<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>australia &#8211; Privacy News Online by Private Internet Access VPN</title>
	<atom:link href="https://www.privateinternetaccess.com/blog/tag/australia/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.privateinternetaccess.com/blog</link>
	<description>Online privacy news from around the world.</description>
	<lastBuildDate>Wed, 26 Aug 2020 22:13:34 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>Roll-out of facial recognition by governments around the world accelerates as privacy experts sound the alarm</title>
		<link>https://www.privateinternetaccess.com/blog/roll-out-of-facial-recognition-by-governments-around-the-world-accelerates-as-privacy-experts-sound-the-alarm/</link>
		
		<dc:creator><![CDATA[Glyn Moody]]></dc:creator>
		<pubDate>Thu, 05 Dec 2019 17:00:05 +0000</pubDate>
				<category><![CDATA[General Privacy News]]></category>
		<category><![CDATA[Governments]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[australia]]></category>
		<category><![CDATA[china]]></category>
		<category><![CDATA[facial recognition]]></category>
		<category><![CDATA[france]]></category>
		<category><![CDATA[gdpr]]></category>
		<category><![CDATA[homeland security]]></category>
		<category><![CDATA[mobile phones]]></category>
		<category><![CDATA[new zealand]]></category>
		<guid isPermaLink="false">https://www.privateinternetaccess.com/blog/?p=12043</guid>

					<description><![CDATA[<p>A year ago, this blog wrote about the spread of facial recognition systems, and the danger they represent to privacy. Since then, the roll-out has accelerated, as the technology becomes more accurate, and the products on offer become cheaper. Governments in particular see facial recognition as an easy way to check and control their populations. &#8230; <a href="https://www.privateinternetaccess.com/blog/roll-out-of-facial-recognition-by-governments-around-the-world-accelerates-as-privacy-experts-sound-the-alarm/" class="more-link">Continue reading<span class="screen-reader-text"> "Roll-out of facial recognition by governments around the world accelerates as privacy experts sound the alarm"</span></a></p>
<p>The post <a rel="nofollow" href="https://www.privateinternetaccess.com/blog/roll-out-of-facial-recognition-by-governments-around-the-world-accelerates-as-privacy-experts-sound-the-alarm/">Roll-out of facial recognition by governments around the world accelerates as privacy experts sound the alarm</a> appeared first on <a rel="nofollow" href="https://www.privateinternetaccess.com/blog">Privacy News Online by Private Internet Access VPN</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>A year ago, this blog wrote about the spread of facial recognition systems, and <a href="https://www.privateinternetaccess.com/blog/2018/12/facial-recognition-systems-advance-and-spread-but-so-do-concerns-about-its-deployment/">the danger they represent to privacy</a>. Since then, the roll-out has accelerated, as the technology becomes more accurate, and the products on offer become cheaper. Governments in particular see facial recognition as an easy way to check and control their populations.</p>
<p>China, for example, now requires <a href="https://www.theguardian.com/world/2019/dec/02/china-brings-in-mandatory-facial-recognition-for-mobile-phone-users">all mobile phone users to submit facial recognition scans</a> when they register new SIM cards. <a href="https://www.theguardian.com/cities/2019/dec/02/big-brother-is-watching-chinese-city-with-26m-cameras-is-worlds-most-heavily-surveilled">China also leads the world in installed CCTV cameras</a>, many of which now employ facial recognition. Eight of the top ten cities with the most surveillance cameras per person are to be found in China (London and Atlanta are the other two). <a href="https://www.scmp.com/tech/policy/article/3031390/chongqing-worlds-most-surveilled-city-these-residents-are-happy-trade">Chongqing comes first</a>, with 2.58 million surveillance cameras covering 15.35 million people. Another straw in the wind is provided by the police bureau in the southern Chinese city of Guangzhou. It wants people to use facial recognition to <a href="https://qz.com/1759284/a-new-chinese-police-app-allows-peer-to-peer-facial-scans/">check that messages from friends are genuine</a>. If this approach became widespread in China, it would see facial recognition built into the fabric of social relationships. China hopes to consolidate its lead in this area by <a href="https://www.ft.com/content/c3555a3c-0d3e-11ea-b2d6-9bf4d1957a67">shaping UN facial recognition standards</a>. Instead of safeguarding privacy, the standard is all about making surveillance easier.</p>
<p>It&#8217;s not just China that is embracing the technology as a convenient way to keep tabs on people. France wants to <a href="https://www.bloomberg.com/news/articles/2019-10-03/french-liberte-tested-by-nationwide-facial-recognition-id-plan">use facial recognition as part of a national identity system</a>. In the French town of Lyon, a driver has been <a href="https://korii.slate.fr/et-caetera/justice-lyon-banbanaste-reconnaissance-faciale-proces-photo-algorithme-preuve">found guilty purely on the basis of a facial recognition system</a> that said his face matched an image captured by a CCTV camera during a theft. In Spain, a bus company has a pilot project that <a href="https://www.eldiario.es/tecnologia/reconocimiento-facial-autobuses-Madrid-China_0_948405844.html">lets people pay by using their face</a>. Once the system recognizes an individual, the money is deducted from their account. There are also moves in the EU to extend <a href="https://netzpolitik.org/2019/europaeische-union-plant-europaweite-abfrage-von-gesichtsbildern/">the use of facial recognition by the police</a>, for example enabling pan-EU searches for matches.</p>
<p>Around the world, other applications of facial recognition are being implemented or considered. As Privacy News Online reported recently, in Australia the government has proposed using facial recognition for <a href="https://www.privateinternetaccess.com/blog/2019/11/australia-proposed-using-facial-recognition-technology-for-online-gambling-and-pornography-age-verification/">online age verification for pornography and gambling Web sites</a> visited by Australians. <a href="https://www.stuff.co.nz/national/117957684/privacy-concerns-over-polices-new-state-of-the-art-facial-recognition-system">New Zealand&#8217;s police force</a> is bringing in a &#8220;state of the art&#8221; facial recognition system. In what would be a dramatic shift in US domestic policy, Homeland Security wants to expand facial recognition checks <a href="https://techcrunch.com/2019/12/02/homeland-security-face-recognition-airport-citizens/">to include all US citizens arriving to and departing from the country</a>. Meanwhile, it has emerged that the US military has built up <a href="https://onezero.medium.com/exclusive-this-is-how-the-u-s-militarys-massive-facial-recognition-system-works-bb764291b96d">a database of 7.4 million identities including facial images</a>, irises, fingerprints and DNA data. The idea is to create a biometric dragnet of anyone who has come in contact with the US military abroad. And as the New York Times showed, public CCTV feeds and low-cost cloud computing resources can be used for <a href="https://www.nytimes.com/interactive/2019/04/16/opinion/facial-recognition-new-york-city.html">facial recognition on the cheap</a>.</p>
<p>However, just as governments rush to embrace the technology, so there is increasing concern by <a href="https://edri.org/facial-recognition-and-fundamental-rights-101/">activists</a>, <a href="https://www.uschamber.com/issue-brief/us-chamber-facial-recognition-policy-principles-0">businesses</a>, and officials at local and international levels, about its impact on privacy. In the US, <a href="https://sfgov.legistar.com/LegislationDetail.aspx?ID=3850006&amp;GUID=12FC5DF6-AAC9-4F4E-8553-8F0CD0EBD3F6">San Francisco</a>, <a href="https://regmedia.co.uk/2019/07/19/oakland_facial_recognition_ordinance.pdf">Oakland</a> and <a href="https://www.fastcompany.com/90436355/portlands-proposed-facial-recognition-ban-could-be-the-strictest-yet">Portland</a> have all brought in various restrictions on the use of facial recognition systems. The EU&#8217;s Fundamental Rights Agency released a paper, &#8220;<a href="https://fra.europa.eu/en/news/2019/facial-recognition-technology-fundamental-rights-considerations-law-enforcement">Facial recognition technology: fundamental rights considerations in law enforcement</a>&#8220;. The head of the EU&#8217;s independent data protection authority, Wojciech Wiewiórowski, wrote an article entitled &#8220;<a href="https://edps.europa.eu/press-publications/press-news/blog/facial-recognition-solution-search-problem_en">Facial recognition: A solution in search of a problem?</a>&#8221; in which he pointed out that the region&#8217;s data protection law, the <a href="https://www.privateinternetaccess.com/blog/?s=gdpr">GDPR</a>, already covers facial recognition. Potentially, its use in the EU might be illegal, or at least highly circumscribed in public places. It will require cases brought to EU courts to lay down exactly what impact the GDPR has on facial recognition technologies. Wiewiórowski explains why so many important issues are involved:</p>
<blockquote><p>A person’s face is a precious and fragile element her identity and sense of uniqueness. It will change in appearance over time and she might choose to obscure or to cosmetically change it &#8211; that is her basic freedom. Turning the human face into another object for measurement and categorisation by automated processes controlled by powerful companies and governments touches the right to human dignity &#8211; even without the threat of it being used as a tool for oppression by an authoritarian state.</p>
<p>Moreover, it tends to be tested on the poorest and most vulnerable in society, ethnic minorities, migrants and children.</p>
<p>Where combined with other publicly available information and the techniques of Big Data, it could obviously chill individual freedom of expression and association.</p></blockquote>
<p>Wiewiórowski points out that this is not just a limited technical issue, but part of a much larger discussion about privacy in the digital world:</p>
<blockquote><p>We need to assess not only the technology on its own merits, but also the likely direction of travel if it continues to be deployed more and more widely. The next stage will be pressure to adopt other forms of objectification of the human being, gait, emotions, brainwaves. Now is the moment for the EU, as it discusses the ethics of AI and the need for regulation, to determine whether &#8211; if ever &#8211; facial recognition technology can be permitted in a democratic society. If the answer is yes, only then do we turn questions of how and safeguards and accountability to be put in place.</p></blockquote>
<p>As that comment makes clear, Wiewiórowski believes that one possible result of court cases might be that facial recognition technology will not be permitted at all in the EU. Although that would be an extreme outcome, it rightly underlines the immense power such systems possess, and the potential harm they can cause. The fact that they can also be useful and beneficial in some circumstances emphasizes just how hard it is going to be to strike the right balance, and to find the right legal framework for controlling facial recognition systems.</p>
<p>Featured image by <a href="https://www.flickr.com/photos/cbpphotos/26902931678">US Customs and Border Protection</a>.</p>
<p>The post <a rel="nofollow" href="https://www.privateinternetaccess.com/blog/roll-out-of-facial-recognition-by-governments-around-the-world-accelerates-as-privacy-experts-sound-the-alarm/">Roll-out of facial recognition by governments around the world accelerates as privacy experts sound the alarm</a> appeared first on <a rel="nofollow" href="https://www.privateinternetaccess.com/blog">Privacy News Online by Private Internet Access VPN</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Australia proposed using facial recognition technology for online gambling and pornography age verification</title>
		<link>https://www.privateinternetaccess.com/blog/australia-proposed-using-facial-recognition-technology-for-online-gambling-and-pornography-age-verification/</link>
		
