Speaking to The Conversation, Albanese wouldn't comment on Bill Shorten's unpopularity with voters, arguing instead that it's a matter of whether the Labor team is “seen as worthy of election".
Both the Coalition and Labor agreed to new laws that will give law enforcement agencies the power to access encrypted systems.
As both sides played the tactics, a remarkable thing happened in the House of Representatives. Behaviour improved 100%, with
none of the usual screaming and exchanges of insults.
Begun as part of efforts to preserve online anonymity and privacy, Freenet, Tor and the Invisible Internet Project are, like the rest of the web, home to both crime and free expression.
The broad and ill-defined new powers outlined in the government's new telecommunications bill are neither necessary nor proportionate – and contain significant scope for abuse.
The strengths of blockchain technologies could help address the weaknesses of health care systems to store and secure medical records.
It is hard to predict when quantum computers will be strong and fast enough to crack the codes that keep bitcoin safe. But that day is coming.
It is hard to know whether metadata retention has been effective or necessary. We can only hope that the debate over accessing and analysing encrypted services is a little more enlightening.
The ban on Queensland Members of Parliament using encrypted messaging apps for government business should be accompanied by a willingness to strengthen official accountability across the board.
Could an employer or platform claim copyright in a chat group? We’d first have to accept that conversations in a chat group are protected by copyright.
Storing data in the cloud is convenient, but how secure is it? And what are users' options for stepping up their data security?
Prime numbers are a mathematical mystery.
Scholars dig in to the debate on whether police should be able to defeat or circumvent encryption systems.
The FBI and police officials say they need to decrypt secure communications to fight crime. But they have other options, and modern threats make clear the importance of strong encryption.
Cloud computing is on the rise, but so are questions about its security. This is why we need systems where the data itself enforces security, not just the cloud system within which it is contained.
KRACK can only be used in certain circumstances, and there are some steps you can take to keep your internet traffic safe.
Every government, business or organisation releasing data needs to think about how to ensure that the risk of re-identifying an individual or revealing personal information about someone is low.
While security researchers are yet to perform a thorough analysis of iOS 11 and Face ID, past issues with the hardware and software of the iPhone point to areas of potential concern.
Some of the iPhone's innovations have made users less secure.
Many Australians are unaware of current police and intelligence powers when it comes to accessing our data.