{"id":2822,"date":"2017-10-09T13:27:10","date_gmt":"2017-10-09T03:27:10","guid":{"rendered":"https:\/\/blogs.qut.edu.au\/crime-and-justice-research-centre\/?p=2822"},"modified":"2018-01-15T14:05:07","modified_gmt":"2018-01-15T04:05:07","slug":"attacks-on-encryption-event-report","status":"publish","type":"post","link":"https:\/\/blogs.qut.edu.au\/crime-and-justice-research-centre\/2017\/10\/09\/attacks-on-encryption-event-report\/","title":{"rendered":"Attacks on Encryption &#8211; Event Report"},"content":{"rendered":"<p><a href=\"https:\/\/blogs.qut.edu.au\/crime-and-justice-research-centre\/files\/2017\/10\/Reece-etc.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-2823\" src=\"https:\/\/blogs.qut.edu.au\/crime-and-justice-research-centre\/files\/2017\/10\/Reece-etc-300x225.png\" alt=\"\" width=\"300\" height=\"225\" srcset=\"https:\/\/blogs.qut.edu.au\/crime-and-justice-research-centre\/files\/2017\/10\/Reece-etc-300x225.png 300w, https:\/\/blogs.qut.edu.au\/crime-and-justice-research-centre\/files\/2017\/10\/Reece-etc-768x576.png 768w, https:\/\/blogs.qut.edu.au\/crime-and-justice-research-centre\/files\/2017\/10\/Reece-etc-1024x768.png 1024w, https:\/\/blogs.qut.edu.au\/crime-and-justice-research-centre\/files\/2017\/10\/Reece-etc-400x300.png 400w, https:\/\/blogs.qut.edu.au\/crime-and-justice-research-centre\/files\/2017\/10\/Reece-etc.png 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p><em>Prof. Reece Walter with speakers<\/em><\/p>\n<p><a href=\"https:\/\/blogs.qut.edu.au\/crime-and-justice-research-centre\/files\/2017\/10\/Belinda-Carpenter.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-2824\" src=\"https:\/\/blogs.qut.edu.au\/crime-and-justice-research-centre\/files\/2017\/10\/Belinda-Carpenter-300x225.png\" alt=\"\" width=\"300\" height=\"225\" srcset=\"https:\/\/blogs.qut.edu.au\/crime-and-justice-research-centre\/files\/2017\/10\/Belinda-Carpenter-300x225.png 300w, https:\/\/blogs.qut.edu.au\/crime-and-justice-research-centre\/files\/2017\/10\/Belinda-Carpenter-768x576.png 768w, https:\/\/blogs.qut.edu.au\/crime-and-justice-research-centre\/files\/2017\/10\/Belinda-Carpenter-400x300.png 400w, https:\/\/blogs.qut.edu.au\/crime-and-justice-research-centre\/files\/2017\/10\/Belinda-Carpenter.png 960w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p><em>Belinda Carpenter opening the event<\/em><\/p>\n<p>On Thursday the 5th of October the Crime and Justice Research Centre, in collaboration with civil society groups the Australian Privacy Foundation, Digital Rights Watch Australia and FutureWise, and industry partner ThoughtWorks, hosted an event on \u2018Attacks on Encryption.\u2019 This in response to the Australian Government&#8217;s intention to pursue new and increased powers to access encrypted communications via s\u2019backdoors.\u2019<\/p>\n<p>A panel of encryption experts, international privacy law experts, politicians, digital rights advocates, and journalists examined the social and technical consequences of the proposed new &#8216;backdooring\u2019 powers. They argued these powers are unnecessary and should be highly concerning for Australians who, unlike other western democracies, do not have a constitutional right to privacy.<\/p>\n<p>Presentations from the night are available at the following links:<br \/>\nSurveillance politics<br \/>\nFormer Senator Mr Scott Ludlam<br \/>\n<a href=\"https:\/\/youtu.be\/Y-puLRRFohQ\">https:\/\/youtu.be\/Y-puLRRFohQ<\/a><\/p>\n<p>Legal dimensions of the global #waronmaths<br \/>\nAngela Daly, Digital Rights Watch Australia and QUT Law<br \/>\n<a href=\"https:\/\/youtu.be\/Y-puLRRFohQ?t=21m35s\">https:\/\/youtu.be\/Y-puLRRFohQ?t=21m35s<\/a><\/p>\n<p>Government attacks on encryption and civil society coalition campaigns<br \/>\nJustin Clacherty, Redfish Group, Australian Privacy Foundation, and Future Wise<br \/>\n<a href=\"https:\/\/youtu.be\/Y-puLRRFohQ?t=36m15s\">https:\/\/youtu.be\/Y-puLRRFohQ?t=36m15s<\/a><\/p>\n<p>Breaking