		<dc:creator><![CDATA[Caleb Chen]]></dc:creator>
		<pubDate>Mon, 04 Nov 2019 16:52:53 +0000</pubDate>
				<category><![CDATA[General Privacy News]]></category>
		<category><![CDATA[Governments]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[age verification]]></category>
		<category><![CDATA[australia]]></category>
		<category><![CDATA[facial recognition]]></category>
		<category><![CDATA[surveillance technology]]></category>
		<guid isPermaLink="false">https://www.privateinternetaccess.com/blog/?p=11889</guid>

					<description><![CDATA[<p>The Australian government’s Department of Home Affairs has proposed using facial recognition for online age verification for pornography and gambling websites visited by Australians as an update to Australia’s National Identity Security Strategy. The full not-so-detailed plan is titled: “Submission to the Inquiry into Age Verification for Online Wagering and Online Pornography.” In it, the &#8230; <a href="https://www.privateinternetaccess.com/blog/australia-proposed-using-facial-recognition-technology-for-online-gambling-and-pornography-age-verification/" class="more-link">Continue reading<span class="screen-reader-text"> "Australia proposed using facial recognition technology for online gambling and pornography age verification"</span></a></p>
<p>The post <a rel="nofollow" href="https://www.privateinternetaccess.com/blog/australia-proposed-using-facial-recognition-technology-for-online-gambling-and-pornography-age-verification/">Australia proposed using facial recognition technology for online gambling and pornography age verification</a> appeared first on <a rel="nofollow" href="https://www.privateinternetaccess.com/blog">Privacy News Online by Private Internet Access VPN</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The Australian government’s Department of Home Affairs has proposed using facial recognition for online age verification for pornography and gambling websites visited by Australians as an update to Australia’s National Identity Security Strategy. The full not-so-detailed plan is titled: “<a href="https://www.aph.gov.au/DocumentStore.ashx?id=903112ab-f5e9-4449-83fa-23793150dd62&amp;subId=671954" target="_blank" rel="noopener noreferrer">Submission to the Inquiry into Age Verification for Online Wagering and Online Pornography</a>.” In it, the Department of Home Affairs highlights their new Face Verification Service and how it could be used for age verification. Note: no words on how online pornography and gambling users would submit their face image for comparison versus their ID in the Face Verification Service:</p>
<blockquote><p>&#8220;[&#8230;] Home Affairs is developing a Face Verification Service which matches a person’s photo against images used on one of their evidence of identity documents to help verify their identity. The Face Verification Service complements the Document Verification Service by preventing the use of stolen as well as fake identity information. This could assist in age verification, for example by preventing a minor from using their parent’s driver licence to circumvent age verification controls.&#8221;</p></blockquote>
<p>While this “protect the children” argument may seem compelling on the surface, Australia’s real intention here is to expand the use of facial recognition technology and build a database of Australian internet users’ porn and gambling habits.</p>
<h2>Australia seeks to expand their use of facial recognition surveillance technology under the guise of protecting the children from pornography and gambling</h2>
<p>The Australian government seems to have the opinion that facial recognition technology should be absolutely everywhere &#8211; despite the fact that facial recognition technology still does show biases and provide <a href="https://www.privateinternetaccess.com/blog/2018/08/us-politicians-discover-the-perils-and-pitfalls-of-facial-recognition-is-it-time-to-ban-it-completely/">false results</a>. In their proposal, the Department of Home Affairs even admits both their long term goal to make sure that facial recognition technology is absolutely everywhere and how far off the normal use case of facial recognition technology their plan really is:</p>
<blockquote><p>“Whilst they are primarily designed to prevent identity crime, Home Affairs would support the increased use of the Document and Face Verification Services across the Australian economy to strengthen age verification processes.”</p></blockquote>
<h2>Facial recognition technology is on the rise around the world</h2>
<p>Australia already has some facial recognition technology that is used by law enforcement; It’s worth noting that this plan by the Department of Home Affairs is absolutely meant to expand Australia’s facial recognition technology programs beyond the oversight of courts. Unlike the <a href="https://www.privateinternetaccess.com/blog/2019/11/aclu-sues-to-find-out-status-of-facial-recognition-mass-surveillance-in-america/">United States</a> which already has it, Australia’s Parliament is currently planning to vote on a database of millions of faces gathered from licenses and passports around the country. Now, it seems that Home Affairs would like to update that database with a timestamp of every instant that you view pornography or gambling online. Of course, the database would also include what type of pornography or gambling site this heinous age verification process happened on. The insistence on an age verification method that can be tied back to individuals’ identities, and all the privacy concerns that come with it, is not unique to Australia.</p>
<p>For years, the United Kingdom has considered and even announced that it was launching a similar online age verification scheme that would have required buying “porn passes” from corner stores while also showing state issued identification for verification. Australia’s plan is admittedly a little more high tech &#8211; which carries with it the fear that Australia’s sometimes <a href="https://www.privateinternetaccess.com/blog/2017/07/australian-prime-minister-turnbull-laws-mathematics-dont-apply-australia/">technology and logic incompetent politicians</a> will wave in this new expansion of facial recognition surveillance without batting an eye.</p>
<p>The post <a rel="nofollow" href="https://www.privateinternetaccess.com/blog/australia-proposed-using-facial-recognition-technology-for-online-gambling-and-pornography-age-verification/">Australia proposed using facial recognition technology for online gambling and pornography age verification</a> appeared first on <a rel="nofollow" href="https://www.privateinternetaccess.com/blog">Privacy News Online by Private Internet Access VPN</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Privacy News Daily &#124; March 27, 2019</title>
		<link>https://www.privateinternetaccess.com/blog/privacy-daily-news-update-march-27th-2019/</link>
		
		<dc:creator><![CDATA[Caleb Chen]]></dc:creator>
		<pubDate>Wed, 27 Mar 2019 18:20:59 +0000</pubDate>
				<category><![CDATA[General Privacy News]]></category>
		<category><![CDATA[amp]]></category>
		<category><![CDATA[Article 13]]></category>
		<category><![CDATA[australia]]></category>
		<guid isPermaLink="false">https://www.privateinternetaccess.com/blog/?p=10832</guid>

