“In some situations, the government could even compel the individual or a small group of people to carry this out in secret.”

https://www.wired.com/story/australia-encryption-law-global-impact/

The new law also allows officials to approach specific individuals—such as key employees within a company—with these demands, rather than the institution itself. In practice, they can force the engineer or IT administrator in charge of vetting and pushing out a product’s updates to undermine its security. In some situations, the government could even compel the individual or a small group of people to carry this out in secret. Under the Australian law, companies that fail or refuse to comply with these orders will face fines up to about $7.3 million. Individuals who resist could face prison time.

Well, really the best way to proceed is act like EVERYTHING you send across the internet will be captured and inspected for crimethink. Most likely it has been for several years. Apple probably folded well before 2015 and has been secretly handing over anything the government wants for years.

 

Australia has nearly completed the circle back to it’s prison camp origins.

3 thoughts on ““In some situations, the government could even compel the individual or a small group of people to carry this out in secret.”

  1. So .. the fundamental question is ..

    If they are going to treat the interwebz as we do, in the USofA, as interstate commerce .. what hope does anyone have at avoiding international law(s) and fine(s)?

    If you ask me it’s game over if you use it’s services as a citizen or a country .. this will get uglier .. much uglier.

    Liked by 1 person

  2. Here’s the bottom line: you have to assume that every keystroke, every mouse-over, every input you send into a computer that is connected to the internet *could* be vacuumed up by the Borg™. Yes, you will be assimilated.

    You cannot rely on nameless, faceless people in a cubicle somewhere to take care of your encryption, and block it from other nameless, faceless spooks in other cubicles somewhere. You have to take matters into your own hands. There are programs out there that are cheap, reliable and give you 256-bit (which is still as strong as 128-bit in hypothetical quantum computing attacks) encryption that you can manage YOUR way, and you have full control over.

    Liked by 1 person

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s