The online safety bill contains measures that appear to compel messaging services to break encryption.
An online exhibition includes access to personal newspaper advertisements from 1860 to 1879 transcribed from archives.
(Jacquelyn Sundberg and Nathalie Cooke)
Personal ads of ‘the Agony Column’ were full of longing, tragedy and profound misfortune. Intrigue they generated has had an enduring effect on literature and film.
Your phone could soon replace your passwords.
Xavier Lorenzo/Moment via Getty Images
Passwords are both annoying to use and vulnerable to hackers. Google is moving to support stronger, easier-to-use passkeys (and other tech companies are close behind).
A look inside the quantum computing process. Quantum technology is a $142 billion opportunity that could employ 229,000 Canadians by 2040.
(Photonic)
Canada is well positioned to gain far-reaching economic and social benefits from the rapidly developing quantum industry, but it must act now to secure its success.
European Commissioner for Home Affairs Ylva Johansson announced a set of proposed regulations requiring tech companies to report child sexual abuse material.
AP Photo/Francisco Seco
The EU’s proposed regulations don’t align with existing technology. They’re likely to fail – or to break the internet as we know it.
Organizations have significantly increased their use of data and the internet because of the pandemic, leading to new cyberattack and cybersecurity risks.
THE CANADIAN PRESS/Jonathan Hayward
Camélia Radu, Université du Québec à Montréal (UQAM) dan Nadia Smaili, Université du Québec à Montréal (UQAM)
An integrative cybersecurity and data protection program will help firms adjust their management protocols and be better prepared for future cybersecurity trends.
The secret recipe came from Arthur Dee, 17th-century alchemist and royal physician to the Tsar.
Apple has developed the means to scan images on your phone. Can you trust the company to protect your privacy?
Sheldon Cooper/SOPA Images/LightRocket via Getty Images
Big Tech makes a lot of promises about protecting privacy, but the reality is that using the industry’s products is a matter of trust.
If you have an Apple device and upload photos to iCloud, the company will use some clever math to sniff them for instances of child abuse – without actually looking at the photos.
Vinicius "amnx" Amano/Unsplash
Apple will scan all photos uploaded to the cloud for child sexual abuse without actually looking at the photos. Privacy experts are concerned by the lack of public accountability.
The AN0M app was programmed by law enforcement to allow ‘back-door’ access. This led to the retrieval of information that culminated in hundreds of search warrants.
Researchers tried several times to have the document declassified, including in 1992, 2004 and 2016. It was initially written to help American NSA agents crack difficult coded messages.
Having an end-to-end encrypted messaging ‘ecosystem’ is a great way for Facebook to evade the full wrath of the law. It has come at a convenient time, too.
Facebook’s initiative places the company in a complicated situation, as increased user privacy, while positive, could come with potential impunity for offenders.
SHUTTERSTOCK
Facebook is planning to put end-to-end encryption on all its messaging services soon. But governments aren’t happy about it, as it could make it harder to catch criminals.
This SDS Sigma 7 computer sent the first message over the predecessor of the internet in 1969.
Andrew 'FastLizard4' Adams/Wikimedia Commons
The first internet communication was underwhelming, thanks to a computer crash. But a lot has happened since then – including key decisions that helped build the internet of today.
The American Survival Research Foundation offered a reward of $1,000 for cracking one of Thouless’s two codes within three years of his death. It was not claimed.
Shutterstock.com
Computer capabilities have boosted our decryption technology to great heights. How will the future compare to a past, one in which codes were thought to be a means of communicating after death?
United Kingdom officials suggest that messaging apps should build in law enforcement access to encrypted text, raising concerns about user privacy.
Shutterstock
A recent proposal by the United Kingdom’s Government Communications Headquarters agency suggests building in law enforcement access to encrypted communications. This has implications for users’ digital rights and privacy.
Telegram was targeted in a distributed denial-of-service (DDoS) attack during the protests.
Jerome Favre/AAP
Telegram enabled protesters in Hong Kong to evade surveillance, but a DDoS attack and the arrest of a group administrator undermined the ability of protesters to organise and communicate.
As police face greater obstacles with encryption, courts are divided on whether compelling people to reveal their passwords is legal.
Shutterstock
In a recent Canadian court case, defence and prosecution argued over whether a suspect was required to provide his password to allow for a search warrant to be executed on his phone.
Atlassian boss Scott Farquhar says the government’s encryption laws ‘threatens jobs’.
AAP Image/Erik Anderson
A forum of Australian tech companies this week was told the government’s encryption laws could see Australian jobs moved overseas. Labor’s promised to “fix” the laws, but that could be too late.
We need a cyber safety equivalent to the Slip! Slop! Slap! campaign to nudge behavioural change in the community.
Shutterstock
If the next government is serious about protecting Australian businesses and families, here are seven concrete actions it should take immediately upon taking office.