Encryption for Dummies<br \/>\nRobin Doherty, ThoughtWorks and Hack for Privacy and Eru Penkman, ThoughtWorks and brisSafety<br \/>\n<a href=\"https:\/\/youtu.be\/Y-puLRRFohQ?t=58m50s\">https:\/\/youtu.be\/Y-puLRRFohQ?t=58m50s<\/a><br \/>\nSlides:\u00a0<a href=\"https:\/\/docs.google.com\/presentation\/d\/1izSTqTmO3Gl79KrliUoeBoFi44NceL4pSIbY8yl-Ur0\/edit?usp=sharing\">https:\/\/docs.google.com\/presentation\/d\/1izSTqTmO3Gl79KrliUoeBoFi44NceL4pSIbY8yl-Ur0\/edit?usp=sharing<\/a><\/p>\n<p>Encryption for journalists<br \/>\nFelix M\u00fcnch, PhD Candidate QUT Digital Media Research Centre<br \/>\n<a href=\"https:\/\/youtu.be\/Y-puLRRFohQ?t=1h22m\">https:\/\/youtu.be\/Y-puLRRFohQ?t=1h22m<\/a><br \/>\nSlides:<a href=\"https:\/\/flxvctr.github.io\/encrypt_all_the_things_primer\/\">\u00a0https:\/\/flxvctr.github.io\/encrypt_all_the_things_primer\/<\/a><\/p>\n<p>The contested moral legitimacy of encryption \u2018backdoors\u2019<br \/>\nMichael Wilson, QUT Justice PhD Candidate<br \/>\n<a href=\"https:\/\/youtu.be\/Y-puLRRFohQ?t=1h40m44s\">https:\/\/youtu.be\/Y-puLRRFohQ?t=1h40m44s<\/a><\/p>\n<p>Discussant<br \/>\nPhil Green, QLD Privacy Commissioner<br \/>\n<a href=\"https:\/\/youtu.be\/Y-puLRRFohQ?t=1h51m24s\">https:\/\/youtu.be\/Y-puLRRFohQ?t=1h51m24s<\/a><\/p>\n<p>Q&amp;A Panel<br \/>\n<a href=\"https:\/\/youtu.be\/Y-puLRRFohQ?t=1h58m32s\">https:\/\/youtu.be\/Y-puLRRFohQ?t=1h58m32s<\/a><\/p>\n<p>Further information about the event can be found at this link:<\/p>\n<p><a href=\"https:\/\/www.attacks-on-encryption.com\/\">https:\/\/www.attacks-on-encryption.com\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Prof. Reece Walter with speakers Belinda Carpenter opening the event On Thursday the 5th of October the Crime and Justice Research Centre, in collaboration with civil society groups the Australian Privacy Foundation, Digital Rights Watch Australia and FutureWise, and industry partner ThoughtWorks, hosted an event on \u2018Attacks on Encryption.\u2019 This in response to the Australian<\/p>\n","protected":false},"author":4341,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1,9697],"tags":[18778,18770,18767,9704,18768,18771,18769,18777],"class_list":{"0":"post-2822","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-uncategorized","7":"category-conferences","8":"tag-backdooring","9":"tag-attacksonencryption","10":"tag-australianprivacyfoundation","11":"tag-crimejusticequt","12":"tag-digitialrightswatchaustralia","13":"tag-encryption","14":"tag-futurewise","15":"tag-thoughtworks"},"acf":[],"_links":{"self":[{"href":"https:\/\/blogs.qut.edu.au\/crime-and-justice-research-centre\/wp-json\/wp\/v2\/posts\/2822","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.qut.edu.au\/crime-and-justice-research-centre\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.qut.edu.au\/crime-and-justice-research-centre\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.qut.edu.au\/crime-and-justice-research-centre\/wp-json\/wp\/v2\/users\/4341"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.qut.edu.au\/crime-and-justice-research-centre\/wp-json\/wp\/v2\/comments?post=2822"}],"version-history":[{"count":1,"href":"https:\/\/blogs.qut.edu.au\/crime-and-justice-research-centre\/wp-json\/wp\/v2\/posts\/2822\/revisions"}],"predecessor-version":[{"id":2825,"href":"https:\/\/blogs.qut.edu.au\/crime-and-justice-research-centre\/wp-json\/wp\/v2\/posts\/2822\/revisions\/2825"}],"wp:attachment":[{"href":"https:\/\/blogs.qut.edu.au\/crime-and-justice-research-centre\/wp-json\/wp\/v2\/media?parent=2822"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.qut.edu.au\/crime-and-justice-research-centre\/wp-json\/wp\/v2\/categories?post=2822"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.qut.edu.au\/crime-and-justice-research-centre\/wp-json\/wp\/v2\/tags?post=2822"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}