(Replying to PARENT post)
The conclusion they draw from that is right however; a lot of laws can be introduced to our parliament that might not get off the ground elsewhere. It's why we've fervently fought against many other, similar laws that would impinge on our rights and freedoms in the past. I spent a good part of my youth fighting against the Clean Feed legislation (it was a great big Internet filter for Australia, a terrible idea) which was thankfully defeated before it got off the ground.
We'll have to do the same for this.
(Replying to PARENT post)
Claiming that you're not backdooring something doesn't stop it from being a backdoor.
(Replying to PARENT post)
(Replying to PARENT post)
The Government says that "systemic" weaknesses cannot be demanded. That said, the third part of the demands that can be made, the "technical capability notice", seems ripe for abuse.
At the very least, the acceptance of a bill like this will erode trust in app stores. I would expect to see some sort of checksum verification by users becoming commonplace as people become wary of potential targeted attacks.
[1] http://www.abc.net.au/news/science/2018-08-20/tech-surveilla...
(Replying to PARENT post)
Now just a decade later this 'backward' behavior is now 'normalized'.
This is evidence things are moving too fast for us to fully comprehend or contemplate how far down the slippery slope we may be at the current time and how 'values' and definitions change in just a decade.
(Replying to PARENT post)
I appreciate that the author mentioned the gross incompetence of our intelligence operation which I presume doesn't get much mention outside the country.
PS: nice original Mac illustration for that article!
(Replying to PARENT post)
Today, I see this announcement in the news and I am wondering which country I can emigrate to with my own kids because I am disgusted with the increasing authoritarian bent of our government, as well as our plummeting human rights record...
(Replying to PARENT post)
This opens up questions as to how someone becomes 'suspicious' if their communication is already encrypted. And if they're already a person of interest, how many myriad other ways do they have of surveilling them or checking out their activities? Terrorist attacks require non-electronic items that have to be purchased, stored, and constructed in non-electronic places. There are existing ways to surveil people, under warrant. GPS trackers, phone records, bank statements, listening devices, watching devices, IMSI catchers, metadata (which Australia has legislated must be kept by ISP's for a couple of years).
This new legislation feels like a LOT of effort for a very small percentage return over and above those things I've already listed, especially considering:
- How long would it take to develop and deploy a targetted version of a program?
- What's the likelihood of the target updating their program during the useful window of time?
- Is this timeframe going to be of use to law enforcement?
- If the timeframe is justified, what's the time limit? Is 'suspect' going to have their comms intercepted for the foreseeable future? At what point is the well deemed to be dry?
- At what point does warranted surveillance become government harassment?
What this looks like from the outside is more psychology than technology:
- Hey Terrorists, we can do these things so, you know, re-think your life's direction
- Chilling effects: encourage paranoia, discourage dissent, even discourage disagreement
(Replying to PARENT post)
At least they are not suggesting to compromise or limit encryption in any way.
What I fail to understand is how all this would help fighting crime. Criminals and terrorists can easily use end-to-end encryption for the communication. There is plenty of software for that and it's really easy to do nowadays.
(Replying to PARENT post)
What is concerning is I am building a information management system that focuses on privacy and this sort of bill makes a mockery of the entire concept.
(Replying to PARENT post)
(Replying to PARENT post)
And for Australia, about immigration from flooding areas in Southeast Asia, right? Which arguably has follow-on roles in "terrorism". [I use scare quotes because the definition of "terrorism" is so politicized.]
(Replying to PARENT post)
But the ongoing ritual humiliation of Australian technologists over the past several decades is really tiresome.
(Replying to PARENT post)
I was just surprised that it had so much awareness of the concerns around what it was doing.
The most worrying part for me was the enabling of remotely serving a warrant. In other words, if they had a warrant for your device they could hack your device instead of physically recovering it. This would mean their cybersecurity team will be broadening it's capabilities and weaponry in that area.
That is worrying. Much in the same way I don't want police cruising town in armoured vehicles with a small arsenal, I am not too hot on investigators being able to sick the hounds on an unsuspecting network. Collateral is a real issue in the digital world too. What if my org network goes down because a warrant was being served remotely on an employee and their exploits were not precision enough?
(Replying to PARENT post)
(Replying to PARENT post)
(Replying to PARENT post)
(Replying to PARENT post)
(Replying to PARENT post)
Three important things to note technical assistance requests, technical assistance notice and technical capability notice.
(Replying to PARENT post)
> The "Five Eyes", often abbreviated as "FVEY", refer to an intelligence alliance comprising Australia, Canada, New Zealand, the United Kingdom and the United States. [1]
[1] https://en.wikipedia.org/wiki/UKUSA_Agreement