On Thu, Jun 15, 2017 at 02:28:19PM +1000, Mark Newton wrote: > On 06/15/2017 12:28 PM, Andrew McN wrote: > >On 15/06/17 10:06, Matt Palmer wrote: > >>On Tue, Jun 13, 2017 at 05:48:38PM +1000, Andrew McN wrote: > >>>I doubt they'd bother trying to breaking encryption. It seems more > >>>likely that their plan is to force players like Google or IOS to push > >>>malware out to people's phones to circumvent the encryption. > >>Even easier plan: just make failing to supply decryption keys an offense > >>punishable by more time than the offense they'll get you for otherwise. > >That alerts the person being spied on. > > Also doesn't work when the key they want is generated by a device, not a > person; and the person never knows what it is. > > Don't offer up solutions unless and until you've thought through the > problem-space, otherwise you're just wasting everybody's time.
Why do you think a solution has to work in order for it to become law? At any rate, I'm not proposing it as a *good* solution, I'm observing that it is the way things are already going in certain places -- ones that Alastair McGibbon has said have a good model that Australia should look into. The other option is that the government continue to fail to "fix" the encryption problem, and keep using it as a lever to force all sorts of other problematic practices into law, under the guise of "stopping terruhrists". Remember: if a politician actually fixes a problem, they lose it as a campaign platform. If they make it worse with their ham-fisted attempts, they're set for life. - Matt -- "For once, Microsoft wasn't exaggerating when they named it the 'Jet Engine' -- your data's the seagull." -- Chris Adams _______________________________________________ AusNOG mailing list AusNOG@lists.ausnog.net http://lists.ausnog.net/mailman/listinfo/ausnog