Hacker News
- Five Eyes' Statement of Principles on Access to Evidence and Encryption https://www.homeaffairs.gov.au/about/national-security/five-country-ministerial-2018/access-evidence-encryption 94 comments
- Five Eyes Statement of Principles on Access to Evidence and Encryption https://www.homeaffairs.gov.au/about/national-security/five-country-ministerial-2018/access-evidence-encryption 4 comments worldnews
- Five Eyes officially warns the tech world: build interception capabilities voluntarily or we'll legislate https://www.homeaffairs.gov.au/about/national-security/five-country-ministerial-2018/access-evidence-encryption 115 comments technology
- Five Eyes officially warns the tech world: build interception capabilities voluntarily or we'll legislate https://www.homeaffairs.gov.au/about/national-security/five-country-ministerial-2018/access-evidence-encryption 148 comments privacy
Linking pages
- ‘Five Eyes’ Nations Quietly Demand Government Access to Encrypted Data - The New York Times https://www.nytimes.com/2018/09/04/us/politics/government-access-encrypted-data.html 298 comments
- 'Five Eyes' governments call on tech giants to build encryption backdoors — or else | TechCrunch https://techcrunch.com/2018/09/03/five-eyes-governments-call-on-tech-giants-to-build-encryption-backdoors-or-else/ 233 comments
- An Australian encryption law could give the U.S. a back door to a back door. https://slate.com/technology/2018/10/australia-u-s-encryption-backdoor-law.html 98 comments
- US, UK, and other governments asks tech companies to build backdoors into encrypted devices - The Verge https://www.theverge.com/2018/9/3/17815196/five-eyes-encryption-backdoors-us-uk-australia-nz-canada 68 comments
- US and UK governments call for mandatory backdoors in encrypted chat | TechRadar https://www.techradar.com/news/compulsory-encryption-backdoors-for-us-uk-australia-canada-and-new-zealand 48 comments
Related searches:
Search whole site: site:www.homeaffairs.gov.au
Search title: Five Eyes' Statement of Principles on Access to Evidence and Encryption
See how to search.