Australia also wants to prevent manufacturers from encrypting their systems

About a year ago, A collation of the unfortunate attacks in San Bernardino, we were recounting one of the most peculiar events between Apple and security agencies of the United States of America. The ban was opened in terms of the means that manufacturing firms used to protect the privacy of their users and to what extent this can undermine national security.

Is now Australia who joins the extravagant request of the United States of America, in the land of kangaroos they also want Apple to stop encrypting the operating system and even messages. This encryption to which companies submit the operating system protects us in an important way against lovers of others.

They have taken this new measure through the proposal of a new Law that would force technology companies such as Apple to work with the country's authorities to decrypt the communications of their devices, among other things they can read our messages without our consent, despite the fact that the Cupertino team has worked hard on an encryption system which makes it quite difficult to access them and which undoubtedly adds value to the mobile device.

We need to make sure that the internet is not a tool for evil people, preventing them from hiding their criminal activities. The reality is that these types of text and voice messaging applications are currently used by all of us, but also They use those people who want to hurt us.

The classic excuse of national security by flag, and taking into account the classic mentality in the Australian country, the possibilities that this Act will succeed are many. Definitely, another that adds to the request of the United Kingdom and the United States of America that Apple include back doors in their systems.


Follow us on Google News

Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: AB Internet Networks 2008 SL
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.