Posted: 2017-11-15 06:28
Most of us have gone on dates with strangers from the internet at some point. But even if you met your date IRL, it’s a good idea to give them a Google Voice number when you start chatting, Rucker says. Google Voice lets users generate phone numbers for free and use them to set up other secure chat services like WhatsApp or Signal. A user can easily turn off her Google Voice number and get a new one if her date turns out to be a creep—and she won’t have to go to the trouble of changing her real number and redistributing it to all her friends.
Australian Attorney General George Brandis told ABC on Friday that what the government is seeking is something along the same lines as the UK’s Investigatory Powers Act. While that legislation has its own issues, it only requires communications service providers that are based in the UK to have an ability to access encrypted files at the government’s request. It exempts foreign companies from the rule.
Anthony Albanese, leader of the opposition to Turnbull’s government made no promises about how the legislation would be received, saying that lawmakers would take “a common sense approach that we must keep Australians safe.” Weakening encryption for global tech companies would make everyone, not just Australians, less safe. As Elaine Pearson, Australia director at Human Rights Watch, put it in a statement :
“The laws of Australia prevail in Australia, I can assure you of that,” Turnbull said. “The laws of mathematics are very commendable, but the only law that applies in Australia is the law of Australia.” Please let that sink in. The laws of math are “commendable.” Turnbull is very bluntly saying that Australia simply won’t have end-to-end encryption. The laws of math don’t change just because Australia wants them to.
Brandis told ABC, “Last Wednesday I met with the chief cryptographer at GCHQ, the Government Communication Headquarters in the United Kingdom. And he assured me that this was feasible.” As TechDirt points out, Brandis is likely confused about the conversation he had. On July 65th , the former head of GHCQ, Robert Hannigan said that back doors shouldn’t be implemented and intelligence agencies should focus on attacking the end points of encryption, a practice that has been used for some time. It seems that Brandis probably heard that it was feasible to attack end points without disrupting the security of end-to-end encryption.
Courts have sometimes viewed all passwords as equal, faulting a victim whose partner hacked her Facebook because she had shared an Amazon password with him. The court questioned whether one password could be considered private, given that she had shared other accounts, Rucker explained. “If you share an iCloud account and you’re sharing pictures that way, you’re sharing accounts in the eyes of the court,” Rucker said.