					<description><![CDATA[<p>Here is the Online Privacy News Update for March 27th, 2018. Today, the world is still coming to grips with the EU Parliament&#8217;s passing of Article 13 and Article 11 (now known as Article 15 and Article 17). Read below for other privacy news from today. AI-based predictive policing systems widely used in US and &#8230; <a href="https://www.privateinternetaccess.com/blog/privacy-daily-news-update-march-27th-2019/" class="more-link">Continue reading<span class="screen-reader-text"> "Privacy News Daily &#124; March 27, 2019"</span></a></p>
<p>The post <a rel="nofollow" href="https://www.privateinternetaccess.com/blog/privacy-daily-news-update-march-27th-2019/">Privacy News Daily | March 27, 2019</a> appeared first on <a rel="nofollow" href="https://www.privateinternetaccess.com/blog">Privacy News Online by Private Internet Access VPN</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Here is the Online Privacy News Update for March 27th, 2018. Today, the world is still coming to grips with the EU Parliament&#8217;s passing of <a href="https://www.privateinternetaccess.com/pages/article-13">Article 13</a> and Article 11 (now known as Article 15 and Article 17). Read below for other privacy news from today.</p>
<blockquote class="wp-embedded-content" data-secret="At3MGhpLHa"><p><a href="https://www.privateinternetaccess.com/blog/2019/03/predictive-policing-algorithms-widely-used-in-us-and-uk-despite-deep-flaws-in-the-approach/">AI-based predictive policing systems widely used in US and UK, despite concerns about privacy, and flaws in the approach</a></p></blockquote>
<p><iframe class="wp-embedded-content" sandbox="allow-scripts" security="restricted" src="https://www.privateinternetaccess.com/blog/2019/03/predictive-policing-algorithms-widely-used-in-us-and-uk-despite-deep-flaws-in-the-approach/embed/#?secret=At3MGhpLHa" data-secret="At3MGhpLHa" width="600" height="338" title="&#8220;AI-based predictive policing systems widely used in US and UK, despite concerns about privacy, and flaws in the approach&#8221; &#8212; Private Internet Access Blog" frameborder="0" marginwidth="0" marginheight="0" scrolling="no"></iframe></p>
<h2>Bill That Would Restore Net Neutrality Moves Forward Despite Telecom’s Best Efforts to Kill it</h2>
<p>HR 1644, the Save the Internet Act of 2019 seeks to restore  net neutrality in the United States. <a href="https://www.privateinternetaccess.com/blog/2019/03/tell-representatives-save-net-neutrality-supporting-save-internet-act-2019/">HR 1644</a> has made it past its first legislative hurdle in the House of Representatives.</p>
<p><a href="https://motherboard.vice.com/en_us/article/qvyqvm/bill-that-would-restore-net-neutrality-moves-forward-despite-telecoms-best-efforts-to-kill-it" target="_blank" rel="noopener noreferrer">https://motherboard.vice.com/en_us/article/qvyqvm/bill-that-would-restore-net-neutrality-moves-forward-despite-telecoms-best-efforts-to-kill-it</a></p>
<h2>5 Reasons why AMP for email is bad</h2>
<p>Google AMP hasn&#8217;t been the most popular thing on the internet and now that they&#8217;re bringing it to email, not everyone is happy. This change will cause your mailbox to become a platform for marketers and advertisers.</p>
<p><a href="https://tutanota.com/blog/posts/amp-email-bad-idea/" target="_blank" rel="noopener noreferrer">https://tutanota.com/blog/posts/amp-email-bad-idea/</a></p>
<h2>Australia &#8216;Absolutely Considering&#8217; Jail Time for Tech Execs Who Can&#8217;t Scrub Hate Off Their Platforms</h2>
<p>Australian Attorney General Christian Porter told GizModo that Australia was “absolutely considering” jail time penalties for executives who fail to remove terrorist content from their online platforms.</p>
<p><a href="https://gizmodo.com/australia-absolutely-considering-jail-time-for-tech-exe-1833578817" target="_blank" rel="noopener noreferrer">https://gizmodo.com/australia-absolutely-considering-jail-time-for-tech-exe-1833578817</a></p>
<h2>Tech companies not &#8216;comfortable&#8217; storing data in Australia, Microsoft warns</h2>
<p>Microsoft is just one of many companies that are uncomfortable storing company data in Australia despite new laws. Australia has passed laws forcing companies to comply with such requests.</p>
<p><a href="https://www.theguardian.com/technology/2019/mar/27/tech-companies-not-comfortable-storing-data-in-australia-microsoft-warns" target="_blank" rel="noopener noreferrer">https://www.theguardian.com/technology/2019/mar/27/tech-companies-not-comfortable-storing-data-in-australia-microsoft-warns</a></p>
<h2>MEP errors mean European copyright law may not have passed</h2>
<p>After the much anticipated Copyright Directive was passed by EU Parliament yesterday, 11 MEPs indicated that they voted incorrectly. That is enough to change the vote and remove the most controversial parts Article 13 and Article 11, but the incorrect vote stands currently.</p>
<p><a href="https://www.theguardian.com/media/2019/mar/27/mep-errors-mean-european-copyright-law-may-not-have-passed" target="_blank" rel="noopener noreferrer">https://www.theguardian.com/media/2019/mar/27/mep-errors-mean-european-copyright-law-may-not-have-passed</a></p>
<h2>Facebook to Fight Belgian Ban on Tracking Users (and Even Non-Users)</h2>
<p>Belgium court believes that Facebook “still violates the fundamental rights of millions of residents of Belgium.” Facebook disagrees and is fighting back for their right to track Belgium Facebook visitors, even those that aren&#8217;t registered users of Facebook.</p>
<p><a href="https://www.bloomberg.com/news/articles/2019-03-27/facebook-attack-of-belgian-order-on-user-tracking-gets-hearing" target="_blank" rel="noopener noreferrer">https://www.bloomberg.com/news/articles/2019-03-27/facebook-attack-of-belgian-order-on-user-tracking-gets-hearing</a></p>
<p>The post <a rel="nofollow" href="https://www.privateinternetaccess.com/blog/privacy-daily-news-update-march-27th-2019/">Privacy News Daily | March 27, 2019</a> appeared first on <a rel="nofollow" href="https://www.privateinternetaccess.com/blog">Privacy News Online by Private Internet Access VPN</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>ISPs in AU and NZ start censoring the internet without legal precedent</title>
		<link>https://www.privateinternetaccess.com/blog/isps-in-au-and-nz-start-censoring-the-internet-without-legal-precedent/</link>
					<comments>https://www.privateinternetaccess.com/blog/isps-in-au-and-nz-start-censoring-the-internet-without-legal-precedent/#comments</comments>
		
		<dc:creator><![CDATA[Caleb Chen]]></dc:creator>
		<pubDate>Tue, 19 Mar 2019 00:11:36 +0000</pubDate>
				<category><![CDATA[Censorship]]></category>
		<category><![CDATA[General Privacy News]]></category>
		<category><![CDATA[australia]]></category>
		<category><![CDATA[censorship]]></category>
		<category><![CDATA[free speech]]></category>
		<category><![CDATA[new zealand]]></category>
		<category><![CDATA[voat]]></category>
		<guid isPermaLink="false">https://www.privateinternetaccess.com/blog/?p=10733</guid>

