastmod></url>
  <url><loc>https://getzerorisc.com/contact</loc><lastmod>2026-05-07</lastmod></url>
  <url><loc>https://getzerorisc.com/</loc><lastmod>2026-05-07</lastmod></url>
  <url><loc>https://getzerorisc.com/platform</loc><lastmod>2026-05-07</lastmod></url>
  <url><loc>https://getzerorisc.com/product</loc><lastmod>2026-05-07</lastmod></url>
  <url><loc>https://getzerorisc.com/research</loc><lastmod>2026-05-07</lastmod></url>
  <url><loc>https://getzerorisc.com/security</loc><lastmod>2026-05-07</lastmod></url>
  <url><loc>https://getzerorisc.com/team</loc><lastmod>2026-05-07</lastmod></url>
  <url><loc>https://getzerorisc.com/blog/eu-cyber-resilience-act-hardware-security</loc><lastmod>2026-05-07</lastmod></url>
  <url><loc>https://getzerorisc.com/blog/hardware-security-for-founders</loc><lastmod>2026-05-07</lastmod></url>
  <url><loc>https://getzerorisc.com/blog/</loc><lastmod>2026-05-07</lastmod></url>
  <url><loc>https://getzerorisc.com/blog/opentitan-explained</loc><lastmod>2026-05-07</lastmod></url>
  <url><loc>https://getzerorisc.com/blog/post-quantum-hardware-readiness</loc><lastmod>2026-05-07</lastmod></url>
  <url><loc>https://getzerorisc.com/blog/risc-v-supply-chain-security</loc><lastmod>2026-05-07</lastmod></url>
  <url><loc>https://getzerorisc.com/blog/risc-v-vs-arm-security-comparison</loc><lastmod>2026-05-07</lastmod></url>
  <url><loc>https://getzerorisc.com/blog/why-security-by-obscurity-fails-hardware</loc><lastmod>2026-05-07</lastmod></url>
  <url><loc>https://getzerorisc.com/blog/zero-trust-embedded-systems</loc><lastmod>2026-05-07</lastmod></url>
  <url><loc>https://getzerorisc.com/legal/cookies</loc><lastmod>2026-05-07</lastmod></url>
  <url><loc>https://getzerorisc.com/legal/privacy</loc><lastmod>2026-05-07</lastmod></url>
  <url><loc>https://getzerorisc.com/legal/terms</loc><lastmod>2026-05-07</lastmod></url>
  <url><loc>https://getzerorisc.com/research/cryptographic-agility-hardware</loc><lastmod>2026-05-07</lastmod></url>
  <url><loc>https://getzerorisc.com/research/firmware-verification-embedded</loc><lastmod>2026-05-07</lastmod></url>
  <url><loc>https://getzerorisc.com/research/hardware-security-iot-edge</loc><lastmod>2026-05-07</lastmod></url>
  <url><loc>https://getzerorisc.com/research/</loc><lastmod>2026-05-07</lastmod></url>
  <url><loc>https://getzerorisc.com/research/open-security-architecture-risc-v</loc><lastmod>2026-05-07</lastmod></url>
  <url><loc>https://getzerorisc.com/research/opentitan-zerorisc-comparison</loc><lastmod>2026-05-07</lastmod></url>
  <url><loc>https://getzerorisc.com/research/risc-v-attestation-overview</loc><lastmod>2026-05-07</lastmod></url>
  <url><loc>https://getzerorisc.com/research/risc-v-root-of-trust-2026</loc><lastmod>2026-05-07</lastmod></url>
  <url><loc>https://getzerorisc.com/research/risc-v-threat-model</loc><lastmod>2026-05-07</lastmod></url>
  <url><loc>https://getzerorisc.com/research/secure-enclaves-risc-v</loc><lastmod>2026-05-07</lastmod></url>
  <url><loc>https://getzerorisc.com/research/zerorisc-seed-announcement</loc><lastmod>2026-05-07</lastmod></url>
</urlset>
