mnot’s blog

Design depends largely on constraints.” — Charles Eames

Internet

Monday, 29 June 2020

What limits legal access to cloud data in Australia?

The Telecommunications and Other Legislation Amendment (Assistance and Access) Act 20181 has proven controversial both before and after passage,2 with considerable debate about its industry assistance framework and its potential for systemically weakening encryption on the Internet - a framing emphasised by the explanatory memorandum which introduced the legislation as ‘measures to better deal with the challenges posed by ubiquitous encryption.’3 Telecommunications and Other Legislation Amendment (Assistance and Access) Act 2018 (Cth). ↩ See, eg, Stilgherrian, ‘What’s actually in Australia’s encryption laws? Everything you need to know’ ZDNet (online, 10 December 2018) https://www.zdnet.com/article/whats-actually-in-australias-encryption-laws-everything-you-need-to-know/. ↩ Explanatory Memorandum, Telecommunications and Other Legislation Amendment (Assistance and Access) Act 2018 (Cth), 2 [1]. ↩

this entry’s page

Tuesday, 11 June 2019

Moving Control to the Endpoints

The introduction of encrypted DNS is a natural step in the process of securing the Internet, but it has brought a considerable amount of controversy, because it removes a means of control for network operators -- including not only enterprises but also schools and parents. The solution is to move control of these services to the endpoints of communication -- for example, the users’ computers -- but doing so has its own challenges.

this entry’s page