Telegram enabled protesters in Hong Kong to evade surveillance, but a DDoS attack and the arrest of a group administrator undermined the ability of protesters to organise and communicate.
In a recent Canadian court case, defence and prosecution argued over whether a suspect was required to provide his password to allow for a search warrant to be executed on his phone.
A forum of Australian tech companies this week was told the government's encryption laws could see Australian jobs moved overseas. Labor's promised to "fix" the laws, but that could be too late.
If the next government is serious about protecting Australian businesses and families, here are seven concrete actions it should take immediately upon taking office.
The government can access your phone metadata, drivers licence photo and much more. And new research shows Australians are OK about it. But that might change.
Virtual private network companies make lots of promising claims about their services. Most people don't have the skills to double-check their providers. So this group of researchers did the testing.
Think defensively about your online accounts and data security – and don't assume you'll avoid harm.
Speaking to The Conversation, Albanese wouldn't comment on Bill Shorten's unpopularity with voters, arguing instead that it's a matter of whether the Labor team is “seen as worthy of election".
Both the Coalition and Labor agreed to new laws that will give law enforcement agencies the power to access encrypted systems.
As both sides played the tactics, a remarkable thing happened in the House of Representatives. Behaviour improved 100%, with
none of the usual screaming and exchanges of insults.
Begun as part of efforts to preserve online anonymity and privacy, Freenet, Tor and the Invisible Internet Project are, like the rest of the web, home to both crime and free expression.
The broad and ill-defined new powers outlined in the government's new telecommunications bill are neither necessary nor proportionate – and contain significant scope for abuse.
The strengths of blockchain technologies could help address the weaknesses of health care systems to store and secure medical records.
It is hard to predict when quantum computers will be strong and fast enough to crack the codes that keep bitcoin safe. But that day is coming.
It is hard to know whether metadata retention has been effective or necessary. We can only hope that the debate over accessing and analysing encrypted services is a little more enlightening.
The ban on Queensland Members of Parliament using encrypted messaging apps for government business should be accompanied by a willingness to strengthen official accountability across the board.
Could an employer or platform claim copyright in a chat group? We’d first have to accept that conversations in a chat group are protected by copyright.
Storing data in the cloud is convenient, but how secure is it? And what are users' options for stepping up their data security?
Prime numbers are a mathematical mystery.
Scholars dig in to the debate on whether police should be able to defeat or circumvent encryption systems.