<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
  <loc>http://www.stuartwray.net/bamford-nsa-analysis.pdf</loc>
  <priority>0.50</priority>
</url>

<url>
  <loc>http://www.stuartwray.net/bugs-with-long-tails-draft.pdf</loc>
  <priority>0.50</priority>
</url>

<url>
  <loc>http://www.stuartwray.net/comp128-a-birthday-surprise-rev.pdf</loc>
  <priority>0.50</priority>
</url>

<url>
  <loc>http://www.stuartwray.net/contact.html</loc>
  <priority>0.30</priority>
</url>

<url>
  <loc>http://www.stuartwray.net/how-to-make-wealth-analysis.pdf</loc>
  <priority>0.50</priority>
</url>

<url>
  <loc>http://www.stuartwray.net/index.html</loc>
  <priority>0.90</priority>
</url>

<url>
  <loc>http://www.stuartwray.net/pair-programming-3-may-07-A.pdf</loc>
  <priority>0.50</priority>
</url>

<url>
  <loc>http://www.stuartwray.net/paperspatentsetc.html</loc>
  <priority>0.30</priority>
</url>

<url>
  <loc>http://www.stuartwray.net/philosophy-of-knowledge.pdf</loc>
  <priority>0.50</priority>
</url>

<url>
  <loc>http://www.stuartwray.net/tyrants-and-hackers-DRAFT-beta3.pdf</loc>
  <priority>0.40</priority>
</url>

<url>
  <loc>http://www.stuartwray.net/tyrants-and-hackers-chapter-1-body.html</loc>
  <priority>0.60</priority>
</url>

<url>
  <loc>http://www.stuartwray.net/tyrants-and-hackers-chapter-10-history-and-prophecy.html</loc>
  <priority>0.60</priority>
</url>

<url>
  <loc>http://www.stuartwray.net/tyrants-and-hackers-chapter-11-over-to-you.html</loc>
  <priority>0.60</priority>
</url>

<url>
  <loc>http://www.stuartwray.net/tyrants-and-hackers-chapter-2-morals.html</loc>
  <priority>0.60</priority>
</url>

<url>
  <loc>http://www.stuartwray.net/tyrants-and-hackers-chapter-3-truth.html</loc>
  <priority>0.60</priority>
</url>

<url>
  <loc>http://www.stuartwray.net/tyrants-and-hackers-chapter-4-tricks.html</loc>
  <priority>0.60</priority>
</url>

<url>
  <loc>http://www.stuartwray.net/tyrants-and-hackers-chapter-5-science.html</loc>
  <priority>0.60</priority>
</url>

<url>
  <loc>http://www.stuartwray.net/tyrants-and-hackers-chapter-6-patterns.html</loc>
  <priority>0.60</priority>
</url>

<url>
  <loc>http://www.stuartwray.net/tyrants-and-hackers-chapter-7-threats.html</loc>
  <priority>0.60</priority>
</url>

<url>
  <loc>http://www.stuartwray.net/tyrants-and-hackers-chapter-8-promises.html</loc>
  <priority>0.60</priority>
</url>

<url>
  <loc>http://www.stuartwray.net/tyrants-and-hackers-chapter-9-blood-and-gold.html</loc>
  <priority>0.60</priority>
</url>

<url>
  <loc>http://www.stuartwray.net/tyrants-and-hackers-chapter-notes.html</loc>
  <priority>0.60</priority>
</url>

<url>
  <loc>http://www.stuartwray.net/tyrants-and-hackers.html</loc>
  <priority>0.80</priority>
</url>

</urlset>