					<description><![CDATA[<p>Several websites including Voat, ZeroHedge, Archive.is, LiveLeak, and others have been blocked in Australia and New Zealand in direct contravention to civil liberties that citizens are supposed to have. The biggest of these internet providers, Telstra, has published a blog post defending their censorship action &#8211; even acknowledging that free speech has been sacrificed by &#8230; <a href="https://www.privateinternetaccess.com/blog/isps-in-au-and-nz-start-censoring-the-internet-without-legal-precedent/" class="more-link">Continue reading<span class="screen-reader-text"> "ISPs in AU and NZ start censoring the internet without legal precedent"</span></a></p>
<p>The post <a rel="nofollow" href="https://www.privateinternetaccess.com/blog/isps-in-au-and-nz-start-censoring-the-internet-without-legal-precedent/">ISPs in AU and NZ start censoring the internet without legal precedent</a> appeared first on <a rel="nofollow" href="https://www.privateinternetaccess.com/blog">Privacy News Online by Private Internet Access VPN</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Several websites including Voat, ZeroHedge, Archive.is, LiveLeak, and others have been blocked in Australia and New Zealand in direct contravention to civil liberties that citizens are supposed to have. The biggest of these internet providers, Telstra, has published a <a href="https://exchange.telstra.com.au/blocking-websites-hosting-footage-christchurch/" target="_blank" rel="noopener noreferrer">blog post</a> defending their censorship action &#8211; even acknowledging that free speech has been sacrificed by company decision:</p>
<blockquote><p>“We appreciate that it is necessary to ensure free speech is carefully balanced against protecting the community – but with these sites continuing to host disturbing content we feel it is the right thing to do to block them.”</p></blockquote>
<p>In fact, some of the blocked sites have been unfairly lambasted in mainstream media as “refusing” to take down offending material. Let’s be clear, each and every one of the blocked websites operates lawfully &#8211; that includes removing illegal material when requested. These internet service providers (ISPs) in Australia and New Zealand have taken it upon themselves to play judge, jury, and executioner in their condemnation of these websites and their visitors just for exercising free speech.</p>
<h2>In New Zealand, mobile internet service providers take it upon themselves to enact censorship</h2>
<p>Starting over the weekend, Spark NZ, Vodafone NZ, and Vocus NZ were the three New Zealand ISPs that have taken it upon themselves to block these sites. On their part, the ISPs and smartphone network providers are claiming that these are only temporary blocks. Temporary blocks that have lasted multiple days &#8211; more than long enough to change people&#8217;s’ browsing habits. Even the perpetrators of this censorship are aware how unprecedented it is. Geoff Thorn, a chief executive at New Zealand Telecommunications Forum (TCF), commented to <a href="https://www.cio.co.nz/article/658895/nz-isps-block-websites-footage-christchurch-shooting/" target="_blank" rel="noopener noreferrer">CIO</a>:</p>
<blockquote><p>“This is an unprecedented move by the telecommunications industry, but one that they all agree is necessary.”</p></blockquote>
<p>CIO additionally confirmed that the ISPs are working together to ban the same sites.</p>
<h2>In Australia, censorship also happens at the whim of the internet providers</h2>
<p>Unsurprisingly, the over-reactive censorship has even started spreading around the world. Starting Monday the 18th, Telstra and Vodafone in Australia have also implemented these blocks network wide &#8211; that means even the many Australians using Vodafone reseller networks are affected by Vodafone’s censorship decisions. Of course, Facebook is not one of the sites that has been blocked.</p>
<blockquote class="twitter-tweet" data-width="550" data-dnt="true">
<p lang="en" dir="ltr">Are these blocks due to legal request, or is Telstra now censoring entire sites due to internal policies? Setting a very dangerous precedent</p>
<p>&mdash; James Franklin (@James23235689) <a href="https://twitter.com/James23235689/status/1107657943678279680?ref_src=twsrc%5Etfw">March 18, 2019</a></p></blockquote>
<p><script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script></p>
<p>Vodafone has even confirmed that they were told to place the blocks, and they will remove the blocks when they are “advised” that the illegal content has been removed.</p>
<h2>Censoring free speech is never &#8220;the right thing to do&#8221;</h2>
<p>The internet providers in Australia and New Zealand are sliding down an incredibly slippery slope against free speech. Previously, in <a href="https://junkee.com/australia-piracy-site-blocking/147694" target="_blank" rel="noopener noreferrer">Australia</a> and other parts of the world like <a href="https://www.privateinternetaccess.com/blog/2016/09/russia-declares-pornhub-youporn-illegal-content-blocks-access/">Russia</a> and <a href="https://www.privateinternetaccess.com/blog/2017/01/president-duterte-banned-porn-philippines-filipinos-now-need-unblock-porn-websites/">Philippines</a>, ISPs would not censor access to websites unless clearly told to by the government. The precedent that internet providers can decide when to start blocking sites seemingly arbitrarily has now both been set and abused… All in the name of “doing the right thing.”</p>
<blockquote class="twitter-tweet" data-width="550" data-dnt="true">
<p lang="en" dir="ltr">Hi Matt, Vodafone Australia has temporarily blocked sites known to be actively hosting footage of the shootings in Christchurch. We believe it&#39;s absolutely the right thing to do. When we receive advice the content has been removed from these sites, we will then remove the block.</p>
<p>&mdash; Vodafone Australia (@VodafoneAU) <a href="https://twitter.com/VodafoneAU/status/1107773521948741632?ref_src=twsrc%5Etfw">March 18, 2019</a></p></blockquote>
<p><script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script></p>
<p>Simply put: It’s not the right thing to do. Free speech is an absolute concept and by that virtue alone &#8211; this is not the right thing to do.</p>
<p>A full list of blocked websites can be found below:</p>
<ul>
<li><a href="https://www.voat.co" target="_blank" rel="noopener noreferrer">voat.co</a></li>
<li><a href="https://www.4chan.org" target="_blank" rel="noopener noreferrer">4chan.org</a></li>
<li><a href="https://www.8ch.net" target="_blank" rel="noopener noreferrer">8ch.net</a></li>
<li><a href="https://www.liveleak.com" target="_blank" rel="noopener noreferrer">liveleak.com</a></li>
<li><a href="https://www.archive.is" target="_blank" rel="noopener noreferrer">archive.is</a></li>
<li><a href="https://www.bitchute.com" target="_blank" rel="noopener noreferrer">bitchute.com</a></li>
<li><a href="https://www.zerohedge.com" target="_blank" rel="noopener noreferrer">zerohedge.com</a></li>
<li><a href="https://www.kiwifarms.net" target="_blank" rel="noopener noreferrer">kiwifarms.net</a></li>
<li><a href="https:/www.eztv.is">eztv.is</a></li>
<li><a href="https://www.dissenter.com" target="_blank" rel="noopener noreferrer">dissenter.com</a></li>
<li><a href="https://www.documentingreality.com" target="_blank" rel="noopener noreferrer">documentingreality.com</a></li>
<li><a href="https://www.bestgore.com" target="_blank" rel="noopener noreferrer">bestgore.com</a></li>
<li><a href="https://www.archive.fo" target="_blank" rel="noopener noreferrer">archive.fo</a></li>
</ul>
<p>Please let us know in the comments below if any blocked websites are missing from this list.</p>
<p>The post <a rel="nofollow" href="https://www.privateinternetaccess.com/blog/isps-in-au-and-nz-start-censoring-the-internet-without-legal-precedent/">ISPs in AU and NZ start censoring the internet without legal precedent</a> appeared first on <a rel="nofollow" href="https://www.privateinternetaccess.com/blog">Privacy News Online by Private Internet Access VPN</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.privateinternetaccess.com/blog/isps-in-au-and-nz-start-censoring-the-internet-without-legal-precedent/feed/</wfw:commentRss>
			<slash:comments>67</slash:comments>
		
		
			</item>
		<item>
		<title>The latest twist on adding backdoors to encryption is spooky &#8211; and dangerous</title>
		<link>https://www.privateinternetaccess.com/blog/the-latest-twist-on-adding-backdoors-to-encryption-is-spooky-and-dangerous/</link>
		
		<dc:creator><![CDATA[Glyn Moody]]></dc:creator>
		<pubDate>Sat, 23 Feb 2019 17:00:34 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Encryption]]></category>
		<category><![CDATA[General Privacy News]]></category>
		<category><![CDATA[Governments]]></category>
		<category><![CDATA[australia]]></category>
		<category><![CDATA[backdoors]]></category>
		<category><![CDATA[eff]]></category>
		<category><![CDATA[end-to-end]]></category>
		<category><![CDATA[gchq]]></category>
		<category><![CDATA[whatsapp]]></category>
		<guid isPermaLink="false">https://www.privateinternetaccess.com/blog/?p=10502</guid>

