Skip to Content
Computing

Australia’s ban on encryption could endanger us all

December 10, 2018

The Australian government has passed a law that forces tech companies to give police and security agencies access to encrypted messages, claiming it’s needed to fight crime.

What it says: The Assistance and Access Bill 2018 is a world first, letting law enforcement bodies require companies to hand over user information, even if it’s end-to-end encrypted. Because companies currently have no way of viewing end-to-end encrypted messages, they will be forced to build a “back door” to gain access.

The problem: But once you create a back door to bypass encryption for law enforcement purposes, it weakens security for everyone, everywhere. It cannot be targeted at just one person or one group of users, and it provides a potential avenue for hackers. For example, the UK health service’s biggest ever cyberattack—using WannaCry ransomware—was possible thanks to a Windows exploit found by the NSA in the US.

The future implications: We won’t know for sure until agencies start to use the new powers. Companies could leave Australia or argue they are not subject to Australian law. Amendments to the law are due to be raised for debate next year, but substantive changes seem unlikely.

Deep Dive

Computing

Erik Prince wants to sell you a “secure” smartphone that’s too good to be true

MIT Technology Review obtained Prince’s investor presentation for the “RedPill Phone,” which promises more than it could possibly deliver.

Corruption is sending shock waves through China’s chipmaking industry

The arrests of several top semiconductor fund executives could force the government to rethink how it invests in the sector.

Inside the software that will become the next battle front in US-China chip war

The US has moved to restrict export of EDA software. What is it, and how will the move affect China?

Hackers linked to China have been targeting human rights groups for years

In a new report shared exclusively with MIT Technology Review, researchers expose a cyber-espionage campaign on “a tight budget” that proves simple can still be effective.

Stay connected

Illustration by Rose Wong

Get the latest updates from
MIT Technology Review

Discover special offers, top stories, upcoming events, and more.

Thank you for submitting your email!

Explore more newsletters

It looks like something went wrong.

We’re having trouble saving your preferences. Try refreshing this page and updating them one more time. If you continue to get this message, reach out to us at customer-service@technologyreview.com with a list of newsletters you’d like to receive.