The American Survival Research Foundation offered a reward of $1,000 for cracking one of Thouless’s two codes within three years of his death. It was not claimed.
Computer capabilities have boosted our decryption technology to great heights. How will the future compare to a past, one in which codes were thought to be a means of communicating after death?
United Kingdom officials suggest that messaging apps should build in law enforcement access to encrypted text, raising concerns about user privacy.
A recent proposal by the United Kingdom's Government Communications Headquarters agency suggests building in law enforcement access to encrypted communications. This has implications for users' digital rights and privacy.
Telegram was targeted in a distributed denial-of-service (DDoS) attack during the protests.
Telegram enabled protesters in Hong Kong to evade surveillance, but a DDoS attack and the arrest of a group administrator undermined the ability of protesters to organise and communicate.
As police face greater obstacles with encryption, courts are divided on whether compelling people to reveal their passwords is legal.
In a recent Canadian court case, defence and prosecution argued over whether a suspect was required to provide his password to allow for a search warrant to be executed on his phone.
Atlassian boss Scott Farquhar says the government’s encryption laws ‘threatens jobs’.
AAP Image/Erik Anderson
A forum of Australian tech companies this week was told the government's encryption laws could see Australian jobs moved overseas. Labor's promised to "fix" the laws, but that could be too late.
We need a cyber safety equivalent to the Slip! Slop! Slap! campaign to nudge behavioural change in the community.
If the next government is serious about protecting Australian businesses and families, here are seven concrete actions it should take immediately upon taking office.
New legislation allows Australian government agencies to access encrypted WhatsApp messages.
The government can access your phone metadata, drivers licence photo and much more. And new research shows Australians are OK about it. But that might change.
Secure communications are increasingly important.
Virtual private network companies make lots of promising claims about their services. Most people don't have the skills to double-check their providers. So this group of researchers did the testing.
Prepare to protect yourself.
Think defensively about your online accounts and data security – and don't assume you'll avoid harm.
Albanese predicts next week’s ALP national conference will be “very.
constructive”, dismissing concerns about divisions over boat
Speaking to The Conversation, Albanese wouldn't comment on Bill Shorten's unpopularity with voters, arguing instead that it's a matter of whether the Labor team is “seen as worthy of election".
Law enforcement agencies can force access to your encrypted systems.
Both the Coalition and Labor agreed to new laws that will give law enforcement agencies the power to access encrypted systems.
For Scott Morrison, the final sitting fortnight has been excruciating.
As both sides played the tactics, a remarkable thing happened in the House of Representatives. Behaviour improved 100%, with
none of the usual screaming and exchanges of insults.
It might sound scary, but the ‘dark web’ is not much different from the rest of the internet.
Begun as part of efforts to preserve online anonymity and privacy, Freenet, Tor and the Invisible Internet Project are, like the rest of the web, home to both crime and free expression.
The Department of Home Affairs argues this new framework will not compel communications providers to build systemic weaknesses or vulnerabilities into their systems.
The broad and ill-defined new powers outlined in the government's new telecommunications bill are neither necessary nor proportionate – and contain significant scope for abuse.
Finding ways to link health care data in a secure and confidential way.
The strengths of blockchain technologies could help address the weaknesses of health care systems to store and secure medical records.
Part of IBM Research’s quantum computer.
It is hard to predict when quantum computers will be strong and fast enough to crack the codes that keep bitcoin safe. But that day is coming.
Despite its enormous cost, the metadata retention scheme wasn’t future-proof.
It is hard to know whether metadata retention has been effective or necessary. We can only hope that the debate over accessing and analysing encrypted services is a little more enlightening.
Queensland’s Ministerial Code now bans Ministers from using private email and messaging apps.
The ban on Queensland Members of Parliament using encrypted messaging apps for government business should be accompanied by a willingness to strengthen official accountability across the board.
Can a company claim intellectual property rights over a conversation between contractors?
Could an employer or platform claim copyright in a chat group? We’d first have to accept that conversations in a chat group are protected by copyright.
Is this cloud secure?
Storing data in the cloud is convenient, but how secure is it? And what are users' options for stepping up their data security?