					<description><![CDATA[<p>Authorities around the world have been calling for backdoors to be added to strong encryption for years – part of an even older battle. The view among all top security experts is that this is a very bad idea, since it is likely to add extra vulnerabilities to systems, which weakens the security for everyone. &#8230; <a href="https://www.privateinternetaccess.com/blog/the-latest-twist-on-adding-backdoors-to-encryption-is-spooky-and-dangerous/" class="more-link">Continue reading<span class="screen-reader-text"> "The latest twist on adding backdoors to encryption is spooky &#8211; and dangerous"</span></a></p>
<p>The post <a rel="nofollow" href="https://www.privateinternetaccess.com/blog/the-latest-twist-on-adding-backdoors-to-encryption-is-spooky-and-dangerous/">The latest twist on adding backdoors to encryption is spooky &#8211; and dangerous</a> appeared first on <a rel="nofollow" href="https://www.privateinternetaccess.com/blog">Privacy News Online by Private Internet Access VPN</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Authorities around the world have been calling for <a href="https://www.privateinternetaccess.com/blog/?s=backdoors">backdoors to be added to strong encryption</a> for years – part of <a href="https://static.newamerica.org/attachments/3407-doomed-to-repeat-history-lessons-from-the-crypto-wars-of-the-1990s/Crypto%20Wars_ReDo.7cb491837ac541709797bdf868d37f52.pdf">an even older battle</a>. The view among all top security experts is that <a href="https://www.schneier.com/academic/paperfiles/paper-keys-under-doormats-CSAIL.pdf">this is a very bad idea</a>, since it is likely to add extra vulnerabilities to systems, which weakens the security for everyone. Despite that, Australia has gone ahead and <a href="https://www.privateinternetaccess.com/blog/2018/12/australia-passes-controversial-encryption-law-raising-serious-privacy-and-legal-concerns/">passed a law requiring backdoors</a>.</p>
<p>One reason the legislation was rushed through in its present dangerous form is that the main opposition party in Australia thought it would be able to improve things afterwards. Indeed, 12 days after the encryption law was passed, Australia&#8217;s Parliamentary Joint Committee on Intelligence and Security announced it would begin a review of the law. Even though <a href="https://digitalrightswatch.org.au/2019/02/22/international-civil-liberties-and-technology-coalition-urges-australian-parliament-to-amend-its-dangerous-encryption-law%EF%BB%BF/">leading technology companies and civil liberties organizations</a> are all strongly against the law, it&#8217;s not clear the review will lead to any radical changes. Australia&#8217;s Digital Rights Watch group <a href="https://digitalrightswatch.org.au/2019/02/14/senate-changes-to-encryption-legislation-are-a-step-in-the-right-direction/">wants the entire law repealed</a>:</p>
<blockquote><p>Encryption is not a barrier to a safe society – quite the opposite – it is a form of protection against criminal acts, including state-sponsored hacking. Encryption plays a role in protecting our digital infrastructure, such as the banking system, the electricity grid and mass transit systems. This is the future of warfare and encryption is one of our few defences against criminal and aggressive acts. It is an important line of defence against bad actors, and we weaken it at our peril.</p></blockquote>
<p>While Australia continues to argue about the use of &#8220;traditional&#8221; encryption backdoors, two senior officers from the UK&#8217;s signals intelligence agency, GCHQ, have published <a href="https://www.lawfareblog.com/principles-more-informed-exceptional-access-debate">an interesting proposal</a> that takes a different approach. It contains some welcome statements, such as: &#8220;Targeted exceptional access capabilities should not give governments unfettered access to user data.&#8221; They say they don&#8217;t propose that governments should have access to some kind of &#8220;global key&#8221; that can unlock any user&#8217;s data. They point out that &#8220;Government controlled global key escrow systems would be a catastrophically dumb solution in these cases.&#8221; They go on to propose what they see as an alternative to weakening strong encryption: silently adding law enforcement agents to otherwise encrypted conversations:</p>
<blockquote><p>The service provider usually controls the identity system and so really decides who’s who and which devices are involved &#8211; they’re usually involved in introducing the parties to a chat or call. You end up with everything still being end-to-end encrypted, but there’s an extra ‘end’ on this particular communication.</p></blockquote>
<p>They say this is no more intrusive than the technique used in traditional voice intercept solutions – clipping on extra wires to circuits – that it doesn’t give any government power they shouldn&#8217;t have, and does not require backdoors that weaken security. That all sounds promising, but experts have criticized the idea for various reasons. For example, <a href="https://www.lawfareblog.com/exceptional-access-devil-details-0">Susan Landau</a>, a professor in the Department of Computer Science, Tufts University, says:</p>
<blockquote><p>alligator clips, as they’re called on this side of the Atlantic, intercept communications, but they do so for communications for which the service provider has not made a commitment of providing end-to-end encryption. The difference between alligator clips and the proposed virtual crocodile clips [of GCHQ&#8217;s suggestion] is that in the latter, the service provider is being asked to change its communication system to provide exactly what the end-to-end encryption system was designed to prevent: access by a silent listener to the communication.</p></blockquote>
<p>The Electronic Frontier Foundation is also unconvinced. A post on its site points out that for a system involving these kind of &#8220;ghost&#8221; participants to work <a href="https://www.eff.org/deeplinks/2019/01/give-ghost-backdoor-another-name">would require client software to lie</a>:</p>
<blockquote><p>In WhatsApp’s UX [user experience], users can verify the security of a conversation by comparing “security codes” within the app. So for the ghost to work, there would have to be a way of forcing both users’ clients to lie to them by showing a falsified security code, as well as suppress any notification that the conversation’s keys had changed. Put differently, if GCHQ’s proposal went into effect, consumers could never again trust the claims that our software makes about what it’s doing to protect us.</p></blockquote>
<p>Fiddling with the code in this way would increase the risk that new vulnerabilities would be introduced, and that other actors could use the same ghost function to eavesdrop on supposedly secure conversations. That&#8217;s obviously bad for users and society in general. But the EFF is right to emphasize the fundamental problem with the GCHQ proposal: that it would undermine trust in an application and the company that made it – hardly a desirable result. <a href="https://www.lawfareblog.com/evaluating-gchq-exceptional-access-proposal">As well-known security expert Bruce Schneier puts it</a>: &#8220;Communications companies could no longer be honest about what their systems were doing, and we would have no reason to trust them if they tried.&#8221;</p>
<p>Matthew Green, a professor at Johns Hopkins University, says providers of messaging software are aware that this is a potential weakness, and are already <a href="https://blog.cryptographyengineering.com/2018/12/17/on-ghost-users-and-messaging-backdoors/">working to prevent users being misled by client software</a>. The GCHQ proposal therefore amounts to a government agency ordering a software company <i>not</i> to harden their systems against that kind of attack. Green warns that this could be just the start of governments vetting software: &#8220;In the worst-case outcome, we’ll be appointing agencies like GCHQ as the ultimate architect of Apple and Facebook’s communication systems.&#8221;</p>
<p>The author of the EFF post mentioned above has co-written another, more technical critique of the GCHQ proposal. The analysis sees four likely routes for <a href="https://www.lawfareblog.com/detecting-ghosts-reverse-engineering-who-ya-gonna-call">detecting when the ghost is present</a>: binary reverse engineering, cryptographic side channels, network-traffic analysis, and crash log analysis. The post also points out a different kind of flaw in the idea:</p>
<blockquote><p>There’s another pretty glaring problem with the ghost proposal that we’re not going to examine here &#8211; it only works with text or asynchronous protocols. It’s not immediately clear to us how it could be adapted to real-time audio or video communications.</p></blockquote>
<p>As the various critiques above make clear, however superficially attractive the GCHQ proposal might seem, it is problematic from multiple viewpoints. It certainly doesn&#8217;t resolve the long-standing tension between a desire for the authorities to have access to communications protected with strong encryption, and the requirement for the public, businesses and government to be able to use the Internet as safely as possible.</p>
<p>Featured image by <a href="https://www.maxpixel.net/Fear-Halloween-Silhouette-Scary-Horror-Hands-Dark-3777403">Max Pixel</a>.</p>
<p>The post <a rel="nofollow" href="https://www.privateinternetaccess.com/blog/the-latest-twist-on-adding-backdoors-to-encryption-is-spooky-and-dangerous/">The latest twist on adding backdoors to encryption is spooky &#8211; and dangerous</a> appeared first on <a rel="nofollow" href="https://www.privateinternetaccess.com/blog">Privacy News Online by Private Internet Access VPN</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Coalition calls on Australia’s government to reject plans to undermine encryption</title>
		<link>https://www.privateinternetaccess.com/blog/coalition-calls-on-australias-government-to-reject-plans-to-undermine-encryption/</link>
		
		<dc:creator><![CDATA[Christel Dahlskjaer]]></dc:creator>
		<pubDate>Fri, 20 Jul 2018 16:00:56 +0000</pubDate>
				<category><![CDATA[Encryption]]></category>
		<category><![CDATA[General Privacy News]]></category>
		<category><![CDATA[australia]]></category>
		<category><![CDATA[encryption]]></category>
		<guid isPermaLink="false">https://www.privateinternetaccess.com/blog/?p=8221</guid>

