A forum of Australian tech companies this week was told the government’s encryption laws could see Australian jobs moved overseas. Labor’s promised to “fix” the laws, but that could be too late.
If the next government is serious about protecting Australian businesses and families, here are seven concrete actions it should take immediately upon taking office.
The government can access your phone metadata, drivers licence photo and much more. And new research shows Australians are OK about it. But that might change.
Virtual private network companies make lots of promising claims about their services. Most people don’t have the skills to double-check their providers. So this group of researchers did the testing.
Anthony Albanese on Labor’s road ahead
CC BY67.5 MB(download)
Speaking to The Conversation, Albanese wouldn't comment on Bill Shorten's unpopularity with voters, arguing instead that it's a matter of whether the Labor team is “seen as worthy of election".
As both sides played the tactics, a remarkable thing happened in the House of Representatives. Behaviour improved 100%, with
none of the usual screaming and exchanges of insults.
Begun as part of efforts to preserve online anonymity and privacy, Freenet, Tor and the Invisible Internet Project are, like the rest of the web, home to both crime and free expression.
The broad and ill-defined new powers outlined in the government’s new telecommunications bill are neither necessary nor proportionate – and contain significant scope for abuse.
It is hard to know whether metadata retention has been effective or necessary. We can only hope that the debate over accessing and analysing encrypted services is a little more enlightening.
The ban on Queensland Members of Parliament using encrypted messaging apps for government business should be accompanied by a willingness to strengthen official accountability across the board.
Could an employer or platform claim copyright in a chat group? We’d first have to accept that conversations in a chat group are protected by copyright.
The FBI and police officials say they need to decrypt secure communications to fight crime. But they have other options, and modern threats make clear the importance of strong encryption.
Cloud computing is on the rise, but so are questions about its security. This is why we need systems where the data itself enforces security, not just the cloud system within which it is contained.