Menu Close

Articles on Encryption

Displaying 21 - 40 of 102 articles

New legislation allows Australian government agencies to access encrypted WhatsApp messages. from www.shutterstock.com

Australians accept government surveillance, for now

The government can access your phone metadata, drivers licence photo and much more. And new research shows Australians are OK about it. But that might change.
Secure communications are increasingly important. maxuser/Shutterstock.com

Is your VPN secure?

Virtual private network companies make lots of promising claims about their services. Most people don’t have the skills to double-check their providers. So this group of researchers did the testing.
Albanese predicts next week’s ALP national conference will be “very. constructive”, dismissing concerns about divisions over boat turnbacks. Mick Tsikas/AAP

Politics with Michelle Grattan: Anthony Albanese on Labor’s road ahead

Anthony Albanese on Labor’s road ahead CC BY67.5 MB (download)
Speaking to The Conversation, Albanese wouldn't comment on Bill Shorten's unpopularity with voters, arguing instead that it's a matter of whether the Labor team is “seen as worthy of election".
It might sound scary, but the ‘dark web’ is not much different from the rest of the internet. Willequet Manuel/Shutterstock.com

Illuminating the ‘dark web’

Begun as part of efforts to preserve online anonymity and privacy, Freenet, Tor and the Invisible Internet Project are, like the rest of the web, home to both crime and free expression.
The Department of Home Affairs argues this new framework will not compel communications providers to build systemic weaknesses or vulnerabilities into their systems. Mick Tsikas/AAP

The devil is in the detail of government bill to enable access to communications data

The broad and ill-defined new powers outlined in the government’s new telecommunications bill are neither necessary nor proportionate – and contain significant scope for abuse.
Cloud computing has become every-day tool, but its security is questionable. New methods are developed to prevent data breaches. Mark Warner/Flickr

Why we need to improve cloud computing’s security

Cloud computing is on the rise, but so are questions about its security. This is why we need systems where the data itself enforces security, not just the cloud system within which it is contained.

Top contributors

More