					<description><![CDATA[<p>Today, a global coalition led by civil society and technology experts sent a letter asking the government of Australia to abandon plans to introduce legislation that would undermine strong encryption. The letter calls on government officials to become proponents of digital security and work collaboratively to help law enforcement adapt to the digital era. In &#8230; <a href="https://www.privateinternetaccess.com/blog/coalition-calls-on-australias-government-to-reject-plans-to-undermine-encryption/" class="more-link">Continue reading<span class="screen-reader-text"> "Coalition calls on Australia’s government to reject plans to undermine encryption"</span></a></p>
<p>The post <a rel="nofollow" href="https://www.privateinternetaccess.com/blog/coalition-calls-on-australias-government-to-reject-plans-to-undermine-encryption/">Coalition calls on Australia’s government to reject plans to undermine encryption</a> appeared first on <a rel="nofollow" href="https://www.privateinternetaccess.com/blog">Privacy News Online by Private Internet Access VPN</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p dir="ltr"><a href="https://www.privateinternetaccess.com/blog/wp-content/uploads/2018/07/australia.jpg?x63129"><img loading="lazy" class="alignnone size-full wp-image-8267" src="https://www.privateinternetaccess.com/blog/wp-content/uploads/2018/07/australia.jpg?x63129" alt="Save Crypto | Secure Australia" width="800" height="336" srcset="https://www.privateinternetaccess.com/blog/wp-content/uploads/2018/07/australia.jpg 800w, https://www.privateinternetaccess.com/blog/wp-content/uploads/2018/07/australia-300x126.jpg 300w, https://www.privateinternetaccess.com/blog/wp-content/uploads/2018/07/australia-768x323.jpg 768w" sizes="(max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 984px) 61vw, (max-width: 1362px) 45vw, 600px" /></a><br />
Today, a global coalition led by civil society and technology experts sent a <a href="https://www.accessnow.org/cms/assets/uploads/2018/07/Australia-Encryption-Coalition-Letter.pdf">letter</a> asking the government of Australia to abandon plans to introduce legislation that would undermine strong encryption. The letter calls on government officials to become proponents of digital security and work collaboratively to help law enforcement adapt to the digital era.</p>
<p dir="ltr">In July 2017, Prime Minister Malcolm Turnbull held a press conference to announce that the government was drafting legislation that would compel device manufacturers to assist law enforcement in accessing encrypted information. In May of this year, Minister for Law Enforcement and Cybersecurity Angus Taylor restated the government’s priority to introduce legislation and traveled to the United States to speak with companies based there.</p>
<p dir="ltr">Today’s letter, signed by 76 organizations, companies, and individuals, asks leaders in the government “not to pursue legislation that would undermine tools, policies, and technologies critical to protecting individual rights, safeguarding the economy, and providing security both in Australia and around the world.”</p>
<p dir="ltr">Whether it’s online banking and purchases, secure communications with loved ones and colleagues, storage of sensitive data, or any number of other basic activities, we each rely on strong encryption to keep our personal information safe. Encryption and other digital security tools protect us against crimes like identity fraud, and in some circumstances, they provide important protections against physical harms.</p>
<p dir="ltr">“Australia is facing a choice on cybersecurity and encryption: real security or false,” said Nathan White, Senior Legislative Manager at <a href="https://accessnow.org">Access Now</a>. “The country can either be the testing ground for policies that undermine privacy and security in the digital era, or it can be a champion for human rights, leveraging its relationships to raise cybersecurity standards for the next generation. The world is watching.”</p>
<p dir="ltr">In addition to the letter delivered by experts today, thousands of concerned individuals in Australia and around the world have joined the call for members of Parliament to reject any proposal that undermines the security of tools and devices we all depend on. You can join them in taking action by signing the petition at <a href="https://secureaustralia.org.au/" target="_blank" rel="noopener noreferrer">SecureAustralia.org.au</a>.</p>
<p>&nbsp;</p>
<p>The post <a rel="nofollow" href="https://www.privateinternetaccess.com/blog/coalition-calls-on-australias-government-to-reject-plans-to-undermine-encryption/">Coalition calls on Australia’s government to reject plans to undermine encryption</a> appeared first on <a rel="nofollow" href="https://www.privateinternetaccess.com/blog">Privacy News Online by Private Internet Access VPN</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Australian Prime Minister Turnbull: The laws of mathematics don&#8217;t apply in Australia</title>
		<link>https://www.privateinternetaccess.com/blog/australian-prime-minister-turnbull-laws-mathematics-dont-apply-australia/</link>
		
		<dc:creator><![CDATA[Caleb Chen]]></dc:creator>
		<pubDate>Sat, 15 Jul 2017 12:28:59 +0000</pubDate>
				<category><![CDATA[General Privacy News]]></category>
		<category><![CDATA[Governments]]></category>
		<category><![CDATA[australia]]></category>
		<category><![CDATA[encryption]]></category>
		<guid isPermaLink="false">https://www.privateinternetaccess.com/blog/?p=5628</guid>

					<description><![CDATA[<p>Australia&#8217;s Prime Minister Michael Turnbull doesn&#8217;t believe in the laws of mathematics &#8211; a troubling sign for a world leader to say the least. Australia&#8217;s leader spoke the infamous words at a press conference yesterday in Sydney, Australia. When asked by a journalist if the laws of mathematics would trump the laws of Australia (as &#8230; <a href="https://www.privateinternetaccess.com/blog/australian-prime-minister-turnbull-laws-mathematics-dont-apply-australia/" class="more-link">Continue reading<span class="screen-reader-text"> "Australian Prime Minister Turnbull: The laws of mathematics don&#8217;t apply in Australia"</span></a></p>
<p>The post <a rel="nofollow" href="https://www.privateinternetaccess.com/blog/australian-prime-minister-turnbull-laws-mathematics-dont-apply-australia/">Australian Prime Minister Turnbull: The laws of mathematics don&#8217;t apply in Australia</a> appeared first on <a rel="nofollow" href="https://www.privateinternetaccess.com/blog">Privacy News Online by Private Internet Access VPN</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Australia&#8217;s Prime Minister Michael Turnbull doesn&#8217;t believe in the laws of mathematics &#8211; a troubling sign for a world leader to say the least. Australia&#8217;s leader spoke the infamous words at a press conference yesterday in Sydney, Australia. When asked by a journalist if the laws of mathematics would trump the laws of Australia (as they trump every man-made law ever), he <a href="http://www.pm.gov.au/media/2017-07-14/press-conference-attorney-general-senator-hon-george-brandis-qc-and-acting" target="_blank" rel="noopener noreferrer">responded</a>:</p>
<blockquote><p>&#8220;The laws of Australia prevail in Australia, I can assure you of that. The laws of mathematics are very commendable but the only law that applies in Australia is the law of Australia.&#8221;</p></blockquote>
<p>What&#8217;s revealed here is a dangerous misunderstanding of the laws of mathematics. To think that the laws of a country could somehow &#8220;beat&#8221; the natural laws of mathematics is exactly the mentality that makes encryption backdoors seem like a good idea. Now that it&#8217;s clear what these politicians think about mathematics, their stances on encryption make a lot more &#8220;sense.&#8221;</p>
<h2>Turnbull wants to make 2+2=5 in Australia</h2>
<p>Australia is pushing their anti-math, <a href="https://www.privateinternetaccess.com/blog/2017/06/australia-wants-able-read-encrypted-messages/">anti-encryption message</a> to the Five Eyes, and even the rest of the world. In places such as <a href="https://www.privateinternetaccess.com/blog/2017/07/new-dutch-law-allows-law-enforcement-digitally-wiretap-friends-family-get/">the Netherlands</a>, data mining and surveillance laws were just passed this past week. At this point, it seems unlikely that their anti-encryption ways will spread far, given that the United Nations has come out in support of end-to-end encryption without <a href="https://www.privateinternetaccess.com/blog/2017/07/prefer-backdoored-crypto-government-malware-third-way/">backdoors</a>, as has the <a href="https://www.privateinternetaccess.com/blog/2017/06/leading-european-politicians-call-state-art-end-end-encryption-no-backdoors/">EU</a>. Additionally, the <a href="https://www.privateinternetaccess.com/pages/united-nations-recommends-using-encryption">United States Human Rights Council</a> has also ruled that internet access to the open internet is a basic human right &#8211; and encryption is a key part of that. Australia, as Prime Minister Turnbull has revealed in spades, literally wants to make 2+2=5 in their quest for big brother surveillance powers. A politician that doesn&#8217;t understand the laws of mathematics shouldn&#8217;t be in the power to make such decisions. This isn&#8217;t a case of forgive for they know not what they do, though. At the end of the day, we do see certain governments such as the <a href="https://www.privateinternetaccess.com/blog/2017/05/uk-government-confirms-plans-destroy-british-software-industry/">UK</a>, <a href="https://www.privateinternetaccess.com/blog/2017/04/russia-threatens-ban-vpns-proxies-dont-censor-whatever-government-wants/">Russia</a>, and now Australia diving headlong into a world where the laws of mathematics are denied.</p>
<p>Like this article? Get notified by <a href="https://feedburner.google.com/fb/a/mailverify?uri=privacyonline">email</a> when there is a new article or signup to receive the latest news in the fight for Privacy via the <a href="http://feeds.feedburner.com/privacyonline">Online Privacy News RSS Feed</a>.</p>
<p>The post <a rel="nofollow" href="https://www.privateinternetaccess.com/blog/australian-prime-minister-turnbull-laws-mathematics-dont-apply-australia/">Australian Prime Minister Turnbull: The laws of mathematics don&#8217;t apply in Australia</a> appeared first on <a rel="nofollow" href="https://www.privateinternetaccess.com/blog">Privacy News Online by Private Internet Access VPN</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Australia wants to be able to read your encrypted messages</title>
		<link>https://www.privateinternetaccess.com/blog/australia-wants-able-read-encrypted-messages/</link>
					<comments>https://www.privateinternetaccess.com/blog/australia-wants-able-read-encrypted-messages/#comments</comments>
		
		<dc:creator><![CDATA[Caleb Chen]]></dc:creator>
		<pubDate>Mon, 26 Jun 2017 13:50:03 +0000</pubDate>
				<category><![CDATA[Encryption]]></category>
		<category><![CDATA[General Privacy News]]></category>
		<category><![CDATA[Governments]]></category>
		<category><![CDATA[australia]]></category>
		<category><![CDATA[backdoor]]></category>
		<category><![CDATA[e2e encryption]]></category>
		<guid isPermaLink="false">https://www.privateinternetaccess.com/blog/?p=5441</guid>

