{"id":133,"date":"2019-04-11T11:27:13","date_gmt":"2019-04-11T00:27:13","guid":{"rendered":"https:\/\/www.onlineinvent.com.au\/blog\/?p=133"},"modified":"2019-02-09T03:49:22","modified_gmt":"2019-02-08T16:49:22","slug":"australian-encryption-laws","status":"publish","type":"post","link":"https:\/\/www.onlineinvent.com.au\/blog\/australian-encryption-laws\/","title":{"rendered":"Australian Encryption Laws"},"content":{"rendered":"\n<p> The controversial encryption laws passed by the Australian government was intended to form <g class=\"gr_ gr_18 gr-alert gr_spell gr_inline_cards gr_run_anim ContextualSpelling ins-del\" id=\"18\" data-gr-id=\"18\">loop holes<\/g> that accorded police and security agencies with the right to access encrypted messages that were transmitted on the platforms created by these tech companies. <\/p>\n\n\n\n<p>Although the intentions of these laws are noble enough as they are targeted towards combatting terrorism and crime, it has left many individuals questioning their own positions in the scheme of things. Critics from all over the globe have condemned the act citing wide-ranging concerns mostly surrounding the fact that these laws would be inadvertently undermining the rights to privacy of individual users throughout the country. <\/p>\n\n\n\n<p>The law which was rushed through towards the end of the deadline received reluctant support from the Labour opposition that held that they supported the encryption laws only to protect Australians during the festive season and maintained that the party\u2019s top representatives had &#8220;legitimate concerns&#8221; about the laws.<\/p>\n\n\n\n<p>The existing laws in Australia which require service providers and tech companies to hand over the communication transcripts of \u2018persons of interest\u2019 to the police was deemed to be inadequate due to the recent developments where tech companies added additional layers of security commonly referred to as end-to-end encryption. <\/p>\n\n\n\n<p>The <g class=\"gr_ gr_10 gr-alert gr_spell gr_inline_cards gr_run_anim ContextualSpelling ins-del multiReplace\" id=\"10\" data-gr-id=\"10\">spin \u2013off<\/g> for this law could be traced back to the claims made by the FBI that device encryption &#8216; has become a huge problem&#8217; as End-to-end encryption does not allow any other party apart from the sender and the receiver to view messages which had been exploited by terrorists and criminals in their id to avoid surveillance. <\/p>\n\n\n\n<p>These laws are non-existent in countries such as China and Russia among others as services that offer end-to-end encryption are banned altogether. These new laws <g class=\"gr_ gr_9 gr-alert gr_gramm gr_inline_cards gr_run_anim Punctuation only-ins replaceWithoutSep\" id=\"9\" data-gr-id=\"9\">however<\/g>, will force companies that provide end-to-end encryption to create new functions that would allow these security agencies to access encrypted messages without prior consent from users. <\/p>\n\n\n\n<p>This means that a \u2018backdoor\u2019 will be created to enter into these platforms which could also be exploited by hackers at whim which jeopardises users across the board simply based on the fact that if these security agencies are able to get it, so would others. In essence, this new law is creating vulnerability as there is no such thing as creating a &#8220;back door&#8221; decryption that only targets one individual. <\/p>\n\n\n\n<p>To put this in a simpler manner, this vulnerability would basically weaken the existing infrastructure of the encryption scheme which would have a drastic impact on the overall security for everybody and thus innocent people could eventually suffer the consequences of such \u2018security holes\u2019. <\/p>\n\n\n\n<p>Although the laws have implemented mitigating factors whereby a safeguard has been placed that indicates the decryptions will not be rolled out if it is observed to cause &#8220;systemic weaknesses&#8221;, this mitigating factor is vague and application of this mitigating factor is unclear even to the lawmakers themselves. <\/p>\n\n\n\n<p>As reported by the BBC, reactions to this move are being seen as a transgression against human rights as the lacks of checks and balances indicates that the security agencies (known for their nosiness in other people\u2019s affairs) could sanction individuals to create backdoors without the knowledge of their employer potentially leaving Australian tech firms in the dark about whether they are even subject to the order.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The controversial encryption laws passed by the Australian government was intended to form loop holes that accorded police and security agencies with the right to access encrypted messages that were transmitted on the platforms created by these tech companies. Although the intentions of these laws are noble enough as they are targeted towards combatting terrorism [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":134,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1,17],"tags":[],"class_list":["post-133","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-all-topics","category-internet-regulation"],"_links":{"self":[{"href":"https:\/\/www.onlineinvent.com.au\/blog\/wp-json\/wp\/v2\/posts\/133","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.onlineinvent.com.au\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.onlineinvent.com.au\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.onlineinvent.com.au\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.onlineinvent.com.au\/blog\/wp-json\/wp\/v2\/comments?post=133"}],"version-history":[{"count":1,"href":"https:\/\/www.onlineinvent.com.au\/blog\/wp-json\/wp\/v2\/posts\/133\/revisions"}],"predecessor-version":[{"id":135,"href":"https:\/\/www.onlineinvent.com.au\/blog\/wp-json\/wp\/v2\/posts\/133\/revisions\/135"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.onlineinvent.com.au\/blog\/wp-json\/wp\/v2\/media\/134"}],"wp:attachment":[{"href":"https:\/\/www.onlineinvent.com.au\/blog\/wp-json\/wp\/v2\/media?parent=133"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.onlineinvent.com.au\/blog\/wp-json\/wp\/v2\/categories?post=133"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.onlineinvent.com.au\/blog\/wp-json\/wp\/v2\/tags?post=133"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}