• This is a political forum that is non-biased/non-partisan and treats every person's position on topics equally. This debate forum is not aligned to any political party. In today's politics, many ideas are split between and even within all the political parties. Often we find ourselves agreeing on one platform but some topics break our mold. We are here to discuss them in a civil political debate. If this is your first visit to our political forums, be sure to check out the RULES. Registering for debate politics is necessary before posting. Register today to participate - it's free!

Australia’s Encryption Law Deals a Serious Blow to Privacy and Security

Lord Tammerlain

DP Veteran
Joined
Jan 25, 2010
Messages
30,531
Reaction score
14,934
Gender
Undisclosed
Political Leaning
Undisclosed
https://nationalinterest.org/featur...deals-serious-blow-privacy-and-security-39212

Home Affairs Minister, Peter Dutton, has repeatedly targeted digital encryption, which many websites and apps employ to secure user data, as an ominous roadblock standing between intelligence officers and transnational crime syndicates and pedophiles.
His efforts worked. Parliament recently turned their ire into law, after Dutton pilloried large tech companies for their supposed recalcitrance when it comes to working with governments to decrypt and hand over user data. The new law allows the government to request or coerce any communications service with an end-user in Australia to build tools that would weaken encryption protocols.

Note. That would mean Apple, Samsung, Nokia, Facebook etc to provide the Australian government with the capacity to access any data in Australia

The law’s proponents respond that the law prohibits these notices from forcing communications providers (which could include tech giants like Facebook and Twitter as well as any amateur blog or journalism website) to introduce “systemic vulnerabilities” into their systems. Instead, law enforcement can only compel firms to weaken encryption for “particular device(s).” This offers little assurance. If a code or key used to decrypt a particular device falls out of the provider’s or government’s hands for any reason, that device is now at substantial risk.
 
Back
Top Bottom