© British library Sloane MS 1876 f1v
The secret recipe came from Arthur Dee, 17th-century alchemist and royal physician to the Tsar.
Apple has developed the means to scan images on your phone. Can you trust the company to protect your privacy?
Sheldon Cooper/SOPA Images/LightRocket via Getty Images
Big Tech makes a lot of promises about protecting privacy, but the reality is that using the industry’s products is a matter of trust.
If you have an Apple device and upload photos to iCloud, the company will use some clever math to sniff them for instances of child abuse – without actually looking at the photos.
Vinicius "amnx" Amano/Unsplash
Apple will scan all photos uploaded to the cloud for child sexual abuse without actually looking at the photos. Privacy experts are concerned by the lack of public accountability.
The AN0M app was programmed by law enforcement to allow ‘back-door’ access. This led to the retrieval of information that culminated in hundreds of search warrants.
Researchers tried several times to have the document declassified, including in 1992, 2004 and 2016. It was initially written to help American NSA agents crack difficult coded messages.
Having an end-to-end encrypted messaging ‘ecosystem’ is a great way for Facebook to evade the full wrath of the law. It has come at a convenient time, too.
Facebook’s initiative places the company in a complicated situation, as increased user privacy, while positive, could come with potential impunity for offenders.
Facebook is planning to put end-to-end encryption on all its messaging services soon. But governments aren’t happy about it, as it could make it harder to catch criminals.
This SDS Sigma 7 computer sent the first message over the predecessor of the internet in 1969.
Andrew 'FastLizard4' Adams/Wikimedia Commons
The first internet communication was underwhelming, thanks to a computer crash. But a lot has happened since then – including key decisions that helped build the internet of today.
The American Survival Research Foundation offered a reward of $1,000 for cracking one of Thouless’s two codes within three years of his death. It was not claimed.
Computer capabilities have boosted our decryption technology to great heights. How will the future compare to a past, one in which codes were thought to be a means of communicating after death?
United Kingdom officials suggest that messaging apps should build in law enforcement access to encrypted text, raising concerns about user privacy.
A recent proposal by the United Kingdom’s Government Communications Headquarters agency suggests building in law enforcement access to encrypted communications. This has implications for users’ digital rights and privacy.
Telegram was targeted in a distributed denial-of-service (DDoS) attack during the protests.
Telegram enabled protesters in Hong Kong to evade surveillance, but a DDoS attack and the arrest of a group administrator undermined the ability of protesters to organise and communicate.
As police face greater obstacles with encryption, courts are divided on whether compelling people to reveal their passwords is legal.
In a recent Canadian court case, defence and prosecution argued over whether a suspect was required to provide his password to allow for a search warrant to be executed on his phone.
Atlassian boss Scott Farquhar says the government’s encryption laws ‘threatens jobs’.
AAP Image/Erik Anderson
A forum of Australian tech companies this week was told the government’s encryption laws could see Australian jobs moved overseas. Labor’s promised to “fix” the laws, but that could be too late.
We need a cyber safety equivalent to the Slip! Slop! Slap! campaign to nudge behavioural change in the community.
If the next government is serious about protecting Australian businesses and families, here are seven concrete actions it should take immediately upon taking office.
New legislation allows Australian government agencies to access encrypted WhatsApp messages.
The government can access your phone metadata, drivers licence photo and much more. And new research shows Australians are OK about it. But that might change.
Secure communications are increasingly important.
Virtual private network companies make lots of promising claims about their services. Most people don’t have the skills to double-check their providers. So this group of researchers did the testing.
Prepare to protect yourself.
Think defensively about your online accounts and data security – and don’t assume you’ll avoid harm.
Albanese predicts next week’s ALP national conference will be “very.
constructive”, dismissing concerns about divisions over boat
Speaking to The Conversation, Albanese wouldn't comment on Bill Shorten's unpopularity with voters, arguing instead that it's a matter of whether the Labor team is “seen as worthy of election".
Law enforcement agencies can force access to your encrypted systems.
Both the Coalition and Labor agreed to new laws that will give law enforcement agencies the power to access encrypted systems.
For Scott Morrison, the final sitting fortnight has been excruciating.
As both sides played the tactics, a remarkable thing happened in the House of Representatives. Behaviour improved 100%, with
none of the usual screaming and exchanges of insults.