Data Retention: the new laws of Australia Entry into force of

2:21 PM
Data Retention: the new laws of Australia Entry into force of -

As of 13 October 2015, Australia has passed into law some of the restrictive laws on data retention in the Western world. If you look, and understand what they mean, you wonder if this is the type of legislation emerging from repressive regimes like China or Syria.

The cost for ISPs could be quite high, causing them to have to raise their prices. The cost to consumers could also be raised at any time a large amount of data is stored unnecessarily, someone comes along and hacks it. Despite the high costs, retention laws can be circumvented easily and at lower cost. We will examine all this now.

Australia Why did he create these new data retention laws?

As has been done for centuries, and with increasing frequency now, a government official cried "There are bad guys! We'll do this to protect you! "While claiming a restriction on your freedom is in your best interest. Your current Prime Minister of Australia, Malcolm Turnbull, actually introduced this bill when he was Minister of Communications

To quotes him :.

"No responsible government can sit while we protect those who lose access to vital information, especially in the current context of high threat."

"You're under attack! But I will protect you by following your every digital movements. Take it with as many grains of salt you need.

What types of communications, and how many are covered?

The data retention laws in Australia cover metadata of all movements online. This is a follow-on who you talk, when you talk to them, how many times you talk to them, etc. What is not covered is the message. These are not followed or detained by law

To see the details, the Australian legislation for data retention requires keeping your :.

  • IP address
  • connected time and time spent on the Internet
  • amount or volume of your uploads and downloads
  • The location data

This information is stored for a period of two years. It is collected, regardless of whether or not you are suspected of a crime. It is a mass surveillance tool that targets the innocent and guilty alike.

what is the problem with the new laws on detention of Australian data

Although the content of the messages are not kept, the activities that people get up to are. The data stored gives people a clear picture of who you are, what you do online with your smartphone, and you spend your days. This can be a problem because of :.

  • Hackers can gain access, steal, and sell
  • The information may be requested much more minor offenses that issues related to terrorism and the protection of children who are overshadowed again and again.
  • Stalkers with hacking skills can use it to track where you are and you find.

Not only that, but there will be a MASSIVE cost to ISPs which will retain all this information. The servers are not free. Internet security agents protect this information do not work for free, and are already in short supply. There are allowances to help ISPs to obtain government funding, but guess where that money comes from? Taxes. You. Even if your ISP raises prices because of the additional cost, it is still your tax money used.

The big big problem, that nobody thinks of is how easy it is to circumvent these laws. Encryption . Encrypting your Internet traffic. Use messaging applications to encrypt your text messages.

What can you protect against Australian laws data retention

This multi data million retention in Australia project can be defeated for as little as $ 3.33 / month with the cheapest we look VPN: private Internet access . Best of all, they do not keep data at all or

To quote Green Party leader Senator Scott Ludlam:

He publicly admitted that you and someone else can easily overcome these laws with encryption via VPN! Even the Prime Minister himself has admitted using encryption tools to hide the same laws enacting it! To be like him, you can try using encrypted phone apps instead of SMS and the cellular network:

  • Wickr
  • Threema
  • TextSecure
  • Surespot

Remember those -ci are not intended to encrypt your Internet traffic. You still need a VPN to encrypt and hide all the information they will store from there.

Your privacy is your business. Using a VPN on your computer, on your iPhone and tablet mobile and texting applications mentioned, and owning your privacy again.

Parting thoughts Snowden ...

image feature via 3dkombinat / Shutterstock

Previous
Next Post »
0 Komentar