					<description><![CDATA[<p>Australia&#8217;s Attorney General Senator Brandis announced over the weekend that he would be leading the discussion on squeezing tech firms and forcing them to encryption backdoors in secure messaging apps at the next annual meeting of public security ministers and attorney generals from the Five Eyes countries (United States, Canada, United Kingdom, New Zealand, and &#8230; <a href="https://www.privateinternetaccess.com/blog/australia-wants-able-read-encrypted-messages/" class="more-link">Continue reading<span class="screen-reader-text"> "Australia wants to be able to read your encrypted messages"</span></a></p>
<p>The post <a rel="nofollow" href="https://www.privateinternetaccess.com/blog/australia-wants-able-read-encrypted-messages/">Australia wants to be able to read your encrypted messages</a> appeared first on <a rel="nofollow" href="https://www.privateinternetaccess.com/blog">Privacy News Online by Private Internet Access VPN</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Australia&#8217;s Attorney General Senator Brandis announced over the weekend that he would be leading the discussion on squeezing tech firms and forcing them to encryption backdoors in secure messaging apps at the next annual meeting of public security ministers and attorney generals from the Five Eyes countries (United States, Canada, United Kingdom, New Zealand, and Australia). Brandis <a href="https://www.reuters.com/article/us-australia-security-messaging-idUSKBN19G044" target="_blank" rel="noopener noreferrer">announced</a> his plan to seek greater power over encrypted messaging and the tech firms that provide it in a joint statement:</p>
<blockquote><p>&#8220;I will raise the need to address ongoing challenges posed by terrorists and criminals using encryption. These discussions will focus on the need to cooperate with service providers to ensure reasonable assistance is provided to law enforcement and security agencies.&#8221;</p></blockquote>
<p>It is still entirely unclear how these politicians would propose forcing tech firms to be able to decrypt messages without a backdoor &#8211; but it is clear that they will be discussing in earnest at the upcoming closed door meeting of these five countries&#8217; security arms.</p>
<h2>Australia to push tech companies for a way to read encrypted messages, continues to deny that such a thing is a backdoor</h2>
<p>Beyond the conundrum of how to technically provide a way to decrypt encrypted messages without an encryption backdoor&#8230; What about citizens&#8217; right to privacy? Earlier this month, as <a href="https://www.privateinternetaccess.com/blog/2017/04/413-australias-national-get-vpn-day-isps-telecoms-officially-begin-metadata-retention/">Australia&#8217;s plans</a> to talk about encrypted messaging at the upcoming Five Eyes meeting was first being unveiled, Australia&#8217;s cyber security special advisor, Alastair MacGibbon, tried to justify the move by <a href="https://www.theregister.co.uk/2017/06/07/australia_to_float_crypto_backdoors_to_fiveeyes/" target="_blank" rel="noopener noreferrer">saying</a> that:</p>
<blockquote><p>&#8220;From time to time we do expect our privacy to be breached. From time to time you would expect a law enforcement agency to break into a private communication online.&#8221;</p></blockquote>
<p>That is to say &#8211; The government is still actively trying to peddle the poisonous idea that privacy is not an absolute thing. Brandeis will likely find an ally in the United Kingdom, where <a href="https://www.privateinternetaccess.com/blog/2017/05/theresa-may-outlines-tory-plan-create-new-censored-internet-controlled-uk-government/">Theresa May</a> has called for <a href="https://www.privateinternetaccess.com/blog/2017/06/uk-prime-minister-theresa-may-war-on-terror-requires-porn-censorship-internet/">censorship</a> and encryption backdoors of their own. Russia is even attempting to ban <a href="https://www.privateinternetaccess.com/blog/2017/06/russian-fcc-threatens-to-ban-telegram-thereby-sending-russian-secrets-over-american-servers-instead/">Telegram</a>, their homegrown encrypted messaging app. In sharp contrast, politicians in the Europe have been calling for &#8220;state-of-the-art,&#8221; <a href="https://www.privateinternetaccess.com/blog/2017/06/leading-european-politicians-call-state-art-end-end-encryption-no-backdoors/">end-to-end encryption</a> and a clear lack of backdoors.</p>
<p>Like this article? Get notified by <a href="https://feedburner.google.com/fb/a/mailverify?uri=privacyonline">email</a> when there is a new article or signup to receive the latest news in the fight for Privacy via the <a href="http://feeds.feedburner.com/privacyonline">Online Privacy News RSS Feed</a>.</p>
<p>The post <a rel="nofollow" href="https://www.privateinternetaccess.com/blog/australia-wants-able-read-encrypted-messages/">Australia wants to be able to read your encrypted messages</a> appeared first on <a rel="nofollow" href="https://www.privateinternetaccess.com/blog">Privacy News Online by Private Internet Access VPN</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.privateinternetaccess.com/blog/australia-wants-able-read-encrypted-messages/feed/</wfw:commentRss>
			<slash:comments>4</slash:comments>
		
		
			</item>
		<item>
		<title>Australian Federal Police unapologetic after accessing a journalist&#8217;s metadata without a warrant</title>
		<link>https://www.privateinternetaccess.com/blog/australian-federal-police-unapologetic-accessing-journalists-metadata-without-warrant/</link>
		
		<dc:creator><![CDATA[Caleb Chen]]></dc:creator>
		<pubDate>Fri, 28 Apr 2017 15:33:23 +0000</pubDate>
				<category><![CDATA[General Privacy News]]></category>
		<category><![CDATA[Governments]]></category>
		<category><![CDATA[australia]]></category>
		<category><![CDATA[metadata]]></category>
		<guid isPermaLink="false">https://www.privateinternetaccess.com/blog/?p=4605</guid>

					<description><![CDATA[<p>The Australian Federal Police (AFP) admitted on Friday that they had illegally accessed call records metadata of an Australian journalist without seeking the proper warrant beforehand. In Australia, like many other countries, there are specific protections to keep law enforcement from willy nilly seeking private information on journalists and whistleblowers. To access the metadata that all &#8230; <a href="https://www.privateinternetaccess.com/blog/australian-federal-police-unapologetic-accessing-journalists-metadata-without-warrant/" class="more-link">Continue reading<span class="screen-reader-text"> "Australian Federal Police unapologetic after accessing a journalist&#8217;s metadata without a warrant"</span></a></p>
<p>The post <a rel="nofollow" href="https://www.privateinternetaccess.com/blog/australian-federal-police-unapologetic-accessing-journalists-metadata-without-warrant/">Australian Federal Police unapologetic after accessing a journalist&#8217;s metadata without a warrant</a> appeared first on <a rel="nofollow" href="https://www.privateinternetaccess.com/blog">Privacy News Online by Private Internet Access VPN</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The Australian Federal Police (AFP) admitted on Friday that they had illegally accessed call records metadata of an Australian journalist without seeking the proper warrant beforehand. In Australia, like many other countries, there are specific protections to keep law enforcement from willy nilly seeking private information on journalists and whistleblowers. To access the metadata that all Australian Internet service providers (ISPs) and telecoms are required to keep, the AFP is supposed to seek a Journalist Information Warrant.</p>
<p>Instead, AFP commissioner Mike Colvin confirmed that an investigator <em>illegally</em> accessed metadata about a journalist&#8217;s call records. The journalist has not been informed of the federal breach of his privacy; furthermore, the investigator that failed to seek a warrant has not been reprimanded at all. The official AFP reasoning from their internal review is that the illegal metadata breach happened due to &#8220;human error&#8221; and that there is no evidence of &#8220;ill will.&#8221; The Commonwealth Ombudsman is expected to carry out an audit of the incident next week.</p>
<h2>Reminder: Australian ISPs store metadata on everybody and police don&#8217;t generally need a warrant to view it</h2>
<p>Australians that don&#8217;t daylight or moonlight as journalists don&#8217;t even have the protection of a Journalist Information Warrant. Their metadata, which is officially being stored by every ISP and telecom on the continent, is openly available to law enforcement that seek it &#8211; and apparently with minimal oversight. April 13th, the day when the mandatory metadata retention laws (which even the <a href="https://www.privateinternetaccess.com/blog/2017/04/not-even-telcos-like-australias-mandatory-metadata-retention-scheme-aka-big-brother-policy/">ISPs and telcos</a> themselves don&#8217;t like) officially had to be followed, has been declared Australia&#8217;s <a href="https://www.privateinternetaccess.com/blog/2017/04/413-australias-national-get-vpn-day-isps-telecoms-officially-begin-metadata-retention/">Get a VPN day</a>. What&#8217;s worse, it&#8217;s very likely that despite promises to the contrary, <a href="https://www.privateinternetaccess.com/blog/2017/01/despite-promises-metadata-gathered-by-australian-mass-surveillance-may-be-made-available-to-civil-litigators-not-just-law-enforcement/">civil litigators</a> could have access to this metadata as well for civil cases involving such crimes such as <a href="https://www.privateinternetaccess.com/blog/2017/02/copyright-industry-works-methodically-erode-civil-liberties-human-rights/">copyright</a> infringement.</p>
<p>There are those that argue that it doesn&#8217;t matter if metadata is accessed. Thankfully, as the evidence mounts that metadata is usable for identification, this minority is shrinking. Metadata leaks are serious because <a href="https://www.privateinternetaccess.com/blog/2014/08/the-yo-app-demonstrates-how-metadata-is-private-data/">metadata is private data</a>. Paul Murphy, from the Media Entertainment and Arts Alliance, commented to <a href="http://www.abc.net.au/news/2017-04-28/afp-officer-accessed-journalists-call-records-in-metadata-breach/8480804" target="_blank" rel="noopener noreferrer">ABC.net.au</a>:</p>
<blockquote><p>&#8220;Despite all of the requirements put in place before a Journalist Information Warrant can be granted, the system has failed. This latest example shows that an overzealous and cavalier approach to individual&#8217;s metadata is undermining the right to privacy and the right of journalists to work with their confidential sources.&#8221;</p></blockquote>
<p>Journalists deserve the protections they were promised, but so do ordinary Australian citizens.</p>
<blockquote class="twitter-tweet" data-width="550">
<p lang="en" dir="ltr">I&#39;m so glad you&#39;re all so worried about journo&#39;s privacy rights, not like anyone else&#39;s privacy rights should matter yeah</p>
<p>&mdash; Asher Wolf (@Asher_Wolf) <a href="https://twitter.com/Asher_Wolf/status/857834725271941121">April 28, 2017</a></p></blockquote>
<p><script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script></p>
<p>When the government won&#8217;t protect your <a href="https://www.privateinternetaccess.com/blog/2017/03/government-wont-protect-online-privacy-youll/">online privacy</a>, you&#8217;ll have to do so yourself.</p>
<p>Like this article? Get notified by <a href="https://feedburner.google.com/fb/a/mailverify?uri=privacyonline">email</a> when there is a new article or signup to receive the latest news in the fight for Privacy via the <a href="http://feeds.feedburner.com/privacyonline">Online Privacy News RSS Feed</a>.</p>
<p>The post <a rel="nofollow" href="https://www.privateinternetaccess.com/blog/australian-federal-police-unapologetic-accessing-journalists-metadata-without-warrant/">Australian Federal Police unapologetic after accessing a journalist&#8217;s metadata without a warrant</a> appeared first on <a rel="nofollow" href="https://www.privateinternetaccess.com/blog">Privacy News Online by Private Internet Access VPN</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Not even the telcos like Australia&#8217;s mandatory metadata retention scheme aka the Big Brother policy</title>
		<link>https://www.privateinternetaccess.com/blog/not-even-telcos-like-australias-mandatory-metadata-retention-scheme-aka-big-brother-policy/</link>
		
