Skip to main content

Encryption-busting law passed in Australia may have global privacy implications

New legislation from Australia could have global consequences for security and privacy on the internet. Controversial laws have been passed which oblige tech companies to allow the police to access encrypted messages, undermining the privacy of encryption.

End-to-end encryption is used by apps like iMessage, WhatApp, Telegram, and Signal to keep messages between users private. It works by taking the message that you are sending and using a string of digits, called a public key, to turn this message into scrambled characters. These scrambled characters are then sent to the recipient, who uses another string of digits, called their private key, to turn the message back into readable text. This means that if your message is intercepted at any point, all that the hackers will be able to see is the scrambled characters. The only person who can read the message is the recipient, who is the only one holding the private key required for decryption.

Recommended Videos

The high level of security that this system offers has made end-to-end encryption the most popular way to keep messages private. However, government intelligence agencies and police forces around the world have been frustrated by encryption which they say prevents them from doing their job of investigating suspicious persons. To address this issue, the Australian government has now created a new form of “computer access warrant” which allows law enforcement agencies to obtain information directly from a device like a smartphone, and to compel technology companies to help them access this information.

Please enable Javascript to view this content

Exactly what this complex legislation will mean in practice is still being debated, but critics from the tech industry have made it clear that they are not on board with governments having this kind of power. Many have interpreted the bill as obliging tech companies to offer backdoor access in their security systems to the government, which is potentially disastrous for security. The bill does have a safeguard which says companies are not required to build “systematic weaknesses” into their software, but the term “systematic” was not defined, meaning that the actual legal requirements are unclear. A further concern with the bill is the lack of judicial oversight in this process. Law enforcement agencies need a warrant to oblige tech companies to comply with them and break the encryption, but after this warrant is issued then there is no further oversight of the system.

Due to the global nature of most tech companies, ordering backdoors built into encryption in Australia could have an impact around the world. As human rights lawyer Lizzie O’Shea points out, “The truth is that there is simply no way to create tools to undermine encryption without jeopardizing digital security and eroding individual rights and freedoms. Hackers with bad intentions will do their utmost to take advantage of any such tools that companies are forced to provide the government.”

Georgina Torbet
Georgina has been the space writer at Digital Trends space writer for six years, covering human space exploration, planetary…
PayPal vs. Venmo vs. Cash App vs. Apple Cash: which app should you use?
PayPal, Venmo, Cash App, and Apple Wallet apps on an iPhone.

We’re getting closer every day to an entirely cashless society. While some folks may still carry around a few bucks for emergencies, electronic payments are accepted nearly everywhere, and as mobile wallets expand, even traditional credit and debit cards are starting to fall by the wayside.

That means many of us are past the days of tossing a few bills onto the table to pay our share of a restaurant tab or slipping our pal a couple of bucks to help them out. Now, even those things are more easily doable from our smartphones than our physical wallets.

Read more
How to change margins in Google Docs
Laptop Working from Home

When you create a document in Google Docs, you may need to adjust the space between the edge of the page and the content --- the margins. For instance, many professors have requirements for the margin sizes you must use for college papers.

You can easily change the left, right, top, and bottom margins in Google Docs and have a few different ways to do it.

Read more
What is Microsoft Teams? How to use the collaboration app
A close-up of someone using Microsoft Teams on a laptop for a videoconference.

Online team collaboration is the new norm as companies spread their workforce across the globe. Gone are the days of primarily relying on group emails, as teams can now work together in real time using an instant chat-style interface, no matter where they are.

Using Microsoft Teams affords video conferencing, real-time discussions, document sharing and editing, and more for companies and corporations. It's one of many collaboration tools designed to bring company workers together in an online space. It’s not designed for communicating with family and friends, but for colleagues and clients.

Read more