		<dc:creator><![CDATA[Caleb Chen]]></dc:creator>
		<pubDate>Fri, 14 Apr 2017 14:28:52 +0000</pubDate>
				<category><![CDATA[General Privacy News]]></category>
		<category><![CDATA[Governments]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[australia]]></category>
		<category><![CDATA[telcos]]></category>
		<guid isPermaLink="false">https://www.privateinternetaccess.com/blog/?p=4454</guid>

					<description><![CDATA[<p>Now that Australia&#8217;s mandatory metadata retention regime is officially started, many are wondering how we got to this point and what we can do to stay private now that every piece of Australian origin metadata is being stored for two years. While companies and customers alike have known this day would come since 2015, both &#8230; <a href="https://www.privateinternetaccess.com/blog/not-even-telcos-like-australias-mandatory-metadata-retention-scheme-aka-big-brother-policy/" class="more-link">Continue reading<span class="screen-reader-text"> "Not even the telcos like Australia&#8217;s mandatory metadata retention scheme aka the Big Brother policy"</span></a></p>
<p>The post <a rel="nofollow" href="https://www.privateinternetaccess.com/blog/not-even-telcos-like-australias-mandatory-metadata-retention-scheme-aka-big-brother-policy/">Not even the telcos like Australia&#8217;s mandatory metadata retention scheme aka the Big Brother policy</a> appeared first on <a rel="nofollow" href="https://www.privateinternetaccess.com/blog">Privacy News Online by Private Internet Access VPN</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Now that Australia&#8217;s mandatory metadata retention regime is officially started, many are wondering how we got to this point and what we can do to stay private now that every piece of Australian origin metadata is being stored for two years. While companies and customers alike have known this day would come since 2015, both consumers and companies have reacted strongly. Australians even declared 4/13/17 to be <a href="https://www.privateinternetaccess.com/blog/2017/04/413-australias-national-get-vpn-day-isps-telecoms-officially-begin-metadata-retention/">National Get a VPN day</a> across the continent as education about VPNs vs metadata retention spread like wildfire.</p>
<h2>Australian Metadata Retention requirements are &#8220;basically a huge Big Brother policy&#8221;</h2>
<p>According to <a href="http://junkee.com/turns-new-metadata-scheme-full-holes-complete-mess/102087" target="_blank" rel="noopener noreferrer">Junkee</a>, an industry figure said:</p>
<blockquote><p>“We’re going to end up with this regime of laws that allow the government to access a huge amount of data on its citizens. They are retaining what devices you sent something from, where you were located, what time you sent it and who you sent it to. It’s not too long before you can use that to make the most amazing profile of everything you do. It’s basically a huge Big Brother policy that Australia has walked into.”</p></blockquote>
<p>By forcing the financial burden of compliance onto the private telecommunication and ISP companies, the government has created a perverse incentive structure. What is undoubtedly going to end up happening in Australia is that lobbyists will push for laws and regulation permitting, like they did in America, <a href="https://www.privateinternetaccess.com/blog/2017/02/internet-service-provider-isp-lobbied-fcc-permission-spy/">spying</a> on their customers. Telecom and ISP lobbies have already tried to argue that web browsing history and app data usage stats are not sensitive information. Now that all of these Australian companies are holding all of this data, at their own cost, they&#8217;re going to need to think of ways to make more money from that data &#8211; hopefully without following the <a href="https://www.privateinternetaccess.com/blog/2017/04/president-trump-makes-big-splash-swamp-signs-away-americans-internet-privacy/">American example</a>.</p>
<p>Angus Fotheringham of Inabox Group, an Australian telco, said:</p>
<blockquote><p>“It was so obvious to me that there was very little thought on the part of the regulator on the complexity of this issue on the wholesale side,”</p></blockquote>
<p>Also, the regulations requiring the storage of two years of metadata does not require proper, encrypted storage techniques &#8211; and experts fear that Australian metadata troves will be a high value target for hackers. The Australian government even set aside $130 million to help Australian telcos and ISPs to comply with the new law. Given the burden compliance, it&#8217;s entirely possible that some service providers might not even comply. John Stanton, the CEO of Australian association group the Communication Alliance, said:</p>
<blockquote><p>“There are 250 providers competing for 1 percent of the market. They’re mum and dad operators servicing their local community. Have they really got the smarts to do everything the law requires? In many cases they’ll either exit the industry or they’ll stay and hope they’re never asked for metadata by the government. The focus for the government will be on the top five-ten providers. That’s who they see as the main game. Frankly, I don’t see the regulator having the resources to chase all the other providers.&#8221;</p></blockquote>
<p>On their part, the Australian government downplayed the task at hand; a spokesperson for the Attorney General&#8217;s office said:</p>
<blockquote><p>&#8220;The Government&#8217;s data retention legislation simply standardised the type of data telecommunications service providers are required to retain and the length of time they need to keep it.&#8221;</p></blockquote>
<p>A stark reminder that they always had access to your metadata, your <a href="https://www.privateinternetaccess.com/blog/2016/05/phone-metadata-can-reveal-location-relationship-status-nsa-can-still-get-guise-hunting-terrorists/">metadata</a> can definitely reveal private things about your life, and now it&#8217;s just more easily query-able.</p>
<p>Like this article? Get notified by <a href="https://feedburner.google.com/fb/a/mailverify?uri=privacyonline">email</a> when there is a new article or signup to receive the latest news in the fight for Privacy via the <a href="http://feeds.feedburner.com/privacyonline">Online Privacy News RSS Feed</a>.</p>
<p>The post <a rel="nofollow" href="https://www.privateinternetaccess.com/blog/not-even-telcos-like-australias-mandatory-metadata-retention-scheme-aka-big-brother-policy/">Not even the telcos like Australia&#8217;s mandatory metadata retention scheme aka the Big Brother policy</a> appeared first on <a rel="nofollow" href="https://www.privateinternetaccess.com/blog">Privacy News Online by Private Internet Access VPN</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/

Object Caching 25/173 objects using disk
Page Caching using disk: enhanced 

Served from: ok.piaservers.com @ 2021-01-26 07:07:52 by W3 Total Cache
-->